Browse Event Presentations
![]() | CISO Responsibilities Matrix: Understanding the CISO Role |
![]() | Implementing zero-trust network with service mesh and kubernetes |
![]() | Fireside Chat with Tima Soni, Director of Cybersecurity at UNICC |
![]() | Existential Challenges Facing Cybersecurity |
![]() | The Cloud Profile: A Rosetta Stone for Cloud, Security, and Finance Sector Compliance |
![]() | The Sovereign Cloud for Germany Philipp Trinius, VP Cloud, Network & IT Security, Deutsche Telekom Security |
![]() | CxO Trust Summit RSAC 2022 - Context is King: The CNAPP Revolution Download this presentation. Request to download |
![]() | CxO Trust Summit RSAC 2022 - Embracing a Cloud-First Model Download this presentation. Request to download |
![]() | CxO Trust Summit RSAC 2022 - Measuring the Maturity of Your Cloud Security ProgramKey Amidst the accelerated digital transformation of the past two years, enterprises across sectors have gone from dipping their toes in the cloud to being fu... Request to download |
![]() | Remediating Critical Vulns in 12 hours or less: Lessons Learned From Log4j - North Carolina Mitigating critical vulnerabilities, whether on-prem or in the cloud, is a race against bad actors who are seeking to exploit those weaknesses for nefario... Request to download |
![]() | CSA Cloud Threat Modeling Tabletop Exercise Threat modeling is essential for cybersecurity programs in order to identify risks that could impact business operations. Whether this is during a DevSecO... Request to download |
![]() | Rethinking How We Approach and Implement Security Well The unprecedented scale enabled by the cloud revolution has come at a cost: an explosive growth in vulnerability, as each SaaS platform and cyber asset ad... Request to download |
![]() | CSA Cloud Threat Modeling Tabletop Exercise MN Summit with John Yeoh, Sean Heide and Jon-Michael Brook Request to download |
![]() | Remediating Critical Vulns in 12 hours or less: Lessons Learned From Log4j Remediating Critical Vulns in 12 hours or less: Lessons Learned From Log4j Request to download |
![]() | Enabling Clouds, Together CSA Minnesota Summit,Param Vig, President, Cloud Security Alliance, Minnesota Chapter Request to download |
![]() | Charting the course through Disruption In this presentation, J.R. Santos, Chief Customer Officer for the Cloud Security Alliance, will share his vision for the direction of CSA, discussing the ... Request to download |
![]() | CSA Federal Summit 2021: FedRAMP Automation FedRAMP has seen an incredible increase in the adoption of the program, both in agency participation and reuse of authorizations. FedRAMP's Program Manage... Request to download |
![]() | CSA Chapter Summit Links A collection of resources and links that were referenced throughout the event. Request to download |
![]() | CCM V4 what's new? Deep dive into the new CSA cloud security framework. The presentation will specifically focus on the Implementation and Auditing Guidelines and will give the audience an understanding of how to use them in o... Request to download |
![]() | CSA STAR – The Answer to Less Complexity and Higher Level of Compliance and Assurance Cloud adoption has been growing rapidly over the years due to business benefits such as cost savings, scalability, increased security, ease of deployment.... Request to download |