ChaptersCircleEventsBlog
Take the Cloud Security & AI Trends Survey for a chance to win a free CCSK token ($445 value) or a CCZT + CCSK training bundle ($1,250 value)!

Event Presentations

Event Presentations

Browse Event Presentations

CCSK, CCAK, and The Relationship Between the Two

CCSK, CCAK, and The Relationship Between the Two
Release Date: 11/04/2021

The presentation will cover the target audience and the relationship between the certificates and the different training offerings available. This present...

Request to download
CSA STAR – The Answer to Less Complexity and Higher Level of Compliance and Assurance

CSA STAR – The Answer to Less Complexity and Higher Level of Compliance and Assurance
Release Date: 11/04/2021

Cloud adoption has been growing rapidly over the years due to business benefits such as cost savings, scalability, increased security, ease of deployment....

Request to download
Shifting Left the Right Way with OSCAL, Dr. Michaela Iorga, Senior Security Technical Lead for Cloud Computing, National Institute of Standards and Technology (NIST/ITL)

Shifting Left the Right Way with OSCAL, Dr. Michaela Iorga, Senior Security Technical Lead for Cloud Computing, National Institute of Standards and Technology (NIST/ITL)
Release Date: 10/29/2021

A key component of the Cloud Development Lifecycle (CDLC) is the early development phase involving infrastructure as code (IaC), which is used to define a...

Request to download
 Auditing and Compliance in Cloud-native Environments, Chris Hughes, Co-Founder and CISO, Aquia

Auditing and Compliance in Cloud-native Environments, Chris Hughes, Co-Founder and CISO, Aquia
Release Date: 10/29/2021

Why you need a SaaS governance plan, and what should be in itThe rapid proliferation of authorized and unauthorized software-as-a-service solutions presen...

Request to download
2021 State of Federal Cloud Security; A Practitioners Perspective, Dr. Mari J. Spina, Principal Cyber Security Engineer, The MITRE Corp.

2021 State of Federal Cloud Security; A Practitioners Perspective, Dr. Mari J. Spina, Principal Cyber Security Engineer, The MITRE Corp.
Release Date: 10/29/2021

The US Federal Government has been headed into the cloud since introduction of its Cloud First policy in 2011. Since then a series of executive orders and...

Request to download
Metrics and Measurements for the CSA CCM

Metrics and Measurements for the CSA CCM
Release Date: 09/19/2021

A number of the controls in the most current version of the CSA’s Cloud Controls Matrix require that the organization develop and implement metrics. Also,...

Request to download
Delivering Continuous Compliance using CSA CCM and NIST OSCAL

Delivering Continuous Compliance using CSA CCM and NIST OSCAL
Release Date: 09/19/2021

In our rapidly changing information technology portfolios, compliance, as imagined typically, does not match compliance as implemented.  CSA has rece...

Request to download
Advancing the Cybersecurity Workforce: Opportunities for an Ecosystem Approach

Advancing the Cybersecurity Workforce: Opportunities for an Ecosystem Approach
Release Date: 09/19/2021

Cybersecurity talent shortage is a fallacy. Talented individuals are struggling to get their foot in the door in a cyber career. Hiring managers need to f...

Request to download
Cloud Native Security & Policy Management

Cloud Native Security & Policy Management
Release Date: 09/19/2021

Improved security is a key benefit of cloud-native technologies, because of immutability and segregation of resources in containers, microservices, server...

Request to download
Think Fast! - Machine Learning for Improved Security

Think Fast! - Machine Learning for Improved Security
Release Date: 09/19/2021

Cloud computing has ushered in an explosion of tools and resources to swiftly adapt applications, business processes, and even create entire industries. W...

Request to download
Using the CSA CAIQ for Acquisition Diligence

Using the CSA CAIQ for Acquisition Diligence
Release Date: 09/19/2021

If you are considering acquiring tech companies, it’s a terrible mistake to ignore their security posture in the current threat climate. The CSA CAIQ (Con...

Request to download
Protecting Against the Future of Ransomware

Protecting Against the Future of Ransomware
Release Date: 09/19/2021

With recent events such as the JBS and Colonial Pipeline attacks making Ransomware an international conversation, security professionals are being asked t...

Request to download
Emergence, Divergence & Convergence: Adapting to Disparate Clouds

Emergence, Divergence & Convergence: Adapting to Disparate Clouds
Release Date: 09/19/2021

Learn how to start adapting your security skills and approach to governance to navigate and succeed in the ever-growing world of disparate clouds, standar...

Request to download
Threat Modeling in Today's Cloud - Ransomware, Supply Chain, and more

Threat Modeling in Today's Cloud - Ransomware, Supply Chain, and more
Release Date: 09/19/2021

Threat modeling is an essential practice for software and systems security. Cloud threat modeling expands on standard threat modeling practices to account...

Request to download
Setting Common Language when Talking to Leadership about IT Risks

Setting Common Language when Talking to Leadership about IT Risks
Release Date: 09/19/2021

To be successful in presenting IT security to senior leadership, it's important it is done in a way that they can ingest, process, and understand; because...

Request to download
Head in the clouds, feet on the ground.

Head in the clouds, feet on the ground.
Release Date: 09/19/2021

Even before the pandemic, people were losing the ability to be in the moment. Future generations will ask what it was like living through the COVID-19 Pan...

Request to download
Zero Trust Frameworks: The Major Approaches

Zero Trust Frameworks: The Major Approaches
Release Date: 09/19/2021

This talk examines the major frameworks for Zero Trust security: Forrester ZTX, NIST SP800-207, and Google BeyondCorp. Each has its own philosophy, but th...

Request to download
Is Bug Bounty Right For You?

Is Bug Bounty Right For You?
Release Date: 09/19/2021

Bug bounties have become ubiquitous in the last several years, allowing companies to leverage extension talent pools outside of their formal employment.&n...

Request to download
Trust in Security Automation – The Key to Defending the Expanding Threat Landscape

Trust in Security Automation – The Key to Defending the Expanding Threat Landscape
Release Date: 09/19/2021

With cyberattack volumes growing exponentially, the only way to gain the upper hand against attackers is to integrate automation into your cybersecurity a...

Request to download
Not Another Boring Cyber Insurance Discussion - The State and Future of Cyber Insurance

Not Another Boring Cyber Insurance Discussion - The State and Future of Cyber Insurance
Release Date: 09/19/2021

Based upon the published OMG discussion paper, The State and Future of Cyber Insurance, the co-authors will briefly present the synopsis of the paper, lea...

Request to download