Browse Event Presentations
![]() | A Framework for Succeeding in Digital Transformation Digital transformation has become a business imperative for nearly every organization. However, progress in achieving transformation goals has been ... Request to download |
![]() | Advancing the Cybersecurity Workforce: Opportunities for an Ecosystem Approach Cybersecurity talent shortage is a fallacy. Talented individuals are struggling to get their foot in the door in a cyber career. Hiring managers need to f... Request to download |
![]() | CSA Federal Summit 2020 - Virtual Webinar Series In the Federal Summit Webinar Series, the Cloud Security Alliance addressed many factors that are at play to implement a secure, user-friendly cloud instance... Request to download |
![]() | CloudBytes Connect View presentations from the CloudBytes Connect, a multi-day virtual event program that brought the collaboration of research and community to the forefront. ... Request to download |
![]() | CSA Virtual EU Summit 2020 View presentations from the inaugural CSA EU Summit. This four-day event drew a cross-section of EU government agencies from the region who shared case studi... Request to download |
![]() | The Resurgence of Cloud |
![]() | Latest Trends in Intelligence Management Part of the CSA Federal Summit 2020, this presentation by TruStar chairman Paul Kurtz discusses intelligence management. Request to download |
![]() | Cloud Resilience: Tested by Pandemic Part of the CSA Federal Summit 2020, this presentation by Jim Reavis, CEO at CSA, discusses the impact of the recent pandemic on cloud. Request to download |
![]() | Cybersecurity in a Post-COVID World Part of the CSA Federal Summit 2020, this presentation by Bob Flores, CEO at Applicology, discusses what cybersecurity will look like after COVID-19. Request to download |
![]() | Implementing a Work from Home Security Strategy Part of the CSA Federal Summit 2020, this presentation by Jerry Archer, Chief Security Officer at Sallie Mae, covers how to implement a work from home securi... Request to download |
![]() | Cloud computing security in the NIS Directive |
![]() | CSA Security Trust Assurance and Risk (STAR) |
![]() | 7th Analysis on the State-of-the-Art on Cloud Security Adoption in Spain and Latin America |
![]() | The Community Draft of the Revised C5 |
![]() | Cyber Security Act and IT-Security Law 2.0 – Actual developments in security labelling |
![]() | Digital Transformation Requires Security Transformation |
![]() | How to scale Vendor Security Management |
![]() | How Cybersecurity Certification can Foster the EU Cybersecurity Market |
![]() | Leveraging Automation to Achieve Security in a Multi-Cloud Environment |
![]() | Taking Control of IoT: An Enterprise Perspective |