Browse Event Presentations
SECtember 2022 Presentations Bundle This is a Cloud Security Alliance Bundle containing 18 resources. Request to download | |
4 Use Cases for Cloud Detection and Response in the SOC In this presentation, Keith Mokris, VP of Cloud Security Evangelism at Orca Security, will expand on four use cases straight from the Security Operations ... Request to download | |
Reporting Risk in the Cloud Without a holistic way of reporting metrics such as key performance and risk indictors in the cloud, financial institutions often struggle to track and ar... Request to download | |
Policy-as-Code CSA’s Cloud Controls Matrix (CCM) and other frameworks provide a comprehensive approachto identifying controls to meet security, risk, and compliance requ... Request to download | |
Cloud Privacy GRC Cloud providers, other tech companies and heavy cloud users are particularly challenged to implement and mature their privacy governance, risk management ... Request to download | |
Taming Multi-Cloud Identity with a New Standard Gartner projects 80% of corporate IT will be cloud-based by 2025, with 81% using two or more cloud platforms. Since each cloud platform has its own identi... Request to download | |
Transforming Information Security for Businesses of All Sizes In order to combat cyber threats for organizations of all sizes and the supply chain, how information security is delivered and managed requires transform... Request to download | |
The Future of Work is Probably Not What You Think This presentation will challenge conventional thinking about how the tech workforce will evolve in the faceof (1) a persistently volatile marketplace... Request to download | |
Protect Every Application on Any Cloud At organizations with multi-cloud operations, security teams face deeper complexity when securing applications and workloads across environments.Luckily, ... Request to download | |
An Executive View on How Zero Trust Protects Organizations by Securely Connecting Users to Resources from Anywhere What is Zero Trust and Security Service Edge? What are the best practices to create an effective Zero Trust strategy that aligns with NIST 800-207? Does t... Request to download | |
How NTT DATA embarked on the Zero Trust Journey 2022 is about Zero Trust being the number one priority of every organization’s cybersecurity roadmap. On May 12th 2021, an Executive Order turned into pol... Request to download | |
Take a Deep Dive Into Common SaaS Data Breaches — And How to Avoid Them SaaS adoption has exploded over the past decade. What used to be point solutions are now fully developed platforms with large ecosystems of connected appl... Request to download | |
State of Financial Services in the Cloud Financial institutions and their partners are moving quickly to migrate further into cloud computing. This presentation will discuss the emergence of rece... Request to download | |
Four Tips for Communicating about Cybersecurity Risk to Non IT Audiences Everybody thinks they are brilliant at communicating with business stakeholders. While some people are right ... we can always be better. Let's spend some... Request to download | |
CSA as a Guiding Light to Cybersecurity With cloud finally entrenched as the primary IT system worldwide and cloud security now the foundation of cybersecurity programs, partnering with CSA is c... Request to download | |
Democratize Cloud Security with your CNAPP As cloud adoption expands, security teams are faced with securing an increasingly complex cloud estate. Keeping pace requires a new approach. Completely a... Request to download | |
Implementing an External Attack Surface Management Program Digital transformation, increased adoption of cloud and Internet of Things (IoT), a growing remote workforce, and a technology talent shortage have led to... Request to download | |
Measuring the Maturity of Your Cloud Security Program What is mature cloud security, and how mature is your organization? Is there a way to track maturity progress and hire the right people? We will dive into... Request to download | |
The Evolution of Private/Public Collaboration and Responsibility CISA has shifted its focus from traditional public/private partnership to one focused on operational collaboration. The results are already paying off, bu... Request to download |