Browse Event Presentations
North Carolina Summit Presentations Bundle This is a Cloud Security Alliance Bundle containing 2 resources. Request to download | |
Remediating Critical Vulns in 12 hours or less: Lessons Learned From Log4j - North Carolina Mitigating critical vulnerabilities, whether on-prem or in the cloud, is a race against bad actors who are seeking to exploit those weaknesses for nefario... Request to download | |
CSA Cloud Threat Modeling Tabletop Exercise Threat modeling is essential for cybersecurity programs in order to identify risks that could impact business operations. Whether this is during a DevSecO... Request to download |