Browse Event Presentations
SECtember Presentations Bundle This is a Cloud Security Alliance Bundle containing 17 resources. Request to download | |
Advancing the Cybersecurity Workforce: Opportunities for an Ecosystem Approach Cybersecurity talent shortage is a fallacy. Talented individuals are struggling to get their foot in the door in a cyber career. Hiring managers need to f... Request to download | |
Cloud Native Security & Policy Management Improved security is a key benefit of cloud-native technologies, because of immutability and segregation of resources in containers, microservices, server... Request to download | |
Emergence, Divergence & Convergence: Adapting to Disparate Clouds Learn how to start adapting your security skills and approach to governance to navigate and succeed in the ever-growing world of disparate clouds, standar... Request to download | |
Protecting Against the Future of Ransomware With recent events such as the JBS and Colonial Pipeline attacks making Ransomware an international conversation, security professionals are being asked t... Request to download | |
Zero Trust Frameworks: The Major Approaches This talk examines the major frameworks for Zero Trust security: Forrester ZTX, NIST SP800-207, and Google BeyondCorp. Each has its own philosophy, but th... Request to download | |
Metrics and Measurements for the CSA CCM A number of the controls in the most current version of the CSA’s Cloud Controls Matrix require that the organization develop and implement metrics. Also,... Request to download | |
Threat Modeling in Today's Cloud - Ransomware, Supply Chain, and more Threat modeling is an essential practice for software and systems security. Cloud threat modeling expands on standard threat modeling practices to account... Request to download | |
Is Bug Bounty Right For You? Bug bounties have become ubiquitous in the last several years, allowing companies to leverage extension talent pools outside of their formal employment.&n... Request to download | |
Setting Common Language when Talking to Leadership about IT Risks To be successful in presenting IT security to senior leadership, it's important it is done in a way that they can ingest, process, and understand; because... Request to download | |
Delivering Continuous Compliance using CSA CCM and NIST OSCAL In our rapidly changing information technology portfolios, compliance, as imagined typically, does not match compliance as implemented. CSA has rece... Request to download | |
Think Fast! - Machine Learning for Improved Security Cloud computing has ushered in an explosion of tools and resources to swiftly adapt applications, business processes, and even create entire industries. W... Request to download | |
Head in the clouds, feet on the ground. Even before the pandemic, people were losing the ability to be in the moment. Future generations will ask what it was like living through the COVID-19 Pan... Request to download | |
Using the CSA CAIQ for Acquisition Diligence If you are considering acquiring tech companies, it’s a terrible mistake to ignore their security posture in the current threat climate. The CSA CAIQ (Con... Request to download | |
Trust in Security Automation – The Key to Defending the Expanding Threat Landscape With cyberattack volumes growing exponentially, the only way to gain the upper hand against attackers is to integrate automation into your cybersecurity a... Request to download | |
Not Another Boring Cyber Insurance Discussion - The State and Future of Cyber Insurance Based upon the published OMG discussion paper, The State and Future of Cyber Insurance, the co-authors will briefly present the synopsis of the paper, lea... Request to download | |
Protecting the Privacy of Healthcare Data in the Cloud Privacy is concerned with decisions about legitimate access to, use of, and alteration of information. Privacy establishes a framework for deciding who sh... Request to download | |
A Framework for Succeeding in Digital Transformation Digital transformation has become a business imperative for nearly every organization. However, progress in achieving transformation goals has been ... Request to download |