Browse Event Presentations
Attacker Mindset in the Cloud | |
Zero Trust Virtual Summit Session Recordings Featuring a world-class program of speakers and panelists, CSA's Virtual Zero Trust Summit delivered critical insights into a variety of Zero Trust focuse... Request to download | |
4 Use Cases for Cloud Detection and Response in the SOC In this presentation, Keith Mokris, VP of Cloud Security Evangelism at Orca Security, will expand on four use cases straight from the Security Operations ... Request to download | |
Key Challenge Testing Report #1 | |
CSA MITRE CAVEaT Tabletop Exercise Join us as CSA’s Director of Research John Yeoh introduces the Joint CSA-MITRE Cloud Adversarial, Vectors, and Threats (CAVEaT) Collaboration to develop, ... Request to download | |
The Slow Gazelle Are you predator or are you prey? Things haven't changed much in more than 2 decades of failure and much like the slow gazelle in the wild we are ri... Request to download | |
Software Transparency: Securing the Digital Supply Chain This session will discuss relevant events and emerging requirements of the software supply chain. It will be touching on topics such as SolarWinds, Log4j,... Request to download | |
Advancing Cloud Security Automation Security plays an instrumental role in the rapidly evolving cloud landscape. NIST and CSA provide fundamental guidance and tools to help organizations add... Request to download | |
2022 State of Federal Cloud Security The US Federal Government has been headed into the cloud since the introduction of its Cloud First policy in 2011. Since then, a series of executive order... Request to download | |
Weaponizing Ambiguity As technology evolves, security programs are increasingly becoming larger and more complex. Success isn’t a given when a program grows, adds new capabilit... Request to download | |
Trust but Verify: Avoiding Cybersecurity Blind Spots Have you ever wondered why some organizations don’t seem to have problems with cybersecurity? As an example, have you ever heard about a FedRAMP certified... Request to download | |
Policy-as-Code CSA’s Cloud Controls Matrix (CCM) and other frameworks provide a comprehensive approachto identifying controls to meet security, risk, and compliance requ... Request to download | |
Cloud Privacy GRC Cloud providers, other tech companies and heavy cloud users are particularly challenged to implement and mature their privacy governance, risk management ... Request to download | |
Reporting Risk in the Cloud Without a holistic way of reporting metrics such as key performance and risk indictors in the cloud, financial institutions often struggle to track and ar... Request to download | |
Transforming Information Security for Businesses of All Sizes In order to combat cyber threats for organizations of all sizes and the supply chain, how information security is delivered and managed requires transform... Request to download | |
The Future of Work is Probably Not What You Think This presentation will challenge conventional thinking about how the tech workforce will evolve in the faceof (1) a persistently volatile marketplace... Request to download | |
Taming Multi-Cloud Identity with a New Standard Gartner projects 80% of corporate IT will be cloud-based by 2025, with 81% using two or more cloud platforms. Since each cloud platform has its own identi... Request to download | |
An Executive View on How Zero Trust Protects Organizations by Securely Connecting Users to Resources from Anywhere What is Zero Trust and Security Service Edge? What are the best practices to create an effective Zero Trust strategy that aligns with NIST 800-207? Does t... Request to download | |
Protect Every Application on Any Cloud At organizations with multi-cloud operations, security teams face deeper complexity when securing applications and workloads across environments.Luckily, ... Request to download | |
Take a Deep Dive Into Common SaaS Data Breaches — And How to Avoid Them SaaS adoption has exploded over the past decade. What used to be point solutions are now fully developed platforms with large ecosystems of connected appl... Request to download |