Browse Event Presentations
An Executive View on How Zero Trust Protects Organizations by Securely Connecting Users to Resources from Anywhere What is Zero Trust and Security Service Edge? What are the best practices to create an effective Zero Trust strategy that aligns with NIST 800-207? Does t... Request to download | |
Four Tips for Communicating about Cybersecurity Risk to Non IT Audiences Everybody thinks they are brilliant at communicating with business stakeholders. While some people are right ... we can always be better. Let's spend some... Request to download | |
State of Financial Services in the Cloud Financial institutions and their partners are moving quickly to migrate further into cloud computing. This presentation will discuss the emergence of rece... Request to download | |
Democratize Cloud Security with your CNAPP As cloud adoption expands, security teams are faced with securing an increasingly complex cloud estate. Keeping pace requires a new approach. Completely a... Request to download | |
CSA as a Guiding Light to Cybersecurity With cloud finally entrenched as the primary IT system worldwide and cloud security now the foundation of cybersecurity programs, partnering with CSA is c... Request to download | |
Implementing an External Attack Surface Management Program Digital transformation, increased adoption of cloud and Internet of Things (IoT), a growing remote workforce, and a technology talent shortage have led to... Request to download | |
Measuring the Maturity of Your Cloud Security Program What is mature cloud security, and how mature is your organization? Is there a way to track maturity progress and hire the right people? We will dive into... Request to download | |
The Evolution of Private/Public Collaboration and Responsibility CISA has shifted its focus from traditional public/private partnership to one focused on operational collaboration. The results are already paying off, bu... Request to download | |
Searching for ZERO TRUST | |
GDPR and national implementation. Best practice to national compliance requirements across EU. | |
The Role of CSA STAR in the Italian Cloud Strategy | |
CISO Responsibilities Matrix: Understanding the CISO Role | |
Implementing zero-trust network with service mesh and kubernetes | |
Fireside Chat with Tima Soni, Director of Cybersecurity at UNICC | |
Existential Challenges Facing Cybersecurity | |
The Sovereign Cloud for Germany Philipp Trinius, VP Cloud, Network & IT Security, Deutsche Telekom Security | |
The Cloud Profile: A Rosetta Stone for Cloud, Security, and Finance Sector Compliance | |
CxO Trust Summit RSAC 2022 - Embracing a Cloud-First Model Download this presentation. Request to download | |
CxO Trust Summit RSAC 2022 - Context is King: The CNAPP Revolution Download this presentation. Request to download | |
CxO Trust Summit RSAC 2022 - Measuring the Maturity of Your Cloud Security ProgramKey Amidst the accelerated digital transformation of the past two years, enterprises across sectors have gone from dipping their toes in the cloud to being fu... Request to download |