Cloud 101CircleEventsBlog
Register for CSA’s free Virtual Cloud Trust Summit to tackle enterprise challenges in cloud assurance.

Event Presentations

Event Presentations

Browse Event Presentations

Remediating Critical Vulns in 12 hours or less:  Lessons Learned From Log4j - North Carolina

Remediating Critical Vulns in 12 hours or less: Lessons Learned From Log4j - North Carolina
Release Date: 05/11/2022

Mitigating critical vulnerabilities, whether on-prem or in the cloud, is a race against bad actors who are seeking to exploit those weaknesses for nefario...

Request to download
CSA Cloud Threat Modeling Tabletop Exercise

CSA Cloud Threat Modeling Tabletop Exercise
Release Date: 05/11/2022

Threat modeling is essential for cybersecurity programs in order to identify risks that could impact business operations. Whether this is during a DevSecO...

Request to download
Rethinking How We Approach and Implement Security Well

Rethinking How We Approach and Implement Security Well
Release Date: 05/10/2022

The unprecedented scale enabled by the cloud revolution has come at a cost: an explosive growth in vulnerability, as each SaaS platform and cyber asset ad...

Request to download
CSA Cloud Threat Modeling Tabletop Exercise

CSA Cloud Threat Modeling Tabletop Exercise
Release Date: 04/07/2022

MN Summit with John Yeoh, Sean Heide and Jon-Michael Brook

Request to download
Remediating Critical Vulns in 12 hours or less:  Lessons Learned From Log4j

Remediating Critical Vulns in 12 hours or less: Lessons Learned From Log4j
Release Date: 04/05/2022

Remediating Critical Vulns in 12 hours or less:  Lessons Learned From Log4j

Request to download
Enabling Clouds, Together

Enabling Clouds, Together
Release Date: 04/04/2022

CSA Minnesota Summit,Param Vig, President, Cloud Security Alliance, Minnesota Chapter

Request to download
Charting the course through Disruption

Charting the course through Disruption
Release Date: 11/23/2021

In this presentation, J.R. Santos, Chief Customer Officer for the Cloud Security Alliance, will share his vision for the direction of CSA, discussing the ...

Request to download
CSA Federal Summit 2021: FedRAMP Automation

CSA Federal Summit 2021: FedRAMP Automation
Release Date: 11/15/2021

FedRAMP has seen an incredible increase in the adoption of the program, both in agency participation and reuse of authorizations. FedRAMP's Program Manage...

Request to download
CCM V4 what's new? Deep dive into the new CSA cloud security framework.

CCM V4 what's new? Deep dive into the new CSA cloud security framework.
Release Date: 11/04/2021

The presentation will specifically focus on the Implementation and Auditing Guidelines and will give the audience an understanding of how to use them in o...

Request to download
CSA STAR – The Answer to Less Complexity and Higher Level of Compliance and Assurance

CSA STAR – The Answer to Less Complexity and Higher Level of Compliance and Assurance
Release Date: 11/04/2021

Cloud adoption has been growing rapidly over the years due to business benefits such as cost savings, scalability, increased security, ease of deployment....

Request to download
CCSK, CCAK, and The Relationship Between the Two

CCSK, CCAK, and The Relationship Between the Two
Release Date: 11/04/2021

The presentation will cover the target audience and the relationship between the certificates and the different training offerings available. This present...

Request to download
CSA Research

CSA Research
Release Date: 11/04/2021

In this session, we will discuss the latest and most popular CSA research as well as review our research roadmap.

Request to download
Shifting Left the Right Way with OSCAL, Dr. Michaela Iorga, Senior Security Technical Lead for Cloud Computing, National Institute of Standards and Technology (NIST/ITL)

Shifting Left the Right Way with OSCAL, Dr. Michaela Iorga, Senior Security Technical Lead for Cloud Computing, National Institute of Standards and Technology (NIST/ITL)
Release Date: 10/29/2021

A key component of the Cloud Development Lifecycle (CDLC) is the early development phase involving infrastructure as code (IaC), which is used to define a...

Request to download
 Auditing and Compliance in Cloud-native Environments, Chris Hughes, Co-Founder and CISO, Aquia

Auditing and Compliance in Cloud-native Environments, Chris Hughes, Co-Founder and CISO, Aquia
Release Date: 10/29/2021

Why you need a SaaS governance plan, and what should be in itThe rapid proliferation of authorized and unauthorized software-as-a-service solutions presen...

Request to download
2021 State of Federal Cloud Security; A Practitioners Perspective, Dr. Mari J. Spina, Principal Cyber Security Engineer, The MITRE Corp.

2021 State of Federal Cloud Security; A Practitioners Perspective, Dr. Mari J. Spina, Principal Cyber Security Engineer, The MITRE Corp.
Release Date: 10/29/2021

The US Federal Government has been headed into the cloud since introduction of its Cloud First policy in 2011. Since then a series of executive orders and...

Request to download
Metrics and Measurements for the CSA CCM

Metrics and Measurements for the CSA CCM
Release Date: 09/19/2021

A number of the controls in the most current version of the CSA’s Cloud Controls Matrix require that the organization develop and implement metrics. Also,...

Request to download
Cloud Native Security & Policy Management

Cloud Native Security & Policy Management
Release Date: 09/19/2021

Improved security is a key benefit of cloud-native technologies, because of immutability and segregation of resources in containers, microservices, server...

Request to download
Advancing the Cybersecurity Workforce: Opportunities for an Ecosystem Approach

Advancing the Cybersecurity Workforce: Opportunities for an Ecosystem Approach
Release Date: 09/19/2021

Cybersecurity talent shortage is a fallacy. Talented individuals are struggling to get their foot in the door in a cyber career. Hiring managers need to f...

Request to download
Protecting Against the Future of Ransomware

Protecting Against the Future of Ransomware
Release Date: 09/19/2021

With recent events such as the JBS and Colonial Pipeline attacks making Ransomware an international conversation, security professionals are being asked t...

Request to download