Browse Event Presentations
Remediating Critical Vulns in 12 hours or less: Lessons Learned From Log4j - North Carolina Mitigating critical vulnerabilities, whether on-prem or in the cloud, is a race against bad actors who are seeking to exploit those weaknesses for nefario... Request to download | |
CSA Cloud Threat Modeling Tabletop Exercise Threat modeling is essential for cybersecurity programs in order to identify risks that could impact business operations. Whether this is during a DevSecO... Request to download | |
Rethinking How We Approach and Implement Security Well The unprecedented scale enabled by the cloud revolution has come at a cost: an explosive growth in vulnerability, as each SaaS platform and cyber asset ad... Request to download | |
CSA Cloud Threat Modeling Tabletop Exercise MN Summit with John Yeoh, Sean Heide and Jon-Michael Brook Request to download | |
Remediating Critical Vulns in 12 hours or less: Lessons Learned From Log4j Remediating Critical Vulns in 12 hours or less: Lessons Learned From Log4j Request to download | |
Enabling Clouds, Together CSA Minnesota Summit,Param Vig, President, Cloud Security Alliance, Minnesota Chapter Request to download | |
Charting the course through Disruption In this presentation, J.R. Santos, Chief Customer Officer for the Cloud Security Alliance, will share his vision for the direction of CSA, discussing the ... Request to download | |
CSA Federal Summit 2021: FedRAMP Automation FedRAMP has seen an incredible increase in the adoption of the program, both in agency participation and reuse of authorizations. FedRAMP's Program Manage... Request to download | |
CSA Chapter Summit Links A collection of resources and links that were referenced throughout the event. Request to download | |
CCM V4 what's new? Deep dive into the new CSA cloud security framework. The presentation will specifically focus on the Implementation and Auditing Guidelines and will give the audience an understanding of how to use them in o... Request to download | |
CSA STAR – The Answer to Less Complexity and Higher Level of Compliance and Assurance Cloud adoption has been growing rapidly over the years due to business benefits such as cost savings, scalability, increased security, ease of deployment.... Request to download | |
CSA Research In this session, we will discuss the latest and most popular CSA research as well as review our research roadmap. Request to download | |
CCSK, CCAK, and The Relationship Between the Two The presentation will cover the target audience and the relationship between the certificates and the different training offerings available. This present... Request to download | |
Auditing and Compliance in Cloud-native Environments, Chris Hughes, Co-Founder and CISO, Aquia Why you need a SaaS governance plan, and what should be in itThe rapid proliferation of authorized and unauthorized software-as-a-service solutions presen... Request to download | |
Shifting Left the Right Way with OSCAL, Dr. Michaela Iorga, Senior Security Technical Lead for Cloud Computing, National Institute of Standards and Technology (NIST/ITL) A key component of the Cloud Development Lifecycle (CDLC) is the early development phase involving infrastructure as code (IaC), which is used to define a... Request to download | |
2021 State of Federal Cloud Security; A Practitioners Perspective, Dr. Mari J. Spina, Principal Cyber Security Engineer, The MITRE Corp. The US Federal Government has been headed into the cloud since introduction of its Cloud First policy in 2011. Since then a series of executive orders and... Request to download | |
Protecting Against the Future of Ransomware With recent events such as the JBS and Colonial Pipeline attacks making Ransomware an international conversation, security professionals are being asked t... Request to download | |
Cloud Native Security & Policy Management Improved security is a key benefit of cloud-native technologies, because of immutability and segregation of resources in containers, microservices, server... Request to download | |
Advancing the Cybersecurity Workforce: Opportunities for an Ecosystem Approach Cybersecurity talent shortage is a fallacy. Talented individuals are struggling to get their foot in the door in a cyber career. Hiring managers need to f... Request to download | |
Emergence, Divergence & Convergence: Adapting to Disparate Clouds Learn how to start adapting your security skills and approach to governance to navigate and succeed in the ever-growing world of disparate clouds, standar... Request to download |