Browse Event Presentations
Trust in Security Automation – The Key to Defending the Expanding Threat Landscape With cyberattack volumes growing exponentially, the only way to gain the upper hand against attackers is to integrate automation into your cybersecurity a... Request to download | |
Using the CSA CAIQ for Acquisition Diligence If you are considering acquiring tech companies, it’s a terrible mistake to ignore their security posture in the current threat climate. The CSA CAIQ (Con... Request to download | |
Head in the clouds, feet on the ground. Even before the pandemic, people were losing the ability to be in the moment. Future generations will ask what it was like living through the COVID-19 Pan... Request to download | |
Think Fast! - Machine Learning for Improved Security Cloud computing has ushered in an explosion of tools and resources to swiftly adapt applications, business processes, and even create entire industries. W... Request to download | |
Delivering Continuous Compliance using CSA CCM and NIST OSCAL In our rapidly changing information technology portfolios, compliance, as imagined typically, does not match compliance as implemented. CSA has rece... Request to download | |
Setting Common Language when Talking to Leadership about IT Risks To be successful in presenting IT security to senior leadership, it's important it is done in a way that they can ingest, process, and understand; because... Request to download | |
Is Bug Bounty Right For You? Bug bounties have become ubiquitous in the last several years, allowing companies to leverage extension talent pools outside of their formal employment.&n... Request to download | |
A Framework for Succeeding in Digital Transformation Digital transformation has become a business imperative for nearly every organization. However, progress in achieving transformation goals has been ... Request to download | |
Threat Modeling in Today's Cloud - Ransomware, Supply Chain, and more Threat modeling is an essential practice for software and systems security. Cloud threat modeling expands on standard threat modeling practices to account... Request to download | |
Metrics and Measurements for the CSA CCM A number of the controls in the most current version of the CSA’s Cloud Controls Matrix require that the organization develop and implement metrics. Also,... Request to download | |
Zero Trust Frameworks: The Major Approaches This talk examines the major frameworks for Zero Trust security: Forrester ZTX, NIST SP800-207, and Google BeyondCorp. Each has its own philosophy, but th... Request to download | |
Emergence, Divergence & Convergence: Adapting to Disparate Clouds Learn how to start adapting your security skills and approach to governance to navigate and succeed in the ever-growing world of disparate clouds, standar... Request to download | |
Advancing the Cybersecurity Workforce: Opportunities for an Ecosystem Approach Cybersecurity talent shortage is a fallacy. Talented individuals are struggling to get their foot in the door in a cyber career. Hiring managers need to f... Request to download | |
CSA Federal Summit 2020 - Virtual Webinar Series In the Federal Summit Webinar Series, the Cloud Security Alliance addressed many factors that are at play to implement a secure, user-friendly cloud instance... Request to download | |
CloudBytes Connect View presentations from the CloudBytes Connect, a multi-day virtual event program that brought the collaboration of research and community to the forefront. ... Request to download | |
CSA Virtual EU Summit 2020 View presentations from the inaugural CSA EU Summit. This four-day event drew a cross-section of EU government agencies from the region who shared case studi... Request to download | |
The Resurgence of Cloud | |
Latest Trends in Intelligence Management Part of the CSA Federal Summit 2020, this presentation by TruStar chairman Paul Kurtz discusses intelligence management. Request to download | |
Cloud Resilience: Tested by Pandemic Part of the CSA Federal Summit 2020, this presentation by Jim Reavis, CEO at CSA, discusses the impact of the recent pandemic on cloud. Request to download | |
Cybersecurity in a Post-COVID World Part of the CSA Federal Summit 2020, this presentation by Bob Flores, CEO at Applicology, discusses what cybersecurity will look like after COVID-19. Request to download |