Browse Event Presentations
![]() | Trust in Security Automation – The Key to Defending the Expanding Threat Landscape With cyberattack volumes growing exponentially, the only way to gain the upper hand against attackers is to integrate automation into your cybersecurity a... Request to download |
![]() | Using the CSA CAIQ for Acquisition Diligence If you are considering acquiring tech companies, it’s a terrible mistake to ignore their security posture in the current threat climate. The CSA CAIQ (Con... Request to download |
![]() | CSA Federal Summit 2020 - Virtual Webinar Series In the Federal Summit Webinar Series, the Cloud Security Alliance addressed many factors that are at play to implement a secure, user-friendly cloud instance... Request to download |
![]() | CloudBytes Connect View presentations from the CloudBytes Connect, a multi-day virtual event program that brought the collaboration of research and community to the forefront. ... Request to download |
![]() | CSA Virtual EU Summit 2020 View presentations from the inaugural CSA EU Summit. This four-day event drew a cross-section of EU government agencies from the region who shared case studi... Request to download |
![]() | The Resurgence of Cloud |
![]() | Latest Trends in Intelligence Management Part of the CSA Federal Summit 2020, this presentation by TruStar chairman Paul Kurtz discusses intelligence management. Request to download |
![]() | Cloud Resilience: Tested by Pandemic Part of the CSA Federal Summit 2020, this presentation by Jim Reavis, CEO at CSA, discusses the impact of the recent pandemic on cloud. Request to download |
![]() | Cybersecurity in a Post-COVID World Part of the CSA Federal Summit 2020, this presentation by Bob Flores, CEO at Applicology, discusses what cybersecurity will look like after COVID-19. Request to download |
![]() | Implementing a Work from Home Security Strategy Part of the CSA Federal Summit 2020, this presentation by Jerry Archer, Chief Security Officer at Sallie Mae, covers how to implement a work from home securi... Request to download |
![]() | Cloud computing security in the NIS Directive |
![]() | CSA Security Trust Assurance and Risk (STAR) |
![]() | 7th Analysis on the State-of-the-Art on Cloud Security Adoption in Spain and Latin America |
![]() | Cyber Security Act and IT-Security Law 2.0 – Actual developments in security labelling |
![]() | The Community Draft of the Revised C5 |
![]() | Digital Transformation Requires Security Transformation |
![]() | How to scale Vendor Security Management |
![]() | How Cybersecurity Certification can Foster the EU Cybersecurity Market |
![]() | Taking Control of IoT: An Enterprise Perspective |
![]() | Leveraging Automation to Achieve Security in a Multi-Cloud Environment |