Browse Event Presentations
![]() | Head in the clouds, feet on the ground. Even before the pandemic, people were losing the ability to be in the moment. Future generations will ask what it was like living through the COVID-19 Pan... Request to download |
![]() | Protecting Against the Future of Ransomware With recent events such as the JBS and Colonial Pipeline attacks making Ransomware an international conversation, security professionals are being asked t... Request to download |
![]() | CSA Federal Summit 2020 - Virtual Webinar Series In the Federal Summit Webinar Series, the Cloud Security Alliance addressed many factors that are at play to implement a secure, user-friendly cloud instance... Request to download |
![]() | CloudBytes Connect View presentations from the CloudBytes Connect, a multi-day virtual event program that brought the collaboration of research and community to the forefront. ... Request to download |
![]() | CSA Virtual EU Summit 2020 View presentations from the inaugural CSA EU Summit. This four-day event drew a cross-section of EU government agencies from the region who shared case studi... Request to download |
![]() | The Resurgence of Cloud |
![]() | Latest Trends in Intelligence Management Part of the CSA Federal Summit 2020, this presentation by TruStar chairman Paul Kurtz discusses intelligence management. Request to download |
![]() | Cloud Resilience: Tested by Pandemic Part of the CSA Federal Summit 2020, this presentation by Jim Reavis, CEO at CSA, discusses the impact of the recent pandemic on cloud. Request to download |
![]() | Cybersecurity in a Post-COVID World Part of the CSA Federal Summit 2020, this presentation by Bob Flores, CEO at Applicology, discusses what cybersecurity will look like after COVID-19. Request to download |
![]() | Implementing a Work from Home Security Strategy Part of the CSA Federal Summit 2020, this presentation by Jerry Archer, Chief Security Officer at Sallie Mae, covers how to implement a work from home securi... Request to download |
![]() | Cloud computing security in the NIS Directive |
![]() | CSA Security Trust Assurance and Risk (STAR) |
![]() | 7th Analysis on the State-of-the-Art on Cloud Security Adoption in Spain and Latin America |
![]() | Cyber Security Act and IT-Security Law 2.0 – Actual developments in security labelling |
![]() | The Community Draft of the Revised C5 |
![]() | Digital Transformation Requires Security Transformation |
![]() | How to scale Vendor Security Management |
![]() | How Cybersecurity Certification can Foster the EU Cybersecurity Market |
![]() | Taking Control of IoT: An Enterprise Perspective |
![]() | Leveraging Automation to Achieve Security in a Multi-Cloud Environment |