Browse Event Presentations
A Hackers Perspective, where do we go from here? | |
Change is Simply an Act of Survival | |
Identity Round Robin Workshop Serverless NA Request to download | |
Data Protection Controls for the Cloud | |
Taking Compliance to the Cloud | |
Attackers Battle for Hijacked Resources | |
Are Your Cloud Servers Under Attack? | |
Shared Responsibility Model in the Age of Cloud | |
Eight Ball For The Win: Key Cloud and Cybersecurity Trends for 2020 | |
Security Leaders as Change Leaders | |
Rethinking the Traditional Cloud Vendor Assessment Model: Proactive vs Reactive Vendor Security | |
Tell Me a Story – The Art of Explaining Risks | |
The Next Evolution of Cloud Based Attacks and How to Prevent It | |
Diversify Defense — Improving Cybersecurity Through Smart Consolidation NA Request to download | |
Native Cloud Security Solutions – AWS Web Application Firewall | |
Best Practices in Trust for the Cloud | |
Using Encryption with AWS | |
CSA Fall Summit – Protecting Information in the Cloud | |
KO – Cloud Security Alliance Data Processing Agreements | |
Effective Methods For Security Information Sharing |