Browse Event Presentations
The Next Evolution of Cloud Based Attacks and How to Prevent It | |
Diversify Defense — Improving Cybersecurity Through Smart Consolidation NA Request to download | |
Native Cloud Security Solutions – AWS Web Application Firewall | |
Using Encryption with AWS | |
Best Practices in Trust for the Cloud | |
CSA Fall Summit – Protecting Information in the Cloud | |
KO – Cloud Security Alliance Data Processing Agreements | |
Effective Methods For Security Information Sharing | |
Caterpillar in the Cloud | |
Blockchain Evolution | |
Rethinking Application Security for Cloud Deployments | |
Building a More Secure Cloud Architecture | |
SSL/TLS Then and Now - Joe Dietz | |
A Hackers Perspective, where do we go from here - Chris Roberts | |
Using Cloud Services Securely – A Practical Viewpoint - Benoit Heynderickx | |
Cloud computing security in the NIS Directive - Dr. Marnix Dekker | |
CSA Security Trust Assurance and Risk (STAR) - Daniele Catteddu | |
Cyber Security Act and IT-Security Law 2.0 – Actual developments in security labelling - Andreas Könen | |
7th Analysis on the State-of-the-Art on CLOUD SECURITY ADOPTION, SPAIN AND LATAM - Mariano Benito | |
Taking Control of IoT: An Enterprise Perspective - Hillary Baron |