Browse Event Presentations
The Next Evolution of Cloud Based Attacks and How to Prevent It | |
Diversify Defense — Improving Cybersecurity Through Smart Consolidation NA Request to download | |
Native Cloud Security Solutions – AWS Web Application Firewall | |
Using Encryption with AWS | |
Best Practices in Trust for the Cloud | |
CSA Fall Summit – Protecting Information in the Cloud | |
KO – Cloud Security Alliance Data Processing Agreements | |
Effective Methods For Security Information Sharing | |
Caterpillar in the Cloud | |
Rethinking Application Security for Cloud Deployments | |
Blockchain Evolution | |
Building a More Secure Cloud Architecture | |
SSL/TLS Then and Now - Joe Dietz | |
A Hackers Perspective, where do we go from here - Chris Roberts | |
Works councils, your best friends (really!) - Mark Wijnhoven | |
What’s up with data breach notifications under the GDPR - Dorotea Alessandra De Marco | |
Using Cloud Services Securely – A Practical Viewpoint - Benoit Heynderickx | |
How Cybersecurity Certification can Foster the EU Cybersecurity Market - Dr. Udo Helmbrecht Organisations, manufacturers or providers involved in the design and development of ICT products, ICT services or ICT processes should be encouraged to imple... Request to download | |
The European Cloud Certification Scheme: Forward Together - Prof. William Ochs | |
How to scale Vendor Security Management - Jenny Gershkovich |