Browse Event Presentations
7th Analysis on the State-of-the-Art on CLOUD SECURITY ADOPTION, SPAIN AND LATAM - Mariano Benito | |
Works councils, your best friends (really!) - Mark Wijnhoven | |
Microservice Programming, the New Era - Vrettos Moulos | |
Cyber Security Act and IT-Security Law 2.0 – Actual developments in security labelling - Andreas Könen | |
Transitioning, Enhancing, and Innovating in the Cloud - John Yeoh | |
What’s up with data breach notifications under the GDPR - Dorotea Alessandra De Marco | |
Using Cloud Services Securely – A Practical Viewpoint - Benoit Heynderickx | |
Defying the Greatest Cloud Security Myths - Dr. Carlo Gebhardt | |
CSA Security Trust Assurance and Risk (STAR) - Daniele Catteddu | |
How Cybersecurity Certification can Foster the EU Cybersecurity Market - Dr. Udo Helmbrecht Organisations, manufacturers or providers involved in the design and development of ICT products, ICT services or ICT processes should be encouraged to imple... Request to download | |
Cloud computing security in the NIS Directive - Dr. Marnix Dekker | |
Colorado Chapter Forum 2019 Presentations | |
Change is Simply an Act of Survival - Bil Harmer | |
Data Protection Controls for the Cloud - Toby Zimmerer | |
Taking Compliance to the Cloud- Tim Weil | |
Identity Round Robin Workshop Serverless - AWS Security | |
Attackers Battle for Hijacked Resources - James Condon | |
Are Your Cloud Servers Under Attack - Brian Hileman | |
Shared Responsibility Model in the Age of Cloud - Janelle Hsia | |
Presentations from the CSA Summit at (ISC)² Security Congress 2019 Presentations from the CSA Summit at (ISC)² Security Congress 2019. Request to download |