Browse Event Presentations
How to scale Vendor Security Management - Jenny Gershkovich | |
Leveraging Automation to Achieve Security in a Multi-Cloud Environment - Michael Jamrosy | |
Taking Control of IoT: An Enterprise Perspective - Hillary Baron | |
The Community Draft of the Revised C5 - Dr. Patrick Grete | |
7th Analysis on the State-of-the-Art on CLOUD SECURITY ADOPTION, SPAIN AND LATAM - Mariano Benito | |
Works councils, your best friends (really!) - Mark Wijnhoven | |
CSA Security Trust Assurance and Risk (STAR) - Daniele Catteddu | |
Cloud computing security in the NIS Directive - Dr. Marnix Dekker | |
Defying the Greatest Cloud Security Myths - Dr. Carlo Gebhardt | |
Transitioning, Enhancing, and Innovating in the Cloud - John Yeoh | |
How Cybersecurity Certification can Foster the EU Cybersecurity Market - Dr. Udo Helmbrecht Organisations, manufacturers or providers involved in the design and development of ICT products, ICT services or ICT processes should be encouraged to imple... Request to download | |
Colorado Chapter Forum 2019 Presentations | |
Change is Simply an Act of Survival - Bil Harmer | |
Data Protection Controls for the Cloud - Toby Zimmerer | |
Taking Compliance to the Cloud- Tim Weil | |
Identity Round Robin Workshop Serverless - AWS Security | |
Attackers Battle for Hijacked Resources - James Condon | |
Are Your Cloud Servers Under Attack - Brian Hileman | |
Shared Responsibility Model in the Age of Cloud - Janelle Hsia | |
Presentations from the CSA Summit at (ISC)² Security Congress 2019 Presentations from the CSA Summit at (ISC)² Security Congress 2019. Request to download |