Cloud 101CircleEventsBlog
Register for CSA's AI Summit at RSAC on May 6!
Something went wrong fetching the event listings.
×

Working Group

Financial Services Industry

The main objective of this working group is to identify and share the challenges, risks and best practices for the development, deployment and management of secure cloud services in the financial services industry.
View Current Projects
State of Financial Services in Cloud
State of Financial Services in Cloud

Download

Financial Services Industry
Working Group Overview

This working group meets on the fourth Monday of the month at 8am PT. The main objective of this working group is to identify and share the challenges, risks and best practices for the development, deployment and management of secure cloud services in the financial services industry.


What do we discuss? 

During our working group meetings we typically discuss and collaborate on projects the group is currently working on. We also sometimes invite a speaker to share a presentation on industry trends. 


Drafts & Important Docs



Working Group Leadership

Craig Balding
Craig Balding

Craig Balding

I help enable organisations to safely operate and transact online in the face of dynamic and adaptive threats. After 20 years of attacking and defending top tier firms I founded Resilient Security to provide cyber risk and security advisory, consulting and services.

Read more

Sean Gray
Sean Gray

Sean Gray

Chase

Security Strategy, Threat Management. Senior Director, Information Security Strategy and Threat Mgmt at PayPal.

Read more

Bill Izzo
Bill Izzo

Bill Izzo

Director, Cloud Security Governance at Depository Trust and Clearing Corporation

Innovative leader with a strong technical and business background with a track record of success across multiple technology domains and markets. Senior business management and technical leadership experience in the DOD, Private, and Government sectors. Years of experience in the management of medium to large network and systems engineering teams with significant experience in the management of large multi-million dollar data com...

Read more

Troy Leach
Troy Leach

Troy Leach

Chief Strategy Officer (CSO), CSA

Troy Leach has spent more than 25 years advocating for the advancement of responsible, safe technology to improve the quality of living and parity for all.

As the Chief Strategy Officer, Mr. Leach supports Cloud Security Alliance's corporate strategy and ongoing mission to provide new and relevant cloud security awareness, education, research, programs and membership participation. Mr. Leach specifically focuses on external engageme...

Read more

Jez Goldstone
Jez Goldstone

Jez Goldstone

Director of Security Architecture, Cloud & Innovation, Barclay Card

This person does not have a biography listed with CSA.

Suyi Guo
Suyi Guo

Suyi Guo

Information Security Advisor

This person does not have a biography listed with CSA.

Publications in ReviewOpen Until
Relationship of Shadow Access with Zero Trust and Artificial IntelligenceApr 06, 2024
AI Organizational Responsibilities - Core Security ResponsibilitiesApr 06, 2024
AI Governance & Compliance in the IndustryApr 06, 2024
AI Legal and Regulatory LandscapeApr 06, 2024
View all
Who can join?

Anyone can join a working group, whether you have years of experience or want to just participate as a fly on the wall.

What is the time commitment?

The time commitment for this group varies depending on the project. You can spend a 15 minutes helping review a publication that's nearly finished or help author a publication from start to finish.

Virtual Meetings

Attend our next meeting. You can just listen in to decide if this group is a good for you or you can choose to actively participate. During these calls we discuss current projects, and well as share ideas for new projects. This is a good way to meet the other members of the group. You can view all research meetings here.

No scheduled meetings for this working group in the next 60 days.

See Full Calendar for this Working Group

Open Peer Reviews

Peer reviews allow security professionals from around the world to provide feedback on CSA research before it is published.

Learn how to participate in a peer review here.

Relationship of Shadow Access with Zero Trust and Artificial Intelligence

Open Until: 04/06/2024

Shadow Access, a growing concern in cloud computing, refers to unintended, unauthorized access to systems and data, often i...

AI Organizational Responsibilities - Core Security Responsibilities

Open Until: 04/06/2024

This white paper focuses on what we define as an enterprise's "core security responsibilities" around Artificial Intelligen...

AI Governance & Compliance in the Industry

Open Until: 04/06/2024

Governance and compliance serve as integral components of organizational management, ensuring adherence to regulations, sta...