CSA Monthly Newsletter (January 21, 2016) - The Cloud Security Alliance Research team hopes that your new year has started well. 2016 is shaping up to be an exciting year for the CSA. With CSA Summit at RSA 2016 in a few weeks and other events on the calendar, we look forward to seeing you this year.
The Cloud Security Alliance Research team hopes that your new year has started well. 2016 is shaping up to be an exciting year for the CSA. With CSA Summit at RSA 2016 in a few weeks and other events on the calendar, we look forward to seeing you this year.
Stay up to date with our latest research projects.
Cloud Adoption does not have to mean opening up your organization to increased security risks and threats if the right policies are in place. That’s what the findings from a new Cloud Security Alliance (CSA) survey, titled The Cloud Balancing Act for IT: Between Promise and Peril, indicated when it surveyed executives and IT managers worldwide.
The CSA announced its preliminary agenda for CSA Summit 2016, a full-day event being held at the RSA Conference on Monday, February 29. This year’s featured keynote will be presented by Robert Herjavec, CEO of the Herjavec Group and star of ABC’s Shark Tank, speaking on Entrepreneurship in Information Security. Luis A. Aguilar, former Commissioner with the U.S. Securities and Exchange Commission, will also serve as a featured keynote at the event.
The Summit will provide practical solutions for managing the transition to the cloud, and implementing security as a key component, rather than an afterthought, of this transition. It will provide insight into models and architectures, the controls and real ‘nuts and bolts’ of what must be done to secure cloud computing.
Containers such as Docker and CoreOS Rkt deliver incredible capabilities to developers and operators and are powering the DevOps revolution in application development and deployment. With all this new found power come significant challenges and concerns. Come learn how containers and micro-services work, understand the security challenges with approach, and strategies to address the same.
BYOD is an adoption, not a rollout. In fact, 57% of employees refuse MAM or MDM on their personal devices. What are the drawbacks of MDM? How can your organization both drive adoption and effectively secure BYOD? In this webinar, we'll answer those questions and discuss next-generation mobile security solutions that can help secure corporate data across managed and unmanaged mobile devices.
You know that every decision to use the Cloud will be challenged, whether by investors, executives, customers, or members of your own team. Behind every challenge is the same question, "Can we trust the decision?" This presentation introduces a new decision model that will transform the confidence you can earn from others that your decisions are to be trusted.
The CloudTrust Protocol (CTP) is designed to be a mechanism by which cloud service customers can ask for and receive information related to the security of the services they use in the cloud, promoting transparency and trust.
In today’s technological environment, standards play a critical role in product development and market competitiveness. Every input, behavior, and action has both a contributory and a potential legal consequence. These procedures help protect the International Standardization Council (ISC or Council) participants and the CSA by establishing the necessary framework for a sound process.
This white paper reports the results of a recent study conducted by ISACA and the Cloud Security Alliance to examine cloud market maturity through four lenses: cloud use and satisfaction level, expected growth, cloud-adoption drivers, and limitations to cloud adoption.