CSA Monthly Newsletter (May 24, 2016) - With a full slate of events, CloudBytes, surveys, and project initiatives in May, the CSA Research team welcomes all CSA members and contacts to participate. More information in this month's newsletter for the latest in CSA Research.
With a full slate of events, CloudBytes, surveys, and project initiatives in May, the CSA Research team's slate welcomes all CSA members and contacts to participate. More information in this month's newsletter for the latest in CSA Research.
Research News
Stay up to date with our latest research projects.
The Cloud Security Alliance hosted its 5th annual CSA APAC Summit in Singapore, beginning May 3rd. The weeklong event was attended by thought leaders, policy and decision makers representing key industry organizations, cloud customers, and the R&D community. Attendees represented both end-user and industry viewpoints and provided networking and business opportunities.
The Cloud Security Alliance, in collaboration with Fraunhofer FOKUS and ENISA, announced the presentations and speaker line up for the upcoming SecureCloud conference. SecureCloud is the only European conference focused exclusively on cloud security and aims to provide an opportunity for government experts, industry experts, and corporate decision makers to discuss and exchange ideas about how to shape the future of cloud computing security.
Current state of SaaS security – with several years of cloud adoption in many organizations, approaches to security have been evolving rapidly. The purpose of this survey is to look at the specific concerns, policies, and controls that enterprises are using. The goal will be to answer the question, what are today’s enterprises doing to mitigate risk across both sanctioned and unsanctioned cloud applications?
SecureCloud is the only European conference focussed exclusively on cloud security. It aims to provide an opportunity for government experts, industry experts, and corporate decision makers to discuss and exchange ideas about how to shape the future of cloud computing security.
The CSA Nordic Summit is the annual Cloud Security Alliance summit for Northern Europe, organized by the CSA Norway Chapter. For 2016, the Nordic Summit will join the forces with the Security Culture Framework community to bring on a bigger, better and more exiting conference!
The Information Technology and Security industry is rapidly moving towards solutions delivered by and through cloud computing. Join us at CSA-AR SUMMIT 2016 to learn more about the progress and challenges faced by local and global organizations in their shift to this new paradigm, as well as the key information security trends that apply to cloud computing
Enterprise adoption of IaaS environments has brought tremendous benefits, in terms of cost savings and agility, and enabled a more dynamic infrastructure. However, these changes have created new security, compliance, and IT administration challenges for enterprises, and management challenges for cloud service providers.
This presentation will cover use case examples of application isolation, cryptographic segmentation, and role-based access control methodologies that limit application exposure while containing and minimizing the damage of breaches when they occur.
In this session, you’ll learn how to: Develop a comprehensive cloud security and governance framework, Map your organization’s maturity based on current practices, Identify key business outcomes across the 4 pillars of cloud security, and Implement best practices for presenting cloud security metrics to the board.
The goal of the Identity Solutions: Security Beyond the Perimeter survey was to address Insufficient Identity, Credential, and Access Management and gain a better understanding and perception of enterprise security in the evolving Information Technology (IT) world.
The OCF/STAR program comprises a global cloud computing assurance framework with a scope of capabilities, flexibility of execution, and completeness of vision that far exceeds the risk and compliance objectives of other security audit and certification programs.
This paper seeks to view the cloud computing industry through the lens of the enterprise information security practitioner. By articulating the state of cloud security from this viewpoint, we can better understand the gaps and solutions we must advocate for and help cloud providers better understand the needs of their consumers.