CSA Monthly Newsletter (December 18, 2015) - Happy Holidays from the Cloud Security Alliance Research team. Thank you to all who attended LA Summit, EMEA Congress, and APAC Congress as those events recently concluded with lessons learned and information on best practices. This month's Newsletter features recent webinars and upcoming events and initiatives. Cheers to a great 2015.
Happy Holidays from the Cloud Security Alliance Research team. Thank you to all who attended LA Summit, EMEA Congress, and APAC Congress as those events recently concluded with lessons learned and information on best practices. This month's Newsletter features recent webinars and upcoming events and initiatives. Cheers to a great 2015.
Stay up to date with our latest research projects.
The Cloud Security Alliance’s Security Guidance for Critical Areas of Focus in Cloud Computing seeks to establish a stable, secure baseline for cloud operations. It acts as a practical, actionable roadmap to individuals looking to safely and securely adopt the cloud paradigm. A draft of Domain 1 is now available for review.
The Cloud Security Alliance announced the launch of the new CSA Asia-Pacific (APAC) Education Council in China, an organization within the CSA designed to serve as a catalyst in bridging the gap between education, research and industry in cloud security with the responsibility of providing guidance to the CSA to further efforts in cloud security education and research.
The Summit will provide practical solutions for managing the transition to the cloud, and implementing security as a key component, rather than an afterthought, of this transition. It will provide insight into models and architectures, the controls and real ‘nuts and bolts’ of what must be done to secure cloud computing.
Organizations thrive and survive in the rapidly changing and vapidly competitive world of today by leveraging on every advantage possible. Technology, being the lifeblood of communications and transactions, forms an intrinsic and indispensable tool for nations, enterprises, and individuals. Which is why we are putting together the CSA APAC Summit 2016. To discuss, update, explain, clarify, and help out map out your future in the Cloud.
You know that every decision to use the Cloud will be challenged, whether by investors, executives, customers, or members of your own team. Behind every challenge is the same question, "Can we trust the decision?" This presentation introduces a new decision model that will transform the confidence you can earn from others that your decisions are to be trusted.
Cloud Access Security Brokers (CASBs) are the hottest security technologies on the market. They provide organizations with much needed visibility and control over corporate data as it moves beyond the firewall via the public cloud.
The EU-US Safe Harbor agreement for data transfers has been declared invalid. Hear what this means for you, your organization and your data on EU citizens. Can you save data in US cloud services, and if so, what do you need to know to ensure you don’t break privacy laws.
The Internet of Things (IoT) has been experiencing massive growth in both consumer and business environments. In response to this emerging market and the particular security requirements of these connected devices, The CSA established the IoT Working Group to focus on providing relevant guidance to its stakeholders who are implementing IoT solutions.
The Incident Management and Forensics Working Group released its “Cloud Forensics Capability Maturity Model”, a new research report that describes a Capability Maturity Model (CMM) that can be used by both cloud consumers and Cloud Service Providers (CSPs) in assessing their process maturity for conducting digital forensic investigations in the cloud environment.
The Quantum-Safe Security Working Group released “What is Post-Quantum Cryptography,” a report that takes a closer look at post-quantum cryptography and what institutions need to know and need to do in order to protect themselves against quantum computers.