CloudBytes

Webinars by Subject Matter Experts

CSA CloudBytes

Upcoming CloudBytes

No Passwords, No Problem: Using WebAuthn to Stop Account Takeover

No Passwords, No Problem: Using WebAuthn to Stop Account Takeover

September 19, 2019, Swaroop Sham, Senior Product Marketing Manager--Security, Okta

Want to eliminate passwords? We all do. WebAuthn is a new web standard published by the World Wide Web Consortium (W3C) for users in the era of passwordless authentication for web applications. Thi...

Quandaries and Clouds: A Discussion on Cloud Security

Quandaries and Clouds: A Discussion on Cloud Security

September 26, 2019, Dan Mellen, Accenture & Robert Scheutter, Valvoline & Lamont Orange, Netskope & Nate Smolenski, Netskope

Are you experiencing these common challenges in your cloud security program? There is no question that the way we work has changed with the rise of cloud and the widespread access to mobile device...

Don’t Let Your Security Slow Your Cloud Journey

Don’t Let Your Security Slow Your Cloud Journey

October 1, 2019, Jason Georgi, Field Chief Technology Officer for Prisma Access and SaaS, Palo Alto Networks

Cloud adoption for some services is no longer optional, however security is what is overwhelmingly holding organizations back from doing more. Cloud and SaaS themselves are also evolving, which is ...

The Future of Audit and Compliance: Controls Automation

The Future of Audit and Compliance: Controls Automation

October 3, 2019, Prasant Vadlamudi, Director of Tech GRC at Adobe

Over the past several years, we have developed and implemented Common Controls Framework (CCF) across Adobe, enabling our cloud products, services, platforms and operations to achieve compliance wi...

Implementing CAIQ-Lite in a Cloud Vendor Security Assessment Workflow

Implementing CAIQ-Lite in a Cloud Vendor Security Assessment Workflow

October 8, 2019, Nick Sorensen-CEO, Whistic & Azure Shen-Compliance Analyst, OneLogin & Samantha Cowan-Security Compliance Manager, HackerOne

Come learn how leading technology companies are optimizing cloud vendor security assessments by leveraging the recently-released CAIQ-Lite in their workflow. Also learn how and why the CAIQ-Lite ca...

How to Calculate, Communicate and Compare Your Cyber Exposure with Tenable Lumin

How to Calculate, Communicate and Compare Your Cyber Exposure with Tenable Lumin

October 17, 2019, Robert Healey | Senior Director Marketing, Asia Pacific, Tenable

Tenable Lumin lets you measure and benchmark your organisation’s cyber exposure, providing comparisons across your organisation internally (business units, geographies, asset classes) and externall...

Why it's Time to Kill Your VPN

Why it's Time to Kill Your VPN

October 17, 2019, Chris Scheels, Director of Product Marketing, Cyxtera

VPNs are dangerous and overly complex. So why are we still pretending that VPNs are an effective security technology? Join this webinar if you are responsible for implementing Zero Trust or managi...

Getting Started

Thank you for your interest in participating in the CSA CloudBytes webinar series. CSA CloudBytes was launched as a webinar series to help us educate the industry on all matters related to the cloud. We envision CSA working groups and CSA members using this platform as a tool to inform our audience of trending topics, new technologies, and latest research that can help increase awareness in the cloud. It also allows audience members the opportunity to earn CPE Credits.

We are always seeking SME's who can bring these topics to our audience in the form of education and discussion in a vendor neutral environment.

If you are interested in learning more about sponsorship options please contact Hillary Baron [email protected].