CloudBytes

Webinars by Subject Matter Experts

CSA CloudBytes

Upcoming CloudBytes

CSA's Executive Series: When AI Goes Wrong

CSA's Executive Series: When AI Goes Wrong

April 2, 2020, Bob Gourley, CTO and Co-Founder of OODA

Join Bob Gourley, CTO and Co-Founder of OODA, to learn about when AI goes wrong including... - 6 categories of real-world AI failures - notable failures in operational systems - compliance needs - ...

Stay Secure: In the Face of a Pandemic, Cyberattackers Seek to Take Advantage

Stay Secure: In the Face of a Pandemic, Cyberattackers Seek to Take Advantage

April 7, 2020, Thomas Martin, Founder, NephōSec | Chris Hertz, Chief Revenue Officer, DivvyCloud

Join Thomas Martin, former GE CIO and Founder of NephōSec, and Chris Hertz, Chief Revenue Officer of DivvyCloud, for a deep dive into the current state of cloud security and practical guidance on w...

CSA's Executive Series: Using CSA Control Framework for Regulatory Alignment

CSA's Executive Series: Using CSA Control Framework for Regulatory Alignment

April 14, 2020, Michael Mazza, Executive Director - Enterprise Technology & Risk - Morgan Stanley

In today’s environment, we are faced with conflicting challenges. Our businesses want us to advance the use of cloud to improve costs and time-to-market. The major CSPs are coming out with new fu...

Cloud Adoption Considerations for IoT and OT

Cloud Adoption Considerations for IoT and OT

April 21, 2020, Shih Hsien Lim, Chief Security Officer, SP Group

IoT in the enterprise will generate new information and business models that will strain on-prem capabilities and resources. The challenges can be resolved by judicious of the cloud. This potential...

Mapping Your Way Through AppSec Challenges

Mapping Your Way Through AppSec Challenges

April 23, 2020, Peleus Uhley, Principal Scientist & Lead Security Strategist at Adobe

It is always important to stay current and explore new technologies. John Lambert is often quoted for saying, “Defenders think in lists. Attackers think in graphs. As long as this is true, attacker...

Managing security in the cloud today VS networks "back in my day"

Managing security in the cloud today VS networks "back in my day"

April 28, 2020, Jim Reavis, CEO, CSA | Karen F. Worstell, CISO | John DiMaria, CSA | Vincent Campitelli, CSA

In our increasingly interconnected world, the cloud is the answer. Services like Microsoft Office 365, Google Drive and AWS have embraced its ability to store data online and have created services ...

Break the Top 10 Cloud Attack Kill Chains

Break the Top 10 Cloud Attack Kill Chains

May 7, 2020, Rich Mogull, VP Product, disruptOps

As cloud adoption matures, so do cloud attacks. This session will highlight the top 10 cloud kill chains and how to break them. The presenters will lay out each step of the chain, which are the eas...

Cybersecurity, Data Protection Policies, and Cloud Adoption in APAC

Cybersecurity, Data Protection Policies, and Cloud Adoption in APAC

May 27, 2020, Lim May-Ann, Executive Director, ACCA

Over recent months, there has been an increasing number of cyber-breaches being reported in Asia Pacific, particularly from the public sector. Yet there have also been an increasing number of cyber...

The S in IoT stands for Security

The S in IoT stands for Security

June 3, 2020, Moderator: Suresh AGARWAL, Panelist: Aleksandar ANDRIC, ​Jim LIM, Haojie ZHUANG

Internet of Things (IoT) and connected devices promise tremendous benefits and a new wave of business opportunities. This hype is best balanced with caution especially with respect to security. Al...

Cloud Incident Response Need Not be Reactive

Cloud Incident Response Need Not be Reactive

June 24, 2020, Alex Siow, Chairman CSA Singapore Chapter

In today’s connected era, a comprehensive incident response is an integral aspect of any organization aiming to manage and lower their risk profile. A good incident response needs to be useful not ...

Emerging Top Threats in Cloud Computing – What We Can Do About Them

Emerging Top Threats in Cloud Computing – What We Can Do About Them

July 15, 2020, Moderator : Jim LIM, Panelists: Raju CHELLAM, Nigel LIM, Steve NG

With cloud becoming the preferred IT infrastructure, understanding the emerging security threats is important. A recent CSA study showed that traditional cloud security issues (such as DDoS, share...

Nefarious Uses of Cloud: A Case Study from Defending a Security Conference

Nefarious Uses of Cloud: A Case Study from Defending a Security Conference

July 29, 2020, Wong Onn Chee, CTO, Resolvo & Co-Chair, CSA APAC Research Advisory Council

As organisations increasingly move to the cloud, so do the attackers. Come and listen to Onn Chee on how the cloud was used to attack a security conference's websites on the cloud, the profile of t...

Getting Started

Thank you for your interest in participating in the CSA CloudBytes webinar series. CSA CloudBytes was launched as a webinar series to help us educate the industry on all matters related to the cloud. We envision CSA working groups and CSA members using this platform as a tool to inform our audience of trending topics, new technologies, and latest research that can help increase awareness in the cloud. It also allows audience members the opportunity to earn CPE Credits.

We are always seeking SME's who can bring these topics to our audience in the form of education and discussion in a vendor neutral environment.

If you are interested in learning more about sponsorship options please contact Hillary Baron [email protected].