CSAIChaptersEventsBlog
AI, evolving regulations, and rapid digital change are reshaping cybersecurity. Join leaders driving real impact and register to attend the CSA Summit at RSAC →

Contribute to CSA Research

Home
Contribute

Open Peer Reviews

Post-Quantum Cryptography Key Management

Open Until: 03/27/2026

This paper presents an in-depth analysis of Post-Quantum Cryptography (PQC) and its impact on key management practices in c...

Leveraging the Health Data from IoT Wearables

Open Until: 03/31/2026

Healthcare is undergoing a transformation, driven by big data and artificial intelligence (AI). This requires the collectio...

Comparing FHE and Other PETs

Open Until: 04/17/2026

Privacy-enhancing technologies offer a broad spectrum of solutions for challenges related to data confidentiality. However,...

MLOps Threat Model

Open Until: 04/17/2026

This paper sets the foundation for how we can apply the threat modelling practice of DevSecOps to MLOps.Please revi...

Open Surveys

Top Threats to Cloud Computing 2026

Participate in this survey to help us identify the top threats, vulnerabilities, and risks organizations are facing in 2026. The results of this survey will be used in CSA's latest installment of the Top Threats to Cloud Computing paper.

Survey participants have the opportunity to win a CCSK exam token$100 Amazon giftcard or $50 Amazon giftcard.

Take the survey before April 10 →