Surveys

Open Survey: CCM V4 - Shape the future of cloud security and win CCSK token and gift cards

Dear colleagues,
The current version of CCM, V3.0.1, has been an enormous success in terms of adoption, and since its initial publication in 2013 has gone through several minor updates, in order to address errata and expand mappings. Like any standards it requires a major update in order to better reflect the changes in the cloud landscape, both in terms of technologies and in terms of governance, risk and compliance requirements.

 

The purpose of this survey is to collect input for the creation of CCM V4.

Link: https://www.surveymonkey.com/r/P3S7VFC



The survey might between 20-30 minutes.

As a thank you the following prizes are being offered upon completion of the survey:

  • $5 Starbucks Card to the first 100 participants that have fully completed the survey.
  • Be entered into a drawing to win one of the five available $100 Amazon Cards.
  • Be entered into a drawing to win one of the five available CCSK token.
 

You stand a chance at winning these prizes if you submit a completed survey. 
Please leave behind your email so we can contact you.

Closing date: 15 January 2019


Open Survey:Top Threats to Cloud Computing 2018

Dear Colleagues,
The CSA Top Threats Working Group is happy to announce the survey for the next iteration of the Top Threats to Cloud Computing report. This time round we have shortlisted 19 security issues from recurring issues like Data Breaches and Insecure Interfaces and APIs to new issues like Weak Control Plane. We need your help to determine the industry perception of what the most significant issues are.

The survey will take less than 10 minutes to complete. To encourage participation, we’re giving away $100 worth of Amazon vouchers and 1 CCSK token. The survey will be open for a month, starting from the 19th of November and end on the same day in December 2018. If you are interested in taking part in the survey, please follow this link: https://lnkd.in/fFpbfqs.

Thank you for your time.

Best Regards,
CSA Top Threats Working Group

Closing date: 19 December 2018

The Cloud Security Alliance is uniquely positioned within the cloud security community. Thousands of active members are able to respond to cloud security-related surveys. This website is a repository of the results from these surveys.

Cloud Adoption and Security in India

The “State on Cloud Adoption and Security in 2016: India” survey was circulated in an effort to understand and evaluate cloud computing trends in India. We hope to understand cloud adoption plans and usage from different industries in India and how cloud adoption can have an impact on organization business strategies and plans. This report…

Release Date: November 22, 2016

Cloud Adoption Practices & Priorities in the Chinese Financial Sector

We circulated the “Financial Services Industry Cloud Adoption Survey: China” survey to IT and security professionals in the Financial Services Institutions (FSIs) in China. The goal was not only to raise awareness around Cloud service adoption, but also to provide insight into how finance, government, insurance, and security decision makers take action in their organization…

Release Date: October 28, 2016

Defeating Insider Threats

As a follow up to the Top Threats in Cloud Computing and from the months of May to July 2016 we surveyed approximately 100 professionals on the extent of the following: Employees leaking critical information and tradecraft on illicit sites Data types and formats being exfiltrated along with exfiltration mechanisms Why so many data threats…

Release Date: October 19, 2016

Mitigating Risk

With several years of cloud adoption in organizations, approaches to security have been evolving rapidly. To dig deeper into these concerns and the controls being used to mitigate both sanctioned and unsanctioned cloud security risks, the Cloud Security Alliance and Bitglass conducted a survey of 176 IT security leaders. Respondents revealed that visibility and control…

Release Date: August 17, 2016

Identity Security

The goal of the Identity Solutions: Security Beyond the Perimeter survey was to address Insufficient Identity, Credential, and Access Management and gain a better understanding and perception of enterprise security in the evolving Information Technology (IT) world.

Release Date: April 19, 2016

The Cloud Balancing Act for IT: Between Promise and Peril

Cloud Adoption does not have to mean opening up your organization to increased security risks and threats if the right policies are in place. That’s what the findings from a new Cloud Security Alliance (CSA) survey, titled The Cloud Balancing Act for IT: Between Promise and Peril, indicated when it surveyed executives and IT managers…

Release Date: January 13, 2016

SME Cloud Security

This 2015 Hong Kong Small and Medium-sized Enterprises (SME) Cloud Adoption, Security and Privacy Readiness Survey was conducted by the Internet Society Hong Kong and the Cloud Security Alliance Hong Kong and Macau Chapter, who commissioned the Hong Kong Productivity Council (Council) to carry out telephone interviews with SMEs (<100 employees) in Hong Kong. The…

Release Date: June 01, 2015

Cloud Adoption In The Financial Services Sector

We circulated the “How Cloud is Being Used in the Financial Sector” survey to IT and security professionals in financial services institutions. The goal was to further the discussion to these topics: Describe your company’s approach to cloud computing. Describe your private cloud policy. What is your corporate risk assessment to cloud computing? What features…

Release Date: March 05, 2015

Cloud Adoption Practices & Priorities

The benefits for enterprises moving to the cloud are clear: greater business agility, data availability, collaboration, and cost savings. The cloud is also changing how companies consume technology. Employees are more empowered than ever before to find and use cloud applications, often with limited or no involvement from the IT department, creating what’s called “shadow…

Release Date: January 09, 2015

Cloud Usage: Risks and Opportunities

This survey was circulated to over 165 IT and security professionals in the U.S. and around the globe representing a variety of industry verticals and enterprise sizes. The goal was to understand their perception of how their enterprises are using cloud apps, what kind of data are moving to and through those apps, and what…

Release Date: September 15, 2014

Data Protection Heat Index

The Cloud Security Alliance surveyed a select group of global data privacy experts with the intention to measure attitudes towards data protection areas that tie into technology solutions which enable the exchange of information across the cloud.

Release Date: September 12, 2014

Government Access to Information

The survey received almost 500 responses from CSA members around the world. It found that 56% of non-US residents were now less likely to use US-based cloud providers, in light of recent revelations about government access to customer information.

Release Date: July 23, 2013

Cloud Consumer Advocacy Questionnaire

The purpose of this survey was to capture the current state of data governance and data security capabilities offered by leading cloud service providers in the industry. The results of this survey are intended to be used for guidance and research conducted by CSA and its affiliates.

Release Date: November 16, 2011

CCAQIS v1.2

The purpose of this survey is to capture the current state of data governance and data security capabilities offered by leading cloud service providers in the industry. The results of this survey will be aggregated and used for guidance and research conducted by CSA and its affiliates.

Release Date: August 01, 2011