CSA Webinars

Dive into cloud security with webinars from subject matter experts.

CSA Webinars
Discover how to use new technologies and the latest research for cloud security, all while earning CPE credits from home.

Our webinars cover all matters related to the cloud including trending topics, new technologies, and latest research from CSA. Browse our upcoming webinars or subscribe to one of our Brighttalk channels to get started.

Our Research Channel features projects and initiatives from CSA's working groups and analysts, while our CloudBytes Channel covers latest trends and technologies emerging in cloud.

Interested in sponsorship opportunities?

We are always seeking subject matter experts who can explain cloud-related topics to our audience in a vendor-neutral environment.

Learn more here

Research Channel
Cloudbytes Channel

Upcoming CloudBytes

It Ain't Done Until It's Automated: Security at the speed of DevOps

It Ain't Done Until It's Automated: Security at the speed of DevOps

May 11, 2021, TJ Gonen, Head of Cloud Product, Check Point Software Technologies

Amidst the growing buzz for shift-left developer centric security methods, this session will highlight the need for a common ground between security and DevOps and offer guidance and best practices...

CSA CxO Trust: Strategies for the Cloud-Centric Enterprise

CSA CxO Trust: Strategies for the Cloud-Centric Enterprise

May 18, 2021, Valerie Abend, Pete Chronis, Rick Doten, & Dan Mellen

C-Suite Challenges in the Cloud Learn about the challenges members of the C-suite face, both technical and non-technical, as their organizations transition to the cloud. What can we learn from th...

CSA CxO Trust: Strategies for the Cloud-Centric Enterprise

CSA CxO Trust: Strategies for the Cloud-Centric Enterprise

May 18, 2021, Rich Baich, David Cass, Nicole Darden Ford

Evolving Cybersecurity with the Cloud Digital transformation to the cloud requires organizations to change many of their processes. Learn how the cloud will specifically impact your organization’s ...

CSA CxO Trust: Strategies for the Cloud-Centric Enterprise

CSA CxO Trust: Strategies for the Cloud-Centric Enterprise

May 18, 2021, Stacey Halota, Mark Houpt, Randy Vickers

Transitioning to the Cloud There are numerous things to keep in mind when transitioning to the cloud; . security concerns, compliance, and managing risk are just a few. This session will consist of...

CSA CxO Trust: Strategies for the Cloud-Centric Enterprise

CSA CxO Trust: Strategies for the Cloud-Centric Enterprise

May 19, 2021, Raj Badhwar and Dr. Yonesy Nunez

Strengthening Cloud Operations With the basics taken care of, it’s time to enhance and integrate your cloud operations. Learn how to develop a complete cloud security foundation that works with you...

5 Ways to Improve Your Cloud Security

5 Ways to Improve Your Cloud Security

May 19, 2021, Ryan Davis, Sr. Cloud Product Marketing Manager at ExtraHop

Cybersecurity has never been easy, and as enterprises expand their footprints in the cloud, they often run into issues and friction that can weaken security and leave them vulnerable to advanced th...

Introducing the “One-Stop Anomaly Shop” (OSAS) Project

Introducing the “One-Stop Anomaly Shop” (OSAS) Project

May 20, 2021, Adobe Security Intelligence Team: Tiberiu Boros, Andrei Cotaie, Vivek Malik, & Kumar Vikramjeet

OSAS is a recently released open-source security intelligence toolset that leverages machine learning and other innovative technologies aimed at discovering anomalies in a given dataset. The tool i...

Securing the Hybrid Cloud: Visibility Best Practices

Securing the Hybrid Cloud: Visibility Best Practices

May 25, 2021, James Mandelbaum, Senior Security Engineer, Gigamon

With the move to cloud and the multitude of approaches, your ability to effectively monitor and secure workloads gets even more difficult. IT complexity, the rate of change, lack of skills, and org...

How to Manage the Top 10 Cloud Security Risks

How to Manage the Top 10 Cloud Security Risks

May 26, 2021, Dr. Saumitra Das, CTO Founder, Blue Hexagon & Dr. Neil Daswani, Co-Director of the Stanford Advanced Cybersecurity Program

Modern cloud threats are complex, multi-stage attacks that involve supply chain infection, credential harvesting, evasive beaconing, zero-day Linux malware, and ransoming cloud storage. These attac...

Introduction, Welcome Remarks & Opening Keynote

Introduction, Welcome Remarks & Opening Keynote

May 27, 2021, Dr. Hing-Yan LEE, Son HO & Jim REAVIS

Introduction ​Dr. Hing-Yan LEE (EVP APAC, CSA) Welcome Remarks (in English & Vietnamese) ​Son HO (Chairman, CSA Vietnam Chapter) ​ ​​ Opening Address Jim REAVIS (CEO & Co-Founder, CSA)

Opening Keynote

Opening Keynote

May 27, 2021, Dr. Dang Duc Mai, Chairman, Hanoi Informatics and Telecommunications Association

The talk will cover digital transformation and the need of information security , as well as cloud security landscape in Vietnam.

Zero Trust and Identity as a Service

Zero Trust and Identity as a Service

May 27, 2021, Nya Alison Murray, CEO, Trac-Car Technology

As the threat landscape and cybersecurity risks are an ever present threat in 2021, it is clear that measures have to be taken to be more mindful of what end users, people, applications and IOT dev...

SDP & ‘Black-Cloud’ Protection

SDP & ‘Black-Cloud’ Protection

May 27, 2021, Juanita Koipillai, Founder & CEO, Waverley Labs

Security has become of paramount importance in recent times, especially due to the advent of cloud computing and virtualization. With so many devices in the mix, users have the choice of working fr...

Cloud Security Architecture (CSArch)

Cloud Security Architecture (CSArch)

May 27, 2021, Shamun MAHMUD, Senior Research Analyst, CSA

-

Reflective Security & DevSecOps

Reflective Security & DevSecOps

May 27, 2021, Ronald TSE, CEO, Ribose & Co-Chair, CSA DevSecOps Working Group

The CSA DevSecOps working group has published a number of papers including Reflexive Security, DevSecOps, and associated best practices. This talk briefly describes these topics, with an explanatio...

Piece of Mind with Cloud Native Security Guidance

Piece of Mind with Cloud Native Security Guidance

May 27, 2021, Suresh AGARWAL, Honorary Secretary, CSA Singapore Chapter & MD, Agarwal Pte Ltd

A new Guidance for Cloud Native Security was approved by the Singapore Information Technology Standards Committee in 2020. This speaker will provide an analysis on the strengths and weaknesses of t...

Best Practices in Implementing Secure Microservices Architecture

Best Practices in Implementing Secure Microservices Architecture

May 27, 2021, Madhav CHABANI, Chairman, CSA NCR Chapter & Consulting CIO, TippingEdge Consulting

Application containers and a microservices architecture are being used to design, develop, and deploy applications leveraging agile software development approaches such as Development Operations. S...

Securing the Cloud via CCSK

Securing the Cloud via CCSK

May 27, 2021, Ekta MISHRA & Philip Cao HUNG

As organizations migrate to the cloud, they need information security professionals who are cloud-savvy. The Certificate of Cloud Security Knowledge (CCSK) is widely recognized as the standard of e...

How Can We Grow the Pool of Cloud Security Professionals

How Can We Grow the Pool of Cloud Security Professionals

May 27, 2021, Dr. Hing-Yan LEE, LE Ngoc Son, Ferdinand FONG

Panel Discussion Given that many countries have been suffering from a dire shortage of IT professionals for many years and the demand for IT professionals has continued unabated. The panel hopes ...

Modern Cyber Threat Intelligence: Cybersecurity Compliance and Regulations

Modern Cyber Threat Intelligence: Cybersecurity Compliance and Regulations

May 27, 2021, Chris Strand, Chief Compliance Officer at IntSights

Threat Intelligence is normally used to enrich the process of security assessment, providing proof on the enforcement of security controls required to be secure and compliant. As threat intelligenc...

Modern Cyber Threat Intelligence: Cybersecurity Compliance and Regulations

Modern Cyber Threat Intelligence: Cybersecurity Compliance and Regulations

May 27, 2021, Chris Strand, Chief Compliance Officer at IntSights

Threat Intelligence is normally used to enrich the process of security assessment, providing proof on the enforcement of security controls required to be secure and compliant. As threat intelligenc...

Least Privilege as Code: Standardizing Management of Cloud Entitlements

Least Privilege as Code: Standardizing Management of Cloud Entitlements

June 3, 2021, Adam Markert, Principal Solutions Architect, CyberArk

Security at scale requires consistent controls. Cloud security and operations teams must be careful to consistently define processes for provisioning, reviewing, and removing IAM permissions. Othe...

Getting to Secure DevOps

Getting to Secure DevOps

June 8, 2021, Gavin Matthews, Senior Technical Product Manager, Red Canary

DevOps established infrastructure that is fast, and easy to deploy and maintain. And it is increasingly complex. Further, many DevOps programs face a high risk of threats as security has not been s...