CSA Webinars

Dive into cloud security with webinars from subject matter experts.

CSA Webinars
Discover how to use new technologies and the latest research for cloud security, all while earning CPE credits from home.

Our webinars cover all matters related to the cloud including trending topics, new technologies, and latest research from CSA. Browse our upcoming webinars or subscribe to one of our Brighttalk channels to get started.

Our Research Channel features projects and initiatives from CSA's working groups and analysts, while our CloudBytes Channel covers latest trends and technologies emerging in cloud.

Interested in sponsorship opportunities?

We are always seeking subject matter experts who can explain cloud-related topics to our audience in a vendor-neutral environment.

Learn more here

Research Channel
Cloudbytes Channel

Upcoming CloudBytes

STAR 1000 - The reason behind the STAR Program success story

STAR 1000 - The reason behind the STAR Program success story

October 27, 2020, Daniele Catteddu, CSA and John DiMaria, CSA

The cloud has come to dominate the technology landscape and revolutionize the market, creating a tectonic shift in accepted practice contributing to a massive advancement in technology. With an inc...

Automating SAML Security Tests

Automating SAML Security Tests

October 29, 2020, Ty Anderson, Application Security Researcher - Product Security Team, Adobe

Single Sign-On (SSO) applications are becoming increasingly prevalent in organizations today. While there are many different SSO configuration types, Security Assertion Markup Language (SAML) is on...

CSA’s Perspective on Cloud Risk Management

CSA’s Perspective on Cloud Risk Management

November 3, 2020, Daniele Catteddu, CTO, Cloud Security Alliance. John DiMaria, Assurance Investigatory Fellow, Cloud Security Alliance

This session is designed to introduce the publication of CSA’s unique insights into the challenges of mastering the widespread adoption of cloud technologies. More importantly, CSA will help member...

The Correlation Between Security Ratings and Breach Likelihood

The Correlation Between Security Ratings and Breach Likelihood

November 3, 2020, Matthew Mckenna, VP, International Operations, Security Scorecard

What is the value of security ratings when it comes to predicting breaches? What are the indicators that breached companies are showing that non-breached companies don’t express? This session will...

GAIA-X: Current Status and Outlook – What to Expect and How to Engage

GAIA-X: Current Status and Outlook – What to Expect and How to Engage

November 3, 2020, Andreas Weiss, Head of Digital Business Models, eco Association of the Internet Industry

The key objectives of GAIA-X, Community Engagement and participation via the GAIA-X Association. European Data Infrastructure as part of NextGenerationEU - based on GAIA-X.

Cloud Security post Covid-19, Where to Go Next

Cloud Security post Covid-19, Where to Go Next

November 3, 2020, Carlo Gebhardt, Managing Director, Accenture Security

Over recent years, security and compliance have been some of the top considerations when moving to the cloud. However, as Covid-19 has served as a transformation accelerator in many aspects of our ...

Using OPA for Continuous Compliance with Cloud Infrastructure Policy-as-Code

Using OPA for Continuous Compliance with Cloud Infrastructure Policy-as-Code

November 3, 2020, Josh Stella, Co-founder and CTO, Fugue

Cloud security is a software engineering problem, not a security analysis one. The engineers that build and maintain cloud infrastructure need policy-as-code tools to ensure cloud security and comp...

Get Quantum Safe

Get Quantum Safe

November 4, 2020, Roger Grimes,Data-driven Defence Evangelist,KnowBe4 Inc. Bruno Huttner,Business Development & Product Management,ID Quantique

Introduction to CSA's Quantum Safe Security Working Group and its goals and objectives. Quantum computers continue to strengthen and soon will be able to break traditional forms of asymmetric encry...

Shared Responsibility: Someone Else’s Problem

Shared Responsibility: Someone Else’s Problem

November 4, 2020, Ashley Ward, Cloud CTO, Palo Alto Networks

When talking about cloud it’s easy to fallback to that old joke that cloud is just someone else’s computer. Unfortunately it’s also easy to see it as Someone Else’s Problem (SEP). Ford Prefect, fro...

STAR Future Roadmap

STAR Future Roadmap

November 4, 2020, Daniele Catteddu, CTO, Cloud Security Alliance. John DiMaria, Assurance Investigatory Fellow, Cloud Security Alliance

The CSA has recently celebrated the 1000 entries into the STAR Registry. This was confirmation of the value and relevance of the STAR program in the cloud community. The STAR Program has evolved...

Unveiling the Wonder of Automated Vulnerability Management in the Cloud

Unveiling the Wonder of Automated Vulnerability Management in the Cloud

November 4, 2020, Eric Zielinski, Director of Security Operations, Veeva Systems

As more workloads move to the cloud, it is critical to secure those workloads against known vulnerabilities. The benefits of the cloud allow for agility, speed and innovation, but the cloud also c...

A Referenced Architecture to Modernize Your Approach to Cloud

A Referenced Architecture to Modernize Your Approach to Cloud

November 4, 2020, John Yeoh, Global Vice President of Research, Cloud Security Alliance

Awaken your approach to cloud with a reference architecture that modernizes your enterprise. John covers the foundational components of the CSA Enterprise Architecture and shares how it is used to ...

What You Need to Know About Credential Stuffing Attacks

What You Need to Know About Credential Stuffing Attacks

November 4, 2020, Jamie Hughes, Senior Solutions Engineer, Auth0

As a central authentication service that processes billions of logins a month, credential stuffing attacks are the most common threats we observe. These attacks can lead to fraud, loss of reputatio...

Cloud Control Matrix V4

Cloud Control Matrix V4

November 5, 2020, Daniele Catteddu, Cloud Security Alliance; Sean Cordero, Netskope and Shawn Harris, Starbucks

Since its debut in 2013, the Cloud Control Matrix (CCM) v3.0.1 has been greatly successful and received wide adoption around the globe. Nevertheless, as new technologies emerge and the cloud certif...

A How-To Guide: Navigating the Top 7 Trends in Third-Party Risk Management

A How-To Guide: Navigating the Top 7 Trends in Third-Party Risk Management

November 5, 2020, Scott Bridgen, GRC Consulting Director, OneTrust

The world of third-party risk management is rapidly changing. Each day, organizations like yours face new security, privacy, and compliance threats when working with third parties. The good news is...

The Impact of Fog Computing and Edge Computing on Cloud Security

The Impact of Fog Computing and Edge Computing on Cloud Security

November 5, 2020, Megha Kalsi, Cloud Security Senior Manager, Protiviti

Due to the rapid growth of IoT and mobile devices, both fog computing and edge computing technologies were hastily developed, which resulted in security and privacy related challenges that could im...

Zero Trust: The Key to your IAM Success

Zero Trust: The Key to your IAM Success

November 5, 2020, Richard Archdeacon, Advisory CISO, EMEA, Duo Security

Enterprise-ready cloud services and hybrid solutions have made it easier for users to complete their work wherever they are, but this flexibility expands the attack surface admins are expected to s...

CCAK: The industry's first global cloud auditing credential

CCAK: The industry's first global cloud auditing credential

November 5, 2020, Daniele Catteddu, Cloud Security Alliance. Shannon Donahue, ISACA. John Guckian. Moshe Ferber. Douglas Barbin.

Developed by CSA and ISACA to meet the unique demands of auditing cloud based environments, the Certificate of Cloud Auditing Knowledge (CCAK) is the first credential that industry professionals ca...

Packets: Defending the Cloud with Network Detection & Response

Packets: Defending the Cloud with Network Detection & Response

November 5, 2020, Jeff Deininger, Principal Sales Engineer, ExtraHop

The playing field between attackers and defenders is not level, and it’s only becoming more unbalanced because of the complex, layered nature of attack surfaces in the cloud. Attackers can launch m...

Introduction, Welcome Remarks & Opening Keynote

Introduction, Welcome Remarks & Opening Keynote

November 11, 2020, Ryan TY, Dr. Hing-Yan LEE, Timothy GRANCE

CSA Philippines Virtual Summit 2020

Securing the Big Shift to the Cloud

Securing the Big Shift to the Cloud

November 11, 2020, Isa OJEDA, Vice President - Compliance Risk Management Officer, APAC, Citibank

The debate on Cloud adoption is over. The pandemic has accelerated the migration of Philippine local enterprises to the cloud. The current table discussions during business meetings is how to mov...

Cloud Security Against the Top Threats in Cloud

Cloud Security Against the Top Threats in Cloud

November 11, 2020, Ricson Singson QUE, Carlos TENGKIAT, Paula Nones-RAMOS, Mark MISTAL

The pandemic has accelerated the digital transformation initiatives of many organizations in the Philippines. Local companies jumped to the cloud with survival response as the prime consideration....

Best Practices in Selecting Cloud Security Services

Best Practices in Selecting Cloud Security Services

November 11, 2020, Gonz GONZALES, Richard PARIA, Reggie TAMAYO, Vic TOLOSA, Leonardo SACAMOS

The pandemic accelerated the digital transformation initiatives of many organizations in the Philippines. Local companies jumped to the cloud with survival response as the prime consideration. Jo...

Today’s Threat Landscape

Today’s Threat Landscape

November 17, 2020, Jeremy Ventura, Sr. Security Engineer, Mimecast

Now more than ever, it’s important for organizations to gain visibility into email and brand reputation threats. While the concept of email hasn’t changed in 20+ years – the tactics, techniques an...

Using KPIs To Build Confidence in Your Cloud Security & Compliance Posture

Using KPIs To Build Confidence in Your Cloud Security & Compliance Posture

November 19, 2020, Nikhil Girdhar, Product Line Marketing Manager & Shrivatsa Upadhye, Sr Technical Marketing Architect, CloudHealth by VMware

How confident are you that your developers are avoiding the mistakes in public cloud usage that can lead to critical security risks? Most security breaches in the cloud are the result of simple co...