CSA Webinars

Dive into cloud security with webinars from subject matter experts.

CSA Webinars
Discover how to use new technologies and the latest research for cloud security, all while earning CPE credits from home.

Our webinars cover all matters related to the cloud including trending topics, new technologies, and latest research from CSA. Browse our upcoming webinars or subscribe to one of our Brighttalk channels to get started.

Our Research Channel features projects and initiatives from CSA's working groups and analysts, while our CloudBytes Channel covers latest trends and technologies emerging in cloud.

Interested in sponsorship opportunities?

We are always seeking subject matter experts who can explain cloud-related topics to our audience in a vendor-neutral environment.

Learn more here

Research Channel
Cloudbytes Channel

Upcoming CloudBytes

Cloud IAM is the New Perimeter, Learn How to Govern It or Lose Control

Cloud IAM is the New Perimeter, Learn How to Govern It or Lose Control

July 14, 2020, Tyler Smith, Sr Cloud Security Engineer, Allstate & Chris Hertz, VP of Sales - Cloud Solutions, DivvyCloud by Rapid7

Strong IAM governance is the key to preventing data breaches and limiting the blast radius should a security incident occur. Join Tyler Smith, Senior Cloud Security Engineer at Allstate, along wi...

Emerging Top Threats in Cloud Computing – What We Can Do About Them

Emerging Top Threats in Cloud Computing – What We Can Do About Them

July 15, 2020, Moderator : Jim LIM, Panelists: Raju CHELLAM | Nigel LIM | Steve NG

With cloud becoming the preferred IT infrastructure, understanding the emerging security threats is important. A recent CSA study showed that traditional cloud security issues (such as DDoS, share...

Update on FedRAMP with an Introduction with John Yeoh, Global VP of Research, CS

Update on FedRAMP with an Introduction with John Yeoh, Global VP of Research, CS

July 15, 2020, Zach Baldwin, Program Manager for Strategy, Innovation, and Technology, General Services Administration

Mr. Baldwin will define and discuss several new initiatives that FedRAMP is working on in response to feedback for their users including: Open Security Controls Assessment Language (OSCAL), Threat-...

Building a Successful Third Party Risk Management Program for a Modern World

Building a Successful Third Party Risk Management Program for a Modern World

July 16, 2020, Chad A. Peterson - Director, Security Operations at Optiv Security &Matthew Barth, Senior Sales Engineer at SecurityScorecard

The challenges that organizations are facing today are increasingly more complex than the past. A global health crisis, an unstable economy and changing dynamics of business risks and opportunities...

Zero Trust: A Five Step Program

Zero Trust: A Five Step Program

July 21, 2020, Leya Leydiker and Ganesh Umapathy, Product Managers at Duo

If you’re eager to learn how you can elevate your Access Management journey, especially with the swift, mass pivot to remote work, don’t miss this webinar. The workforce to protect continues to exp...

CSA STAR Town Hall – Everything you’ve wanted to know

CSA STAR Town Hall – Everything you’ve wanted to know

July 22, 2020, John Yeoh of CSA, JR of CSA, John DiMaria of CSA, and Brianna Hogan of Booz Allen Hamilton

CSA STAR is being recognized as the international harmonized solution, leading the way of trust for cloud providers, users, and their stakeholders, by providing an integrated cost-effective solutio...

Visibility & Security Challenges Across Multicloud, Hybrid, & Remote Deployments

Visibility & Security Challenges Across Multicloud, Hybrid, & Remote Deployments

July 23, 2020, Fernando Montenegro, Principal Analyst, 451 Research & Dan Frey, Sr. Product Marketing Manager, ExtraHop

Migration to the cloud continues, now with even greater urgency as organizations around the world transition to remote workforces and shift operations off-premises. But cloud environments can expan...

Nefarious Uses of Cloud: A Case Study from Defending a Security Conference

Nefarious Uses of Cloud: A Case Study from Defending a Security Conference

July 29, 2020, Wong Onn Chee, CTO, Resolvo & Co-Chair, CSA APAC Research Advisory Council

As organisations increasingly move to the cloud, so do the attackers. Come and listen to Onn Chee on how the cloud was used to attack a security conference's websites on the cloud, the profile of t...

Tackling Security in the World of Containers and Hybrid Cloud

Tackling Security in the World of Containers and Hybrid Cloud

August 4, 2020, Lucy Kerner, Global Senior Principal Security Technical Evangelist, Red Hat

Security teams are increasingly finding it challenging to keep up with the changing risks, compliance requirements, tools, and architectural changes introduced by new technologies - such as contain...