CSA Webinars

Dive into cloud security with webinars from subject matter experts.

CSA Webinars
Discover how to use new technologies and the latest research for cloud security, all while earning CPE credits from home.

Our webinars cover all matters related to the cloud including trending topics, new technologies, and latest research from CSA. Browse our upcoming webinars or subscribe to one of our Brighttalk channels to get started.

Our Research Channel features projects and initiatives from CSA's working groups and analysts, while our CloudBytes Channel covers latest trends and technologies emerging in cloud.

Interested in sponsorship opportunities?

We are always seeking subject matter experts who can explain cloud-related topics to our audience in a vendor-neutral environment.

Learn more here

Research Channel
Cloudbytes Channel

Upcoming CloudBytes

Building a Great Security Culture

Building a Great Security Culture

September 29, 2020, Isaac Painter, Security Training, Awareness, and Culture Manager, Adobe

Addressing technology risk is a no-brainer, but when it comes to addressing human-security risk, it’s not always top of mind for companies – but it should be! Studies show that over 50% of cyber se...

Panel: Pandemic & Beyond: Migrating to Cloud Securely

Panel: Pandemic & Beyond: Migrating to Cloud Securely

September 29, 2020, Jim Reavis, Pete Chronis, Tima Soni, Patti Titus, Vinay Patel

In this panel, our group of CISOs will be discussing the central cloud security issues currently being faced. Is the pandemic accelerating the push to the cloud? What are the governance, technical...

SECtember Experience Wrap-Up: Guiding your Race to the Cloud

SECtember Experience Wrap-Up: Guiding your Race to the Cloud

September 30, 2020, Jim Reavis, CEO, Cloud Security Alliance

In this session, Jim will take a look back at the critical topics covered throughout this month-long SECtember Experience and highlight key takeaways that can help guide you on your race to the clo...

Exposed in the Cloud: Agility Comes With Risk

Exposed in the Cloud: Agility Comes With Risk

October 1, 2020, Jim Wachhaus, Director of Technical Product Marketing, CyCognito

According to Gartner, spending on shadow IT can exceed 40% of the formal IT spend. That’s probably not too surprising for those of us leveraging the cloud to move quickly. But it means that enterpr...

Securing IAM: The New Cloud Perimeter is Broken

Securing IAM: The New Cloud Perimeter is Broken

October 6, 2020, Matt Chiodi, Chief Security Officer of Public Cloud, Palo Alto Networks

Historically, defense in depth was mostly performed through network-layer controls. While network security controls remain an important component of cloud security, an additional layer of identity ...

What You Need to Know About Credential Stuffing Attacks

What You Need to Know About Credential Stuffing Attacks

October 8, 2020, Andrew Akers, Solutions Product Marketing Manager, Auth0

As a central authentication service that processes billions of logins a month, credential stuffing attacks are the most common threats we observe. These attacks can lead to fraud, loss of reputatio...

Reinventing Data Security for the Remote Workforce in A “Cloud First” World

Reinventing Data Security for the Remote Workforce in A “Cloud First” World

October 13, 2020, Sundaram Lakshmanan, CTO, CipherCloud & Matt Hines, VP and Evangelist, CipherCloud

If the overnight expansion of the remote workforce has taught us one lesson, it is that improving data protection for cloud apps has become the primary challenge facing today’s security practitione...

Identifying Risky Vendors: 10 Warning Signs You Shouldn't Ignore

Identifying Risky Vendors: 10 Warning Signs You Shouldn't Ignore

October 15, 2020, Walton Stephens, Third-Party Risk Consultant, OneTrust

For individuals managing third-party risk, there is one primary question that needs answering: Are your vendors safe to do business with? Answering that question is not so straightforward. Third-pa...

Why AI Needs Cyber Security Urgently?

Why AI Needs Cyber Security Urgently?

October 20, 2020, Jim Reavis, Co-Founder & CEO, CSA & Prof. Yu Chien Siang, Chief Innovation & Trust Officer, Amaris AI

Traditionally, cyber security systems have been adding AI capabilities to detect unknown malware, zero day attacks and to analyse logs to detect abnormalities to discover frauds, insider attacks an...

Disrupting yourself and your Adversaries in the cloud

Disrupting yourself and your Adversaries in the cloud

October 20, 2020, Mickey Perre, Security Specialist, Elastic

As organisations lift and shift workloads into the cloud they are required to not only protect themselves from external threats but also from internal disruptions such as multi cloud deployment spr...

Modeling Against the Top Threats in Cloud

Modeling Against the Top Threats in Cloud

October 20, 2020, John Yeoh, Global Vice President of Research, CSA

Since 2010, the CSA Top Threats report has revealed major security concerns in cloud computing from top industry professionals. John shares how the report can be used to protect against the latest ...

Collaborating for Inclusion & Equality in Cybersecurity

Collaborating for Inclusion & Equality in Cybersecurity

October 20, 2020, Larry Whiteside, Jr., Co-Founder & President ICMCP and Illena Armstrong, Industry Strategy Advisor, CSA

Diversity, inclusion and equality strategies and practices have always been integral to organizations’ daily operations and future growth. The need for executive leaders to genuinely embrace, evolv...

SASE Economics: The New Frontier of Cloud Security

SASE Economics: The New Frontier of Cloud Security

October 21, 2020, Dr. Hing-Yan Lee EVP APAC, CSA & Jonathan Andresen, Senior Director Marketing, Asia-Pacific & Japan Bitglass

Secure Access Service Edge (SASE) has become one of the hottest topics in the IT industry. Fueled by cloud services, the rise of BYOD and fast tracked by the new reality of remote working, direct-t...

SDP & 'Black-Cloud' Protection

SDP & 'Black-Cloud' Protection

October 21, 2020, Juanita Koipillai, Founder & CEO, Waverley Labs

Security has become of paramount importance in recent times, especially due to the advent of cloud computing and virtualization. With so many devices in the mix, users have the choice of working fr...

Zero Trust and Identity as a Service

Zero Trust and Identity as a Service

October 21, 2020, Nya Alison Murray, CEO, Trac-Car Technology

As the threat landscape and cybersecurity risks are an ever present threat in 2020, it is clear that measures have to be taken to be more mindful of what end users, people, applications and IOT dev...

There is no more enterprise perimeter.  Now What?

There is no more enterprise perimeter. Now What?

October 21, 2020, Bob Flores, Satyavathi Divadari, Sandip Kumar Panda & Keith Prabhu.

With more and more emphasis on cloud computing, the traditional enterprise perimeter is being redefined. This means enterprises must think differently when considering cybersecurity protection. T...

Coronavirus, computer virus, cyber threats: A false sense of security

Coronavirus, computer virus, cyber threats: A false sense of security

October 22, 2020, Ekta Mishra, APAC Membership Director & Country Manager - India & Dr. Ngair Teow-Hin, CEO, SecureAge Technology

With most office workers working from home due to Coronavirus pandemic, computer virus attacks on home computers are now a major issue facing the world. In this talk, we discuss the history of comp...

Watching the STARs

Watching the STARs

October 22, 2020, Sanjeev Gupta, Director, Certification Partners Global

We review what Certification means, in the most important criterion for a business, sales. How does a Certification Program achieve this? And what are the costs, not just direct. How should an O...

The Current & Future of Cloud Security Strategy

The Current & Future of Cloud Security Strategy

October 22, 2020, Ken Low, Subhajit Deb, Alex Ng, Noordin Yusuff Marican, Ian Loe

Join fellow CISOs for this panel discussion about Cloud Security strategy in 2020 and beyond. Where should you place your bets (and your budget)? How can you protect your organization from the new...

Public Cloud Database Security: Using Others’ Mistakes to Stop Attacks

Public Cloud Database Security: Using Others’ Mistakes to Stop Attacks

October 22, 2020, Aaron C. Newman Founder, SecureCloudDB

Hacks and breaches occur regularly. It can take months to find and contain an incident. According to Gartner, 99% of cloud security failures will be the cloud customer’s fault. Why is that? Join...

CSA’s Perspective on Cloud Risk Management

CSA’s Perspective on Cloud Risk Management

November 3, 2020, Daniele Catteddu, CTO, Cloud Security Alliance. John DiMaria, Assurance Investigatory Fellow, Cloud Security Alliance

This session is designed to introduce the publication of CSA’s unique insights into the challenges of mastering the widespread adoption of cloud technologies. More importantly, CSA will help member...

The Correlation Between Security Ratings and Breach Likelihood

The Correlation Between Security Ratings and Breach Likelihood

November 3, 2020, Matthew Mckenna, VP, International Operations, Security Scorecard

What is the value of security ratings when it comes to predicting breaches? What are the indicators that breached companies are showing that non-breached companies don’t express? This session will...

GAIA-X: Current Status and Outlook – What to Expect and How to Engage

GAIA-X: Current Status and Outlook – What to Expect and How to Engage

November 3, 2020, Andreas Weiss, Head of Digital Business Models, eco Association of the Internet Industry

The key objectives of GAIA-X, Community Engagement and participation via the GAIA-X Association. European Data Infrastructure as part of NextGenerationEU - based on GAIA-X.

Cloud Security post Covid-19, Where to Go Next

Cloud Security post Covid-19, Where to Go Next

November 3, 2020, Carlo Gebhardt, Managing Director, Accenture Security

Over recent years, security and compliance have been some of the top considerations when moving to the cloud. However, as Covid-19 has served as a transformation accelerator in many aspects of our ...

Using OPA for Continuous Compliance with Cloud Infrastructure Policy-as-Code

Using OPA for Continuous Compliance with Cloud Infrastructure Policy-as-Code

November 3, 2020, Josh Stella, Co-founder and CTO, Fugue

Cloud security is a software engineering problem, not a security analysis one. The engineers that build and maintain cloud infrastructure need policy-as-code tools to ensure cloud security and comp...

Get Quantum Safe

Get Quantum Safe

November 4, 2020, Roger Grimes,Data-driven Defence Evangelist,KnowBe4 Inc. Bruno Huttner,Business Development & Product Management,ID Quantique

Introduction to CSA's Quantum Safe Security Working Group and its goals and objectives. Quantum computers continue to strengthen and soon will be able to break traditional forms of asymmetric encry...

Shared Responsibility: Someone Else’s Problem

Shared Responsibility: Someone Else’s Problem

November 4, 2020, Ashley Ward, Cloud CTO, Palo Alto Networks

When talking about cloud it’s easy to fallback to that old joke that cloud is just someone else’s computer. Unfortunately it’s also easy to see it as Someone Else’s Problem (SEP). Ford Prefect, fro...

STAR Future Roadmap

STAR Future Roadmap

November 4, 2020, Daniele Catteddu, CTO, Cloud Security Alliance. John DiMaria, Assurance Investigatory Fellow, Cloud Security Alliance

The CSA has recently celebrated the 1000 entries into the STAR Registry. This was confirmation of the value and relevance of the STAR program in the cloud community. The STAR Program has evolved...

Unveiling the Wonder of Automated Vulnerability Management in the Cloud

Unveiling the Wonder of Automated Vulnerability Management in the Cloud

November 4, 2020, Eric Zielinski, Director of Security Operations, Veeva Systems

As more workloads move to the cloud, it is critical to secure those workloads against known vulnerabilities. The benefits of the cloud allow for agility, speed and innovation, but the cloud also c...

A Referenced Architecture to Modernize Your Approach to Cloud

A Referenced Architecture to Modernize Your Approach to Cloud

November 4, 2020, John Yeoh, Global Vice President of Research, Cloud Security Alliance

Awaken your approach to cloud with a reference architecture that modernizes your enterprise. John covers the foundational components of the CSA Enterprise Architecture and shares how it is used to ...

Cloud Control Matrix V4

Cloud Control Matrix V4

November 5, 2020, Daniele Catteddu, CTO, Cloud Security Alliance. Sean Cordero, Head of Cloud Strategy, Netskope

Since its debut in 2013, the Cloud Control Matrix (CCM) v3.0.1 has been greatly successful and received wide adoption around the globe. Nevertheless, as new technologies emerge and the cloud certif...

A How-To Guide: Navigating the Top 7 Trends in Third-Party Risk Management

A How-To Guide: Navigating the Top 7 Trends in Third-Party Risk Management

November 5, 2020, Scott Bridgen, GRC Consulting Director, OneTrust

The world of third-party risk management is rapidly changing. Each day, organizations like yours face new security, privacy, and compliance threats when working with third parties. The good news is...

The Impact of Fog Computing and Edge Computing on Cloud Security

The Impact of Fog Computing and Edge Computing on Cloud Security

November 5, 2020, Megha Kalsi, Cloud Security Senior Manager, Protiviti

Due to the rapid growth of IoT and mobile devices, both fog computing and edge computing technologies were hastily developed, which resulted in security and privacy related challenges that could im...

Zero Trust: The Key to your IAM Success

Zero Trust: The Key to your IAM Success

November 5, 2020, Richard Archdeacon, Advisory CISO, EMEA, Duo Security

Enterprise-ready cloud services and hybrid solutions have made it easier for users to complete their work wherever they are, but this flexibility expands the attack surface admins are expected to s...

CCAK: The industry's first global cloud auditing credential

CCAK: The industry's first global cloud auditing credential

November 5, 2020, Daniele Catteddu, Cloud Security Alliance. Shannon Donahue, ISACA. John Guckian. Moshe Ferber. Douglas Barbin.

Developed by CSA and ISACA to meet the unique demands of auditing cloud based environments, the Certificate of Cloud Auditing Knowledge (CCAK) is the first credential that industry professionals ca...