CSA Webinars

Dive into cloud security with webinars from subject matter experts.

CSA Webinars
Discover how to use new technologies and the latest research for cloud security, all while earning CPE credits from home.

Our webinars cover all matters related to the cloud including trending topics, new technologies, and latest research from CSA. Browse our upcoming webinars or subscribe to one of our Brighttalk channels to get started.

Our Research Channel features projects and initiatives from CSA's working groups and analysts, while our CloudBytes Channel covers latest trends and technologies emerging in cloud.

Interested in sponsorship opportunities?

We are always seeking subject matter experts who can explain cloud-related topics to our audience in a vendor-neutral environment.

Learn more here

Research Channel
Cloudbytes Channel

Upcoming CloudBytes

Defending your Cloud with MITRE D3FEND

Defending your Cloud with MITRE D3FEND

August 12, 2021, Dr. Neil Daswani, Co-Director of the Stanford Advanced Cybersecurity Program and Dr. Saumitra Das, CTO Founder, Blue Hexagon

Modern cloud threats with complex, multi-stage kill chains cannot be mitigated simply by compliance and configuration checks. The MITRE ATT&CK framework for Cloud provides a structure for security ...

Introduction, Welcome Remarks & Opening Address

Introduction, Welcome Remarks & Opening Address

August 18, 2021, Dr. Hing-Yan LEE, Prof Alex SIOW & Jim Reavis

CSA Singapore Summit 2021 Introduction & Welcome Remarks ​Dr. Hing-Yan LEE (EVP APAC, CSA) Opening Remarks Prof Alex SIOW (Chair, CSA Singapore Chapter​) Opening Address Jim REAVIS (Co-Founder...

Zero Trust – Your Way to the Cloud for post-COVID Recovery

Zero Trust – Your Way to the Cloud for post-COVID Recovery

August 18, 2021, YUM Shoen Yih (Director, Cyber Security Programme Centre, Cybersecurity Agency, Singapore)

Keynote Address The recent economic situation showed that companies that used cloud technologies to serve the customers anywhere anytime thrived better than companies whose businesses rely on cus...

The Remote Workforce Cyber Problem – Resistance to Adoption

The Remote Workforce Cyber Problem – Resistance to Adoption

August 18, 2021, Debashish JYOTIPRAKASH (CTSO - APAC Managing Director – India & SAARC, Qualys, Inc.)

Keynote Address As we celebrate the Workers aren’t going to be returning to the office in 2021. Work from home is going to be in place until there is a full vaccine rollout, and maybe even longer....

Cloud Incident Response Framework

Cloud Incident Response Framework

August 18, 2021, Prof Alex SIOW (Co-chair, Cloud Incident Response WG, CSA) & LIM Soon Tein (Co-chair, Cloud Incident Response WG, CSA)

In cloud incidents, it is necessary to coordinate and share information with stakeholders and other organizations which will be discussed. This presentation is for all cloud customers as well as cl...

COVID 19 : Challenging the OT-IT Convergent

COVID 19 : Challenging the OT-IT Convergent

August 18, 2021, William HO (Co-chair, Industrial Control System Security WG, CSA)

Operational Technology (OT) systems, especially Industrial Control Systems (ICS), are an increasingly attractive target for highly-sophisticate cyber actors around the world. A more worrying trend ...

Hybrid Cloud Security: Risks & Mitigation

Hybrid Cloud Security: Risks & Mitigation

August 18, 2021, Ferdinand FONG, Brendan LAWS, Narudom ROONGSIRIWONG, Faisal YAHYA

Panel Discussion Timothy Grance (NIST) shared that no hybrid cloud existed when he co-authored the landmark NIST definition of different clouds. He has never expected hybrid clouds to become so p...

CCM Addendum - Mapping of ABS Cloud Computing Implementation Guide 2.0 to CCM

CCM Addendum - Mapping of ABS Cloud Computing Implementation Guide 2.0 to CCM

August 18, 2021, Arun Vivek IYER

Presented by - Arun Vivek IYER (​Head of Cloud & Container Security – Cyber Security Services, Standard Chartered Bank & Co-chair, CCM ABS Mapping WG, CSA) In the technology space, there are also ...

MTCS: The New Edition (SS584:2020): What's New

MTCS: The New Edition (SS584:2020): What's New

August 18, 2021, Sanjeev GUPTA (Director, Certification Partners Global)

The Multi-Tier Cloud Security (MTCS) Singapore Standard was revised in 2020, and some changes have been made to reflect user concerns and changing technology. We look at what is new, and what is u...

Cloud Native Security Guidelines from Singapore TR 82:2020, NIST and CSA

Cloud Native Security Guidelines from Singapore TR 82:2020, NIST and CSA

August 18, 2021, WONG Onn Chee (Co-chair, CSA APAC Research Advisory Council & CTO, Resolvo)

Cloud native computing is a new software development approach, not an infrastructure approach as commonly miscontrued. Come and hear what constitutes cloud native and learn more about the various s...

Data Sovereignty - What’s the Big Fuss About?

Data Sovereignty - What’s the Big Fuss About?

August 18, 2021, Dr. LEE Hing-Yan, Stephanie King-Chung HUNG, May-Ann LIM, Ian LIM

Panel Discussion The term “data sovereignty” has often been used by stakeholders (including cloud service consumers, cloud service providers, sectoral regulators) to mean different things. Just ...

How Unity Uses Continuous Risk Assessment to Empower its Google Cloud Estate

How Unity Uses Continuous Risk Assessment to Empower its Google Cloud Estate

August 18, 2021, Justin Somaini, Unity, Dr. Anton Chuvakin, Google, and Alaap Pandit, Orca Security

Meet Justin Somaini, Chief Security Officer at Unity. Somaini is an expert in securing large environments having done stints as the CISO of Yahoo! and SAP. The scale of operations at Unity is even ...

Foresight is 20/20: How to Use Cyber Threat Intelligence for Proactive SecOps

Foresight is 20/20: How to Use Cyber Threat Intelligence for Proactive SecOps

August 19, 2021, Alexei Rubinstein, Vice President of Sales Engineering at IntSights

The rapid-fire of cybersecurity threats hitting today’s businesses cause many security teams to “live in the moment.” It’s equally important, however, to receive and understand the early indicators...

How to Take a User-First Approach to Identity Management

How to Take a User-First Approach to Identity Management

August 24, 2021, Nabeel Saeed, Senior Product Marketing, Security and Ian Hassard, Senior Manager, Product Management, Auth0

The burden of proving a customer’s identity today rests mostly on the end user. Companies and services do not trust end users by default, and those end users--their customers--do not trust a servic...

How-To: Securing Messaging in Mobile Apps

How-To: Securing Messaging in Mobile Apps

August 26, 2021, Anshika Agarwal, Software Development Engineer.

Are You Using Push Notifications? Mobile Push Messaging is a powerful communication channel that allows mobile app developers to draw their user's attention with the right information at the right ...

So A Cloud Security Expert Walks Into a CISO Role...

So A Cloud Security Expert Walks Into a CISO Role...

August 31, 2021, Nathan Burke, CMO, Axonius and Ashish Rajan, CISO, Cloud Security Podcast

Join Ashish Rajan, CISO and host of the popular Cloud Security Podcast and Nathan Burke, CMO at Axonius as they discuss the cloud security challenges facing a CISO in a new role, how to prioritize ...

What happens when ransomware targets your cloud infrastructure?

What happens when ransomware targets your cloud infrastructure?

September 8, 2021, Kat Traxler Senior Security Researcher and Joe Malenfant, VP of Product Marketing, Vectra AI

The rapid shift to remote work in 2020 saw adoption of public cloud skyrocket. Organizations quickly saw the benefits of public cloud from SaaS based applications, to the agility that PaaS provides...