Dive into cloud security with webinars from subject matter experts.
Discover how to use new technologies and the latest research for cloud security, all while earning CPE credits from home.
Our webinars cover all matters related to the cloud including trending topics, new technologies, and latest research from CSA. Browse our upcoming webinars or subscribe to one of our Brighttalk channels to get started.
Our Research Channel features projects and initiatives from CSA's working groups and analysts, while our CloudBytes Channel covers latest trends and technologies emerging in cloud.
Interested in sponsorship opportunities?
We are always seeking subject matter experts who can explain cloud-related topics to our audience in a vendor-neutral environment.
STAR 1000 - The reason behind the STAR Program success story
October 27, 2020, Daniele Catteddu, CSA and John DiMaria, CSA
The cloud has come to dominate the technology landscape and revolutionize the market, creating a tectonic shift in accepted practice contributing to a massive advancement in technology. With an inc...
Automating SAML Security Tests
October 29, 2020, Ty Anderson, Application Security Researcher - Product Security Team, Adobe
Single Sign-On (SSO) applications are becoming increasingly prevalent in organizations today. While there are many different SSO configuration types, Security Assertion Markup Language (SAML) is on...
CSA’s Perspective on Cloud Risk Management
November 3, 2020, Daniele Catteddu, CTO, Cloud Security Alliance. John DiMaria, Assurance Investigatory Fellow, Cloud Security Alliance
This session is designed to introduce the publication of CSA’s unique insights into the challenges of mastering the widespread adoption of cloud technologies. More importantly, CSA will help member...
The Correlation Between Security Ratings and Breach Likelihood
November 3, 2020, Matthew Mckenna, VP, International Operations, Security Scorecard
What is the value of security ratings when it comes to predicting breaches? What are the indicators that breached companies are showing that non-breached companies don’t express? This session will...
GAIA-X: Current Status and Outlook – What to Expect and How to Engage
November 3, 2020, Andreas Weiss, Head of Digital Business Models, eco Association of the Internet Industry
The key objectives of GAIA-X, Community Engagement and participation via the GAIA-X Association. European Data Infrastructure as part of NextGenerationEU - based on GAIA-X.
Cloud Security post Covid-19, Where to Go Next
November 3, 2020, Carlo Gebhardt, Managing Director, Accenture Security
Over recent years, security and compliance have been some of the top considerations when moving to the cloud. However, as Covid-19 has served as a transformation accelerator in many aspects of our ...
Using OPA for Continuous Compliance with Cloud Infrastructure Policy-as-Code
November 3, 2020, Josh Stella, Co-founder and CTO, Fugue
Cloud security is a software engineering problem, not a security analysis one. The engineers that build and maintain cloud infrastructure need policy-as-code tools to ensure cloud security and comp...
Get Quantum Safe
November 4, 2020, Roger Grimes,Data-driven Defence Evangelist,KnowBe4 Inc. Bruno Huttner,Business Development & Product Management,ID Quantique
Introduction to CSA's Quantum Safe Security Working Group and its goals and objectives. Quantum computers continue to strengthen and soon will be able to break traditional forms of asymmetric encry...
Shared Responsibility: Someone Else’s Problem
November 4, 2020, Ashley Ward, Cloud CTO, Palo Alto Networks
When talking about cloud it’s easy to fallback to that old joke that cloud is just someone else’s computer. Unfortunately it’s also easy to see it as Someone Else’s Problem (SEP). Ford Prefect, fro...
STAR Future Roadmap
November 4, 2020, Daniele Catteddu, CTO, Cloud Security Alliance. John DiMaria, Assurance Investigatory Fellow, Cloud Security Alliance
The CSA has recently celebrated the 1000 entries into the STAR Registry. This was confirmation of the value and relevance of the STAR program in the cloud community. The STAR Program has evolved...
Unveiling the Wonder of Automated Vulnerability Management in the Cloud
November 4, 2020, Eric Zielinski, Director of Security Operations, Veeva Systems
As more workloads move to the cloud, it is critical to secure those workloads against known vulnerabilities. The benefits of the cloud allow for agility, speed and innovation, but the cloud also c...
A Referenced Architecture to Modernize Your Approach to Cloud
November 4, 2020, John Yeoh, Global Vice President of Research, Cloud Security Alliance
Awaken your approach to cloud with a reference architecture that modernizes your enterprise. John covers the foundational components of the CSA Enterprise Architecture and shares how it is used to ...
What You Need to Know About Credential Stuffing Attacks
November 4, 2020, Jamie Hughes, Senior Solutions Engineer, Auth0
As a central authentication service that processes billions of logins a month, credential stuffing attacks are the most common threats we observe. These attacks can lead to fraud, loss of reputatio...
Cloud Control Matrix V4
November 5, 2020, Daniele Catteddu, Cloud Security Alliance; Sean Cordero, Netskope and Shawn Harris, Starbucks
Since its debut in 2013, the Cloud Control Matrix (CCM) v3.0.1 has been greatly successful and received wide adoption around the globe. Nevertheless, as new technologies emerge and the cloud certif...
A How-To Guide: Navigating the Top 7 Trends in Third-Party Risk Management
November 5, 2020, Scott Bridgen, GRC Consulting Director, OneTrust
The world of third-party risk management is rapidly changing. Each day, organizations like yours face new security, privacy, and compliance threats when working with third parties. The good news is...
The Impact of Fog Computing and Edge Computing on Cloud Security
November 5, 2020, Megha Kalsi, Cloud Security Senior Manager, Protiviti
Due to the rapid growth of IoT and mobile devices, both fog computing and edge computing technologies were hastily developed, which resulted in security and privacy related challenges that could im...
Zero Trust: The Key to your IAM Success
November 5, 2020, Richard Archdeacon, Advisory CISO, EMEA, Duo Security
Enterprise-ready cloud services and hybrid solutions have made it easier for users to complete their work wherever they are, but this flexibility expands the attack surface admins are expected to s...
CCAK: The industry's first global cloud auditing credential
November 5, 2020, Daniele Catteddu, Cloud Security Alliance. Shannon Donahue, ISACA. John Guckian. Moshe Ferber. Douglas Barbin.
Developed by CSA and ISACA to meet the unique demands of auditing cloud based environments, the Certificate of Cloud Auditing Knowledge (CCAK) is the first credential that industry professionals ca...
Packets: Defending the Cloud with Network Detection & Response
November 5, 2020, Jeff Deininger, Principal Sales Engineer, ExtraHop
The playing field between attackers and defenders is not level, and it’s only becoming more unbalanced because of the complex, layered nature of attack surfaces in the cloud. Attackers can launch m...
Introduction, Welcome Remarks & Opening Keynote
November 11, 2020, Ryan TY, Dr. Hing-Yan LEE, Timothy GRANCE
CSA Philippines Virtual Summit 2020
Securing the Big Shift to the Cloud
November 11, 2020, Isa OJEDA, Vice President - Compliance Risk Management Officer, APAC, Citibank
The debate on Cloud adoption is over. The pandemic has accelerated the migration of Philippine local enterprises to the cloud. The current table discussions during business meetings is how to mov...
Cloud Security Against the Top Threats in Cloud
November 11, 2020, Ricson Singson QUE, Carlos TENGKIAT, Paula Nones-RAMOS, Mark MISTAL
The pandemic has accelerated the digital transformation initiatives of many organizations in the Philippines. Local companies jumped to the cloud with survival response as the prime consideration....
Best Practices in Selecting Cloud Security Services
November 11, 2020, Gonz GONZALES, Richard PARIA, Reggie TAMAYO, Vic TOLOSA, Leonardo SACAMOS
The pandemic accelerated the digital transformation initiatives of many organizations in the Philippines. Local companies jumped to the cloud with survival response as the prime consideration. Jo...
Today’s Threat Landscape
November 17, 2020, Jeremy Ventura, Sr. Security Engineer, Mimecast
Now more than ever, it’s important for organizations to gain visibility into email and brand reputation threats. While the concept of email hasn’t changed in 20+ years – the tactics, techniques an...
Using KPIs To Build Confidence in Your Cloud Security & Compliance Posture
November 19, 2020, Nikhil Girdhar, Product Line Marketing Manager & Shrivatsa Upadhye, Sr Technical Marketing Architect, CloudHealth by VMware
How confident are you that your developers are avoiding the mistakes in public cloud usage that can lead to critical security risks? Most security breaches in the cloud are the result of simple co...