ChaptersCircleEventsBlog
Join this free webinar on April 24th to explore how to build resilience, stay compliant, protect your brand, and keep critical services online.

Working Group

Data Security

Data security is the process of protecting digital information from unauthorized access, corruption, or theft throughout its entire lifecycle.
View Current Projects
Data Security Working Group Charter 2023
Data Security Working Group Charter 2023

Download

Data security is the process of protecting digital information from unauthorized access, corruption, or theft throughout its entire lifecycle. It’s a concept that encompasses every aspect of information security from the physical security of hardware and storage devices, administrative and access controls, logical security of software applications, and organizational policies and procedures. When properly implemented, data security strategies will protect an organization’s information assets against cyberattacks, as well as guard against insider threats and human error, which remains among the leading causes of data breaches.

Current projects:

Working Group Leadership

Alex Kaluza
Alex Kaluza

Alex Kaluza

Research Analyst, CSA

Publications in ReviewOpen Until
Zero Trust Guidance for IoTApr 26, 2025
Agentic AI Red Teaming GuideApr 27, 2025
AI Consensus Assessments Initiative Questionnaire (AI-CAIQ)Apr 28, 2025
Secure Agentic System Design - A Trait-Based ApproachMay 15, 2025
View all
Who can join?

Anyone can join a working group, whether you have years of experience or want to just participate as a fly on the wall.

What is the time commitment?

The time commitment for this group varies depending on the project. You can spend a 15 minutes helping review a publication that's nearly finished or help author a publication from start to finish.

Open Peer Reviews

Peer reviews allow security professionals from around the world to provide feedback on CSA research before it is published.

Learn how to participate in a peer review here.

Zero Trust Guidance for IoT

Open Until: 04/26/2025

Adopting Internet of Things (IoT) technologies introduces security challenges that require an effective strategy for ensuri...

Agentic AI Red Teaming Guide

Open Until: 04/27/2025

Red teaming for Agentic AI requires a specialized approach due to several critical factors. Agentic AI systems demand more ...

AI Consensus Assessments Initiative Questionnaire (AI-CAIQ)

Open Until: 04/28/2025

The AI Consensus Assessment Initiative Questionnaire (AI-CAIQ) is an extension of the Cloud Security Allia...

Secure Agentic System Design - A Trait-Based Approach

Open Until: 05/15/2025

This paper addresses the security challenges unique to agentic AI systems. As AI transitions from passive tools to autonomo...