ChaptersEventsBlog
AI, evolving regulations, and rapid digital change are reshaping cybersecurity. Join leaders driving real impact and register to attend the CSA Summit at RSAC →
Something went wrong fetching the event listings.
×

Working Group

Financial Services Industry

The main objective of this industry specific working group is to identify and share the challenges, risks and best practices for the development, deployment and management of secure systems and services in the financial services industry. This consists primarily of ad hoc surveys and studies, as well as collaboration on select, FS-related initiatives with CSA AI, cloud and Zero Trust security working groups.
View Current Projects
State of Financial Services in Cloud
State of Financial Services in Cloud

Download

Financial Services Industry
Working Group Overview

The main objective of this working group is to identify and share the challenges, risks and best practices for the development, deployment and management of secure systems and services in the financial services industry. This includes ad hoc collaboration on FS-related initiatives with CSA AI, cloud and Zero Trust security working groups.

What do we discuss? 

During our ad hoc working group meetings we typically discuss and collaborate on projects the group is currently working on. We also sometimes invite speakers to share a presentation on industry developments and trends. 

Working Group Leadership

Craig Balding
Craig Balding

Craig Balding

I help enable organisations to safely operate and transact online in the face of dynamic and adaptive threats. After 20 years of attacking and defending top tier firms I founded Resilient Security to provide cyber risk and security advisory, consulting and services.

Read more

Sean Gray
Sean Gray

Sean Gray

Chase

Security Strategy, Threat Management. Senior Director, Information Security Strategy and Threat Mgmt at PayPal.

Read more

Troy Leach
Troy Leach

Troy Leach

Chief Strategy Officer (CSO), CSA

Troy Leach has spent more than 25 years advocating for the advancement of responsible, safe technology to improve the quality of living and parity for all.

As the Chief Strategy Officer, Mr. Leach supports Cloud Security Alliance's corporate strategy and ongoing mission to provide new and relevant cloud security awareness, education, research, programs and membership participation. Mr. Leach specifically focuses on external engageme...

Read more

Publications in ReviewOpen Until
Post-Quantum Cryptography Key ManagementMar 27, 2026
Leveraging the Health Data from IoT WearablesMar 31, 2026
Comparing FHE and Other PETsApr 17, 2026
MLOps Threat ModelApr 17, 2026
View all
Who can join?

Anyone can join a working group, whether you have years of experience or want to just participate as a fly on the wall.

What is the time commitment?

The time commitment for this group varies depending on the project. You can spend a 15 minutes helping review a publication that's nearly finished or help author a publication from start to finish.

Virtual Meetings

Attend our next meeting. You can just listen in to decide if this group is a good for you or you can choose to actively participate. During these calls we discuss current projects, and well as share ideas for new projects. This is a good way to meet the other members of the group. You can view all research meetings here.

Open Peer Reviews

Peer reviews allow security professionals from around the world to provide feedback on CSA research before it is published.

Learn how to participate in a peer review here.

Post-Quantum Cryptography Key Management

Open Until: 03/27/2026

This paper presents an in-depth analysis of Post-Quantum Cryptography (PQC) and its impact on key management practices in c...

Leveraging the Health Data from IoT Wearables

Open Until: 03/31/2026

Healthcare is undergoing a transformation, driven by big data and artificial intelligence (AI). This requires the collectio...

Comparing FHE and Other PETs

Open Until: 04/17/2026

Privacy-enhancing technologies offer a broad spectrum of solutions for challenges related to data confidentiality. However,...

MLOps Threat Model

Open Until: 04/17/2026

This paper sets the foundation for how we can apply the threat modelling practice of DevSecOps to MLOps.Please revi...