Cloud 101CircleEventsBlog
Master CSA’s Security, Trust, Assurance, and Risk program—download the STAR Prep Kit for essential tools to enhance your assurance!
Something went wrong fetching the event listings.
×

Working Group

Financial Services Industry

The main objective of this working group is to identify and share the challenges, risks and best practices for the development, deployment and management of secure cloud services in the financial services industry.
View Current Projects
State of Financial Services in Cloud
State of Financial Services in Cloud

Download

Financial Services Industry
Working Group Overview

This working group meets on the fourth Monday of the month at 8am PT. The main objective of this working group is to identify and share the challenges, risks and best practices for the development, deployment and management of secure cloud services in the financial services industry.


What do we discuss? 

During our working group meetings we typically discuss and collaborate on projects the group is currently working on. We also sometimes invite a speaker to share a presentation on industry trends. 


Drafts & Important Docs



Working Group Leadership

Craig Balding
Craig Balding

Craig Balding

I help enable organisations to safely operate and transact online in the face of dynamic and adaptive threats. After 20 years of attacking and defending top tier firms I founded Resilient Security to provide cyber risk and security advisory, consulting and services.

Read more

Sean Gray
Sean Gray

Sean Gray

Chase

Security Strategy, Threat Management. Senior Director, Information Security Strategy and Threat Mgmt at PayPal.

Read more

Bill Izzo
Bill Izzo

Bill Izzo

Director, Cloud Security Governance at Depository Trust and Clearing Corporation

Innovative leader with a strong technical and business background with a track record of success across multiple technology domains and markets. Senior business management and technical leadership experience in the DOD, Private, and Government sectors. Years of experience in the management of medium to large network and systems engineering teams with significant experience in the management of large multi-million dollar data com...

Read more

Troy Leach
Troy Leach

Troy Leach

Chief Strategy Officer (CSO), CSA

Troy Leach has spent more than 25 years advocating for the advancement of responsible, safe technology to improve the quality of living and parity for all.

As the Chief Strategy Officer, Mr. Leach supports Cloud Security Alliance's corporate strategy and ongoing mission to provide new and relevant cloud security awareness, education, research, programs and membership participation. Mr. Leach specifically focuses on external engageme...

Read more

Jez Goldstone
Jez Goldstone

Jez Goldstone

Director of Security Architecture, Cloud & Innovation

Jez is a cyber security expert, leader, innovator with over twenty years of IT experience in the Financial Services and other sectors. He has lead innovation initiatives and teams - focusing on where cyber innovations really add value to solve complex business challenges and open up competitive advantage opportunities. I have a keen interest in how Privacy Enhancing Tech, and specifically FHE, can help solve some of these challenges.

Read more

Suyi Guo
Suyi Guo

Suyi Guo

Information Security Advisor

Publications in ReviewOpen Until
Context-Based Access Control for Zero TrustNov 27, 2024
Fully Homomorphic Encryption: A Comprehensive Guide for Cybersecurity ProfessionalsDec 06, 2024
AI Organizational Responsibilities: AI Tools and ApplicationsDec 08, 2024
Zero Trust Guidance for Small and Medium Size Businesses (SMBs)Dec 15, 2024
View all
Who can join?

Anyone can join a working group, whether you have years of experience or want to just participate as a fly on the wall.

What is the time commitment?

The time commitment for this group varies depending on the project. You can spend a 15 minutes helping review a publication that's nearly finished or help author a publication from start to finish.

Virtual Meetings

Attend our next meeting. You can just listen in to decide if this group is a good for you or you can choose to actively participate. During these calls we discuss current projects, and well as share ideas for new projects. This is a good way to meet the other members of the group. You can view all research meetings here.

No scheduled meetings for this working group in the next 60 days.

See Full Calendar for this Working Group

Open Peer Reviews

Peer reviews allow security professionals from around the world to provide feedback on CSA research before it is published.

Learn how to participate in a peer review here.

Context-Based Access Control for Zero Trust

Open Until: 11/27/2024

The document "Context-Based Access Control for Zero Trust" provides guidance on implementing context-based access control (...

Fully Homomorphic Encryption: A Comprehensive Guide for Cybersecurity Professionals

Open Until: 12/06/2024

The document Fully Homomorphic Encryption: A Comprehensive Guide for Cybersecurity Professionals serves as an in-d...

AI Organizational Responsibilities: AI Tools and Applications

Open Until: 12/08/2024

The integration of LLMs and Generative AI introduces vital security considerations across development and deployment proces...

Zero Trust Guidance for Small and Medium Size Businesses (SMBs)

Open Until: 12/15/2024

In an increasingly digital world, small and medium-sized businesses (SMBs) are facing heightened security challenges, makin...