Working Group
Hybrid Cloud Security
This working group intends to provide suggestions on hybrid cloud governance, hybrid cloud threat profiles and hybrid cloud security evaluation, guiding both users and cloud service providers to choose and provide secure hybrid cloud solutions, and promoting security planning and implementation.
Secure Connection Requirements of Hybrid Cloud
Working Group Leadership
Zou Feng
Zou has been working in IT for 15+ years with a strong technical
background and broad experience in heterogeneous systems and
multi-culture environments.
Starting as Communication Engineer at
ICBC, the largest bank in China, Zou maintained legacy
telecommunication circuits and an IBM mainframe communication
controller. During this period, Zou built up their first experience in
data security by implementing a cipher machine to...
Narudom Roongsiriwong
Head of Digital Architecture
Narudom ROONGSIRIWONG (SVP, Head of Digital Architecture, Bank of Ayudhya (Krungsri Bank) PCL, Thailand) has been an information security professional for over twenty years with solid technical experience in architecture, data analytics, application development and cloud computing. He has experience in running three security operation centers and the last one operated with in-house AI and Machine Learning. He was a pioneer in setting up the...
Publications in Review | Open Until |
---|---|
Fully Homomorphic Encryption: A Comprehensive Guide for Cybersecurity Professionals | Dec 06, 2024 |
AI Organizational Responsibilities: AI Tools and Applications | Dec 08, 2024 |
Zero Trust Guidance for Small and Medium Size Businesses (SMBs) | Dec 15, 2024 |
Zero Trust Privacy Assessment and Guidance | Dec 27, 2024 |
Who can join?
Anyone can join a working group, whether you have years of experience or want to just participate as a fly on the wall.
What is the time commitment?
The time commitment for this group varies depending on the project. You can spend a 15 minutes helping review a publication that's nearly finished or help author a publication from start to finish.
Open Peer Reviews
Peer reviews allow security professionals from around the world to provide feedback on CSA research before it is published.