144 past events found
+ 5 upcoming events found
Back to Search Begin New Search Save Search Auto-Notify
AI is Coming to Every Data Center
AI can enable organizations to improve, innovate, and accelerate their business. AI/ML and data science solutions are being implemented across all industries, including Government. From supply chain to customer experience, there is enormous potential for digital innovation gained from adopting AI/ML in your technology stack.However, integrating effective AI capability in the past was challenging. The footprint of these solutions is often hybri...
March 2, 2021
Organizer: Cloud Security Alliance (CSA)
Location: Webcast
Add Favorite
How Shutterstock Implemented DevSecOps...
Modern security tools are easy to buy; it’s people’s mindsets and culture that are hard to change. Shutterstock’s AppSec team knew this when implementing a DevSecOps strategy throughout their organization. Its global digital media platform is built heavily on cloud native applications; including containers, microservices, and Kubernetes. Securing it all, at scale, has been no small task. A big focus area of this transition ha...
February 25, 2021
Organizer: Cloud Security Alliance (CSA)
Location: Webcast
Add Favorite
Cloud Security: Are You Doing It Wrong?
Your attack surface is expanding from the on-prem data center to the cloud to remote deployments and the device edge. But your tools only secure the perimeter or rely on logs and agents, you’re leaving visibility gaps that adversaries can use to attack critical workloads and data.In this webinar, you’ll learn how network detection and response (NDR) eliminates visibility gaps across your attack surface by unlocking data from netwo...
February 18, 2021
Organizer: Cloud Security Alliance (CSA)
Location: Webcast
Add Favorite
CSA Los Angeles Red Team Hunt
Join the CSA Los Angeles Red Team Hunt for an interactive, hands-on cybersecurity scavenger hunt where participants utilize attacking skills, and possibly learning some new ones along the way, to complete a series of challenges. Participants earn and accumulate points based on how quickly they complete each challenge. Hints can be requested if needed through the challenge, at the cost of points. The further participants get in the challenge or...
February 18, 2021
Organizer: Vectra
Location: Webcast
Add Favorite
Key C Level Challenges in the Cloud
We recently engaged with Pete Chronis,the newly retired CISO at WarnerMedia,to get better insights into C-Level pain points and how we can help. He came up with an initial list of Key C-Level Challenges intheCloud which he will discuss during this session including: Reducing IT Footprint and Drive Efficiencies Moving to the Cloud Developing a Secure, Enterprise Cloud Operating Model Top 5 Critical Security Considerations for Cloud Migration a...
February 17, 2021
Organizer: Cloud Security Alliance (CSA)
Location: Webcast
Add Favorite
Fixing Broken Authentication: One of th...
Authentication is a cornerstone capability of any application. Ensuring a user is who they say they are is crucial to maintaining data privacy and preventing fraud and data breaches. Consequently, improperly implemented authentication, known as broken authentication, is a potentially devastating application vulnerability. In fact, the Open Web Application Security Project (OWASP) lists broken authentication as the second most critical security...
February 10, 2021
Organizer: Cloud Security Alliance (CSA)
Location: Webcast
Add Favorite
Fixing Broken Authentication: How to Ad...
Authentication is a mission-critical component of most applications, making it a prime target for attackers. Improperly implemented authentication, also known as broken authentication, is a widespread problem. According to the Open Web Application Security Project (OWASP), broken authentication is the second-most critical web application security risk.Broken authentication encompasses a variety of vulnerabilities related to an application...
February 9, 2021
Organizer: Cloud Security Alliance (CSA)
Location: Webcast
Add Favorite
CloudBytes Connect
CSA is excited to launch CloudBytes Connect, a multi-day virtual event program that brings the collaboration of research and community to the forefront. Leveraging CSA’s research initiatives to educate the industry on key issues and trends faced in cloud security, CloudBytes Connect will introduce participants, free of charge, to their peers and prominent leaders in the cloud and cybersecurity industry. Over the course of three days, CSA...
February 2-4, 2021
Organizer: Cloud Security Alliance (CSA)
Location: Virtual
Add Favorite
Dealing with an Adolescent Cloud
Would you like to learn how to secure the cloud? This webcast will go in depth on AWS's 7 secure design principles and walk you through a variety of open source tools that your organization can deploy to secure a cloud environment. For each principle we will demonstrate a Fundamental and Advanced approaches to transform any organization
December 15, 2020
Organizer: Cloud Security Alliance (CSA)
Location: Webcast
Add Favorite
Who's in Your Cloud?
When it comes to cloud operations, monitoring security and visibility are critical especially with the increase in staff working remotely. Join us on December 15th to learn about “Cloud State Monitoring,” why it is important, and who needs to be aware of it. Why Cloud is special? Meeting Agenda 1:00 -1:15 Announcements 1:15-2:05 Vanessa Grose, Google Cloud Michael Ojala, Google Solution Creator 2:05-2:25 Break/Sponsor Spotlight - E...
December 15, 2020
Organizer: Cloud Security Alliance (CSA)
Location: Virtual
Add Favorite
Back to Search Begin New Search