Cloud Trust Summit
CSA’s Cloud Trust Summit will deliver detailed information about how to secure cloud adoption and maintain robust cyber resilience through use of CSA's Security, Trust, Assurance and Risk (STAR) program, the largest cloud assurance program in the world. Prominent leaders from industry, national and regional regulatory bodies will convene at the Cloud Trust Summit to discuss the top challenges for enterprises to achieve cloud assurance re...
Securing Human and Workload Identities...
As multicloud environments expand, there are more identities and permissions organizations need to effectively manage. In fact, our recent State of Cloud Permissions Risks Report finds that there are over 40,000 permissions across major clouds but human and workload identities across multicloud are using only 1% of their permissions granted; this delta is called the Permissions Gap. The bigger the gap, the more significant risk for accidental...
Cloud Threats & Vulnerabilities Summit
CSA’s Virtual Cloud Threats & Vulnerabilities Summit is a free, two-day online event that will address key systemic risks uncovered within the global cloud ecosystem and show how CSA's efforts to improve standards for cloud vulnerability and threat identification are growing. Attendees will gain a better understanding of the key responsibilities every cloud customer has in managing vulnerabilities and modeling threats, how malicious...
Virtual CSA FinCloud Security Summit
CSA’s FinCloud Security Summit is a two-day, online event showcasing conversations by leaders in financial services and cloud services about the future of protecting digital assets. With the accelerated growth of cloud computing as a way for banks, fintech, insurance and other organizations to scale their operations efficiently, adopting security best practices to minimize risk and demonstrate ongoing regulatory compliance is critical. T...
Virtual Zero Trust Summit
With the support of our Zero Trust Advancement Center (ZTAC) founding members, CSA is excited to host the Virtual Zero Trust Summit, November 16th-17th, to deliver critical insights into a variety of Zero Trust focused topics. Zero Trust is one of the most widely talked about cybersecurity trends today. CSA’s mission is to cut through the hyperbole and hype, and focus the conversation on building and evangelizing authoritative Zero Trust...
CSA Colorado Fall Summit 2022
This educational, one-day forum will address the unique needs and concerns of the cloud security community. This is our fifth annual summit, and will be the best one yet! The session will feature three tracks: Security, Compliance and Privacy with multiple sessions throughout the day. We will also have a distinguished panel of speakers to close out the event. Attendees will hear from security experts on how to move at the speed of the cloud an...
CSA Federal Summit
An Iron Will: Building Cyber Resilience in 2023 With cloud firmly entrenched as the primary IT system worldwide and cloud security now the foundation of cybersecurity programs, establishing cyber resilience across IT portfolios has become imperative. Threats to national cybersecurity continue to take center stage, including supply chain attacks, malware, and an ever-growing list of vulnerabilities. As nation-states conduct more and more cyber...
SECtember 2022
SECtember 2022 is the essential industry conference to assist organizations in elevating their cybersecurity capabilities. Cyber risk is growing quickly in a world of pervasive computing, well-funded adversaries and nation-state actors. Brought to you by Cloud Security Alliance, SECtember provides a state-of-the-art perspective on the threat vectors and solutions for cybersecurity that now have a foundation of cloud computing. Held in the hear...
The Future of Data-Centric Security, a...
Data drives business and better data delivered faster drives competitive advantage. Of course, this valuable data must be protected and secured throughout its lifecycle. However, enterprises manage and secure data in chaotic and messy ways. How can enterprises improve data security while streamlining data access at the same time? The answer: this challenge can only be met by moving to a data-centric security model AND cooperation between the d...
Top 5 Zero Trust Practices to Stop Mode...
Modern attacks like ransomware and supply chain attacks can start from anywhere in the kill chain – endpoints, identities or cloud workloads. Zero Trust, if deployed correctly, can be the answer to increasing real-time security coverage and reducing the attack surface in the hybrid enterprise. However, with the rapidly evolving adversarial tactics and techniques behind modern attacks, organizations need to not only operationalize Zero Tr...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.