Top 5 Ways Network Security is Differen...
Cloud is different. That seems obvious to most, yet many organizations treat the cloud as just an extension of their existing data center. This can cause problems at many layers (architecture, infrastructure, operations) and network security is perhaps the best example of this. Please join us for this discussion of the Top 5 Ways Network Security is Different in Public Cloud and get our experts’ perspectives on the differences and what t...
Passwords are Dead: WebAuthn for Securi...
Modern web applications are poised to replace passwords with widely available cryptographic authenticators. The Verizon DBIR cites password misuse or brute force as responsible for more than 80% of all breaches year-over-year, so why do we still use them when alternatives exist? This talk will discuss advances in authentication methods not reliant on passwords, introduce and provide context around the FIDO2/WebAuthn standard, and review curren...
Cloud Security Demo Forum
Technology Demos | Analyst Interviews | Panel Discussions Cloud Security is broad, let's see its current incarnations The technology is evolving FAST, let's see where we are today Practitioners are confused, let's see what the tools actually do
CSA Federal Summit
Reset Normal: Building Trust & Security Our world has transformed over the past year to adapt to the realities of working under a global pandemic. The way we interact with people, the processes we’ve developed and the technology we consume are all under significant strain as we collectively work to build trust and security into and around each of these areas. It has become abundantly clear that we’ll never be able to go back t...
CSA Continuous: Security Never Sleeps
The cloud journey that organizations are undertaking is representing a generation shift in both IT and cybersecurity. In the wake of several high-profile attacks, including SolarWinds and the Colonial Pipeline, ensuring a secure cloud computing environment 24-7 has never been more important. With critical threats ever-present and evolving, security never sleeps. The Cloud Security Alliance is excited to launch CSA Continuous, a 24-hour global...
Discovering the DDoS Criminal's M.O. (a...
Presenting the crime scene investigation of today's sophisticated DDoS criminals. How the attacks are launched. Why aren't they getting detected and stopped in time? Why do companies with the best-of-breed mitigation still suffer DDoS attack damages?
SECtember 2021
Reunite with peers and make new connections in-person at SECtember, a premier event for the cloud and cybersecurity communities from the Cloud Security Alliance. Held in Bellevue, adjacent to CSA’s home city of Seattle, this signature event is focused on educating stakeholders on the key issues and trends in cloud computing today. The COVID-19 pandemic created an instant demand for cloud-based solutions requiring the majority of organiz...
CxO Trust Summit
Advance cloud computing and cybersecurity within the C-Suite. Join the Cloud Security Alliance in-person at its inaugural CxO Trust Summit at SECtember on Tuesday, September 14, 2021 in Bellevue, Washington. This exclusive event will feature keynote presentations, networking opportunities, a panel discussion on the challenges of digital transformation, participation in an intensive 3-phase attack scenario, and more. The CxO Trust Summit is a f...
Cloud-Native Attacks on Availability: H...
The rapid shift to remote work in 2020 saw adoption of public cloud skyrocket. Organizations quickly saw the benefits of public cloud from SaaS based applications, to the agility that PaaS provides. While the pandemic dominated the headlines last year, 2021 will likely go down as the year of ransomware. While the economics of ransomware have been a proven, profitable business, the shift to the cloud opens new possibilities. Join security resea...
The Latest Threats, Techniques, Risks ...
Join us for this webinar where eSentire and Sumo Logic threat intelligence experts will brief CSA members on cutting edge threat intelligence developed from threat reports and first-hand detections our threat hunting teams have encountered in cloud environments. This briefing will bring CSA members up to date on the latest threats, risks, and vulnerabilities in cloud environments. We will share the top cloud threats and vulnerabilities eSentir...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.