111 past events found
+ 1 upcoming event found
Back to Search Begin New Search Save Search Auto-Notify
The Problem of Shadow Access and How It...
Join us on July 24th for a webinar with Ryan Gifford, analyst at the Cloud Security Alliance, and security expert and CEO of Stack Identity, Venkat Raghavan on the topic of Shadow Access and how it enabled the LastPass cloud data breach. You will learn: What is Shadow Access? What creates toxic combinations of identity and access in the cloud? Step-by step walkthrough of how the LastPass data breach unfolded How Shadow Access enabled the LastP...
July 24, 2023
Organizer: Cloud Security Alliance
Location: Webcast
Add Favorite
Deliver Value and Security through Zero Trust
While Zero Trust has become an industry slogan among security advocates, it also has been diluted by being associated to specific solutions and technologies. Let’s move beyond the buzz word and beyond the diatribe of repeated messages that fall short in providing a clear and concise message. For security practitioners who strongly advocate for ZT, we are going to provide practical and actionable steps on your journey to implementing ZT w...
July 20, 2023
Organizer: Cloud Security Alliance
Location: Webcast
Add Favorite
Real World Cloud Incident Response
Join FireMon’s Cloud Security leader Rich Mogull, as he presents his latest research findings on the top cloud attacks and how to detect and respond to them. Sure, there are plenty of potential fancy cloud attacks, but the reality is the vast majority follow the same repeatable patterns. Rich will show attendees how to build an effective monitoring and detection infrastructure, the importance of including real-time misconfiguration monit...
July 19, 2023
Organizer: Cloud Security Alliance
Location: Webcast
Add Favorite
The NIST CSF to CSA CCM Mapping – A Primer
The CSA, NIST, Weaver, and CSA volunteers have teamed together to map the NIST CSF subcategories to the CSA’s CCM controls. During the webcast, we will introduce attendees to the mapping and discuss in detail a few select controls to illustrate how they can leverage the mapping in their environment. We will discuss how the mapping can support specific use cases, and how it can be leveraged to enhance the security posture of cloud service...
July 18, 2023
Organizer: Cloud Security Alliance
Location: Webcast
Add Favorite
Tackling Data Security in the Multi-Clo...
Join Dig Security’s CEO and Co-Founder Dan Benjamin for an insider chat with Carlos Carlos, Director of Data Security at Oportun as they flesh out key challenges and advise on practical solutions related to tackling data security in the multi-cloud era. The panelists will discuss topics including how to know when you need to protect your cloud data, requirements for an effective cloud data security program, specific cloud data security c...
July 13, 2023
Organizer: Cloud Security Alliance
Location: Webcast
Add Favorite
Making Secrets Management Scalable and...
Explore how Confidential Computing revolutionizes secrets management for organizations undergoing cloud-based digital transformations. Hybrid architectures often strain legacy backend components like HSMs and key management systems, which must move to the cloud to scale. Learn how Confidential Computing solves these challenges, enabling effective secrets management practices. Join us as we explore: The challenges of leveraging the cloud for di...
July 12, 2023
Organizer: Cloud Security Alliance
Location: Webcast
Add Favorite
The Role of CWPP in a CNAPP World
Cloud Workload Protection Platforms (CWPP) must provide real-time detection and response if they are to be effective in defending against machine-speed ransomware attacks in the cloud. When coupled with Cloud Native Application Protection Platforms (CNAPP), cloud-enabled businesses can experience comprehensive cloud security without throttling innovation. Join SentinelOne as we speak plainly about cloud defense in depth. From build time to run...
July 11, 2023
Organizer: Cloud Security Alliance
Location: Webcast
Add Favorite
5 Ways Access Management Goes Awry in AWS
When following best practices for secure access in the cloud, things often seem to start off so simple. Least privilege makes sense. Enforcing credential rotation, strong passwords and the such all seem easy. But then you’re faced with fact that the vast majority of breaches today are access/identity-based, and that recent research shows that 85% of access grants were never used in a 90-day period. All of a sudden things aren’t so...
June 28, 2023
Organizer: Cloud Security Alliance
Location: Webcast
Add Favorite
The State of Cloud-Native Security 2023
Learn what’s keeping 2,500 of your peers awake at night. Stay informed with empirical insights to inform your cloud-native security decisions.The State of Cloud-Native Security Report 2023 is the result of a months-long survey traversing seven countries and five sectors of industry to consult with 2,500 cloud security and DevOps professionals — from chief executives to developers to security technicians — with the goal of ide...
June 22, 2023
Organizer: Cloud Security Alliance
Location: Webcast
Add Favorite
How to Fortify Your Salesforce Ecosyste...
Nearly every enterprise relies on Salesforce to manage customer relationships and build new applications designed to drive business outcomes and innovation. But a secure Salesforce environment requires more than configuration management to mitigate a SaaS breach. Overlooking the shared responsibility during implementation and in everyday operations can lead to potential risks. Salesforce admins, security practitioners, and IT teams need visibi...
June 20, 2023
Organizer: Cloud Security Alliance
Location: Webcast
Add Favorite
Back to Search Begin New Search