A Cyber Mashup Event: Debating the Tech...
Join AT&T Cybersecurity’s top cyber field advisors and Troy Leach, CSA Chief Security Officer to learn the top five most effective actions to take in 2024 for improving your organization’s cyber resilience in the cloud. We’re hosting an engaging cyber networking event and discussions with some big names at the Delta Hotels in Silicon Valley for a unique opportunity to engage with experts in a live Q&A session. We'll t...
Cyber Enforcement Trends
The SEC’s enforcement action against Solar Winds and its Chief Information Security Officer Tim Brown is one data point in a trend of regulators putting their sights directly on information security and technology executives. It follows on the DOJ’s prosecution and conviction of Joe Sullivan, Uber’s former Chief Security Officer, and the FTC’s consent decree against Drizly’s Chief Executive Officer James Cory Rell...
CxO Trust Summit at SECtember
Advance cloud computing and cybersecurity within the C-Suite. Join the Cloud Security Alliance in-person for the CxO Trust Summit at SECtember on Tuesday, September19, 2023 in Bellevue, Washington. This exclusive event will feature keynote presentations, networking opportunities, panel discussions, participation in an intensive 3-phase attack scenario, and more. The CxO Trust Summit is a forum to establish a common understanding and base of kn...
Making Secrets Management Scalable and...
Explore how Confidential Computing revolutionizes secrets management for organizations undergoing cloud-based digital transformations. Hybrid architectures often strain legacy backend components like HSMs and key management systems, which must move to the cloud to scale. Learn how Confidential Computing solves these challenges, enabling effective secrets management practices. Join us as we explore: The challenges of leveraging the cloud for di...
5 Ways Access Management Goes Awry in AWS
When following best practices for secure access in the cloud, things often seem to start off so simple. Least privilege makes sense. Enforcing credential rotation, strong passwords and the such all seem easy. But then you’re faced with fact that the vast majority of breaches today are access/identity-based, and that recent research shows that 85% of access grants were never used in a 90-day period. All of a sudden things aren’t so...
How to Fortify Your Salesforce Ecosyste...
Nearly every enterprise relies on Salesforce to manage customer relationships and build new applications designed to drive business outcomes and innovation. But a secure Salesforce environment requires more than configuration management to mitigate a SaaS breach. Overlooking the shared responsibility during implementation and in everyday operations can lead to potential risks. Salesforce admins, security practitioners, and IT teams need visibi...
Securing Human and Workload Identities...
As multicloud environments expand, there are more identities and permissions organizations need to effectively manage. In fact, our recent State of Cloud Permissions Risks Report finds that there are over 40,000 permissions across major clouds but human and workload identities across multicloud are using only 1% of their permissions granted; this delta is called the Permissions Gap. The bigger the gap, the more significant risk for accidental...
Cloud Governance as Code: A New Paradig...
As organizations continue to scale their cloud adoption, teams struggle to enforce governance policies consistently, so they meet regulatory requirements and avoid potential breaches. Further, they find it even more difficult to address these governance requirements without impeding development productivity. Cloud Governance as Code is a new paradigm that enables organizations to use code to manage and automate various aspects of governance, i...
How to Prepare for an Audit Against the...
The CSA STAR allows for both an attestation under a SOC 2 audit or certification under ISO 27001. While most organizations self attest to the CSA Star, this presentation will discuss how to prepare for a successful audit under either SOC 2 or ISO 27001 to demonstrate compliance with the CSA STAR standard.
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.