11 past events found
Back to Search Begin New Search Save Search Auto-Notify
A Cyber Mashup Event: Debating the Tech...
Join AT&T Cybersecurity’s top cyber field advisors and Troy Leach, CSA Chief Security Officer to learn the top five most effective actions to take in 2024 for improving your organization’s cyber resilience in the cloud. We’re hosting an engaging cyber networking event and discussions with some big names at the Delta Hotels in Silicon Valley for a unique opportunity to engage with experts in a live Q&A session. We'll t...
April 4, 2024
Organizer: Cloud Security Alliance | AT&T
Location: Santa Clara, CA
Add Favorite
Cyber Enforcement Trends
The SEC’s enforcement action against Solar Winds and its Chief Information Security Officer Tim Brown is one data point in a trend of regulators putting their sights directly on information security and technology executives. It follows on the DOJ’s prosecution and conviction of Joe Sullivan, Uber’s former Chief Security Officer, and the FTC’s consent decree against Drizly’s Chief Executive Officer James Cory Rell...
December 1, 2023
Organizer: Cloud Security Alliance
Location: Virtual
Add Favorite
CxO Trust Summit at SECtember
Advance cloud computing and cybersecurity within the C-Suite. Join the Cloud Security Alliance in-person for the CxO Trust Summit at SECtember on Tuesday, September19, 2023 in Bellevue, Washington. This exclusive event will feature keynote presentations, networking opportunities, panel discussions, participation in an intensive 3-phase attack scenario, and more. The CxO Trust Summit is a forum to establish a common understanding and base of kn...
September 19, 2023
Organizer: Cloud Security Alliance
Location: Bellevue, WA
Add Favorite
Catch Up on Cloud Native Application Pr...
Readout for the CNAPP survey. Thought leadership in top challenges in Cloud security. Guidance in what to look for in choosing a CNAPP.
August 24, 2023
Organizer: Cloud Security Alliance
Location: Webcast
Add Favorite
Making Secrets Management Scalable and...
Explore how Confidential Computing revolutionizes secrets management for organizations undergoing cloud-based digital transformations. Hybrid architectures often strain legacy backend components like HSMs and key management systems, which must move to the cloud to scale. Learn how Confidential Computing solves these challenges, enabling effective secrets management practices. Join us as we explore: The challenges of leveraging the cloud for di...
July 12, 2023
Organizer: Cloud Security Alliance
Location: Webcast
Add Favorite
5 Ways Access Management Goes Awry in AWS
When following best practices for secure access in the cloud, things often seem to start off so simple. Least privilege makes sense. Enforcing credential rotation, strong passwords and the such all seem easy. But then you’re faced with fact that the vast majority of breaches today are access/identity-based, and that recent research shows that 85% of access grants were never used in a 90-day period. All of a sudden things aren’t so...
June 28, 2023
Organizer: Cloud Security Alliance
Location: Webcast
Add Favorite
How to Fortify Your Salesforce Ecosyste...
Nearly every enterprise relies on Salesforce to manage customer relationships and build new applications designed to drive business outcomes and innovation. But a secure Salesforce environment requires more than configuration management to mitigate a SaaS breach. Overlooking the shared responsibility during implementation and in everyday operations can lead to potential risks. Salesforce admins, security practitioners, and IT teams need visibi...
June 20, 2023
Organizer: Cloud Security Alliance
Location: Webcast
Add Favorite
Securing Human and Workload Identities...
As multicloud environments expand, there are more identities and permissions organizations need to effectively manage. In fact, our recent State of Cloud Permissions Risks Report finds that there are over 40,000 permissions across major clouds but human and workload identities across multicloud are using only 1% of their permissions granted; this delta is called the Permissions Gap. The bigger the gap, the more significant risk for accidental...
May 10, 2023
Organizer: Cloud Security Alliance
Location: Webcast
Add Favorite
Cloud Governance as Code: A New Paradig...
As organizations continue to scale their cloud adoption, teams struggle to enforce governance policies consistently, so they meet regulatory requirements and avoid potential breaches. Further, they find it even more difficult to address these governance requirements without impeding development productivity. Cloud Governance as Code is a new paradigm that enables organizations to use code to manage and automate various aspects of governance, i...
April 21, 2022
Organizer: Cloud Security Alliance | Stacklet
Location: Webcast
Add Favorite
How to Prepare for an Audit Against the...
The CSA STAR allows for both an attestation under a SOC 2 audit or certification under ISO 27001. While most organizations self attest to the CSA Star, this presentation will discuss how to prepare for a successful audit under either SOC 2 or ISO 27001 to demonstrate compliance with the CSA STAR standard.
September 18, 2020
Organizer: Cloud Security Alliance (CSA)
Location: Webcast
Add Favorite
Back to Search Begin New Search