Top Threats to Cloud Computing
This webinar provides case study analyses for The Egregious 11: Top Threats to Cloud Computing white paper and a relative security industry breach analysis. Using nine actual attacks and breaches, including a major financial services company, a leading enterprise video communications firm, and a multinational grocery chain for its foundation, this webinar connects the dots between the CSA Top Threats in terms of security analysis.
Secure DevOps Best Practices for Multic...
Multicloud is inevitable. In fact, it’s likely you’re already using different clouds like AWS, Google Cloud, and Azure for various functions. But, how do you address risk and ensure proper security practices across all of your cloud accounts and deployments? In this session, we’ll look at best practices for secure DevOps across multiple clouds. We’ll take a comprehensive look at your lifecycle from authentication and in...
5 Steps to Develop, Launch, and Maintai...
As the use of SaaS applications grows within organizations of all sizes, so does the need to implement strong SaaS security. There are some simple first steps to determine if your organization has the proper SaaS security program in place - and best practices to ensure your apps stay protected. Join Tim Bach, Vice President of Engineering at AppOmni; Chris Hughes, CISO at Aquia; and Bryan Solari of AppOmni as they discuss SaaS security, how to...
Go Dox Yourself: Staying Safe(r) Online...
In this webinar, you will learn: Why doxxing happens, and the most common doxxing methods used by attackers How to instruct a non-security audience on the security mindset What recycling slogans can teach us about maintaining our online presence News reports on doxxing (the practice of researching private or identifying information about someone online, typically with the intent to publicize it) have increased exponentially over the last sever...
Top 5 Ways Network Security is Differen...
Cloud is different. That seems obvious to most, yet many organizations treat the cloud as just an extension of their existing data center. This can cause problems at many layers (architecture, infrastructure, operations) and network security is perhaps the best example of this. Please join us for this discussion of the Top 5 Ways Network Security is Different in Public Cloud and get our experts’ perspectives on the differences and what t...
Passwords are Dead: WebAuthn for Securi...
Modern web applications are poised to replace passwords with widely available cryptographic authenticators. The Verizon DBIR cites password misuse or brute force as responsible for more than 80% of all breaches year-over-year, so why do we still use them when alternatives exist? This talk will discuss advances in authentication methods not reliant on passwords, introduce and provide context around the FIDO2/WebAuthn standard, and review curren...
Cloud Security Demo Forum
Technology Demos | Analyst Interviews | Panel Discussions Cloud Security is broad, let's see its current incarnations The technology is evolving FAST, let's see where we are today Practitioners are confused, let's see what the tools actually do
CSA Continuous: Security Never Sleeps
The cloud journey that organizations are undertaking is representing a generation shift in both IT and cybersecurity. In the wake of several high-profile attacks, including SolarWinds and the Colonial Pipeline, ensuring a secure cloud computing environment 24-7 has never been more important. With critical threats ever-present and evolving, security never sleeps. The Cloud Security Alliance is excited to launch CSA Continuous, a 24-hour global...
SECtember 2021
Reunite with peers and make new connections in-person at SECtember, a premier event for the cloud and cybersecurity communities from the Cloud Security Alliance. Held in Bellevue, adjacent to CSA’s home city of Seattle, this signature event is focused on educating stakeholders on the key issues and trends in cloud computing today. The COVID-19 pandemic created an instant demand for cloud-based solutions requiring the majority of organiz...
Protecting Against Network Layer DDoS Attacks
Protecting against network layer DDoS attacks: Emerging attack trends, ransom-DDoS attack patterns, and available solutions. Ransom DDoS attacks are on the rise and new attack trends are beginning to emerge. Network infrastructures that are exposed to the Internet need the same level of protection as web facing assets. Due to the changing nature of attacks with respect to size, persistence, and even duration, implementing DDoS protections must...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.