Back to Search Begin New Search Save Search Auto-Notify
Key C Level Challenges in the Cloud
We recently engaged with Pete Chronis,the newly retired CISO at WarnerMedia,to get better insights into C-Level pain points and how we can help. He came up with an initial list of Key C-Level Challenges intheCloud which he will discuss during this session including: Reducing IT Footprint and Drive Efficiencies Moving to the Cloud Developing a Secure, Enterprise Cloud Operating Model Top 5 Critical Security Considerations for Cloud Migration a...
February 17, 2021
Organizer: Cloud Security Alliance (CSA)
Location: Webcast
Add Favorite
Fixing Broken Authentication: One of th...
Authentication is a cornerstone capability of any application. Ensuring a user is who they say they are is crucial to maintaining data privacy and preventing fraud and data breaches. Consequently, improperly implemented authentication, known as broken authentication, is a potentially devastating application vulnerability. In fact, the Open Web Application Security Project (OWASP) lists broken authentication as the second most critical security...
February 10, 2021
Organizer: Cloud Security Alliance (CSA)
Location: Webcast
Add Favorite
Fixing Broken Authentication: How to Ad...
Authentication is a mission-critical component of most applications, making it a prime target for attackers. Improperly implemented authentication, also known as broken authentication, is a widespread problem. According to the Open Web Application Security Project (OWASP), broken authentication is the second-most critical web application security risk.Broken authentication encompasses a variety of vulnerabilities related to an application...
February 9, 2021
Organizer: Cloud Security Alliance (CSA)
Location: Webcast
Add Favorite
Dealing with an Adolescent Cloud
Would you like to learn how to secure the cloud? This webcast will go in depth on AWS's 7 secure design principles and walk you through a variety of open source tools that your organization can deploy to secure a cloud environment. For each principle we will demonstrate a Fundamental and Advanced approaches to transform any organization
December 15, 2020
Organizer: Cloud Security Alliance (CSA)
Location: Webcast
Add Favorite
The Blind Spot in Object Storage
Amazon S3 is one of the most successful services provided by AWS. AWS has unlimited emphasis, ensuring your data is safe. Customers and AWS leverage many native features and security frameworks, including redundancy, bucket permissions, encryption and duplication across regions and availability zones. However, the hidden threat to your customers and corporate applications dependent on Amazon S3 is the ability for intentional malware to be upl...
September 25, 2020
Organizer: Cloud Security Alliance (CSA)
Location: Webcast
Add Favorite
Building a World-Class Security Program
There is no "playbook" for today's information security officer to becoming a successful leader. With thousands of security technologies, millions of threat actors, and new attack vectors to defend against, simply working harder won't solve the problem. Information security leaders must transform from reactive, infrastructure-focused, into proactive, business-aligned security leaders. A world-class security program combines people, process, an...
September 24, 2020
Organizer: Cloud Security Alliance (CSA)
Location: Webcast
Add Favorite
Security Automation: Principles, Opport...
One of the fundamental principles of any security program is a focus on reducing the “timeline to compromise” for security issues. Not only are attacks getting more and more sophisticated, but they are also starting to get more aggressive as all of us have been forced by the pandemic crisis into new modes of working. Responding well to these challenges requires the ability to focus your resources on your most challenging security p...
September 23, 2020
Organizer: Cloud Security Alliance (CSA)
Location: Webcast
Add Favorite
In the Trenches of Cloud Governance Battles
When a large organization adopts cloud computing, it goes through several learning curves. Especially when during this journey, a transformation towards a DevOps way of working is implemented. It goes through multiple growth stages. After two to three years, one reaches a stage with turf wars. A true story that reads like an Asterix and Obelix comic book, I will tell a story of an organization adopting both AWS and Azure cloud. While doing so...
September 21, 2020
Organizer: Cloud Security Alliance (CSA)
Location: Webcast
Add Favorite
How to Prepare for an Audit Against the...
The CSA STAR allows for both an attestation under a SOC 2 audit or certification under ISO 27001. While most organizations self attest to the CSA Star, this presentation will discuss how to prepare for a successful audit under either SOC 2 or ISO 27001 to demonstrate compliance with the CSA STAR standard.
September 18, 2020
Organizer: Cloud Security Alliance (CSA)
Location: Webcast
Add Favorite
Vendor Risk Assessment: Secrets for Pro...
In this panel, our experts will share lessons learned and best practices for securing cloud services. From proactive risk assessments within the procurement process to architectural considerations to secure systems management, our diverse panel will provide a holistic perspective on the strategic programs organizations should have in place to secure their cloud experience.
September 17, 2020
Organizer: Cloud Security Alliance (CSA)
Location: Webcast
Add Favorite
Back to Search Begin New Search