66 past events found
Back to Search Begin New Search Save Search Auto-Notify
The Future of Data-Centric Security, a...
Data drives business and better data delivered faster drives competitive advantage. Of course, this valuable data must be protected and secured throughout its lifecycle. However, enterprises manage and secure data in chaotic and messy ways. How can enterprises improve data security while streamlining data access at the same time? The answer: this challenge can only be met by moving to a data-centric security model AND cooperation between the d...
September 12, 2022
Organizer: Cloud Security Alliance
Location: Webcast
Add Favorite
Top 5 Zero Trust Practices to Stop Mode...
Modern attacks like ransomware and supply chain attacks can start from anywhere in the kill chain – endpoints, identities or cloud workloads. Zero Trust, if deployed correctly, can be the answer to increasing real-time security coverage and reducing the attack surface in the hybrid enterprise. However, with the rapidly evolving adversarial tactics and techniques behind modern attacks, organizations need to not only operationalize Zero Tr...
August 24, 2022
Organizer: Cloud Security Alliance
Location: Webcast
Add Favorite
Cloud Governance as Code: A New Paradig...
As organizations continue to scale their cloud adoption, teams struggle to enforce governance policies consistently, so they meet regulatory requirements and avoid potential breaches. Further, they find it even more difficult to address these governance requirements without impeding development productivity. Cloud Governance as Code is a new paradigm that enables organizations to use code to manage and automate various aspects of governance, i...
April 21, 2022
Organizer: Cloud Security Alliance | Stacklet
Location: Webcast
Add Favorite
Demystifying Zero Trust for the C-Level...
Implemented correctly, a Zero Trust architecture / strategy / approach to Information Technology, and the architecture that supports it, has the potential to provide a simpler, more secure, more flexible environment for an organization to do business. The advent of Zero Trust should be regarded as an opportunity to better align IT with an organization’s business strategy. The whole purpose of modern networked computing is to facilitate c...
April 19, 2022
Organizer: Cloud Security Alliance
Location: Webcast
Add Favorite
Emulation Planning with ATT&CK
AttackIQ’s alignment to the MITRE ATT&CK® framework and our deep partnership with MITRE Engenuity’s Center for Threat-Informed Defense set us apart from the pack when it comes to adversary emulation. Through cutting-edge research informed by the best minds in cybersecurity, AttackIQ helps you achieve comprehensive cybersecurity readiness through realistic and specific adversary emulations. We bring the deepest library of MI...
April 19, 2022
Organizer: Cloud Security Alliance
Location: Webcast
Add Favorite
Top Threats to Cloud Computing
This webinar provides case study analyses for The Egregious 11: Top Threats to Cloud Computing white paper and a relative security industry breach analysis. Using nine actual attacks and breaches, including a major financial services company, a leading enterprise video communications firm, and a multinational grocery chain for its foundation, this webinar connects the dots between the CSA Top Threats in terms of security analysis.
January 27, 2022
Organizer: Cloud Security Alliance
Location: Webcast
Add Favorite
Secure DevOps Best Practices for Multic...
Multicloud is inevitable. In fact, it’s likely you’re already using different clouds like AWS, Google Cloud, and Azure for various functions. But, how do you address risk and ensure proper security practices across all of your cloud accounts and deployments? In this session, we’ll look at best practices for secure DevOps across multiple clouds. We’ll take a comprehensive look at your lifecycle from authentication and in...
January 25, 2022
Organizer: Cloud Security Alliance
Location: Webcast
Add Favorite
5 Steps to Develop, Launch, and Maintai...
As the use of SaaS applications grows within organizations of all sizes, so does the need to implement strong SaaS security. There are some simple first steps to determine if your organization has the proper SaaS security program in place - and best practices to ensure your apps stay protected. Join Tim Bach, Vice President of Engineering at AppOmni; Chris Hughes, CISO at Aquia; and Bryan Solari of AppOmni as they discuss SaaS security, how to...
January 24, 2022
Organizer: Cloud Security Alliance
Location: Webcast
Add Favorite
Go Dox Yourself: Staying Safe(r) Online...
In this webinar, you will learn: Why doxxing happens, and the most common doxxing methods used by attackers How to instruct a non-security audience on the security mindset What recycling slogans can teach us about maintaining our online presence News reports on doxxing (the practice of researching private or identifying information about someone online, typically with the intent to publicize it) have increased exponentially over the last sever...
January 19, 2022
Organizer: Cloud Security Alliance (CSA)
Location: Webcast
Add Favorite
Top 5 Ways Network Security is Differen...
Cloud is different. That seems obvious to most, yet many organizations treat the cloud as just an extension of their existing data center. This can cause problems at many layers (architecture, infrastructure, operations) and network security is perhaps the best example of this. Please join us for this discussion of the Top 5 Ways Network Security is Different in Public Cloud and get our experts’ perspectives on the differences and what t...
January 13, 2022
Organizer: Cloud Security Alliance
Location: Webcast
Add Favorite
Back to Search Begin New Search