AWS Threat Playbook: Stopping Attacks T...
88% of data breaches involve stolen credentials - traditional posture management tools like DSPM and CSPM can’t stop what looks like legitimate access. So, how do you stop a malicious insider or an attacker with valid AWS credentials from exfiltrating your most sensitive data? Join us as we expose the blind spots that posture tools leave behind. You’ll see how data-centric threat detection catches what DSPM and CSPM cannot, includi...
Agentic AI Security Summit 2025
Securing the Age of Agentic AI: Autonomy, Risk, and Resilience As artificial intelligence progresses beyond static models and narrowly defined tasks, the emergence of Agentic AI marks a pivotal shift in how intelligent systems operate. These systems are increasingly capable of autonomous decision-making, continuous learning, and adaptive behavior — posing new opportunities and challenges for technology leaders, researchers, and practiti...
AI Super Agents: Delivering Autonomous SecOps
Join ReliaQuest experts Brian P. Murphy, Chief Scientist, and Jonathan Echavarria, Principal Research Scientist, as they explore the transformative power of AI multi-agent systems. Learn how these "super agents" collaborate to automate Tier 1 and Tier 2 tasks, improve detection and response, and empower your team to focus on high-impact priorities. In this session, you’ll discover:How multi-agent systems enable autonomous, end-to-end sec...
Non-Human Identity (NHI) Summit 2025
The rise of non-human identities (NHIs) is reshaping the cloud security landscape. APIs, service accounts, bots, and machine identities now outnumber humans in most cloud environments—and they often hold the keys to your most critical systems. Join global cloud and identity experts for CSA’s first-ever Non-Human Identity Summit, a free, two-day virtual event dedicated to tackling the complex challenges of NHI management. NHI Summit...
State of SaaS Security
The State of SaaS Security: Trends and Insights for 2025-26, commissioned by Valence in partnership with the Cloud Security Alliance, reveals a critical inflection point in SaaS security. While 86% of organizations now prioritize SaaS security with 76% increasing budgets, significant challenges persist that threaten enterprise security postures. Survey data from 420 IT and security professionals highlights persistent visibility gaps, with 55%...
State of SaaS Security
The State of SaaS Security: Trends and Insights for 2025-26, commissioned by Valence in partnership with the Cloud Security Alliance, reveals a critical inflection point in SaaS security. While 86% of organizations now prioritize SaaS security with 76% increasing budgets, significant challenges persist that threaten enterprise security postures. Survey data from 420 IT and security professionals highlights persistent visibility gaps, with 55%...
Breaking Down Security for AI: From LLM...
The security for AI landscape is constantly evolving, protecting AI as it advances from standalone models to complex agents. In this webinar, we demystify what it means to secure AI models, applications, and agents. Whether you’re building your own model or deploying frontier or open-source systems, you need to understand the full lifecycle to secure it. From AI red teaming during development to runtime defense in production systems, thi...
The CSA Enterprise Authority to Operate...
The CSA Enterprise Authority to Operate (EATO) Framework is an assessment, remediation, consultancy, and certification framework. It targets Anything-as-a-Service (XaaS) providers and their entire underlying supply chain who are catering to customers in highly regulated industries processing sensitive data. EATO controls are based on CCMv4, with augmented controls to reflect tight regulatory requirements, and the certification plugs into the C...
Cloud Trust Summit 2025
Join global leaders from industry, regulatory agencies, and standards bodies at CSA’s third annual Virtual Cloud Trust Summit—now expanded into a dynamic, free, two-day virtual event. As cloud adoption accelerates and emerging technologies like generative AI reshape the digital landscape, organizations face mounting pressure to meet evolving security and compliance demands. This year’s summit will spotlight two of the most pr...
How to Protect M&A in FinServ: A Conver...
Mergers and acquisitions can fuel growth—but they also create prime opportunities for cyber threats. Financial services organizations must act fast to secure newly acquired entities, maintain compliance, and prevent cyber risks from jeopardizing the deal. In this webinar, security leaders will learn:The biggest cybersecurity risks during M&A and how attackers exploit themBest practices for securing the business throughout the process...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.