CES 2024
ALL TOGETHER. ALL ON. Flip the switch on global business opportunity with CES, where you can meet with partners, customers, media, investors, and policymakers from across the industry and the world all in one place. CES is a trade-only event for individuals 18 years of age or older and affiliated with the consumer technology industry. All registrants must follow health and safety protocols while at CES 2024. Learn more. CES is not open to the...
ACSAC 39 | Annual Computer Security App...
The Annual Computer Security Applications Conference (ACSAC) brings together cutting-edge researchers, with a broad cross-section of security professionals drawn from academia, industry, and government, gathered to present and discuss the latest security results and topics. With peer reviewed technical papers, invited talks, panels, national interest discussions, and workshops, ACSAC continues its core mission of investigating practical soluti...
December 4-8, 2023
Organizer:
ACSAC Location:
Austin, TX
CES 2022
CES® Is the Global Stage for Innovation CES® is the most influential tech event in the world — the proving ground for breakthrough technologies and global innovators. This is where the world's biggest brands do business and meet new partners, and the sharpest innovators hit the stage. Owned and produced by the Consumer Technology Association (CTA)®, CES features every aspect of the tech sector. Owned and produced by the Consu...
CxO Trust Summit
Advance cloud computing and cybersecurity within the C-Suite. Join the Cloud Security Alliance in-person at its inaugural CxO Trust Summit at SECtember on Tuesday, September 14, 2021 in Bellevue, Washington. This exclusive event will feature keynote presentations, networking opportunities, a panel discussion on the challenges of digital transformation, participation in an intensive 3-phase attack scenario, and more. The CxO Trust Summit is a f...
CloudCon 2021
Outdoor and In-Person! The West Michigan Cloud Security Alliance is thrilled to announce CloudCon 2021 This year we will be be both in-person in Grand Rapids, Michigan as well as being live-streamed. Building off of last year’s virtual event success, we have been working with LMCU Ballpark to bring together Cloud Security leaders, speakers, and vendors for 2 days of the very best content available. Content Matters Since the inception of...
CloudBytes Connect
CSA is excited to launch CloudBytes Connect, a multi-day virtual event program that brings the collaboration of research and community to the forefront. Leveraging CSA’s research initiatives to educate the industry on key issues and trends faced in cloud security, CloudBytes Connect will introduce participants, free of charge, to their peers and prominent leaders in the cloud and cybersecurity industry. Over the course of three days, CSA...
The Blind Spot in Object Storage
Amazon S3 is one of the most successful services provided by AWS. AWS has unlimited emphasis, ensuring your data is safe. Customers and AWS leverage many native features and security frameworks, including redundancy, bucket permissions, encryption and duplication across regions and availability zones. However, the hidden threat to your customers and corporate applications dependent on Amazon S3 is the ability for intentional malware to be upl...
Building a World-Class Security Program
There is no "playbook" for today's information security officer to becoming a successful leader. With thousands of security technologies, millions of threat actors, and new attack vectors to defend against, simply working harder won't solve the problem. Information security leaders must transform from reactive, infrastructure-focused, into proactive, business-aligned security leaders. A world-class security program combines people, process, an...
Security Automation: Principles, Opport...
One of the fundamental principles of any security program is a focus on reducing the “timeline to compromise” for security issues. Not only are attacks getting more and more sophisticated, but they are also starting to get more aggressive as all of us have been forced by the pandemic crisis into new modes of working. Responding well to these challenges requires the ability to focus your resources on your most challenging security p...
In the Trenches of Cloud Governance Battles
When a large organization adopts cloud computing, it goes through several learning curves. Especially when during this journey, a transformation towards a DevOps way of working is implemented. It goes through multiple growth stages. After two to three years, one reaches a stage with turf wars. A true story that reads like an Asterix and Obelix comic book, I will tell a story of an organization adopting both AWS and Azure cloud. While doing so...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.