122 past events found
Back to Search Begin New Search Save Search Auto-Notify
Building a World-Class Security Program
There is no "playbook" for today's information security officer to becoming a successful leader. With thousands of security technologies, millions of threat actors, and new attack vectors to defend against, simply working harder won't solve the problem. Information security leaders must transform from reactive, infrastructure-focused, into proactive, business-aligned security leaders. A world-class security program combines people, process, an...
September 24, 2020
Organizer: Cloud Security Alliance (CSA)
Location: Webcast
Add Favorite
Security Automation: Principles, Opport...
One of the fundamental principles of any security program is a focus on reducing the “timeline to compromise” for security issues. Not only are attacks getting more and more sophisticated, but they are also starting to get more aggressive as all of us have been forced by the pandemic crisis into new modes of working. Responding well to these challenges requires the ability to focus your resources on your most challenging security p...
September 23, 2020
Organizer: Cloud Security Alliance (CSA)
Location: Webcast
Add Favorite
In the Trenches of Cloud Governance Battles
When a large organization adopts cloud computing, it goes through several learning curves. Especially when during this journey, a transformation towards a DevOps way of working is implemented. It goes through multiple growth stages. After two to three years, one reaches a stage with turf wars. A true story that reads like an Asterix and Obelix comic book, I will tell a story of an organization adopting both AWS and Azure cloud. While doing so...
September 21, 2020
Organizer: Cloud Security Alliance (CSA)
Location: Webcast
Add Favorite
How to Prepare for an Audit Against the...
The CSA STAR allows for both an attestation under a SOC 2 audit or certification under ISO 27001. While most organizations self attest to the CSA Star, this presentation will discuss how to prepare for a successful audit under either SOC 2 or ISO 27001 to demonstrate compliance with the CSA STAR standard.
September 18, 2020
Organizer: Cloud Security Alliance (CSA)
Location: Webcast
Add Favorite
Vendor Risk Assessment: Secrets for Pro...
In this panel, our experts will share lessons learned and best practices for securing cloud services. From proactive risk assessments within the procurement process to architectural considerations to secure systems management, our diverse panel will provide a holistic perspective on the strategic programs organizations should have in place to secure their cloud experience.
September 17, 2020
Organizer: Cloud Security Alliance (CSA)
Location: Webcast
Add Favorite
XDR: Myth or Reality
More details coming soon about XDR: Myth or Reality!! The SECtember Experience provides a preview of the top-notch content attendees will receive at the live SECtember conference in 2021. Featuring sessions from prominent industry leaders, this webinar series is designed to help guide you on your race to the cloud.
September 16, 2020
Organizer: Cloud Security Alliance (CSA)
Location: Webcast
Add Favorite
Risk Appetite & the Alignment of Cybers...
Most organizations would like you to believe they are agile. In 2020, they get to prove it. Everything has changed. Historical trend and proforma comparisons suddenly mean nothing. Sales drivers and market dynamics are now being influenced at a hyper-local level. Meanwhile, a workforce that used to pile into conference rooms to review data together now have to find a quiet place at home and find other ways to be heard. Join me as we discuss ho...
September 15, 2020
Organizer: Cloud Security Alliance (CSA)
Location: Webcast
Add Favorite
Maturing Your Cloud Security
In this session, Mike Rothman will go through the Cloud Security Maturity Model, developed in partnership between Securosis and IANS, to provide perspective on your cloud security journey. The session will describe the 12 categories across 3 domains, as well as laying out success criteria to improve maturity (and there improve cloud security posture). Anchored by a number of stories of success (and failure) in cloud security, attendees will le...
September 14, 2020
Organizer: Cloud Security Alliance (CSA)
Location: Virtual
Add Favorite
Software Defined Perimeter, Microsegmen...
Security has become of paramount importance in recent times, especially due to the advent of cloud computing and virtualization. With so many devices in the mix, users have the choice of working from anywhere they want. The rapid increase in global IP traffic has challenged network service providers to scale and improve infrastructure to meet this new demand. We explore the merits and performance of Software Defined Perimeters to withstand DDo...
September 11, 2020
Organizer: Cloud Security Alliance (CSA)
Location: Webcast
Add Favorite
Talking to the Board About the New Real...
With the sudden shift of the global workforce from in-office to remote, IT teams quickly transformed their operations to accommodate the new realities of business — including large-scale adoption of work-from-home technologies, heightened activity on customer-facing networks, and greater use of online services. While these examples of agility allowed business to continue, they also greatly increased the risk of misconfigurations and cybe...
September 10, 2020
Organizer: Cloud Security Alliance (CSA)
Location: Webcast
Add Favorite
Back to Search Begin New Search