Cloud-Native Attacks on Availability: H...
The rapid shift to remote work in 2020 saw adoption of public cloud skyrocket. Organizations quickly saw the benefits of public cloud from SaaS based applications, to the agility that PaaS provides. While the pandemic dominated the headlines last year, 2021 will likely go down as the year of ransomware. While the economics of ransomware have been a proven, profitable business, the shift to the cloud opens new possibilities. Join security resea...
The Latest Threats, Techniques, Risks ...
Join us for this webinar where eSentire and Sumo Logic threat intelligence experts will brief CSA members on cutting edge threat intelligence developed from threat reports and first-hand detections our threat hunting teams have encountered in cloud environments. This briefing will bring CSA members up to date on the latest threats, risks, and vulnerabilities in cloud environments. We will share the top cloud threats and vulnerabilities eSentir...
Is it Time to Confront Your VPN?
Join CSA & Appgate for this 60-minute webinar where we discuss why it’s time to consider phasing out your VPN. We know it can be easier said than done. Many IT leaders struggle with the scope of the transition and fear of operational disruption. It doesn’t have to be this way.
Protecting Against Network Layer DDoS Attacks
Protecting against network layer DDoS attacks: Emerging attack trends, ransom-DDoS attack patterns, and available solutions. Ransom DDoS attacks are on the rise and new attack trends are beginning to emerge. Network infrastructures that are exposed to the Internet need the same level of protection as web facing assets. Due to the changing nature of attacks with respect to size, persistence, and even duration, implementing DDoS protections must...
Dark Web Demystified, Part One: An Over...
Aside from a subject of intrigue, misunderstanding, and a valuable source of intelligence, what is the dark web? In part one of this deep dive series, we'll tap into the knowledge of security practitioners with expert knowledge on the dark web. Charity Wright, a former NSA analyst and current Expert Cyber Threat Intelligence Analyst at Recorded Future, will pull back the curtain. She'll bust myths associated with the criminal underground and d...
Account Takeover in Office 365
Navigate through uncharted security territory by analyzing the attack lifecycle in the cloud and dissecting a real-world attack. The same technology that makes the cloud dynamic can have the opposite effect on an organization’s ability to implement detection and response in cloud environments. This includes the adding additional layer of preventative controls in addition to MFA, because it's increasingly being bypassed in O365. Michael L...
CloudCon 2021
Outdoor and In-Person! The West Michigan Cloud Security Alliance is thrilled to announce CloudCon 2021 This year we will be be both in-person in Grand Rapids, Michigan as well as being live-streamed. Building off of last year’s virtual event success, we have been working with LMCU Ballpark to bring together Cloud Security leaders, speakers, and vendors for 2 days of the very best content available. Content Matters Since the inception of...
Moving from Cyber Security to Cyber Res...
How can cyber security catch up to the business, while still maintaining a dynamic, resilient and secure operation? Transitioning and operating in the cloud is no longer just about moving from your on-premises data centers. It’s about optimizing connections between branch offices to home offices, and accelerating the development and deployment of applications – all while remaining secure and compliant! Join us and find ways to sque...
How to Think Like a Hacker to Avoid Clo...
You’ll learn how these hacks go down, and how to spot previously missed vulnerabilities, and determine the blast radius of your cloud security gaps.About this Cloud Security Masterclass: A live video session with open chat throughout, and extra time for Q&A following the main session Hands-on demonstrations of real-time cloud exploits using tools such as the AWS Console and Command Line A fun, interactive learning session (no boring...
Getting Sassy With SASE
Join the CSA Delaware Valley and Triangle chapters and our panel of experts in discussing the emerging technologies and challenges around SASE (Secure Access Service Edge).By tuning in to this panel discussion one can expect to come away with an understanding of what SASE is, the problems it solves, and what a well thought out implementation looks like. Our panel of experts will discuss multi-cloud use cases, how to operationalize the service...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.