Cloud Security: Are You Doing It Wrong?
Your attack surface is expanding from the on-prem data center to the cloud to remote deployments and the device edge. But your tools only secure the perimeter or rely on logs and agents, you’re leaving visibility gaps that adversaries can use to attack critical workloads and data.In this webinar, you’ll learn how network detection and response (NDR) eliminates visibility gaps across your attack surface by unlocking data from netwo...
CSA Los Angeles Red Team Hunt
Join the CSA Los Angeles Red Team Hunt for an interactive, hands-on cybersecurity scavenger hunt where participants utilize attacking skills, and possibly learning some new ones along the way, to complete a series of challenges. Participants earn and accumulate points based on how quickly they complete each challenge. Hints can be requested if needed through the challenge, at the cost of points. The further participants get in the challenge or...
February 18, 2021
Organizer:
Vectra Location:
Webcast
Key C Level Challenges in the Cloud
We recently engaged with Pete Chronis,the newly retired CISO at WarnerMedia,to get better insights into C-Level pain points and how we can help. He came up with an initial list of Key C-Level Challenges intheCloud which he will discuss during this session including: Reducing IT Footprint and Drive Efficiencies Moving to the Cloud Developing a Secure, Enterprise Cloud Operating Model Top 5 Critical Security Considerations for Cloud Migration a...
Fixing Broken Authentication: One of th...
Authentication is a cornerstone capability of any application. Ensuring a user is who they say they are is crucial to maintaining data privacy and preventing fraud and data breaches. Consequently, improperly implemented authentication, known as broken authentication, is a potentially devastating application vulnerability. In fact, the Open Web Application Security Project (OWASP) lists broken authentication as the second most critical security...
Fixing Broken Authentication: How to Ad...
Authentication is a mission-critical component of most applications, making it a prime target for attackers. Improperly implemented authentication, also known as broken authentication, is a widespread problem. According to the Open Web Application Security Project (OWASP), broken authentication is the second-most critical web application security risk.Broken authentication encompasses a variety of vulnerabilities related to an application...
CloudBytes Connect
CSA is excited to launch CloudBytes Connect, a multi-day virtual event program that brings the collaboration of research and community to the forefront. Leveraging CSA’s research initiatives to educate the industry on key issues and trends faced in cloud security, CloudBytes Connect will introduce participants, free of charge, to their peers and prominent leaders in the cloud and cybersecurity industry. Over the course of three days, CSA...
Dealing with an Adolescent Cloud
Would you like to learn how to secure the cloud? This webcast will go in depth on AWS's 7 secure design principles and walk you through a variety of open source tools that your organization can deploy to secure a cloud environment. For each principle we will demonstrate a Fundamental and Advanced approaches to transform any organization
Who's in Your Cloud?
When it comes to cloud operations, monitoring security and visibility are critical especially with the increase in staff working remotely. Join us on December 15th to learn about “Cloud State Monitoring,” why it is important, and who needs to be aware of it. Why Cloud is special? Meeting Agenda 1:00 -1:15 Announcements 1:15-2:05 Vanessa Grose, Google Cloud Michael Ojala, Google Solution Creator 2:05-2:25 Break/Sponsor Spotlight - E...
The Blind Spot in Object Storage
Amazon S3 is one of the most successful services provided by AWS. AWS has unlimited emphasis, ensuring your data is safe. Customers and AWS leverage many native features and security frameworks, including redundancy, bucket permissions, encryption and duplication across regions and availability zones. However, the hidden threat to your customers and corporate applications dependent on Amazon S3 is the ability for intentional malware to be upl...
SECtember Experience
As many organizations rush to meet the needs of a remote workforce and respond to the uncertainty of a COVID world, the need to develop secure, cloud-based solutions is essential. To meet this need, CSA is launching the SECtember Experience, a webinar series designed to help guide you on your race to the cloud. This series will provide a taste of what we have planned for the in-person SECtember conference in 2021. With a selection of top-notch...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.