Hi [[ session.user.profile.firstName ]]

Cloud Security Alliance

  • Date
  • Rating
  • Views
  • CSA Research: Mitigating Top Cloud Threats CSA Research: Mitigating Top Cloud Threats Salim Hafid and Rich Campagna of Bitglass, and John Yeoh of CSA Recorded: Aug 30 2016 57 mins
    With cloud adoption on the rise, IT leaders are looking to peer organizations to understand security best practices in the cloud. Bitglass and CSA surveyed infosec professionals to uncover the top threats to cloud security and the tools most often used to secure cloud apps.

    In this webinar, John Yeoh, Senior Research Analyst at CSA, joins Bitglass to discuss the results of the "Mitigating Risk for Cloud Applications" report and to explore the major issues facing organizations in their move to the cloud, from Shadow IT and inadequate visibility to concerns around government access.
  • Standardization and visibility of security controls in Hybrid Standardization and visibility of security controls in Hybrid Avinash Prasad and Munish Gupta of Infosys Ltd Recorded: Aug 24 2016 50 mins
    The needs for IT agility for business, is driving adoption of flexible computing environments including IaaS, Private Cloud among others. The challenge associated with this transformation towards the Hybrid cloud environment is the assurance around the security for the workloads and data. Specific issues arise due to the “Shared security model ” of the varying Cloud environments in terms of implementation of security, compliance and optimization in these environments.

    The need of the hour is to ensure effective security governance through standardization of security controls/Policies across Hybrid cloud deployments are driven by embedded security mechanisms with lesser bolted-on overhead on the IT security teams. One successful example is the leveraging of “security for the cloud from the cloud” to provide elastic and adaptive security services for the hybrid cloud

    In this webinar, Avinash Prasad, AVP, Information & Cyber Risk Management and Munish Gupta, Principal – Information & Cyber Risk Management , Infosys (NYSE: INFY) will share their experiences with respect to standardization of security controls in Hybrid cloud environments.
  • Protect, Detect, Respond and Recover: Mitigating the Risks of Cyber Security Protect, Detect, Respond and Recover: Mitigating the Risks of Cyber Security Mat Hamlin of Spanning by EMC and Will McNae of Microsoft Recorded: Aug 16 2016 49 mins
    Information theft is the most expensive consequence of cybercrime, according to a recent Ponemon study. Business interruption following a cyberattack exacts a high price in productivity and business process failures—even greater than the cost of information and revenue losses.1 The more data you share in the cloud, the more you expose it to attack. While there’s no one way to achieve absolute security for your data, there’s a lot you can do to safeguard against attacks and to stop them from crippling your business if they do occur. Join us for this webinar as we explore ways to more effectively protect your cloud-based data, detect threats, respond to attacks, and recover from them.
  • True Detective: Detecting Insider Threats and Compromised Accounts in Office 365 True Detective: Detecting Insider Threats and Compromised Accounts in Office 365 Brandon Cook and Santosh Raghuram of Skyhigh Networks Recorded: Aug 9 2016 50 mins
    How does your organization combat insider threats and compromised accounts?

    Join CSA and Skyhigh Networks to learn about cloud threat findings from the research of CSA and Skyhigh Cloud Security Labs. We’ll share practical guidance on how to address the rapidly evolving cloud threat landscape, starting with user behavior analysis.

    Specifically, we will discuss how Information Security teams can:

    • Detect malicious or negligent insider stealing or unintentionally exposing data from O365 and other SaaS applications.
    • Catch third parties logging into corporate cloud service using stolen or misplaced login credentials to steal valuable corporate data
    • Identify malicious administrators accessing data out of policy, intentionally degrading security settings, or creating dummy accounts for unauthorized third party access
  • Protect Against New Threats to Safely Enable SaaS Protect Against New Threats to Safely Enable SaaS Palo Alto Networks Recorded: Aug 4 2016 50 mins
    The usage of SaaS applications continues to grow rapidly whether they are enabled by IT or your end users. SaaS-based application usage has grown 46 percent over the past three years as shown in the latest Application Usage and Threat Report from Palo Alto Networks. The attackers are now adapting to leverage these applications as a point of insertion and a medium for malware to proliferate.

    Join us for this live webinar where you will hear from Unit 42, the Palo Alto Networks threat research team, on how malware is using SaaS applications. You will also learn how to:

    • Protect against the new insertion and distribution points for malware
    • Gain visibility and granular, context-based control of SaaS applications
    • Secure corporate data from malicious and inadvertent data exposure
  • Joining the Cloud Cyber Intelligence Exchange Joining the Cloud Cyber Intelligence Exchange Patrick Coughlin, TruSTAR Recorded: Aug 2 2016 44 mins
    CSA, along with support from key corporate members like Rackspace and Intel, has been incubating a new intelligence exchange within the CloudCISC Working Group. Join CSA and technology partner TruSTAR to discuss:
    - The challenges of building effective intelligence exchange
    - How the CloudCISC exchange is designed differently
    - How you can get involved in the growing collection of vetted CSA members exchanging intelligence everyday!
  • Insights from the 2016 Gartner Magic Quadrant for Secure Web Gateways Insights from the 2016 Gartner Magic Quadrant for Secure Web Gateways Jim Reavis of CSA and Atri Chatterjee of Zscaler Recorded: Aug 1 2016 55 mins
    According to Gartner, cloud-based security is continuing to grow at a significant rate, spiking at a 35% CAGR compared to 6% for on-premise appliances. Newer and more advanced threats are creating risks that traditional appliances are struggling to keep up with. Consequently, the report highlights a number of key priorities for your security strategy, including:
    - The need for ‘advanced threat defense’ and not just a web filtering solution
    - The critical nature of securing your remote offices

    Is your security strategy aligned with all of the key recommendations from Gartner? What are the implications for enterprise security?

    Join Jim Reavis, Co-Founder and Chief Executive Officer, Cloud Security Alliance and Atri Chatterjee, Chief Marketing Officer, Zscaler, Inc., for a compelling webcast providing deep insights into Gartner's findings that are relevant for CISO's and CIO's. They will also address:
    - Latest security trends for enterprise security
    - Implications of the recent M&A activity in the security market
    - Key considerations when making your next web security decision
  • Five Requirements for Securely Adopting Cloud Applications Five Requirements for Securely Adopting Cloud Applications Mark D. Campbell and Brandon Whichard of IBM Security Recorded: Jul 26 2016 62 mins
    The business benefits of cloud applications are undeniable, however security concerns can still slow their adoption. While many mainstream cloud applications offer secure platforms and excellent security capabilities, much of the security burden is still on you. You still need a strategy and the technology tools to ensure your organization can safely and efficiently utilize these cloud apps.

    Join IBM Security as we discuss five essential requirements for ensuring safe and efficient adoption of cloud applications.
  • Office 365 Security and Compliance – Enforcing the 4 Layers of Trust Office 365 Security and Compliance – Enforcing the 4 Layers of Trust Brandon Cook and Srini Gurrapu of Skyhigh Networks Recorded: Jul 13 2016 50 mins
    Office 365 usage has tripled in the last 9 months as more and more companies enable anytime, anywhere access to Microsoft’s suite of cloud services. But security and compliance require a new level of granularity when users access cloud-based systems of record from a variety of networks, locations, and devices.

    In today’s cloud-first, mobile-first world, IT Security teams are creating variable trust models based on user, device, activity, and data sensitivity. In this session, we’ll share the proven 4-layer trust model for security and compliance in O365.
  • Protecting employees on the move with cloud-friendly application segmentation Protecting employees on the move with cloud-friendly application segmentation Paul German of Certes Networks Recorded: Jul 13 2016 52 mins
    Changed business practices, such as employees working on the move and the adoption of the cloud and cloud resources, should be mirrored by a change in security strategies. Organizations are commonly reluctant to adopt cloud technologies over concerns with security and control over enterprise data. However at the same time, many of these same organizations opened up access to applications for employees on the move, users on personal devices, external contractors, and other third parties that created a significantly larger attack surface than cloud services would have. To combat these threats, a number of cloud-friendly segmentation and application isolation techniques can be deployed to allow organizations to safely use the cloud whilst reducing their attack surface. Specifically, application segmentation via software-defined security represents a technique to accommodate borderless applications, adoption of the cloud, and modern user behaviours.

    Paul German, VP in EMEA, will discuss how the challenges presented by the next generation of information security can be overcome with practical examples and best practice tips.

Embed in website or blog