Hi [[ session.user.profile.firstName ]]

Cloud Security Alliance: CloudBytes

  • Date
  • Rating
  • Views
  • SECtember Experience Wrap-Up: Guiding your Race to the Cloud
    SECtember Experience Wrap-Up: Guiding your Race to the Cloud
    Jim Reavis, CEO, Cloud Security Alliance Recorded: Sep 30 2020 56 mins
    In this session, Jim will take a look back at the critical topics covered throughout this month-long SECtember Experience and highlight key takeaways that can help guide you on your race to the cloud. How do you move forward and leverage the information and tools you collected during this past month? Jim will provide his insights and a roadmap ahead as you look to navigate the challenges of the current cloud climate.
  • Panel: Pandemic & Beyond: Migrating to Cloud Securely
    Panel: Pandemic & Beyond: Migrating to Cloud Securely
    Jim Reavis, Pete Chronis, Tima Soni, Patti Titus, Vinay Patel Recorded: Sep 29 2020 60 mins
    In this panel, our group of CISOs will be discussing the central cloud security issues currently being faced. Is the pandemic accelerating the push to the cloud? What are the governance, technical and cultural lessons learned? The CISO panelists represent organizations with diverse cloud maturity, from dipping the toes to all in, and the panel will have something of value to all audience members
  • Building a Great Security Culture
    Building a Great Security Culture
    Isaac Painter, Security Training, Awareness, and Culture Manager, Adobe Recorded: Sep 29 2020 45 mins
    Addressing technology risk is a no-brainer, but when it comes to addressing human-security risk, it’s not always top of mind for companies – but it should be! Studies show that over 50% of cyber security breaches are due to human-security risk. In this session, Adobe’s security training, awareness, and culture team will be sharing how they address the human-security risk through their security training, awareness, and culture program.
  • The Blind Spot in Object Storage
    The Blind Spot in Object Storage
    Ed Casmer,CTO, Cloud Storage Security Recorded: Sep 25 2020 43 mins
    Amazon S3 is one of the most successful services provided by AWS. AWS has unlimited emphasis, ensuring your data is safe. Customers and AWS leverage many native features and security frameworks, including redundancy, bucket permissions, encryption and duplication across regions and availability zones. However, the hidden threat to your customers and corporate applications dependent on Amazon S3 is the ability for intentional malware to be uploaded by an attacker, or an unintentional upload of potentially malicious files or objects by a legitimate user to your object storage.

    Thank you to our sponsors of the SECtember Experience: Adobe, ExtraHop, Qualys, OneTrust, Trendmicro, and Whistic.
  • It’s Been Ten Years. Why has nothing changed?
    It’s Been Ten Years. Why has nothing changed?
    Peter Karlson, Jim Reavis, Candy Alexander, Recorded: Sep 25 2020 43 mins
    Join us for a candid discussion on why we continue to see a shortage of skilled Cyber professional and how it is fast becoming one of the least understood problems faced by businesses and the profession today. Based on the latest research paper The Life and Times of Cybersecurity Professionals 2019. A Cooperative Research Project by Enterprise Strategic Group and the International Systems Security Association (ISSA), Jim Reavis and Candy Alexander, two of our prominent leaders in the community, discuss why it was so important to forge the alliance between ISSA and CSA and how to best tackle the problem at hand.
  • Are you Prepared for the Changing Cybersecurity Threat Landscape?
    Are you Prepared for the Changing Cybersecurity Threat Landscape?
    Moderator: Satyavathi Divadri | Panelists : Sridhar GOVARDHAN, Sunil DAVID, Vikas YADAV Recorded: Sep 25 2020 39 mins
    Panel Discussion
  • CSA STAR– New Paradigm for Measuring Security, Privacy and Governance in cloud
    CSA STAR– New Paradigm for Measuring Security, Privacy and Governance in cloud
    John DIMARIA, Assurance Investigatory Fellow, CSA Recorded: Sep 25 2020 21 mins
    When a paradigm shifts, you cannot ignore change and count on past success. New technology can revolutionize a market, creating a tectonic shift in accepted practice. The advent of the Cloud to date has been such an advancement in technology and optimization of its capability the need for flexible access have led to an increase in business demand for cloud computing along with increased security and privacy concerns. How organizations evaluate Cloud Service Providers (CSPs) has become key to providing increased levels of assurance transparency.
    John DiMaria; CSAs Assurance Investigatory Fellow and one of the key innovators in the evolution of CSA STAR, will discuss the history behind the vison and take you on journey down the road through the three levels of the Open Certification Framework (OCF), but more importantly how it helps organizations optimize processes, reduce costs, decrease risk while meeting the continuing rigorous international demands on cloud services.
  • Software Eats Security:  Zero Trust Software Defined Perimeter
    Software Eats Security: Zero Trust Software Defined Perimeter
    Ekta MISHRA, APAC Membership Director & Country Manager - India | Keith PRABHU, Chairman, CSA Mumbai Chapter Recorded: Sep 25 2020 42 mins
    Software is eating the world and information security is no different. The network perimeter no longer exists. Traditional IP based security can be blind-sided to evolving attacks. Software based perimeter enhances authentication capabilities. Benefits of SDP approach to Zero Trust. Components required for implementation.
  • Building a World-Class Security Program
    Building a World-Class Security Program
    James Christiansen, Vice President of Cloud Security Transformation, Netskope Recorded: Sep 24 2020 50 mins
    There is no "playbook" for today's information security officer to becoming a successful leader. With thousands of security technologies, millions of threat actors, and new attack vectors to defend against, simply working harder won't solve the problem. Information security leaders must transform from reactive, infrastructure-focused, into proactive, business-aligned security leaders. A world-class security program combines people, process, and technology. The best security programs are guided by dynamic leaders who understand the business to provide consistent demonstrable value.

    Thank you to our sponsors of the SECtember Experience: Adobe, ExtraHop, Qualys, OneTrust, Trendmicro, and Whistic.
  • Deep Fakes, Disinformation and Social Engineering
    Deep Fakes, Disinformation and Social Engineering
    Etay Maor, Chief Security Officer, IntSights Recorded: Sep 24 2020 61 mins
    In information security, we always talk about PPT – People, Processes, and Technology. We tend to focus mostly on the tech: new sophisticated malware, surprising zero-day vulnerabilities, and advanced detection evasion techniques. But attackers are often one step ahead of security teams because they focus on people and processes. Nation states do the same - whether its meddling in elections, engaging in military PSYOPS or getting a foothold on a target’s network - there is a plethora of tools and tactics that target the person and not the technology.

    Register for, Deep Fakes, Disinformation and Social Engineering, presented by IntSights Chief Security Officer Etay Maor to learn why these technologies should be of interest to businesses and how they may "spill" from election interference to business interference.

Embed in website or blog