Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Standards-based Cloud Security Governance Automation: CIS-CSA-NIST collaboration Daniele Catteddu, Michaela Iorga, Phyllis Lee The panel will discuss the importance of a standard-based approach to Cloud Security Governance automation, the role and value of OSCAL as the standar... 2 weeks ago | 51 mins CSA-ISF Partnership: CCM and SOGP Framework and their Mapping Alignment Eleftherios Skoutaris, Benoit Heynderickx, Geoff Bird, Ross Johnson The Cloud Security Alliance (CSA) and the Information Security Forum (ISF) have teamed up on a new initiative to provide the cloud/cyber security comm... 2 weeks ago | 24 mins Using the SOGP and CCM for Multi-Cloud Security Benoit Heynderickx - Principal Analyst, ISF, and Lefteris Skoutaris - Program Manager, CSA In this session, we will demonstrate how the cross reference can help security practitioners leverage the two resources to deploy effective controls o... 2 months ago | 61 mins The NIST CSF to CSA CCM Mapping – A Primer Eric Peeters, Senior Manager, Weaver and Shelby Mathers, Manager, Weaver The CSA, NIST, Weaver, and CSA volunteers have teamed together to map the NIST CSF subcategories to the CSA’s CCM controls. During the webcast, we wil... July 18, 2023 7:00pm The CRI-CSA Cloud Profile Has Arrived! Emily Bean, Cyber Risk Institute & Daniele Catteddu, Cloud Security Alliance Financial institutions face many major challenges across all IT services as their cloud journey progresses. Cyber security governance, risk management... 4 months ago | 32 mins Introduction to the Cloud Controls Matrix v4.0 Lefteris SKOUTARIS (Program Manager, CSA) The presentation aims to provide a synopsis about the latest release of the Cloud Control Matrix version 4.0, a greater insight into its development a... 9 months ago | 37 mins Top Threats to the Cloud for the Business John Yeoh, Global Vice President of Research | Cloud Security Alliance The cloud landscape is complex with different threats, risks, and vulnerabilities that can overwhelm a business and its security teams. An annual repo... 6 months ago | 42 mins Ready to Deploy Enterprise File Services in a Private Cloud? (In Hebrew) Moti Oxman, Director of Sales Israel at CTERA and Ran Ben-Ishai, General Manager Israel at Matrix innercloud Have you been looking to migrate your existing unstructured data to the cloud, but are concerned about security, scalability, management, and costs? ... 6 months ago | 47 mins Pooled audits – A cost-effective way of auditing Third-Party Risk John DiMaria, Imre Bako, Thomas Pfeiffer Pooled audits are helpful for both the Cloud Service Provider (CSP) and the Cloud Service User as they reduce the costs to any one outsourcing institu... 4 months ago | 32 mins Implementing the Shared Security Responsibility Model Using CCM/CAIQ V4 Erik Johnson, Sr. Research Analyst, CSA and Eleftherios Skoutaris, Program Manager, CSA The cloud Shared Security Responsibility Model (SSRM) is inherent to the use of cloud services. It is critical for cloud service customers (CSCs) to b... 4 months ago | 35 mins Load more