ChaptersEventsBlog
Prove your skills in Illumiverse Labs’ Breach Containment CTF. Register now to stop attackers.

Announcements

Announcements
Beyond the Hype: A Benchmark Study of AI Agents in the SOC
Beyond the Hype: A Benchmark Study of AI Agents in the SOC

October 6, 2025

Beyond the Hype: A Benchmark Study of AI Agents in the SOC
Beyond the Hype: A Benchmark Study of AI Agents in the SOC

October 6, 2025

Explore the Latest Zero Trust Insights
Explore the Latest Zero Trust Insights

October 3, 2025

Getting Ready for STAR for AI 42001
Getting Ready for STAR for AI 42001

October 1, 2025

From Compliance to Culture: What CISOs Need to Know About Evolving SAT
From Compliance to Culture: What CISOs Need to Know About Evolving SAT

October 1, 2025

From Compliance to Culture: What CISOs Need to Know About Evolving SAT
From Compliance to Culture: What CISOs Need to Know About Evolving SAT

October 1, 2025

Zero Trust Architecture: Principle Driven Security Strategy for Organizations and Security Leaders
Zero Trust Architecture: Principle Driven Security Strategy for Organizations and Security Leaders

September 30, 2025

Join the Seattle AI Workshop with CSA and Northeastern University
Join the Seattle AI Workshop with CSA and Northeastern University

October 19, 2025

September 29, 2025

AI Log Analysis for Event Correlation in Zero Trust
AI Log Analysis for Event Correlation in Zero Trust

September 26, 2025

Tackling Enterprise AI Risks with Insights from Industry & Academia
Tackling Enterprise AI Risks with Insights from Industry & Academia

Join CSA and Northeastern University for free on Oct 28

September 25, 2025

Now accepting speaker submissions for the 2025 AGM hosted by Telefónica Tech (EN)
Now accepting speaker submissions for the 2025 AGM hosted by Telefónica Tech (EN)

September 25, 2025

SaaS Security Capability Framework (SSCF)
SaaS Security Capability Framework (SSCF)

September 23, 2025

Controls vs. Key Security Indicators: Rethinking Compliance for FedRAMP
Controls vs. Key Security Indicators: Rethinking Compliance for FedRAMP

September 23, 2025

The First AI Model Security Leaderboard
The First AI Model Security Leaderboard

Confident AI Decisions Start with RiskRubric

September 17, 2025

How AI coding tools can learn to develop secure software
How AI coding tools can learn to develop secure software

Reversing Labs

September 17, 2025

First-of-Its-Kind AI Model Security Leaderboard
First-of-Its-Kind AI Model Security Leaderboard

Your Guide to Secure, Reliable AI Models

September 17, 2025

5 steps for deploying agentic AI red teaming
5 steps for deploying agentic AI red teaming

CSO

September 17, 2025

An Update on European Compliance: NIS2, CRA, DORA
An Update on European Compliance: NIS2, CRA, DORA

September 17, 2025

Global Email Threat Landscape: Eye-Opening VEC and BEC Engagement Trends by Region
Global Email Threat Landscape: Eye-Opening VEC and BEC Engagement Trends by Region

September 16, 2025

The Third-Party Access Problem: The Elephant in the Room for Every CISO’s Identity Strategy
The Third-Party Access Problem: The Elephant in the Room for Every CISO’s Identity Strategy

September 15, 2025