Browse Event Presentations
![]() | Not Another Boring Cyber Insurance Discussion - The State and Future of Cyber Insurance Based upon the published OMG discussion paper, The State and Future of Cyber Insurance, the co-authors will briefly present the synopsis of the paper, lea... Request to download |
![]() | Protecting the Privacy of Healthcare Data in the Cloud Privacy is concerned with decisions about legitimate access to, use of, and alteration of information. Privacy establishes a framework for deciding who sh... Request to download |
![]() | CSA Federal Summit 2020 - Virtual Webinar Series In the Federal Summit Webinar Series, the Cloud Security Alliance addressed many factors that are at play to implement a secure, user-friendly cloud instance... Request to download |
![]() | CloudBytes Connect View presentations from the CloudBytes Connect, a multi-day virtual event program that brought the collaboration of research and community to the forefront. ... Request to download |
![]() | CSA Virtual EU Summit 2020 View presentations from the inaugural CSA EU Summit. This four-day event drew a cross-section of EU government agencies from the region who shared case studi... Request to download |
![]() | The Resurgence of Cloud |
![]() | Latest Trends in Intelligence Management Part of the CSA Federal Summit 2020, this presentation by TruStar chairman Paul Kurtz discusses intelligence management. Request to download |
![]() | Cloud Resilience: Tested by Pandemic Part of the CSA Federal Summit 2020, this presentation by Jim Reavis, CEO at CSA, discusses the impact of the recent pandemic on cloud. Request to download |
![]() | Cybersecurity in a Post-COVID World Part of the CSA Federal Summit 2020, this presentation by Bob Flores, CEO at Applicology, discusses what cybersecurity will look like after COVID-19. Request to download |
![]() | Implementing a Work from Home Security Strategy Part of the CSA Federal Summit 2020, this presentation by Jerry Archer, Chief Security Officer at Sallie Mae, covers how to implement a work from home securi... Request to download |
![]() | Cloud computing security in the NIS Directive |
![]() | CSA Security Trust Assurance and Risk (STAR) |
![]() | 7th Analysis on the State-of-the-Art on Cloud Security Adoption in Spain and Latin America |
![]() | Cyber Security Act and IT-Security Law 2.0 – Actual developments in security labelling |
![]() | The Community Draft of the Revised C5 |
![]() | Digital Transformation Requires Security Transformation |
![]() | How to scale Vendor Security Management |
![]() | How Cybersecurity Certification can Foster the EU Cybersecurity Market |
![]() | Taking Control of IoT: An Enterprise Perspective |
![]() | Leveraging Automation to Achieve Security in a Multi-Cloud Environment |