Browse Event Presentations
![]() | Delivering Continuous Compliance using CSA CCM and NIST OSCAL In our rapidly changing information technology portfolios, compliance, as imagined typically, does not match compliance as implemented. CSA has rece... Request to download |
![]() | Cloud Native Security & Policy Management Improved security is a key benefit of cloud-native technologies, because of immutability and segregation of resources in containers, microservices, server... Request to download |
![]() | CSA Federal Summit 2020 - Virtual Webinar Series In the Federal Summit Webinar Series, the Cloud Security Alliance addressed many factors that are at play to implement a secure, user-friendly cloud instance... Request to download |
![]() | CloudBytes Connect View presentations from the CloudBytes Connect, a multi-day virtual event program that brought the collaboration of research and community to the forefront. ... Request to download |
![]() | CSA Virtual EU Summit 2020 View presentations from the inaugural CSA EU Summit. This four-day event drew a cross-section of EU government agencies from the region who shared case studi... Request to download |
![]() | The Resurgence of Cloud |
![]() | Latest Trends in Intelligence Management Part of the CSA Federal Summit 2020, this presentation by TruStar chairman Paul Kurtz discusses intelligence management. Request to download |
![]() | Cloud Resilience: Tested by Pandemic Part of the CSA Federal Summit 2020, this presentation by Jim Reavis, CEO at CSA, discusses the impact of the recent pandemic on cloud. Request to download |
![]() | Cybersecurity in a Post-COVID World Part of the CSA Federal Summit 2020, this presentation by Bob Flores, CEO at Applicology, discusses what cybersecurity will look like after COVID-19. Request to download |
![]() | Implementing a Work from Home Security Strategy Part of the CSA Federal Summit 2020, this presentation by Jerry Archer, Chief Security Officer at Sallie Mae, covers how to implement a work from home securi... Request to download |
![]() | Cloud computing security in the NIS Directive |
![]() | CSA Security Trust Assurance and Risk (STAR) |
![]() | 7th Analysis on the State-of-the-Art on Cloud Security Adoption in Spain and Latin America |
![]() | Cyber Security Act and IT-Security Law 2.0 – Actual developments in security labelling |
![]() | The Community Draft of the Revised C5 |
![]() | Digital Transformation Requires Security Transformation |
![]() | How Cybersecurity Certification can Foster the EU Cybersecurity Market |
![]() | How to scale Vendor Security Management |
![]() | Taking Control of IoT: An Enterprise Perspective |
![]() | Leveraging Automation to Achieve Security in a Multi-Cloud Environment |