Browse Event Presentations
![]() | The Next Evolution of Cloud Based Attacks and How to Prevent It |
![]() | Diversify Defense — Improving Cybersecurity Through Smart Consolidation NA Request to download |
![]() | Native Cloud Security Solutions – AWS Web Application Firewall |
![]() | Best Practices in Trust for the Cloud |
![]() | Using Encryption with AWS |
![]() | CSA Fall Summit – Protecting Information in the Cloud |
![]() | KO – Cloud Security Alliance Data Processing Agreements |
![]() | Effective Methods For Security Information Sharing |
![]() | Caterpillar in the Cloud |
![]() | Blockchain Evolution |
![]() | Rethinking Application Security for Cloud Deployments |
![]() | Building a More Secure Cloud Architecture |
![]() | SSL/TLS Then and Now - Joe Dietz |
![]() | A Hackers Perspective, where do we go from here - Chris Roberts |
![]() | Using Cloud Services Securely – A Practical Viewpoint - Benoit Heynderickx |
![]() | Defying the Greatest Cloud Security Myths - Dr. Carlo Gebhardt |
![]() | 7th Analysis on the State-of-the-Art on CLOUD SECURITY ADOPTION, SPAIN AND LATAM - Mariano Benito |
![]() | Microservice Programming, the New Era - Vrettos Moulos |
![]() | The Community Draft of the Revised C5 - Dr. Patrick Grete |
![]() | Cyber Security Act and IT-Security Law 2.0 – Actual developments in security labelling - Andreas Könen |