ChaptersEventsBlog
How is your enterprise using AI Agents? Help us benchmark security and take the survey before November 30 →

Contribute to CSA Research

Home
Contribute

Open Peer Reviews

Software-Defined Perimeter: Architecture Guide V3

Open Until: 12/05/2025

The increasing sophistication of cyber threats and the limitations of traditional network security models have led to the e...

Zero Trust Guidance for Building a Resilient Enterprise Environment

Open Until: 12/05/2025

Resiliency is an increasingly important global business and compliance priority across different jurisdictions and business...

Standards-Benchmarks-Maturity

Open Until: 12/13/2025

Standardization serves as a foundational backbone that enables uniqueness and diversity to flourish within structured envir...

Open Source Red Teaming Tool: PyRIT Automation Capability in Agentic Red Team Testing Environments

Open Until: 12/13/2025

This paper presents an open source red teaming tool for simulating adversarial attacks in modern systems. Designed for secu...

Using Zero Trust Against Identity Spoofing and Abuse

Open Until: 12/20/2025

The shift towards zero trust architectures brings in a heightened focus on the integrity of identity and identity attribute...

Using Zero Trust to Secure Enterprise Information in LLM Environments

Open Until: 12/20/2025

Guidance for safe enterprise enablement of AI/ML apps while protecting sensitive organizational information (IP, PII, etc.)...

Open Surveys

Take the Securing the New Digital Workforce Survey by November 30 →

This survey aims to capture the current state of enterprise adoption, usage, and security practices surrounding AI Agents. With specific goals around:
  • Measure Adoption and Usage
  • Evaluate Security Posture
  • Understand Governance and Compliance
  • Explore Operational Challenges
  • Map Future Investment and Innovation Priorities

Take this survey by November 30 for a chance to win a $25 Amazon gift card or Apple AirPods.