ChaptersEventsBlog
How is your enterprise using AI Agents? Help us benchmark security and take the survey before November 30 →

Working Group

CxO Trust

The CSA CxO Trust Working Group will conduct research consisting of best practices, metrics, surveys, C-level presentations, and other tools in support of the overall initiative mission of the broader CSA CxO Trust Initiative.
Top Cloud Priorities for CxOs
Top Cloud Priorities for CxOs

Download

Working Group Overview
The CSA CxO Trust Working Group will conduct research consisting of best practices, metrics, surveys, C-level presentations, and other tools in support of the overall initiative mission of the broader CSA CxO Trust Initiative.

Active Projects
Who can join?

Anyone can join a working group, whether you have years of experience or want to just participate as a fly on the wall.

What is the time commitment?

The time commitment for this group varies depending on the project. You can spend a 15 minutes helping review a publication that's nearly finished or help author a publication from start to finish.

Open Peer Reviews

Peer reviews allow security professionals from around the world to provide feedback on CSA research before it is published.

Learn how to participate in a peer review here.

Standards-Benchmarks-Maturity

Open Until: 12/13/2025

Standardization serves as a foundational backbone that enables uniqueness and diversity to flourish within structured envir...

Open Source Red Teaming Tool: PyRIT Automation Capability in Agentic Red Team Testing Environments

Open Until: 12/13/2025

This paper presents an open source red teaming tool for simulating adversarial attacks in modern systems. Designed for secu...

Using Zero Trust Against Identity Spoofing and Abuse

Open Until: 12/20/2025

The shift towards zero trust architectures brings in a heightened focus on the integrity of identity and identity attribute...

Using Zero Trust to Secure Enterprise Information in LLM Environments

Open Until: 12/20/2025

Guidance for safe enterprise enablement of AI/ML apps while protecting sensitive organizational information (IP, PII, etc.)...