Proactive communication, collaboration, and decisive action can turn a security breach into an opportunity for a stronger ...
Learn how the Cloud Shared Security Responsibility Model and the Cloud Controls Matrix work together in this summary of a ...
Gain expertise in Zero Trust with CSA’s Certificate of Competence in Zero Trust (CCZT). Elevate your security skills and advance your career. This October, join us in raising awareness about essential ...
With over 15 years of experience in research and technology, John excels at executive-level leadership, relationship management, and strategy development. He is a published author, technologist, and ...
CSA Research promotes cybersecurity best practices. In this interview, CEO Jason Garbis describes his work with CSA’s Zero ...
The AI Technology and Risk Committee is focused on staying abreast of the latest technological advancements in AI while simultaneously identifying, understanding, and forecasting associated risks, ...
This group aims to provide organizations with an up-to-date, expert-informed understanding of cloud security risks, threats and vulnerabilities in order to make educated risk-management decisions ...
An IEEE standard for local and metropolitan area networks–Port-Based Network Access Control. IEEE 802 LANs are deployed in networks that convey or provide access to critical data, that support mission ...
Please download and import the following iCalendar (.ics) files to your calendar system.