Best practices, guidance, frameworks and tools to help the industry secure the cloud. Read our research to get your questions around cloud security answered.
Since 2012 Michael has contributed to over 100 CSA projects completed by CSA's Internet of Things, Zero Trust/Software-Defined Perimeter, Top Threats, Cloud Control Matrix, Containers/Microservices, ...
The purpose of this working group is to identify consensus definitions of what Security as a Service means, to categorize the different types of Security as a Service and to provide guidance to ...
The Enterprise Resource Planning (ERP) working group seeks to develop best practices to enable organizations that run their business on large ERP implementations, such as SAP or Oracle applications, ...
The goal of this group is to develop security guidance to encourage cloud providers, asset owners and device manufacturers towards adopting best practices to secure industrial control systems. We ...
Proactive communication, collaboration, and decisive action can turn a security breach into an opportunity for a stronger ...
Learn how the Cloud Shared Security Responsibility Model and the Cloud Controls Matrix work together in this summary of a ...
CSA Research promotes cybersecurity best practices. In this interview, CEO Jason Garbis describes his work with CSA’s Zero ...
Gain expertise in Zero Trust with CSA’s Certificate of Competence in Zero Trust (CCZT). Elevate your security skills and advance your career. This October, join us in raising awareness about essential ...
The AI Technology and Risk Committee is focused on staying abreast of the latest technological advancements in AI while simultaneously identifying, understanding, and forecasting associated risks, ...