Cybersecurity audits of cloud systems have their own unique challenges. Get an overview of CSA’s audit training programs: the CCAK & STAR Lead Auditor Training.
Strong passwords reduce the risk of data breaches by making it harder for cybercriminals to guess or steal your credentials, a key defense in today's digital age.
An IEEE standard for local and metropolitan area networks–Port-Based Network Access Control. IEEE 802 LANs are deployed in networks that convey or provide access to critical data, that support mission ...
Gain expertise in Zero Trust with CSA’s Certificate of Competence in Zero Trust (CCZT). Elevate your security skills and advance your career. This October, join us in raising awareness about essential ...
AI-powered tools can simulate advanced cyber attacks and identify network, system, and software vulnerabilities before malicious actors can exploit them. They can help cover various attack scenarios, ...
CSA EMEA Congress 2019 TBD June 3, 2019 Download presentations CSA Colorado Chapter Forum 2019 TBD June 3, 2019 Download presentations CSA Summit at (ISC)² Security Congress 2019 TBD June 3, 2019 ...
Ashish Mehta has extensive experience in cybersecurity, blockchain, web development, IT management, financial markets, and the energy industry. He currently serves as Co-Chair of the Blockchain ...
Learn the core concepts, best practices and recommendation for securing an organization on the cloud regardless of the provider or platform. Covering all 14 domains from the CSA Security Guidance v4, ...
Microsoft’s Data Protection Requirements (DPR) has new mandates to address AI and includes references to ISO 42001 that suppliers may want to take advantage of.
CSA has identified a need for open standards and tooling that can enable the automation of compliance activities and a more ...
Are you a research volunteer? Request to have your profile displayed on the website here.