Discussion Posts

  Thread Subject Replies Last Post Community Name Status
Working group call has started. Feel free to join! Passcode: 536522
0 18 hours ago by Marina Bregkou
Cloud Key Management
Hello from DFW
0 yesterday by Nicholas Grant
The Inner Circle
Reminder of tomorrow's working group call & Meeting Minutes March 13th.
0 yesterday by Marina Bregkou
Cloud Key Management
New working group call next week!
0 5 days ago by Marina Bregkou
Cloud Key Management
Data Security Working Group Meeting - 3/14/24
0 6 days ago by Alex Kaluza
Data Security
CISA FBI MS-ISAC UNDERSTANDING AND RESPONDING TO DISTRIBUTED DENIAL-OF-SERVICE ATTACKS
0 6 days ago by Michael Roza
Top Threats
CISA FBI MS-ISAC UNDERSTANDING AND RESPONDING TO DISTRIBUTED DENIAL-OF-SERVICE ATTACKS
0 6 days ago by Michael Roza
The Inner Circle
Kind reminder of tomorrow's working group call!
2 7 days ago by Damneet Basak
Original post by Marina Bregkou
Cloud Key Management
Meeting Minutes 12 March 2024, 27 February 2024 and 13th February 2024.
0 7 days ago by Marina Bregkou
Privacy Level Agreement
Untangling the Mysteries of Ze­ro Trust
0 8 days ago by Zied TURKI
Zero Trust
Greetings From Chicago!
0 9 days ago by Nahil Mahmood
The Inner Circle
Query : AI certificate from CSA?
0 9 days ago by Md Nasim Akhtar
Artificial Intelligence
Free API Security Workshop provided by apisecuniversity.com - April 23rd, 2024 from 4-5PM EST
0 9 days ago by Eric Lansbery CSA
Pittsburgh Chapter
FedRAMP Penetration Test Guidance
0 11 days ago by Michael Roza
Top Threats
FedRAMP Penetration Test Guidance
0 11 days ago by Michael Roza
The Inner Circle
ENISA Telecom Security Incidents 2022
0 11 days ago by Michael Roza
Top Threats
ENISA Telecom Security Incidents 2022
0 11 days ago by Michael Roza
The Inner Circle
CCAK Online Review Course - Discount Request
3 12 days ago by Manjunath A T
Original post by Orbert Reavis
Certificate of Cloud Auditing Knowledge (CCAK)
Reviewers Wanted: QSS Governance/Security Controls Project
1 12 days ago by John Jiang
Original post by Hillary Baron
Quantum-safe Security
NSA Manage Cloud Logs for Effective Threat Hunting
0 13 days ago by Michael Roza
Top Threats
NSA Manage Cloud Logs for Effective Threat Hunting
0 13 days ago by Michael Roza
The Inner Circle
CCSKv5 Peer Review: Domain 5
2 13 days ago by Judith Bagwell
Certificate of Cloud Security Knowledge (CCSK)
CCSK v.5 Chapter 5 Peer Review is Now Open
0 13 days ago by Olivia Rempe
The Inner Circle
Top Threats Meeting Minutes 2024-03-14
0 13 days ago by Vic Hargrave
Top Threats
NSA Enforce Secure Automated Deployment Practices through Infrastructure as Code
0 13 days ago by Michael Roza
DevSecOps
NSA Enforce Secure Automated Deployment Practices through Infrastructure as Code
0 13 days ago by Michael Roza
The Inner Circle
ENISA Remote ID Proofing - Good practices
0 14 days ago by Michael Roza
Top Threats
ENISA Remote ID Proofing - Good practices
0 14 days ago by Michael Roza
The Inner Circle
Enjoy Your CSA Pi
0 14 days ago by Olivia Rempe
The Inner Circle
CSA SFO Chapter monthly meet
0 14 days ago by Satish Govindappa
San Francisco Chapter
CCSKv5 Peer Review: Domain 5
0 14 days ago by Judith Bagwell
The Inner Circle
Working group call has started. Feel free to join!
0 14 days ago by Marina Bregkou
Cloud Key Management
NSA Uphold the Cloud Shared Responsibility Model
0 14 days ago by Michael Roza
Zero Trust
NSA Uphold the Cloud Shared Responsibility Model
0 14 days ago by Michael Roza
The Inner Circle
QSS Subgroup - Quantum Safe Security Governance will meet weekly on Fridays
5 15 days ago by John Jiang
Quantum-safe Security
Kind reminder of tomorrow's working group call!
0 15 days ago by Marina Bregkou
Cloud Key Management
Meeting Minutes - March 12
0 15 days ago by Hillary Baron
Quantum-safe Security
CISA Secure Cloud Business Applications: Hybrid Identity Solutions Guidance
0 15 days ago by Michael Roza
The Inner Circle
CISA Secure Cloud Business Applications: Hybrid Identity Solutions Guidance
0 15 days ago by Michael Roza
Zero Trust
Data Security Glossary
0 15 days ago by Doug McDorman
Data Security
CSA AI Summit at RSA Conference & CSA Meetup at RSA
1 16 days ago by Erik Johnson
Zero Trust
Attention: No Working Group Call on Tuesday 12th March!
0 16 days ago by Marina Bregkou
Privacy Level Agreement
zero trust paradox 67 16 days ago by boris taratine
Zero Trust
Removed
0 16 days ago by Hillary Baron
Quantum-safe Security
IEEE ZT Security Working Group
0 18 days ago by Ronald Martin
Zero Trust
ENX – CSA Partnership – Call for Experts (ENX is a European association in the automotive industry) 0 19 days ago by Lefteris Skoutaris
Cloud Controls Matrix
NSA CISA Use Secure Cloud Key Management Practices
0 20 days ago by Michael Roza
Cloud Key Management
NSA CISA Use Secure Cloud Key Management Practices
0 20 days ago by Michael Roza
The Inner Circle
NSA CISA Secure Data in the Cloud
0 20 days ago by Michael Roza
Zero Trust: Data
NSA CISA Secure Data in the Cloud
0 20 days ago by Michael Roza
The Inner Circle