|
Working group call has started. Feel free to join! Passcode: 536522
|
0
|
18 hours ago
by
Marina Bregkou
|
Cloud Key Management
|
|
|
Hello from DFW
|
0
|
yesterday
by
Nicholas Grant
|
The Inner Circle
|
|
|
Reminder of tomorrow's working group call & Meeting Minutes March 13th.
|
0
|
yesterday
by
Marina Bregkou
|
Cloud Key Management
|
|
|
New working group call next week!
|
0
|
5 days ago
by
Marina Bregkou
|
Cloud Key Management
|
|
|
Data Security Working Group Meeting - 3/14/24
|
0
|
6 days ago
by
Alex Kaluza
|
Data Security
|
|
|
CISA FBI MS-ISAC UNDERSTANDING AND RESPONDING TO DISTRIBUTED DENIAL-OF-SERVICE ATTACKS
|
0
|
6 days ago
by
Michael Roza
|
Top Threats
|
|
|
CISA FBI MS-ISAC UNDERSTANDING AND RESPONDING TO DISTRIBUTED DENIAL-OF-SERVICE ATTACKS
|
0
|
6 days ago
by
Michael Roza
|
The Inner Circle
|
|
|
Kind reminder of tomorrow's working group call!
|
2
|
7 days ago
by
Damneet Basak
Original post by
Marina Bregkou
|
Cloud Key Management
|
|
|
Meeting Minutes 12 March 2024, 27 February 2024 and 13th February 2024.
|
0
|
7 days ago
by
Marina Bregkou
|
Privacy Level Agreement
|
|
|
Untangling the Mysteries of Zero Trust
|
0
|
8 days ago
by
Zied TURKI
|
Zero Trust
|
|
|
Greetings From Chicago!
|
0
|
9 days ago
by
Nahil Mahmood
|
The Inner Circle
|
|
|
Query : AI certificate from CSA?
|
0
|
9 days ago
by
Md Nasim Akhtar
|
Artificial Intelligence
|
|
|
Free API Security Workshop provided by apisecuniversity.com - April 23rd, 2024 from 4-5PM EST
|
0
|
9 days ago
by
Eric Lansbery CSA
|
Pittsburgh Chapter
|
|
|
FedRAMP Penetration Test Guidance
|
0
|
11 days ago
by
Michael Roza
|
Top Threats
|
|
|
FedRAMP Penetration Test Guidance
|
0
|
11 days ago
by
Michael Roza
|
The Inner Circle
|
|
|
ENISA Telecom Security Incidents 2022
|
0
|
11 days ago
by
Michael Roza
|
Top Threats
|
|
|
ENISA Telecom Security Incidents 2022
|
0
|
11 days ago
by
Michael Roza
|
The Inner Circle
|
|
|
CCAK Online Review Course - Discount Request
|
3
|
12 days ago
by
Manjunath A T
Original post by
Orbert Reavis
|
Certificate of Cloud Auditing Knowledge (CCAK)
|
|
|
Reviewers Wanted: QSS Governance/Security Controls Project
|
1
|
12 days ago
by
John Jiang
Original post by
Hillary Baron
|
Quantum-safe Security
|
|
|
NSA Manage Cloud Logs for Effective Threat Hunting
|
0
|
13 days ago
by
Michael Roza
|
Top Threats
|
|
|
NSA Manage Cloud Logs for Effective Threat Hunting
|
0
|
13 days ago
by
Michael Roza
|
The Inner Circle
|
|
|
CCSKv5 Peer Review: Domain 5
|
2
|
13 days ago
by
Judith Bagwell
|
Certificate of Cloud Security Knowledge (CCSK)
|
|
|
CCSK v.5 Chapter 5 Peer Review is Now Open
|
0
|
13 days ago
by
Olivia Rempe
|
The Inner Circle
|
|
|
Top Threats Meeting Minutes 2024-03-14
|
0
|
13 days ago
by
Vic Hargrave
|
Top Threats
|
|
|
NSA Enforce Secure Automated Deployment Practices through Infrastructure as Code
|
0
|
13 days ago
by
Michael Roza
|
DevSecOps
|
|
|
NSA Enforce Secure Automated Deployment Practices through Infrastructure as Code
|
0
|
13 days ago
by
Michael Roza
|
The Inner Circle
|
|
|
ENISA Remote ID Proofing - Good practices
|
0
|
14 days ago
by
Michael Roza
|
Top Threats
|
|
|
ENISA Remote ID Proofing - Good practices
|
0
|
14 days ago
by
Michael Roza
|
The Inner Circle
|
|
|
Enjoy Your CSA Pi
|
0
|
14 days ago
by
Olivia Rempe
|
The Inner Circle
|
|
|
CSA SFO Chapter monthly meet
|
0
|
14 days ago
by
Satish Govindappa
|
San Francisco Chapter
|
|
|
CCSKv5 Peer Review: Domain 5
|
0
|
14 days ago
by
Judith Bagwell
|
The Inner Circle
|
|
|
Working group call has started. Feel free to join!
|
0
|
14 days ago
by
Marina Bregkou
|
Cloud Key Management
|
|
|
NSA Uphold the Cloud Shared Responsibility Model
|
0
|
14 days ago
by
Michael Roza
|
Zero Trust
|
|
|
NSA Uphold the Cloud Shared Responsibility Model
|
0
|
14 days ago
by
Michael Roza
|
The Inner Circle
|
|
|
QSS Subgroup - Quantum Safe Security Governance will meet weekly on Fridays
|
5
|
15 days ago
by
John Jiang
|
Quantum-safe Security
|
|
|
Kind reminder of tomorrow's working group call!
|
0
|
15 days ago
by
Marina Bregkou
|
Cloud Key Management
|
|
|
Meeting Minutes - March 12
|
0
|
15 days ago
by
Hillary Baron
|
Quantum-safe Security
|
|
|
CISA Secure Cloud Business Applications: Hybrid Identity Solutions Guidance
|
0
|
15 days ago
by
Michael Roza
|
The Inner Circle
|
|
|
CISA Secure Cloud Business Applications: Hybrid Identity Solutions Guidance
|
0
|
15 days ago
by
Michael Roza
|
Zero Trust
|
|
|
Data Security Glossary
|
0
|
15 days ago
by
Doug McDorman
|
Data Security
|
|
|
CSA AI Summit at RSA Conference & CSA Meetup at RSA
|
1
|
16 days ago
by
Erik Johnson
|
Zero Trust
|
|
|
Attention: No Working Group Call on Tuesday 12th March!
|
0
|
16 days ago
by
Marina Bregkou
|
Privacy Level Agreement
|
|
|
zero trust paradox
|
67
|
16 days ago
by
boris taratine
|
Zero Trust
|
|
|
Removed
|
0
|
16 days ago
by
Hillary Baron
|
Quantum-safe Security
|
|
|
IEEE ZT Security Working Group
|
0
|
18 days ago
by
Ronald Martin
|
Zero Trust
|
|
|
ENX – CSA Partnership – Call for Experts (ENX is a European association in the automotive industry)
|
0
|
19 days ago
by
Lefteris Skoutaris
|
Cloud Controls Matrix
|
|
|
NSA CISA Use Secure Cloud Key Management Practices
|
0
|
20 days ago
by
Michael Roza
|
Cloud Key Management
|
|
|
NSA CISA Use Secure Cloud Key Management Practices
|
0
|
20 days ago
by
Michael Roza
|
The Inner Circle
|
|
|
NSA CISA Secure Data in the Cloud
|
0
|
20 days ago
by
Michael Roza
|
Zero Trust: Data
|
|
|
NSA CISA Secure Data in the Cloud
|
0
|
20 days ago
by
Michael Roza
|
The Inner Circle
|
|