Public Communities

6 total

5G Security  

  last person joined 8 days ago

View Only

APAC Data Sovereignty  

  last person joined 21 days ago

View Only

Cloud Data Breach Investigation  

The Cloud Data Breach Investigation working group will undertake to develop an industry best-practice guidance on how an investigation of cloud data breaches should be conducted to ensure timely detection of data breaches; accurate identification of root cause(s) and timeline; proper handling of evidence for legal admissibility; and, reporting to management of affected organizations and regulators.

  last person joined 23 days ago

View Only


Businesses are now demanding a stronger collaboration between both development and operational teams and adding their relative security teams. This additional force that creates DevSecOps is transferable to the idea that prior to this implementation, DevOps skipped the security step which after deployment of applications created roadblocks once confronted with issues that arose with this specific exclusion. The true focus of DevSecOps is to create a transparent and full circle management life cycle that leverages all of the components of DevSecOps to ensure timely and full functioning application deployment that include proper security steps through every process rather than at the end.

  last person joined yesterday

View Only

Global Security Database (GSD)  

Global Security Database (GSD) Working Group and discussion

  last person joined 7 days ago

View Only

Security as a Service  

In today's world of so many SecaaS offerings, CSA's SecaaS working group strives to establish general categories of security services, and provides guidance on what should be expected as a standard set of functionalities in any given category.
This working group is in the process of being revitalized, and co-chairs are currently being determined. Once leadership is confirmed, charter revision and forecasting deliverables will begin.

  last person joined 3 days ago

View Only