Discussion Posts

  Thread Subject Replies Last Post Community Name Status
Sensitive data spread across cloud and SaaS? This session is built for you.
0 2 days ago by Shalonda Willis
The Inner Circle
If you manage sensitive data across cloud or SaaS, this session is for you.
0 9 days ago by Shalonda Willis
The Inner Circle
Responsible AI Starts with Trust
0 29 days ago by Shalonda Willis
The Inner Circle
Non-Human Identity Foundation Level Training Course
0 one month ago by Lalit Choda
The Inner Circle
🚀 Build Trust in AI: Data Readiness for the Age of Large Language Models
0 one month ago by Shalonda Willis
The Inner Circle
How to delete client side cookie when server side session is terminated by agent or user?
1 one month ago by Gagan Mathur
Original post by Shailesh Kejadiwal
Identity and Access Management
How to handle enumeration attack with user authentication system (IAM)?
1 one month ago by Gagan Mathur
Original post by Shailesh Kejadiwal
Identity and Access Management
How leaders are staying ahead of AI risk & regulation
0 one month ago by Shalonda Willis
The Inner Circle
Key Mgmt WG Meeting Minutes, 17 October 2025
0 one month ago by Marina Bregkou
Cloud Key Management
Meet up
0 one month ago by Omar AL-Fayyadh
Chicago Chapter
🤖 Before You Trust AI, Trust Your Data
0 one month ago by Shalonda Willis
The Inner Circle
The Cloud Key Mgmt Working group Call has started. Feel free to join!
0 one month ago by Marina Bregkou
Cloud Key Management
Kind reminder of today's Key Mgmt call!
0 one month ago by Marina Bregkou
Cloud Key Management
Data discovery shouldn’t feel like guesswork — or busywork.
0 one month ago by Shalonda Willis
The Inner Circle
🚨 Ever feel like your data discovery tool finds everything except what matters?
0 one month ago by Shalonda Willis
The Inner Circle
Join our Public Slack Channel for the QSS Working Group
0 one month ago by Morning Ellergrace
Quantum-safe Security
Join BigID and leading voices in AI, data, and security for a real conversation on the risks shaping enterprise AI
0 one month ago by Shalonda Willis
The Inner Circle
The Cloud Key Mgmt Working group Call has started. Feel free to join!
0 2 months ago by Marina Bregkou
Cloud Key Management
AI Controls WG Last Meeting Minutes, 1st October 2025
0 2 months ago by Marina Bregkou
IoT Control Matrix Verification
Kind reminder of today's Key Mgmt call!
0 2 months ago by Marina Bregkou
Cloud Key Management
Think you’ve mastered data discovery? 🤔
0 2 months ago by Shalonda Willis
The Inner Circle
Top Local Business Listing Sites in the USA - Boost Your Online Visibility
0 2 months ago by Luna Watson
The Inner Circle
Think of this as your front-row pass to the biggest conversations in AI. 🔑
0 2 months ago by Shalonda Willis
The Inner Circle
Data Security Working Group Meetings Paused
1 2 months ago by V. Horvát
Original post by Hillary Baron
Data Security
Data Security Working Group Meetings Paused
0 2 months ago by Hillary Baron
Data Security
Rogue AI is Here—Is Your Organization Ready?
0 2 months ago by Shalonda Willis
The Inner Circle
🤖 Is Your AI Truly Secure? Learn How Top Leaders Are Protecting Theirs
0 2 months ago by Shalonda Willis
The Inner Circle
Task 4: AICM Auditing Guidelines call has started. Please feel free to join!
0 3 months ago by Marina Bregkou
IoT Control Matrix Verification
🚨 Just Announced: Keynote with Allie Mellen, Principal Analyst at Forrester! 🚨
0 3 months ago by Shalonda Willis
The Inner Circle
Passed CCSK in 2 Weeks
0 3 months ago by Baba Yaga
Certificate of Cloud Security Knowledge (CCSK)
🚨 The Stage for AI Security’s Boldest Ideas
0 3 months ago by Shalonda Willis
The Inner Circle
Data Security within AI Environments - Peer Review
3 3 months ago by Adeola Aderonmu
Original post by Alex Kaluza
The Inner Circle
Data Security within AI Environments - Peer Review
0 3 months ago by Alex Kaluza
Data Security
Recap: Workstream 9 - working session recap, August 6
0 3 months ago by Jason Garbis
Zero Trust
Top Threats Meeting Minutes 2025-07-31
0 4 months ago by Vic Hargrave
Top Threats
2 WG docs out for Public Peer Review
0 4 months ago by Marina Bregkou
Cloud Key Management
2 WG docs out for Public Peer Review
0 4 months ago by Marina Bregkou
IoT Control Matrix Verification
New: Runtime Integrity for eBPF Security
0 4 months ago by Jaime Gassmann
The Inner Circle
Inside DotCon: Exclusive Insights for the CSA Inner Circle
0 4 months ago by Shalonda Willis
The Inner Circle
Key Mgmt WG Meeting Minutes, 25 July 2025
0 4 months ago by Marina Bregkou
Cloud Key Management
Key Mgmt WG Meeting Minutes, 25 July 2025
0 4 months ago by Marina Bregkou
IoT Control Matrix Verification
Call To Action: GEN-SHIELD Core , By: JAMES A. BEX | Workflows for DevSecOps & STAR-CAR
1 4 months ago by Akshay Mittal
Original post by James Bex
DevSecOps
The Cloud Key Mgmt Working group Call has started. Feel free to join!
0 4 months ago by Marina Bregkou
IoT Control Matrix Verification
The Cloud Key Mgmt Working group Call has started. Feel free to join!
0 4 months ago by Marina Bregkou
Cloud Key Management
AI Controls WG Meeting Minutes, 23rd July 2025
0 4 months ago by Marina Bregkou
IoT Control Matrix Verification
Framework for Web3 and Stable coin
0 4 months ago by Madhavendra Mishra
The Inner Circle
The AI Controls Working Group Call has started. Feel free to join!
0 4 months ago by Marina Bregkou
IoT Control Matrix Verification
Peer Review : Applying ZT Principles with Network-Infrastructure Hiding Protocol - Stealth Mode for Network Infrastructure
2 4 months ago by J Trahan
Original post by Erik Johnson
Zero Trust
Don’t miss your chance to get 50% off CSA’s Zero Trust Certificate (CCZT)
0 4 months ago by Olivia Rempe
Certificate of Competence in Zero Trust (CCZT)
Don’t miss your chance to get 50% off CSA’s Zero Trust Certificate (CCZT)
0 4 months ago by Olivia Rempe
The Inner Circle