Hear from Willy Fabritius, Global Head of Strategy at SGS. Discover the cybersecurity insights that Willy has learned ...
Explore how AI is shaping the future of cybersecurity on both ends: empowering defenders and assisting attackers. Also have a ...
The Alert Readiness Framework aligns with Gartner's augmented cybersecurity vision, enhancing resilience, streamlining tools, ...
Since 2012 Michael has contributed to over 100 CSA projects completed by CSA's Internet of Things, Zero Trust/Software-Defined Perimeter, Top Threats, Cloud Control Matrix, Containers/Microservices, ...
Learn about CISO Alex Getsin’s contributions to CSA Research, including the Top Threats series, and why he continues to stay ...
Strengthen Google Workspace security by moving beyond app-specific passwords, enforcing MFA, and transitioning to OAuth or ...
Jon-Michael C. Brook is a certified, 25-year practitioner of cybersecurity, cloud, and privacy. He is the principal contributor to certification sites for privacy and cloud security, and has published ...
Get an overview of the major challenges that the Common Vulnerabilities and Exposures (CVE) program faces in today’s ...
An IEEE standard for local and metropolitan area networks–Port-Based Network Access Control. IEEE 802 LANs are deployed in networks that convey or provide access to critical data, that support mission ...
With more than 25 years of information security experience, Shawn Harris is currently the Director of Information Security at Starbucks Coffee Company. His background includes engineering, ...
Ashish Mehta has extensive experience in cybersecurity, blockchain, web development, IT management, financial markets, and the energy industry. He currently serves as Co-Chair of the Blockchain ...
Along with releasing updated versions of the CCM and CAIQ, this working group provides addendums, control mappings and gap analysis between the CCM and other research releases, industry standards, and ...