CSA Summit

  • Cloud Security Alliance (CSA) Summit

    When: Wednesday, October 4th (9:30am – 5:00pm)

    This year’s Cloud Security Alliance Summit welcomes world leading security experts and cloud providers to discuss global governance, the latest trends in technology, the threat landscape, security innovations, best practices and global governance in order to help organizations address the new frontiers in cloud security.

    The CSA Summit is free to attend for registered Infosecurity North America participants. With a limit of 250 Summit attendees, be sure to register sooner rather than later to secure your place. Earn CPE/CPD credits for participating!

    There are two simple ways to register for the Summit:

    Register to attend Infosecurity North America + the CSA summit

    Already registered for the event? Sign up for the CSA summit

    For more information about the Summit, visit the CSA website

  • What's on the agenda?

    1. Welcome Address
      Luciano Santos, Executive Vice President of Research, Cloud Security Alliance
    2. Top 7 Cloud Security Use Cases for CASB
    3. Security Expert Panel Discussion
    4. Oracle Session
    5. Zscaler Session
    6. Adobe Session
    7. Tenable Session
    8. Forcepoint Session
    9. CSA Research Panel Discussion
    10. Anatomy of an Attack
      John Amaral, Director of Engineering, Cisco

    Some of the topics we'll cover:

    As enterprises increasingly utilize SaaS like Office 365, Box, Salesforce, Slack, etc. and IaaS like AWS and Azure, protecting your corporate data in the cloud has become a top priority for both security and compliance teams. 

    We will discuss securely enable cloud capability and outline top high-impact cloud security use cases.

    Cyber criminals are increasingly exploiting Internet services to build agile and resilient infrastructures, and consequently to protect themselves from being exposed and stopped.

    We will look at recent attacks and explain how the correlation of Internet data on multiple levels (DNS, BGP, ASN, Prefixes/IPs) can be used to expose the attackers' infrastructure.

  • Register

    Don't miss out - secure your Keynote Pass for the modules of your choice.

    Register today

    What else is on?

    Find out what else will be happening at the show.

    See more

Media Partners

EC-Council Infosecurity Magazine ACSC Cyber Defense Magazine Cloud Security Alliance CyberTech EWF ISC2 EM360 ISMG TechTarget MassTech Security Solutions Watch The Register Crest Mass TLC Newsweek MIT

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.