Discover the top cybersecurity threats of 2025, from AI-driven attacks to quantum risks. Learn strategies to secure your business against evolving cyber risks.
An IEEE standard for local and metropolitan area networks–Port-Based Network Access Control. IEEE 802 LANs are deployed in networks that convey or provide access to critical data, that support mission ...
This working group aims to develop Zero Trust standards to achieve consistency for cloud, hybrid and mobile endpoint environments. The topic of group discourse include Zero Trust benefits, ...
Please download and import the following iCalendar (.ics) files to your calendar system.
Along with releasing updated versions of the CCM and CAIQ, this working group provides addendums, control mappings and gap analysis between the CCM and other research releases, industry standards, and ...
The CCSK certificate is highly regarded as the benchmark for cloud security expertise. It provides a comprehensive and unbiased understanding of how to effectively secure data in the cloud. Earning ...
The Cloud Security Alliance (CSA) has partnered with the EU Cloud Code of Conduct (EU Cloud CoC), a pioneer initiative setting market standards for robust data protection across the cloud sector.
CSA Working Groups are the go-to source for best practices, research and tools for providing security assurance and privacy in the cloud. CSA’s diverse membership of industry practitioners and ...
Since 2012, Michael Roza has been a pivotal member of the Cloud Security Alliance (CSA) family. He has contributed to over 125 projects, as a Lead Author or Author/Contributor and many more as a ...
For over 30 years, Jim Reavis has worked in cybersecurity industry as an entrepreneur, writer, speaker, technologist and business strategist. Jim’s innovative thinking about emerging trends have been ...
The CSA Cloud Controls Matrix (CCM) is a cybersecurity control framework for cloud computing. It is composed of 197 control objectives that are structured in 17 domains covering all key aspects of ...
This group has been merged with the CCM Working Group. Lack of security control transparency is a leading inhibitor to the adoption of cloud services. The CSA Consensus Assessments (CAIQ) working ...