Road to CSA AI Summit at RSAC
Presented by Road to CSA AI Summit at RSAC

Road to CSA AI Summit at RSAC

8 episodes
The Road to CSA AI Summit at RSAC is a free webinar series that delivers the latest tools and guidance for the most critical topics in cloud computing today.
Driven by CSA’s Research working groups, this thought leadership webinar series is designed to help organizations address today’s cloud security priorities,
one crucial topic at a time. Throughout the month of April 2024, CSA Research is featuring renowned cybersecurity experts to deliver provocative we

All episodes

Date
How CISOs can Leverage AI: A Fireside Conversation with Vanta and CSA

How CISOs can Leverage AI: A Fireside Conversation with Vanta and CSA

Jadee Hanson, CISO, Vanta, and Daniele Catteddu, CTO, Cloud Security Alliance

Over the past year, the proliferation of AI technologies has introduced new challenges and risks for CISOs to contend with. From creating new ways for data
to be accessed to reshaping the threat landscape with deepfakes and automated malware, AI has added more complexity and more pressure to exist

On-demand

5 Ways Cybersecurity Leaders can leverage GenAI

5 Ways Cybersecurity Leaders can leverage GenAI

Tim Chase, Lacework, Field CISO and Caleb Sima, Chair for AI Safety Initiative, CSA

In an era where cyber threats are increasingly sophisticated and pervasive, how can resource strapped teams stay ahead? This webinar explores how
GenAI can support cybersecurity teams by enabling rapid security investigations, anomaly detection, and faster insight generation. Tim Chase, Field C

On-demand

Fighting Fire with Fire - Leveraging AI in Cybersecurity

Fighting Fire with Fire - Leveraging AI in Cybersecurity

Nayeem Islam, VP Product Management, Qualys and Caleb Sima, Chair for AI Safety Initiative, Cloud Security Alliance

Conventional defense mechanisms often fall short with adversaries employing advanced AI methodologies to target cloud assets. This session delves into the
use of cutting-edge AI strategies to counter these evolving threats, offering insights into how AI helps defend against sophisticated attacks.

On-demand

Unleashing Crypto-agility: A Blueprint for Post-Quantum Cryptography

Unleashing Crypto-agility: A Blueprint for Post-Quantum Cryptography

Avesta Hojjati, VP of Research and Development, DigiCert & Denis Mandich, CTO, Qrypt

In the ever-evolving landscape of digital transformation, organizations are facing unprecedented challenges in securing and scaling their cryptographic
infrastructure. The need for crypto agility has never been more critical as companies grapple with risks posed by advanced technologies such as AI, e

On-demand

Securing Developers By Closing Credential Security Gaps

Securing Developers By Closing Credential Security Gaps

Josh Kirkwood, CyberArk and Kurt Seifried, Cloud Security Alliance

The age of AI is shining a light on the most vulnerable identities within organizations. At the top of this list: developers. They're one of the most valuable
assets for digital enterprises. Attackers know this. Initial access to a developer's credentials, an organization's repository, or secrets management lea

On-demand

Challenges From Within and Without: Trends in Cloud Attack & Defense

Challenges From Within and Without: Trends in Cloud Attack & Defense

Chris Hosking, Cloud Security Evangelist, SentinelOne & John Yeoh, Global VP of Research, CSA

While threat actors are pivoting to target cloud environments and cloud breaches on the rise, the trends and potential lessons to learn are still difficult to find
and decipher. This session is dedicated to bringing some clarity to the nature of external cloud threats, and the most pressing people, process and tec

On-demand

De-risking AI: Risk Management Essentials

De-risking AI: Risk Management Essentials

Mandy Pote, Managing Principal of Strategy, Privacy, Risk, Coalfire & John DiMaria, Director of Operations Excellence, CSA

Artificial Intelligence (AI) has moved beyond hype and unrealistic expectations. Organizations are increasingly embracing AI yet its adoption is both promising
and perilous. To harness its potential while mitigating risks, organizations must cultivate a forward-looking AI risk management strategy. In this sessi

On-demand

Breaking the Identity Perimeter: An Attacker’s Perspective

Breaking the Identity Perimeter: An Attacker’s Perspective

Roey Rozi, Director of Solution Architecture at Oasis Security and John Yeoh, Global VP of Research, CSA

The transition to cloud computing has diminished the effectiveness of traditional network security perimeters, rendering identity as the final line of defense
against attackers. While enterprises have allocated substantial budgets to identity programs and have made significant progress in safeguarding hum

On-demand