What we're about

Welcome to the Cloud Security Alliance - Louisiana Chapter. Chapter events are held at various locations throughout Louisiana on a quarterly basis.

CLOUD 2020: CYBER SECURITY TRANSFORMATION & CONVERGENCE

- Hybrid Cloud Security Implications & Management Considerations

- Market Issues | Vendor Issues | Gartner Issues (Speed of Change)---too Late, already outdated!

- Security Eco-Systems (formation and importance of these systems)

- Security Eco-Systems (data convergence, visibility, analytics, IR/SOC implications)

- Speed, Automation, Aggregation, and Accuracy: Implications on Threat Management

- Threat Hunting | Vulnerability Management in the Hybrid Cloud

- Cloud IAM | Privilege Access Management (PAM)

- Disaster Recovery As A Service (DRaaS) | IT Resilience

- Application Security (SDLC) | WAF | Scanning (Testing) Automated/Manual

- IT/OT/IOT Convergence

Chapter Chairs - Peter Vogt | Josh Tannehill | Kenneth Boe, CIO (LSU Health Sciences)

PLEASE JOIN US:

The Cloud Security Alliance Louisiana Chapter promotes best practices for secure Cloud Computing. The Louisiana Chapter is an active chapter hosting quarterly events in the New Orleans area at various locations.

The Cloud Security Alliance (CSA) is a not-for-profit organization of more than 90,000 members led by a broad coalition of industry practitioners, corporations, associations and other key stakeholders.

Our mission within the Louisiana Chapter is to act as a bridge across the state for security and IT practitioners to network, share knowledge, and to advance cloud computing and cloud security methods within our profession. The Louisiana Chapter provides education on the uses of Cloud Computing to help secure all other forms of computing. We invite you to join the Louisiana Chapter of the Cloud Security Alliance.

All quarterly chapter events will be posted on this meetup site.

MEMBERSHIP IS FREE

For additional information, please contact Peter Vogt:

pvogt@CSA-Louisiana.org

504.315.5075

Chapter and Event Sponsorship Opportunities are available!

Peter Vogt | Louisiana Chapter Chair

===================================================================

The Cloud Security Alliance (CSA) today has more than 90,000 members and is led by its founding charter members, a broad coalition of industry practitioners, corporations, associations and other key stakeholders.

Our mission within the Louisiana Chapter is to provide a forum for security and IT practitioners to network, share knowledge, and to advance cloud computing and cloud security methods within our profession.

Peter Vogt | Chapter Chair

Upcoming events (1)

TOLA CSA Fall Summit

Online event

TOLA CSA VIRTUAL FALL CONFERENCE Texas | Oklahoma | Louisiana | Arkansas | Alabama Continuous digital transformation, while creating customer value, is significantly increasing overall cyber risk. Cloud ecosystems are diverse, spanning across multiple vendors, applications and systems: The TOLA CSA Fall Conference (full-day event) will focus on the importance of sharing data across cybersecurity ecosystems in times of rapid global change. The event will include corporate CISOs from Texas, Oklahoma, Louisiana, Arkansas, and Alabama who will share how the Corona Virus has impacted their brick-n-mortar & cybersecurity operations. Vendor sessions will address technology collaborations, integrations, data sharing, including breakout rooms for demos and Q&A. ADDITIONAL EVENT INFORMATION: We have reached a juncture in the security industry where it has never been more critical for cybersecurity products to work together as a system. With on-premise infrastructure fading away and the perimeter now gone, traditional out-of-the-box products often lack sufficient visibility and in many cases are simply rendered ineffective. While organizations continue to implement a layered security stack, how these security products connect to each other and how intelligence and context is shared (beyond the SIEM) is critically important to threat management. A fundamental problem we face as an industry is that most cybersecurity products are still unaware of each other, linked only by a human interface, or at best, limited data available through an API. These limitations slow down security teams, reduce efficiencies, and frequently result in administrative and analyst frustration---providing attackers with opportunities to exploit. There are 2,500 cybersecurity vendors today, almost double the number of a few years ago—and only a small portion work together in any sort of cohesive manner. Fortunately, more open architectures are evolving, enabling interconnected multi-vendor security solutions to share information and perform coordinated actions: Actionable data available through APIs are now enabling applications and systems to communicate and execute playbooks more effectively. As these components of the open security architecture share threat intelligence, they can deliver significantly broader visibility over the attack surface...enabling IT and security teams to understand (with better context), exactly what is going on in the deployment, enabling a more effective, coordinated response. An open ecosystem model aligns with recommendations from the U.S. Department of Homeland Security: “We must reach a point where the only barriers to collaboration across devices, people, and organizations are those we choose to impose by policy, not those that are imposed on us by technology.” Look for cybersecurity open ecosystems to provide broader and deeper visibility, integrated end-to-end threat detection, as well as automated response and analytics. Some of the core attributes should include: - Open architecture that enables security solutions from multiple vendors to work together and be managed across heterogeneous platforms in multiple regions - Vendor toolsets and security platforms that support cross functional collaboration across IT and security functions - Integration across security systems via open APIs, connectors, and automation tools and scripts - Greater visibility, enhanced compliance, and increased protection against advanced threats - Faster time to deployment of security solutions and reduced systems integration costs as a result of pre-validated solutions - Security automation critical to countering a global shortage of cybersecurity skills KEYNOTE SPEAKERS: To be announced VENDOR SPEAKERS: To be announced CHARITY: All-In-Challenge - Providing food to those in need

Past events (7)

ElevateIT: TOLA Technology Summit

Online event

Photos (12)