What we're about

Welcome to the Cloud Security Alliance - Alabama Chapter. Chapter events are held at various locations throughout Alabama on a quarterly basis.


*Seeking interested individuals for board member positions who are willing to help lead the chapter.

Please contact Todd Edison | CSA Chapter Relations Manager | tedison@cloudsecurityalliance.org | 360-961-6755

- Hybrid Cloud Security Implications & Management Considerations

- Market Issues | Vendor Issues | Gartner Issues (Speed of Change)---too Late, already outdated!

- Security Eco-Systems (formation and importance of these systems)

- Security Eco-Systems (data convergence, visibility, analytics, IR/SOC implications)

- Speed, Automation, Aggregation, and Accuracy: Implications on Threat Management

- Threat Hunting | Vulnerability Management in the Hybrid Cloud

- Cloud IAM | Privilege Access Management (PAM)

- Disaster Recovery As A Service (DRaaS) | IT Resilience

- Application Security (SDLC) | WAF | Scanning (Testing) Automated/Manual

- IT/OT/IOT Convergence

The Cloud Security Alliance (CSA) today has more than 90,000 members and is led by its founding charter members, a broad coalition of industry practitioners, corporations, associations and other key stakeholders.


The Cloud Security Alliance (Alabama Chapter) promotes best practices for secure cloud computing. Quarterly events will begin in January and will be hosted at various locations throughout the city.

There are no fees to attend our events.

Our mission within the Alabama Chapter is to provide a forum for security and IT practitioners to network, share knowledge, and to advance cloud computing and cloud security methods within our profession.

Upcoming events (2)

CSA Chapter Summit

Online event

Calling all CSA chapter members! Join us on November 4th from 8am-12:30pm (PT) for the inaugural CSA Chapter Summit, a free virtual event. This summit will be a unique opportunity for chapter members to come together and network, while also learning about ways to engage with CSA global. During the event, CSA experts will share cloud security best practices, tools for auditing and compliance, the latest CSA research, and education and training opportunities.

Are you up for the challenge? We are excited to have Curated Entertainment provide a cyber trivia challenge and some great prizes during the inaugural CSA Chapter Summit on November 4th from 8am-12pm. Registration is FREE.

Register here: https://www.airmeet.com/e/ce39f820-26e3-11ec-8a73-cf5c6ed596d7

CSA Presentation: Leveraging the CAIQ and CCM

Online event

Join us November 18th at 11:30am Central Time to learn how the CAIQ and CCM can equip your organization with the tools necessary to properly assess potential cloud technologies using commonly accepted industry standards and documented security controls.

In 1997, Professor Ramnath Chellappa of Emory University coined the term, "Cloud." 5 years later, Amazon Web Services (AWS) launched its initial public cloud offering in 2002. By 2018, the global cloud computing market exceeded $270B; and recent events, like the COVID-19 pandemic, have served as accelerants for this cloud explosion with expectations to exceed $620B by 2023.

Along with this voracious appetite for cloud technologies, numerous security vulnerabilities have been exposed; and today, one of the most critical challenges for many organizations is understanding how to evaluate potential cloud service providers.

Since 2008, the Cloud Security Alliance (CSA) has defined standards, certifications, and best practices to help ensure secure cloud environments. The Consensus Assessments Initiative Questionnaire (CAIQ - pronounced "CAKE") is a CSA survey designed to give consumers and auditors the ability to assess the security capabilities and Cloud Controls Matrix (CCM) compliance of cloud service providers.

The CCM is a CSA cybersecurity control framework for cloud computing composed of more than 130 control objectives across 16 domains of cloud technology, such as:

Application and Interface Security
Audit Assurance and Compliance
Business Continuity Management and Operations Resilience
Change Control and Configuration Management
Data Security and Information Lifecycle Management
Datacenter Security
Encryption and Key Management
Governance and Risk Management
Human Resources
Identity and Access Management
Infrastructure and Virtualization Security
Interoperability and Portability
Mobile Security
Security Incident Management, E-Discovery, and Cloud Forensics
Supply Chain Management, Transparency and Accountability
Threat and Vulnerability Management

Past events (4)

Call for Leadership


Photos (13)