What we're about

Welcome to the Cloud Security Alliance - Oklahoma Chapter. Chapter events are held at various locations throughout Oklahoma on a quarterly basis.

CLOUD 2020: CYBER SECURITY TRANSFORMATION & CONVERGENCE

****** The OKLAHOMA CSA CHAPTER IS A NEW CHAPTER ******

Chapter and Event Sponsorship Opportunities are available!

Chapter Chair: Peter Vogt | peter.vogt@csa-oklahoma.org | 512-745-1671

Chapter Co-Chairs: Ricky Dill, Ted Turich

Events Coordinator: Bryan Bundy

CLOUD 2020: CYBER SECURITY TRANSFORMATION & CONVERGENCE

- Hybrid Cloud Security Implications & Management Considerations

- Market Issues | Vendor Issues | Gartner Issues (Speed of Change)---too Late, already outdated!

- Security Eco-Systems (formation and importance of these systems)

- Security Eco-Systems (data convergence, visibility, analytics, IR/SOC implications)

- Speed, Automation, Aggregation, and Accuracy: Implications on Threat Management

- Threat Hunting | Vulnerability Management in the Hybrid Cloud

- Cloud IAM | Privilege Access Management (PAM)

- Disaster Recovery As A Service (DRaaS) | IT Resilience

- Application Security (SDLC) | WAF | Scanning (Testing) Automated/Manual

- IT/OT/IOT Convergence

The Cloud Security Alliance (Oklahoma Chapter) promotes best practices for secure cloud computing. Quarterly events will begin in 2020 and will be hosted at various locations throughout the city.

There are no fees to attend our events. Lunch and snacks are provided.

Chapter and Event Sponsorship Opportunities are available!

Peter Vogt | Chapter Chair | peter.vogt@csa-oklahoma.org | 512-745-1671

Ricky Dill | Chapter Co-Chair

Upcoming events (2)

ElevateIT: TOLA Technology Summit

Online event

ElevateIT: TOLA Technology Summit --- A virtual full-day event https://bit.ly/TTS20Reg Comp Code: EIPTTS20 The Texas, Oklahoma, Louisiana, Arkansas (TOLA) region is a hot bed of Disruptive Innovation within startups and established firms alike. From Finance to Health Care, Oil & Gas to Manufacturing, the TOLA area is where business gets done! We know that with ever changing markets and technologies, it is imperative that organizations can adapt with speed and skill. There must be a shift in IT strategies to ensure that the right steps are taken to empower global digital transformation. The 2nd Annual ElevateIT: DFW Technology Summit is now the ElevateIT: TOLA Technology Summit and will be hosted virtually on July 10th, 2020. The CSA TOLA Chapters (including our new CSA Alabama Chapter) are pleased to sponsor this annual ElevateIT event. Registration fee is waived for CSA members. Please see the ElevateIT Registration Link and Comp Code below for complimentary passes. We hope you will join us for a full day of Peer-to-Peer Networking, Educational Presentations by Industry Leaders, and 50+ vendors to evaluate. Be sure to attend and get entered to win one of the Three Grand Prize Visa Gift Cards totaling $5000! https://bit.ly/TTS20Reg Comp Code: EIPTTS20

TOLA CSA Fall Summit

Online event

TOLA CSA VIRTUAL FALL CONFERENCE Texas | Oklahoma | Louisiana | Arkansas | Alabama Continuous digital transformation, while creating customer value, is significantly increasing overall cyber risk. Cloud ecosystems are diverse, spanning across multiple vendors, applications and systems: The TOLA CSA Fall Conference (full-day event) will focus on the importance of sharing data across cybersecurity ecosystems in times of rapid global change. The event will include corporate CISOs from Texas, Oklahoma, Louisiana, Arkansas, and Alabama who will share how the Corona Virus and a burgeoning remote work force have impacted their brick-n-mortar & cybersecurity operations. Vendor sessions will address technology collaborations, integrations, data sharing, including breakout rooms for demos and Q&A. ADDITIONAL EVENT INFORMATION: We have reached a juncture in the security industry where it has never been more critical for cybersecurity products to work together as a system. With on-premise infrastructure fading away and the perimeter now gone, traditional out-of-the-box products often lack sufficient visibility and in many cases are simply rendered ineffective. While organizations continue to implement a layered security stack, how these security products connect to each other and how intelligence and context is shared (beyond the SIEM) is critically important to threat management. A fundamental problem we face as an industry is that most cybersecurity products are still unaware of each other, linked only by a human interface, or at best, limited data available through an API. These limitations slow down security teams, reduce efficiencies, and frequently result in administrative and analyst frustration---providing attackers with opportunities to exploit. There are 2,500 cybersecurity vendors today, almost double the number of a few years ago—and only a small portion work together in any sort of cohesive manner. Fortunately, more open architectures are evolving, enabling interconnected multi-vendor security solutions to share information and perform coordinated actions: Actionable data available through APIs are now enabling applications and systems to communicate and execute playbooks more effectively. As these components of the open security architecture share threat intelligence, they can deliver significantly broader visibility over the attack surface...enabling IT and security teams to understand (with better context), exactly what is going on in the deployment, enabling a more effective, coordinated response. An open ecosystem model aligns with recommendations from the U.S. Department of Homeland Security: “We must reach a point where the only barriers to collaboration across devices, people, and organizations are those we choose to impose by policy, not those that are imposed on us by technology.” Look for cybersecurity open ecosystems to provide broader and deeper visibility, integrated end-to-end threat detection, as well as automated response and analytics. Some of the core attributes should include: - Open architecture that enables security solutions from multiple vendors to work together and be managed across heterogeneous platforms in multiple regions - Vendor toolsets and security platforms that support cross functional collaboration across IT and security functions - Integration across security systems via open APIs, connectors, and automation tools and scripts - Greater visibility, enhanced compliance, and increased protection against advanced threats - Faster time to deployment of security solutions and reduced systems integration costs as a result of pre-validated solutions - Security automation critical to countering a global shortage of cybersecurity skills KEYNOTE SPEAKERS: To be announced VENDOR SPEAKERS: To be announced CHARITY: All-In-Challenge - Providing food to those in need

Photos (7)