What we're about

Welcome to the Cloud Security Alliance - San Antonio Chapter. We are a developing chapter. Chapter events are held at various locations around San Antonio on a quarterly basis.

CLOUD 2020: CYBER SECURITY TRANSFORMATION & CONVERGENCE

- Hybrid Cloud Security Implications & Management Considerations

- Market Issues | Vendor Issues | Gartner Issues (Speed of Change)---too Late, already outdated!

- Security Eco-Systems (formation and importance of these systems)

- Security Eco-Systems (data convergence, visibility, analytics, IR/SOC implications)

- Speed, Automation, Aggregation, and Accuracy: Implications on Threat Management

- Threat Hunting | Vulnerability Management in the Hybrid Cloud

- Cloud IAM | Privilege Access Management (PAM)

- Disaster Recovery As A Service (DRaaS) | IT Resilience

- Application Security (SDLC) | WAF | Scanning (Testing) Automated/Manual

- IT/OT/IOT Convergence

If you are interested in speaking at one of our CSA events, please contact Peter Vogt, San Antonio Chapter Chair | pvogt@CSA-SanAntonio.org | 512-745-1671

Chapter Co-Chairs: Peter Vogt, George Sprague, Ted Turich

The Cloud Security Alliance (CSA) is a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing and to provide education on the uses of Cloud Computing to help secure all other forms of computing. The Cloud Security Alliance is led by a broad coalition of industry practitioners, corporations, associations and other key stakeholders.

Upcoming events (1)

TOLA CSA Fall Summit

Online event

TOLA CSA VIRTUAL FALL CONFERENCE Texas | Oklahoma | Louisiana | Arkansas | Alabama Continuous digital transformation, while creating customer value, is significantly increasing overall cyber risk. Cloud ecosystems are diverse, spanning across multiple vendors, applications and systems: The TOLA CSA Fall Conference (full-day event) will focus on the importance of sharing data across cybersecurity ecosystems in times of rapid global change. The event will include corporate CISOs from Texas, Oklahoma, Louisiana, Arkansas, and Alabama who will share how the Corona Virus has impacted their brick-n-mortar & cybersecurity operations. Vendor sessions will address technology collaborations, integrations, data sharing, including breakout rooms for demos and Q&A. ADDITIONAL EVENT INFORMATION: We have reached a juncture in the security industry where it has never been more critical for cybersecurity products to work together as a system. With on-premise infrastructure fading away and the perimeter now gone, traditional out-of-the-box products often lack sufficient visibility and in many cases are simply rendered ineffective. While organizations continue to implement a layered security stack, how these security products connect to each other and how intelligence and context is shared (beyond the SIEM) is critically important to threat management. A fundamental problem we face as an industry is that most cybersecurity products are still unaware of each other, linked only by a human interface, or at best, limited data available through an API. These limitations slow down security teams, reduce efficiencies, and frequently result in administrative and analyst frustration---providing attackers with opportunities to exploit. There are 2,500 cybersecurity vendors today, almost double the number of a few years ago—and only a small portion work together in any sort of cohesive manner. Fortunately, more open architectures are evolving, enabling interconnected multi-vendor security solutions to share information and perform coordinated actions: Actionable data available through APIs are now enabling applications and systems to communicate and execute playbooks more effectively. As these components of the open security architecture share threat intelligence, they can deliver significantly broader visibility over the attack surface...enabling IT and security teams to understand (with better context), exactly what is going on in the deployment, enabling a more effective, coordinated response. An open ecosystem model aligns with recommendations from the U.S. Department of Homeland Security: “We must reach a point where the only barriers to collaboration across devices, people, and organizations are those we choose to impose by policy, not those that are imposed on us by technology.” Look for cybersecurity open ecosystems to provide broader and deeper visibility, integrated end-to-end threat detection, as well as automated response and analytics. Some of the core attributes should include: - Open architecture that enables security solutions from multiple vendors to work together and be managed across heterogeneous platforms in multiple regions - Vendor toolsets and security platforms that support cross functional collaboration across IT and security functions - Integration across security systems via open APIs, connectors, and automation tools and scripts - Greater visibility, enhanced compliance, and increased protection against advanced threats - Faster time to deployment of security solutions and reduced systems integration costs as a result of pre-validated solutions - Security automation critical to countering a global shortage of cybersecurity skills KEYNOTE SPEAKERS: To be announced VENDOR SPEAKERS: To be announced CHARITY: All-In-Challenge - Providing food to those in need

Past events (1)

ElevateIT: TOLA Technology Summit

Online event

Photos (7)