The Cloud Security Alliance (CSA) is the world's leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment.
Eric Hart
President, CSA - Triangle Chapter
This CSA Triangle program assists veterans with IT and/or Cybersecurity backgrounds grow in their civilian careers.

CSA Research
Stan Mierzwa & David Ortiz discuss the NJ chapter's research paper on a very hot topic: Securing Critical Infrastructure. The highlight of the discussion is a deep dive into the Top 10 best practices for securing an industrial environment.
Shankar Chebrolu,
Vice President, CSA - Triangle Chapter
Shankar shows the mapping between these two frameworks and what that entails, as well as how this work implementation can help small and medium organizations that are azure cloud consumers.

Orca Security is the industry-leading agentless Cloud Security Platform for AWS, Azure, Google Cloud and Kubernetes that identifies, prioritizes, and remediates risks. Orca saves your time by connecting to your environment in minutes with patent-pending Sidescanning technology to provide complete coverage across vulnerabilities, malware and misconfigurations.
Ido Geffen
VP Product Management
Complete, automated coverage against all cloud risks, across all clouds. Agentless scanning reveals attack paths and CI/CD controls enable security to be embedded early in the dev process.
 

Trend Micro, a global cybersecurity leader, helps make the world safe for exchanging digital information. Fueled by decades of security expertise, global threat research, and continuous innovation, our cybersecurity platform protects 500,000+ organizations and 250+ million individuals across clouds, networks, devices, and endpoints.
Marc Tabago
Solutions Architect
In this phase, security often begins as an overlay to an existing cloud deployment and requires minimal configuration to simply "work."

Marc Tabago
Solutions Architect
Your migration process should address two key questions: How does security work in a hybrid environment? How can I ensure migration is both quick and secure?
Marc Tabago
Solutions Architect
In this phase, adhering to compliance standards and laying down base security guidelines enable accelerated cloud projects.

Marc Tabago
Solutions Architect
When developing cloud-native applications, security should be embedded in the applications to secure the variable usage and lifecycle of modern cloud systems.

JupiterOne is the first software cloud-native security platform built on a graph data model, to expose the complex relationships between your cyber assets. It enables you to create and manage your entire security process from policy creation, to compliance and certifications, to operating a secure cloud infrastructure while your company quickly grows and evolves.
Erkang Zheng
CEO & Founder, JupiterOne
Cloud-native security platform built on a graph data model, to expose the complex relationships between your cyber assets.

Erkang Zheng &
Tyler Shields
Cloud-native security platform built on a graph data model, to expose the complex relationships between your cyber assets.
Akash Ganapathi
Director Solutions, Architecture
Singularity Cloud Workload Security to simplify security of cloud VMs and containers, no matter their location.

George Tang
Solutions Architect
The concept of Zero Trust architectures for secure network access has been around for years but the last 18 months took the practice of Zero Trust to new levels.

Secure the Cloud with a unified cloud native security platform, automating security posture at scale, preventing advanced threats and giving you visibility and control over any workload across any cloud.
Idan Didi
Co-founder & COO, Check Point
Spectral is a lightning-fast, developer-first cybersecurity solution that acts as a control-plane over source code and other developer assets.

Abigael Levy
Technical Product Manager
Cloud native security, with advanced threat prevention for all assets and workloads – in your public, private, hybrid or multi-cloud environment.

Yonatan Philip
Product Manager
Cloud native security, with advanced threat prevention for all assets and workloads – in your public, private, hybrid or multi-cloud environment.