Submit Search
Upload
Why CSA Australia
•
1 like
•
365 views
CloudSecurityAllianceAustralia
Follow
Cloud Security Alliance
Read less
Read more
Technology
Business
Report
Share
Report
Share
1 of 23
Download now
Download to read offline
Recommended
Global Mandate to Secure Cloud Computing
Global Mandate to Secure Cloud Computing
CloudSecurityAllianceAustralia
CSA Standards Development Summary
CSA Standards Development Summary
CloudSecurityAllianceAustralia
CSA Introduction 2013 David Ross
CSA Introduction 2013 David Ross
Graeme Wood
Cybersecurity frameworks globally and saudi arabia
Cybersecurity frameworks globally and saudi arabia
Faysal Ghauri
Rohan s w2 - top 5 tools that help in monitoring compliance for pci dss and...
Rohan s w2 - top 5 tools that help in monitoring compliance for pci dss and...
Rohan Singh
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
Maganathin Veeraragaloo
CSA Security Guidance Cloud Computing v3.0
CSA Security Guidance Cloud Computing v3.0
CloudSecurityAllianceAustralia
Secure your cloud applications by building solid foundations with enterprise ...
Secure your cloud applications by building solid foundations with enterprise ...
Vladimir Jirasek
Recommended
Global Mandate to Secure Cloud Computing
Global Mandate to Secure Cloud Computing
CloudSecurityAllianceAustralia
CSA Standards Development Summary
CSA Standards Development Summary
CloudSecurityAllianceAustralia
CSA Introduction 2013 David Ross
CSA Introduction 2013 David Ross
Graeme Wood
Cybersecurity frameworks globally and saudi arabia
Cybersecurity frameworks globally and saudi arabia
Faysal Ghauri
Rohan s w2 - top 5 tools that help in monitoring compliance for pci dss and...
Rohan s w2 - top 5 tools that help in monitoring compliance for pci dss and...
Rohan Singh
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
Maganathin Veeraragaloo
CSA Security Guidance Cloud Computing v3.0
CSA Security Guidance Cloud Computing v3.0
CloudSecurityAllianceAustralia
Secure your cloud applications by building solid foundations with enterprise ...
Secure your cloud applications by building solid foundations with enterprise ...
Vladimir Jirasek
Cloud Security Governance
Cloud Security Governance
Shankar Subramaniyan
Securing Servers in Public and Hybrid Clouds
Securing Servers in Public and Hybrid Clouds
RightScale
Webroot - self-defending IoT devices & gateways
Webroot - self-defending IoT devices & gateways
IISPEastMids
Service Organizational Control (SOC 2) Compliance - Kloudlearn
Service Organizational Control (SOC 2) Compliance - Kloudlearn
KloudLearn
NIST Cybersecurity Framework (CSF) on the Public Cloud
NIST Cybersecurity Framework (CSF) on the Public Cloud
CloudHesive
4.5.cloud security
4.5.cloud security
DrRajapraveenkN
Implementing zero trust architecture in azure hybrid cloud
Implementing zero trust architecture in azure hybrid cloud
Ajit Bhingarkar
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
Netskope
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...
Amazon Web Services
63 Requirements for CASB
63 Requirements for CASB
Kyle Watson
How SASE can help you move securely from the PSN with VMware and Breeze Networks
How SASE can help you move securely from the PSN with VMware and Breeze Networks
Articulate Marketing
Cloud Security Guide - Ref Architecture and Gov. Model
Cloud Security Guide - Ref Architecture and Gov. Model
Vishal Sharma
CSA & GRC Stack
CSA & GRC Stack
CloudSecurityAllianceAustralia
Building a Security Architecture
Building a Security Architecture
Cisco Canada
Workshop on CASB Part 2
Workshop on CASB Part 2
Priyanka Aash
CASB — Your new best friend for safe cloud adoption?
CASB — Your new best friend for safe cloud adoption?
Digital Transformation EXPO Event Series
Cloud Security Demystified
Cloud Security Demystified
Michael Torres
Best practices for automating cloud security processes with Evident.io and AWS
Best practices for automating cloud security processes with Evident.io and AWS
Amazon Web Services
Securing Sensitive Data in Your Hybrid Cloud
Securing Sensitive Data in Your Hybrid Cloud
RightScale
Cloud summit demystifying cloud security
Cloud summit demystifying cloud security
David De Vos
Introduction to CSA Australia 2013 by David Ross
Introduction to CSA Australia 2013 by David Ross
CloudSecurityAllianceAustralia
Generosity
Generosity
Roberto Vallejo
More Related Content
What's hot
Cloud Security Governance
Cloud Security Governance
Shankar Subramaniyan
Securing Servers in Public and Hybrid Clouds
Securing Servers in Public and Hybrid Clouds
RightScale
Webroot - self-defending IoT devices & gateways
Webroot - self-defending IoT devices & gateways
IISPEastMids
Service Organizational Control (SOC 2) Compliance - Kloudlearn
Service Organizational Control (SOC 2) Compliance - Kloudlearn
KloudLearn
NIST Cybersecurity Framework (CSF) on the Public Cloud
NIST Cybersecurity Framework (CSF) on the Public Cloud
CloudHesive
4.5.cloud security
4.5.cloud security
DrRajapraveenkN
Implementing zero trust architecture in azure hybrid cloud
Implementing zero trust architecture in azure hybrid cloud
Ajit Bhingarkar
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
Netskope
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...
Amazon Web Services
63 Requirements for CASB
63 Requirements for CASB
Kyle Watson
How SASE can help you move securely from the PSN with VMware and Breeze Networks
How SASE can help you move securely from the PSN with VMware and Breeze Networks
Articulate Marketing
Cloud Security Guide - Ref Architecture and Gov. Model
Cloud Security Guide - Ref Architecture and Gov. Model
Vishal Sharma
CSA & GRC Stack
CSA & GRC Stack
CloudSecurityAllianceAustralia
Building a Security Architecture
Building a Security Architecture
Cisco Canada
Workshop on CASB Part 2
Workshop on CASB Part 2
Priyanka Aash
CASB — Your new best friend for safe cloud adoption?
CASB — Your new best friend for safe cloud adoption?
Digital Transformation EXPO Event Series
Cloud Security Demystified
Cloud Security Demystified
Michael Torres
Best practices for automating cloud security processes with Evident.io and AWS
Best practices for automating cloud security processes with Evident.io and AWS
Amazon Web Services
Securing Sensitive Data in Your Hybrid Cloud
Securing Sensitive Data in Your Hybrid Cloud
RightScale
Cloud summit demystifying cloud security
Cloud summit demystifying cloud security
David De Vos
What's hot
(20)
Cloud Security Governance
Cloud Security Governance
Securing Servers in Public and Hybrid Clouds
Securing Servers in Public and Hybrid Clouds
Webroot - self-defending IoT devices & gateways
Webroot - self-defending IoT devices & gateways
Service Organizational Control (SOC 2) Compliance - Kloudlearn
Service Organizational Control (SOC 2) Compliance - Kloudlearn
NIST Cybersecurity Framework (CSF) on the Public Cloud
NIST Cybersecurity Framework (CSF) on the Public Cloud
4.5.cloud security
4.5.cloud security
Implementing zero trust architecture in azure hybrid cloud
Implementing zero trust architecture in azure hybrid cloud
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...
63 Requirements for CASB
63 Requirements for CASB
How SASE can help you move securely from the PSN with VMware and Breeze Networks
How SASE can help you move securely from the PSN with VMware and Breeze Networks
Cloud Security Guide - Ref Architecture and Gov. Model
Cloud Security Guide - Ref Architecture and Gov. Model
CSA & GRC Stack
CSA & GRC Stack
Building a Security Architecture
Building a Security Architecture
Workshop on CASB Part 2
Workshop on CASB Part 2
CASB — Your new best friend for safe cloud adoption?
CASB — Your new best friend for safe cloud adoption?
Cloud Security Demystified
Cloud Security Demystified
Best practices for automating cloud security processes with Evident.io and AWS
Best practices for automating cloud security processes with Evident.io and AWS
Securing Sensitive Data in Your Hybrid Cloud
Securing Sensitive Data in Your Hybrid Cloud
Cloud summit demystifying cloud security
Cloud summit demystifying cloud security
Viewers also liked
Introduction to CSA Australia 2013 by David Ross
Introduction to CSA Australia 2013 by David Ross
CloudSecurityAllianceAustralia
Generosity
Generosity
Roberto Vallejo
Problems of poverty01
Problems of poverty01
Anjana P.V.Nair
Nitin resume final
Nitin resume final
Nitin Sati
Poverty and Food Security
Poverty and Food Security
Anjana P.V.Nair
Liberalisation , privataisation and globalisation
Liberalisation , privataisation and globalisation
Anjana P.V.Nair
Our changing earth
Our changing earth
Anjana P.V.Nair
Government budget and the economy
Government budget and the economy
Anjana P.V.Nair
Viewers also liked
(8)
Introduction to CSA Australia 2013 by David Ross
Introduction to CSA Australia 2013 by David Ross
Generosity
Generosity
Problems of poverty01
Problems of poverty01
Nitin resume final
Nitin resume final
Poverty and Food Security
Poverty and Food Security
Liberalisation , privataisation and globalisation
Liberalisation , privataisation and globalisation
Our changing earth
Our changing earth
Government budget and the economy
Government budget and the economy
Similar to Why CSA Australia
Global Efforts to Secure Cloud Computing
Global Efforts to Secure Cloud Computing
InnoTech
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
Phil Agcaoili
C-Level tools for Cloud strategy decisions
C-Level tools for Cloud strategy decisions
Cloud Security Alliance, UK chapter
C-Level tools for Cloud security
C-Level tools for Cloud security
Vladimir Jirasek
Cloud security with Sage Construction Anywhere
Cloud security with Sage Construction Anywhere
Sage Construction and Real Estate
Neville Fuller
Neville Fuller
Neville1964
CIF Pro member Oct16 Final
CIF Pro member Oct16 Final
Jason Wyatt
Scot-Cloud 2015
Scot-Cloud 2015
Ray Bugg
CSA STAR Webinar (FINAL).pdf
CSA STAR Webinar (FINAL).pdf
AmyPoblete3
Hogan Kusnadi - Cloud Computing Secutity
Hogan Kusnadi - Cloud Computing Secutity
Indonesia Honeynet Chapter
2014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v01
promediakw
Csa summit argentina-reavis
Csa summit argentina-reavis
CSA Argentina
PaaS in the Real World
PaaS in the Real World
Angie Hirata
3245224.ppt
3245224.ppt
ahmad21315
Business Solutions Seminar Series
Business Solutions Seminar Series
William Ho (何添福)
Zero trust strategy: cloud security by design
Zero trust strategy: cloud security by design
accenture
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019
Amazon Web Services
Unlocking Generative AI for Accelerated Content Velocity Today - Asya Ivanova...
Unlocking Generative AI for Accelerated Content Velocity Today - Asya Ivanova...
DigiMarCon - Digital Marketing, Media and Advertising Conferences & Exhibitions
Security: Enabling the Journey to the Cloud
Security: Enabling the Journey to the Cloud
Capgemini
AWS Summit Sydney 2014 | Building Tomorrow’s Digital Enterprise Leveraging SM...
AWS Summit Sydney 2014 | Building Tomorrow’s Digital Enterprise Leveraging SM...
Amazon Web Services
Similar to Why CSA Australia
(20)
Global Efforts to Secure Cloud Computing
Global Efforts to Secure Cloud Computing
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
C-Level tools for Cloud strategy decisions
C-Level tools for Cloud strategy decisions
C-Level tools for Cloud security
C-Level tools for Cloud security
Cloud security with Sage Construction Anywhere
Cloud security with Sage Construction Anywhere
Neville Fuller
Neville Fuller
CIF Pro member Oct16 Final
CIF Pro member Oct16 Final
Scot-Cloud 2015
Scot-Cloud 2015
CSA STAR Webinar (FINAL).pdf
CSA STAR Webinar (FINAL).pdf
Hogan Kusnadi - Cloud Computing Secutity
Hogan Kusnadi - Cloud Computing Secutity
2014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v01
Csa summit argentina-reavis
Csa summit argentina-reavis
PaaS in the Real World
PaaS in the Real World
3245224.ppt
3245224.ppt
Business Solutions Seminar Series
Business Solutions Seminar Series
Zero trust strategy: cloud security by design
Zero trust strategy: cloud security by design
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019
Unlocking Generative AI for Accelerated Content Velocity Today - Asya Ivanova...
Unlocking Generative AI for Accelerated Content Velocity Today - Asya Ivanova...
Security: Enabling the Journey to the Cloud
Security: Enabling the Journey to the Cloud
AWS Summit Sydney 2014 | Building Tomorrow’s Digital Enterprise Leveraging SM...
AWS Summit Sydney 2014 | Building Tomorrow’s Digital Enterprise Leveraging SM...
Recently uploaded
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
Enterprise Knowledge
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
Memoori
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
Rizwan Syed
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
shyamraj55
costume and set research powerpoint presentation
costume and set research powerpoint presentation
phoebematthew05
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Mark Simos
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
Mark Billinghurst
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
carlostorres15106
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
null - The Open Security Community
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Wonjun Hwang
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
hariprasad279825
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Patryk Bandurski
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April Automation LPDG
MarianaLemus7
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
ScyllaDB
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
UiPathCommunity
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
2toLead Limited
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
Fwdays
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
Kalema Edgar
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
BookNet Canada
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
Florian Wilhelm
Recently uploaded
(20)
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
costume and set research powerpoint presentation
costume and set research powerpoint presentation
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April Automation LPDG
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
Why CSA Australia
1.
www.cloudsecurityalliance.orgCopyright © 2013
Cloud Security Alliance Global Site : https://cloudsecurityalliance.org
2.
www.cloudsecurityalliance.orgCopyright © 2013
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2013 Cloud Security Alliance CSA Mission and Australian Objectives Corporate Sponsors Benefits to Member and Sponsors Research Framework and Portfolio Certifications CCSK, OCF, STAR Australian Membership Profile Opportunities for Sponsors
3.
www.cloudsecurityalliance.orgCopyright © 2013
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2013 Cloud Security Alliance Mission To promote the use of best practices for providing security assurance within Cloud Computing, and provide education on the uses of Cloud Computing to help secure all other forms of computing. Objectives Established with the aim of bringing trust to the cloud Develop a global trusted cloud ecosystem Building best practices and standards for next-gen IT Grounded in an agile philosophy, rapid development of applied research that supports all activities
4.
www.cloudsecurityalliance.orgCopyright © 2013
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2013 Cloud Security Alliance 1. To provide opportunities for Australian cloud vendors and consumers 1. to acquire and share information, 2. establish common language and interpretation, 3. form best practices on cloud security in both the provision and usage 2. To provide Cloud Security Certification & Training Programs, Access to Global research and thought leadership content 3. To participate in CSA Global & APAC activities as the Australia chapter 1. to provide input from Australian stakeholders to CSA frameworks 2. to share with Australian stakeholders outputs from CSA Global
5.
www.cloudsecurityalliance.orgCopyright © 2013
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2013 Cloud Security Alliance
6.
www.cloudsecurityalliance.orgCopyright © 2013
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2013 Cloud Security Alliance Research Framework and Projects Impact of Research to Stakeholders User Certifications (CCSK) Trusted Provider Certifications OCF for Vendors
7.
www.cloudsecurityalliance.orgCopyright © 2013
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2013 Cloud Security Alliance CSA research is organized under a framework based on CSA Security Guidance for Critical Area of Focus in Cloud Computing Total of 14 domains organised under 3 key areas of focus – Architecture, Governance and Operational Security
8.
www.cloudsecurityalliance.orgCopyright © 2013
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2013 Cloud Security Alliance Our research includes fundamental projects needed to define and implement trust within the future of information technology CSA continues to be aggressive in producing critical research, education and tools Sponsorship opportunities Selected research projects in following areas
9.
www.cloudsecurityalliance.orgCopyright © 2013
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2013 Cloud Security Alliance
10.
www.cloudsecurityalliance.orgCopyright © 2013
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2013 Cloud Security Alliance The industry’s first user certification program for secure cloud computing Based on CSA research framework, specifically the Security Guidance for Critical Area of Focus in Cloud Computing Designed to ensure that a broad range of professionals with responsibility related to cloud computing have a demonstrated awareness of the security threats and best practices for securing the cloud
11.
www.cloudsecurityalliance.orgCopyright © 2013
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2013 Cloud Security Alliance CCSK Basic One day course to enable student to pass CCSK CCSK Plus Two day course includes practical cloud lab work CCSK Train-the-Trainer Three day course including CCSK Plus GRC Stack Training Additional one day course to use GRC Stack components PCI/DSS In the Cloud Additional one day course focusing on achieving PCI compliance in cloud computing http://cloudsecurityalliance.org/education/training/
12.
www.cloudsecurityalliance.orgCopyright © 2013
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2013 Cloud Security Alliance The CSA Open Certification Framework is an industry initiative to allow global, accredited, trusted certification of cloud providers. The CSA Open Certification Framework is a program for flexible, incremental and multi- layered certification Based on CSA best practices Integrating with popular third-party assessment and attestation statements, initially ISO 27001 & AICPA SSAE16 (SOC2) Pilots in progress, will be released Q3 2013 under the STAR brand
13.
www.cloudsecurityalliance.orgCopyright © 2013
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2013 Cloud Security Alliance OPEN CERTIFICATION FRAMEWORK CONTINUOUS ATTESTATION | CERTIFICATION SELF ASSESSMENT TRANSPERANCY ASSURANCE CSA STAR (Security, Trust and Assurance Registry) Public Registry of Cloud Provider self assessments
14.
www.cloudsecurityalliance.orgCopyright © 2013
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2013 Cloud Security Alliance Key locations are sydney, melbourne and brisbane Cloud security issues is Senior management focus Key member occupation is IT mgm and Consulting firms looking for information
15.
www.cloudsecurityalliance.orgCopyright © 2013
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2013 Cloud Security Alliance Information dissemination/sharing to Australian IT marketplace CSA Supported Research and Investigation Local deployment of CSA Businesses Research of Cloud Security Practices in Australia businesses Communications plan for stakeholders
16.
www.cloudsecurityalliance.orgCopyright © 2013
Cloud Security Alliance Appendix
17.
www.cloudsecurityalliance.orgCopyright © 2013
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2013 Cloud Security Alliance Information dissemination/sharing to Australian IT marketplace 1. Exposure through Web pages 2. Sharing of CSA messages /outputs to marketplace 3. Development, authoring and provision of white papers, reports and presentations 4. Organizing and presenting seminars, workshops and symposia Benefits for Corporate Sponsors: Exposure 1. Listing names and logos on CSA Australia Web pages 2. Corporate and individual names on CSA Australia outputs e.g. translations and reports as contributors 3. Eligible for sponsorship and presentation in CSA Australia events • Conferences, Workshop , Webinars
18.
www.cloudsecurityalliance.orgCopyright © 2013
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2013 Cloud Security Alliance Communications plan for stakeholders 1. Edm mail & Enewsletters given to members via database/mailing list: CSA-Australia Chapter activities and information for members News and announcements from CSA global, APAC and EMEA Other Australian Cloud + Security Industry news, thought leadership topics and events reports Other Stakeholder initiatives 1. RSS feeds from Cloud Security ecosystems, 2. Social Media Engagement and collaboration 3. Branch Meetings with Sponsors support 4. Briefing of CCSK, STAR and OCF and other CSA training courses Benefits for Corporate Sponsors: Exposure
19.
www.cloudsecurityalliance.orgCopyright © 2013
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2013 Cloud Security Alliance CSA Supported Research and Investigation 1. Local workgroups and sections with focus on Australian issues Healthcare, Finance, Users, Certification/Audits, Mobile 2. Participating in CSA Global and APAC workgroups 3. Local interpretation, implementation and deployment of CSA global outputs 4. Development and implementation of best practices to apply CSA materials to Australia Benefits for Corporate Sponsors: Retrieval of up-to-dated information 1. Interaction with thought leaders thru WG and sections 2. Corporate and individual names on CSA-Australia communications
20.
www.cloudsecurityalliance.orgCopyright © 2013
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2013 Cloud Security Alliance Local deployment of CSA Businesses 1. Local training deployment and exams for CCSK 2. Local site development and operation of STAR 3. Local implementation and global alignment of OCF 4. Promotion of CSA outputs including Guidance and CCM Benefits for Corporate Sponsors: Opportunities engage and reward members 1. Discounts on exams and trainings for CCSK (planned) 2. Eligible to STAR participation and result upload 3. Priorities in OCF and relevant consultation (planned)
21.
www.cloudsecurityalliance.orgCopyright © 2013
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2013 Cloud Security Alliance Research of Cloud Security Practices in Australia businesses 1. SLA development suitable for Australian business practices 2. 3rd evaluation of cloud security and its practical model development (OCF) 3. Classification of security requirements & best practices aligned to Australian legal regulations Benefits for Corporate Sponsors: Participation in industrial standards development, Acquiring technical competence 1. Participating in development of standards, guidelines and reference models 2. Socialising and networking with top-level leaders in the IT industry 3. Credits provision of corporate/staff on reports, guidelines and reference models 4. Opportunities to present at in the events by Cloud Security participants
22.
www.cloudsecurityalliance.orgCopyright © 2013
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2013 Cloud Security Alliance
23.
www.cloudsecurityalliance.orgCopyright © 2013
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2013 Cloud Security Alliance AIIA ACS AISA Auscert ISACA (ISC)2 Engaged and working with Cloud Security SIGs Engaged and working with Cloud Security SIGs Attendance at their conferences Attendance at CSO stand (membership drive) Conference attendance and key speaking slot Conference attendance and key speaking slot
Download now