Welcome to the Cloud Security Alliance

Suisse Chapter 🇨🇭

The Cloud Security Alliance (CSA) is the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment.

Latest News from the Suisse Chapter

CSA & SIGS Special Event – April 10 – 11, 2024

Join CSA and SIGS on April 10th and 11th to hear from featured speakers John Kindervag and Rob van der Veer at a special two-day event in Zurich. Learn about Zero Trust and AI and network with like-minded peers in cybersecurity. Register today to save your spot! Learn More Rob van der Veer, Senior Director…

[ Continue Reading ]

New CSA CH vEvent – Morning Breakfast on July 6th, 2022 !!

Title:  Dealing with the challenges of China’s cross-border data transfer restrictions Speaker Name: Samuel Yang    Abstract:                       In this session we will discuss: China’s most up-to-date data localization and cross-border data transfer rules, and how they affect companies doing business in/with China. Regulatory and practical issues in relation to the use of VPN and foreign…

[ Continue Reading ]

Chapter Suimmit 2021 – Nov 4th

All CSA chapter members are encouraged to join us on November 4th (8am-12pm Pacific Time) for the inaugural CSA Chapter Summit, an exclusive and free virtual event. This summit will be a unique opportunity for chapter members to come together and network, while also learning about ways to engage with CSA global. During the event,…

[ Continue Reading ]

Zero-cloud and Data Protection

Here my last article on the topic “Data Security as Business enabler”, which I recently presented in a 3-days panel organized by EPFL on “Zero-Trust cloud week – Data Protection in the Cloud”. Recording available here: https://lnkd.in/dWtrF9E #datasecurity #security #privacy

[ Continue Reading ]

Latest News from CSA blog

  • To Meet Bold Ambitions and Combat Mounting Threats, Australia Endorses Zero Trust
    Originally published by CXO REvolutionaries.Written by Heng Mok, CISO in Residence, Zscaler. If Australia is to become the most cyber-secure nation in the world by 2030, as Cyber Security Minister Clare O'Neill has said it can be, it has a ways to go. The Australian government’s recognition of this fact can be seen in two recent reports highlighting the need for cyber readiness in an era of heightened tension.First came a report from the Australian Securities and Investment Commission (ASIC) ...continue reading on CSA Home
  • An Explanation of the Guidelines for Secure AI System Development
    Originally published by Schellman & Co.Recently, the UK National Security Centre (NCSC) and the US Cybersecurity and Infrastructure Security Agency (CISA)—along with other groups from around the world—released the Guidelines for Secure AI System Development. A new resource for developers as of November 2023, the document is meant to aid in the development of secure artificial intelligence (AI) systems. Increased use of AI technology continues within both the public and private sectors, an...continue reading on CSA Home
  • What is Azure Policy: All You Need to Know
    Originally published by Sonrai Security.Written by Tally Shea. What is Azure Policy? Azure Policy is a service within Microsoft Azure that allows organizations to create, assign, and manage policies. These policies define rules and effects over resources, identities, and groups, in an effort to ensure compliance and uphold security. Enforcement comes in two forms – flagging non compliance so your team can remediate the concern or simply blocking deployment.Before delving deeper into Azure Pol...continue reading on CSA Home
  • Latest DevSecOps Guidance from Cloud Security Alliance and SAFECode Emphasizes Value of Collaboration, Integration in DevSecOps Landscape
    Document provides practical insights for seamlessly embedding security in DevOps processes and workflow and examines convergence of DevSecOps with Zero Trust, MLSecOps, and AIOps SEATTLE – Feb. 21, 2024 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, today released The Six Pillars of DevSecOps - Collaboration and Integration. Written by CSA’s DevSecOps...continue reading on CSA Home
  • Departing Thoughts of the STAR Program Director
    As I prepare to transition from my role as the STAR Program Director to embark on a new journey as the Director of Operations Excellence at CSA, I find myself reflecting on the incredible journey we've embarked on together. Leading the STAR program has been one of the most fulfilling chapters of my professional career, filled with challenges, growth, and remarkable achievements.I have always been inspired by the potential of the STAR program to make a significant impact on our community. Toge...continue reading on CSA Home
  • Understanding the Ransomware Wave of 2023
    Originally published by Skyhigh Security on December 8, 2023. Written by Nick Graham, Solution Architect, Public Sector, Skyhigh Security. As we near the end of 2023, Skyhigh Security has observed a concerning surge in ransomware attacks that have significantly reshaped the cybersecurity landscape. This year has been a challenging one for businesses worldwide, highlighting the critical role of advanced security solutions in combating these threats.What Have We Seen in the Past?In both 2021 an...continue reading on CSA Home
  • Securing Your Microsoft Environment After the Midnight Blizzard Attack
    Originally published by Reco. Written by Oz Wasserman. IntroductionThe attack on Microsoft's SaaS-based Entra environment by Midnight Blizzard (aka Nobelium, Cozy Bear or APT29) was notably one of the most sophisticated attacks seen on similar platforms. This incident, spanning from November 2023 to January 2024, targeted Microsoft's corporate email through a vulnerable Entra test tenant. The lack of Multi-Factor Authentication (MFA) was a key weakness that allowed the attackers unparalleled ...continue reading on CSA Home
  • 5 Steps to Fortify Your Organization Against Cyber Liabilities
    Originally published by Diligent. Written by Nithya B. Das, Chief Legal & Administrative Officer, Diligent. Cybersecurity is a business issue. This was one of the key takeaways from a recent panel discussion I moderated on key strategies to guide CISOs, general counsels and other legal and information security executives as they navigate the evolving landscape.In the face of rising cyberthreats and increasing regulatory scrutiny, organizations and boards of directors must treat cybersecur...continue reading on CSA Home
  • Understanding PCI DSS: A Guide to the Payment Card Industry Data Security Standard
    Originally published by BARR Advisory.Written by Kyle Cohlmia. According to a report by The Ascent, credit card fraud remained the most common type of identity theft in 2023. In today’s digital age, where online transactions have become an integral part of our daily lives, the security of payment card information is essential. That’s why the Payment Card Industry Data Security Standard (PCI DSS) exists—a crucial framework for protecting sensitive data. No matter the size of your organization,...continue reading on CSA Home
  • Part 3: The Anatomy of Supply Chain Attacks: Non-Human Identities & TPRM Failure
    Originally published by Astrix.Written by Alex Flores, Danielle Guetta, and Tal Skverer. “Identity is the new perimeter.” This catch phrase is present in almost every website of identity security vendors, and for a good reason. Human access, more commonly referred to as user access, is an established security program in most organizations – big or small. The realization that user identities and login credentials need to be vigorously protected with IAM policies and security tools like MFA or ...continue reading on CSA Home