Welcome to the Cloud Security Alliance

Suisse Chapter 🇨🇭

The Cloud Security Alliance (CSA) is the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment.

Latest News from the Suisse Chapter

New CSA CH vEvent – Morning Breakfast on July 6th, 2022 !!

Title:  Dealing with the challenges of China’s cross-border data transfer restrictions Speaker Name: Samuel Yang    Abstract:                       In this session we will discuss: China’s most up-to-date data localization and cross-border data transfer rules, and how they affect companies doing business in/with China. Regulatory and practical issues in relation to the use of VPN and foreign…

[ Continue Reading ]

Chapter Suimmit 2021 – Nov 4th

All CSA chapter members are encouraged to join us on November 4th (8am-12pm Pacific Time) for the inaugural CSA Chapter Summit, an exclusive and free virtual event. This summit will be a unique opportunity for chapter members to come together and network, while also learning about ways to engage with CSA global. During the event,…

[ Continue Reading ]

Zero-cloud and Data Protection

Here my last article on the topic “Data Security as Business enabler”, which I recently presented in a 3-days panel organized by EPFL on “Zero-Trust cloud week – Data Protection in the Cloud”. Recording available here: https://lnkd.in/dWtrF9E #datasecurity #security #privacy

[ Continue Reading ]

New 2021 website is Live!

After an initial virtual event held in June, we have worked to build the new CSA, Swiss Chapter website. Next event in autumn (stay tuned, it will be announced soon), we will present the overall mission and define the objectives for our Chapter for coming 2022 period.

[ Continue Reading ]

Latest News from CSA blog

  • Cloud Security Detection Doesn’t Reduce Risk. Here Are Six Remediation Steps That Do.
    Originally published by Dazz. Written by Eshel Yaron, Software Engineer, Dazz. As organizations migrate their software development lifecycle from on-premises to the cloud, our tools have changed to deal with fast-paced CI/CD pipelines. Similarly, the tools we use to detect application vulnerabilities, infrastructure misconfiguration, and other flaws have evolved to keep up with the pace of the cloud. As we grow our development efforts and get ever more efficient, we detect an increasing numbe...continue reading on CSA Home
  • Why Healthcare Organizations Are Slower to Adopt Cloud Services
    Originally published by Skyhigh Security. Written by Rodman Ramezanian, Global Cloud Threat Lead, Skyhigh Security. Security and compliance concerns dominateConsidering the type of sensitive data held by healthcare organizations, it’s not surprising that the sector has been more cautious about adopting the cloud than other industries. Our latest report, “Skyhigh Security Cloud Adoption and Risk Report: Healthcare Edition,” paints the picture of a sector that is hesitant to embark on cloud tra...continue reading on CSA Home
  • NIST CSF vs. Other Cybersecurity Frameworks
    Originally published by Schellman. With the new SEC Cybersecurity Disclosure Rule requiring both the reporting of material cybersecurity events and the annual disclosure of cybersecurity programs for public companies, those affected are taking a closer look at cybersecurity frameworks that—while previously considered optional or “nice to have”— could help their organization meet the new regulatory requirements. One in particular—the National Institute of Standards and Technology (NIST) Cybers...continue reading on CSA Home
  • What is Cloud Repatriation?
    Originally published by Sangfor Technologies. Written by Nicholas Tay Chee Seng, CTO, Sangfor Cloud.The Cloud Repatriation Trend in 2023Browse the pages of most IT tech news websites and chances are you will come across stories of enterprise organizations migrating en masse to the public cloud as part of their cloud adoption strategy. But does the premise of hosting on the public cloud, a service dominated by cloud hyperscalers like AWS, Azure, and GCP, still ring true? By and large, yes. Org...continue reading on CSA Home
  • 3 Ways Cybercriminals are Targeting Your Email
    Original published by Abnormal Security. Written by Mike Britton. It wasn't long ago that the world was much simpler when it came to protecting our employees and their email use. We all had a data center. Most of our employees spent their days working in an office. While SaaS has been around for quite some time, the ability to access it from anywhere, anytime, and from any device, was limited.Fast forward to today, and an overwhelming majority of companies are using a hosted email solution li...continue reading on CSA Home
  • Insider Threat Awareness Month 2023: Bringing Awareness to Every Level of Your Organization
    Originally published by Code42. Written by Chrysa Freeman, Sr. Manager of Code42's Cybersecurity Team. In the ever-evolving world of work, where remote collaboration, the Great Resignation, the rise of contractors, and the ascent of cloud technologies redefine how we conduct business, a common threat grows larger: Insider Risk. As organizations rush to adapt to these modern workforce shifts, any lag in this progress leaves critical IP vulnerable to data loss, leak, and theft. Given this reali...continue reading on CSA Home
  • Safeguarding the Healthcare Industry: Effective Measures to Prevent Ransomware Attacks
    Originally published by CyberGuard Compliance. Written by Daniel Porter. The healthcare industry, entrusted with safeguarding sensitive patient information, faces a growing threat from malicious cyberattacks, particularly ransomware. These attacks not only compromise patient data security but also disrupt critical healthcare services.Ransomware Protection Solutions in HealthcareAs the reliance on digital infrastructure continues to expand, it is crucial for healthcare organizations to priorit...continue reading on CSA Home
  • Frequently Asked Questions Answered—ISO 27001 Certifications
    Originally published by BARR Advisory. As one of the most thorough cybersecurity assessments an organization can go through, achieving ISO certification might initially seem daunting. At our recent ISO Open House, Director of Attest Services Angela Redmond and Manager of Attest Services Marc Gold answered some frequently asked questions about ISO 27001 and what to expect when working towards the certification. Let’s look at a few of these FAQs and what our experts have to say so you can confi...continue reading on CSA Home
  • Cyberthreats Increasingly Target the World’s Biggest Event Stages
    Originally published by Microsoft. Threat actors go where the targets are, capitalizing on opportunities to launch targeted or widespread, opportunistic attacks. This extends into high profile sporting events, especially those in increasingly connected environments, introducing cyber risk for organizers, regional host facilities, and attendees. The United Kingdom’s National Cyber Security Centre (NCSC) found that cyberattacks against sports organizations are increasingly common, with 70 perce...continue reading on CSA Home
  • Ready, Set, Respond: Ensuring Compliance with the SEC Reporting Regulations
    Originally published by Mitiga. Written by Ariel Parnes. The Securities and Exchange Commission (SEC) of the United States has adopted new regulations that require public companies to disclose material cybersecurity incidents within four days. To the positive, this initiative seeks to increase transparency and safeguard investors against potential cybersecurity risks. However, it also puts new weight and responsibility on enterprises that may not yet be ready for the challenge. Meeting this s...continue reading on CSA Home