Join industry leaders and experts at the CSA Swiss Chapter TPRM Roundtable for in-depth discussions on third-party risk management strategies, emerging trends, regulatory insights, and practical solutions to enhance cybersecurity resilience.
Join industry leaders and experts at the CSA Swiss Chapter TPRM Roundtable for in-depth discussions on third-party risk management strategies, emerging trends, regulatory insights, and practical solutions to enhance cybersecurity resilience.
No Information Available Yet!
No Information Available Yet!
In 2009, the Cloud Security Alliance (CSA) embarked on a journey to redefine the landscape of cloud security with the first version of the Security Guidance. This year, as we celebrate our 15th anniversary, we're proud to reflect on the remarkable strides we've made together in building a more secure and trusted cloud ecosystem. We’ve produced over 600 consensus-driven research artifacts and grown to encompass a global community of over 500 corporate members, 100+ global chapters, 16,000+ Research volunteer contributors, and more than 200,000 individual members. Reflecting on our achievements, we extend our deepest gratitude to our members, partners, and volunteers who have been instrumental in our success. Your dedication and commitment to advancing cloud security have been the driving force behind our accomplishments.
"As we look towards the horizon, filled with quantum computers, AI developments, and yet-unnamed technologies, I am confident that together, we will continue to safeguard the cloud, ensuring that CSA remains a beacon of trust and security for the next 85 years and beyond."
- Jim Reavis, CEO and Founder, Cloud Security Alliance.
This is the 4th try to bring together the power women in the Swiss Cyber Security Landscape for an informal dinner without any sponsors or presentations
The intersection between cloud security and generative AI
Meet with and be inspired by like-minded peers who face a similar set of challenges. Share strategies for mitigating the most current information security threats