Learn the latest case studies on the end-to-end cyber security implementation practices when working with third parties to ensure a truly resilient and secure supply chain network at the Third Party & Supply Chain Cyber Security Summit.
Led by 30+ TOP Information Security professionals from leading companies, the discussion will allow you to see the issue from the perspective of different industries & angles and identify the complex solution to implement in your company.
Join us in Dubai and build your end-to-end strategy!
Learn from your peers and ensure the most effective cyber risk management approach towards your suppliers.
In 2009, the Cloud Security Alliance (CSA) embarked on a journey to redefine the landscape of cloud security with the first version of the Security Guidance. This year, as we celebrate our 15th anniversary, we're proud to reflect on the remarkable strides we've made together in building a more secure and trusted cloud ecosystem. We’ve produced over 600 consensus-driven research artifacts and grown to encompass a global community of over 500 corporate members, 100+ global chapters, 16,000+ Research volunteer contributors, and more than 200,000 individual members. Reflecting on our achievements, we extend our deepest gratitude to our members, partners, and volunteers who have been instrumental in our success. Your dedication and commitment to advancing cloud security have been the driving force behind our accomplishments.
"As we look towards the horizon, filled with quantum computers, AI developments, and yet-unnamed technologies, I am confident that together, we will continue to safeguard the cloud, ensuring that CSA remains a beacon of trust and security for the next 85 years and beyond."
- Jim Reavis, CEO and Founder, Cloud Security Alliance.
This is the 4th try to bring together the power women in the Swiss Cyber Security Landscape for an informal dinner without any sponsors or presentations
Join industry leaders and experts at the CSA Swiss Chapter TPRM Roundtable for in-depth discussions on third-party risk management strategies, emerging trends, regulatory insights, and practical solutions to enhance cybersecurity resilience.
The intersection between cloud security and generative AI