AI Super Agents: Delivering Autonomous SecOps
Join ReliaQuest experts Brian P. Murphy, Chief Scientist, and Jonathan Echavarria, Principal Research Scientist, as they explore the transformative power of AI multi-agent systems. Learn how these "super agents" collaborate to automate Tier 1 and Tier 2 tasks, improve detection and response, and empower your team to focus on high-impact priorities. In this session, you’ll discover:How multi-agent systems enable autonomous, end-to-end sec...
Non-Human Identity (NHI) Summit 2025
The rise of non-human identities (NHIs) is reshaping the cloud security landscape. APIs, service accounts, bots, and machine identities now outnumber humans in most cloud environments—and they often hold the keys to your most critical systems. Join global cloud and identity experts for CSA’s first-ever Non-Human Identity Summit, a free, two-day virtual event dedicated to tackling the complex challenges of NHI management. NHI Summit...
State of SaaS Security
The State of SaaS Security: Trends and Insights for 2025-26, commissioned by Valence in partnership with the Cloud Security Alliance, reveals a critical inflection point in SaaS security. While 86% of organizations now prioritize SaaS security with 76% increasing budgets, significant challenges persist that threaten enterprise security postures. Survey data from 420 IT and security professionals highlights persistent visibility gaps, with 55%...
State of SaaS Security
The State of SaaS Security: Trends and Insights for 2025-26, commissioned by Valence in partnership with the Cloud Security Alliance, reveals a critical inflection point in SaaS security. While 86% of organizations now prioritize SaaS security with 76% increasing budgets, significant challenges persist that threaten enterprise security postures. Survey data from 420 IT and security professionals highlights persistent visibility gaps, with 55%...
Breaking Down Security for AI: From LLM...
The security for AI landscape is constantly evolving, protecting AI as it advances from standalone models to complex agents. In this webinar, we demystify what it means to secure AI models, applications, and agents. Whether you’re building your own model or deploying frontier or open-source systems, you need to understand the full lifecycle to secure it. From AI red teaming during development to runtime defense in production systems, thi...
The CSA Enterprise Authority to Operate...
The CSA Enterprise Authority to Operate (EATO) Framework is an assessment, remediation, consultancy, and certification framework. It targets Anything-as-a-Service (XaaS) providers and their entire underlying supply chain who are catering to customers in highly regulated industries processing sensitive data. EATO controls are based on CCMv4, with augmented controls to reflect tight regulatory requirements, and the certification plugs into the C...
Cloud Trust Summit 2025
Join global leaders from industry, regulatory agencies, and standards bodies at CSA’s third annual Virtual Cloud Trust Summit—now expanded into a dynamic, free, two-day virtual event. As cloud adoption accelerates and emerging technologies like generative AI reshape the digital landscape, organizations face mounting pressure to meet evolving security and compliance demands. This year’s summit will spotlight two of the most pr...
How to Protect M&A in FinServ: A Conver...
Mergers and acquisitions can fuel growth—but they also create prime opportunities for cyber threats. Financial services organizations must act fast to secure newly acquired entities, maintain compliance, and prevent cyber risks from jeopardizing the deal. In this webinar, security leaders will learn:The biggest cybersecurity risks during M&A and how attackers exploit themBest practices for securing the business throughout the process...
Extend Zero Trust to your Branch, Facto...
As organizations realize security and operational benefits of protecting users with zero trust principles, they are also achieving value for extended environments like office branches, factories, data centers, and clouds. This session will demonstrate how they adopt and operationalize these locations by extending their zero trust architecture to branch offices, cloud workloads, and OT/IoT devices.
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.