


Risk Management in Cloud Security
Nov 29, 2020
•
Cloud Security Alliance

WHAT IS DIGITAL RISK PROTECTION & WHY IS IT IMPORTANT?
Nov 22, 2020
•
Zerofox

AWS SECURITY USING OPEN SOURCE
Nov 15, 2020
•
CloudSploit

WHAT THE HECK IS CI/CD?
Nov 8, 2020
•
mParticle

HOW TO PREPARE FOR GDPR IN AZURE CLOUD ENVIRONMENT
Nov 1, 2020
•
energage

HOW TO START IN BUG BOUNTY IN 2020
Oct 25, 2020
•
bugcrowd

CONTINUOUS MONITORING FOR CONTROLS & VULNERABILITIES
Oct 18, 2020
•
Unsupervised Learning

AWS SECURITY FOR LARGE REGULATED ENTERPRISE!
Oct 11, 2020
•
CapitalOne

CISO Challenges in Cloud Security
Oct 4, 2020
•
databricks

WHAT IS SECURITY CHAOS ENGINEERING?
Sep 27, 2020
•
Vmware

Security And Compliance in AWS Cloud
Sep 20, 2020
•
ByteChek

Identity & Cross Account Access Management in AWS Cloud
Sep 13, 2020
•
Tenchi Security

WHAT IS AZURE IDENTITY MANAGEMENT?
Sep 6, 2020
•
Argos

DO YOU NEED A CLOUD SECURITY POSTURE MANAGEMENT (CSPM) ?
Aug 30, 2020
•
Redlock

HOW TO BUILD SECURE ENVIRONMENTS IN GOOGLE CLOUD
Aug 23, 2020
•
Google Cloud

HOW TO BUILD SECURE ENVIRONMENTS IN MICROSOFT AZURE?
Aug 16, 2020
•
EITR Technologies

HOW TO CREATE AN EFFECTIVE CYBER SECURITY TEAM?
Aug 9, 2020
•
r2c

APPLICATION SECURITY APPSEC 101
Aug 2, 2020
•
Purple

Getting Started with Chaos Engineering
Jul 26, 2020
•
Verica

CLOUD SECURITY IN A OPERATIONAL TECHNOLOGY VS INFORMATION TECHNOLOGY
Jul 19, 2020
•
Teck

HOW TO BECOME A SUCCESSFUL CISO IN 2020
Jul 12, 2020
•
Microsoft

HOW TO DO GOOGLE CLOUD SECURITY ? – THE 2020 EDITION
Jul 5, 2020
•
Google Cloud

HOW TO BECOME A CLOUD SECURITY ENGINEER in 2020
Jun 28, 2020
•
OTEEMO

BUILDING AN ENGINEERING SECURITY CULTURE
Jun 21, 2020
•
tyro

Women in Cybersecurity
Jun 14, 2020
•
Airglow Security

Google Cloud Security – how does google cloud work?
Jun 7, 2020
•
Cloud Security Alliance

What is GOOD COMPANY CULTURE?
May 31, 2020
•
Matillion

What is a Connected Car? & How to secure it’s API?
May 24, 2020
•

What is SRE & when do you need it?
May 17, 2020
•
Netflix

NIST CyberSecurity Metrics for the Board
May 10, 2020
•
EdenData

Talking Cloud Security with Hacker Valley Studio
May 3, 2020
•
Hacker Valley Studio

SERVERLESS SECURITY BEST PRACTICES
Apr 26, 2020
•
we45

HOW TO SECURE AND IMPROVE YOUR CLOUD ENVIRONMENT
Apr 12, 2020
•
AWS

How Atlassian manages Risk and Compliance
Apr 5, 2020
•
Atlassian

HOW TO BUILD CYBERSECURITY TRAINING PROGRAM
Mar 29, 2020
•
Cyber Fareedah

Cloud Native Security
Mar 22, 2020
•
Hashicorp

Multi Cloud Strategy
Mar 15, 2020
•
Delloite

Data governance best practices
Mar 8, 2020
•
EdenData

Container Security 101 in AWS
Mar 1, 2020
•
AWS

Threat Intelligence in Azure
Feb 23, 2020
•
Microsoft

Microsoft Ignite 2020 Sydney – Security Releases
Feb 16, 2020
•
Argos Security

Is public cloud secure?
Feb 9, 2020
•
Cloud Security Alliance

Cloud Security in a world of multi public cloud
Feb 2, 2020
•
JustEat

CLOUD SECURITY IN JAPAN 2020
Jan 26, 2020
•

AZURE vs AWS from a cybersecurity lens
Jan 19, 2020
•

Cloud Security journey of Dow Jones post the AWS Cloud Breach
Jan 12, 2020
•
Product Security

How to attract and retain more women engineers?
Jan 5, 2020
•
KnewStart

Cloud Security and Infosec girls
Dec 25, 2019
•
OWASP