CSA Security Update
CSA STAR is the industry's most powerful program for security assurance in the cloud.The Security Trust Assurance and Risk (STAR) Program encompasses key principles of transparency, rigorous auditing, and harmonization of standards. Companies who use STAR indicate best practices and validate the security posture of their cloud offerings.This podcast series explores CSA STAR as well as CSA best practices and research along with associated technologies and tools.
Podcasting since 2019 • 49 episodes
CSA Security Update
Latest Episodes
Play
The Human Side of AI Security: Leadership, Culture, and Change
SummaryIn this episode, John DiMaria and John Earle discuss the rapid rise of AI in cybersecurity, drawing parallels to the early adoption of cloud security. They explore the importance of organizational culture, change management, and ...
•
26:27
Play
Guardrails for Generative AI: Balancing Innovation with Responsibility
As organizations embrace generative AI, ensuring applications align with safeguards is critical. Today, we are here to explore how proper Guardrails can enable responsible AI by filtering harmful content, enforcing policies, and supporting comp...
•
25:50
Play
Empowering Cloud Providers: The EU Cloud Code of Conduct and GDPR Explained
In this insightful episode, we explore the intricate world of GDPR compliance and how tools like codes of conduct can support cloud service providers. Our special guest, Gabriela Mercuri, Managing Director of SCOPE Europe, shares her expertise ...
•
31:05
Play
Real-talk: Opportunities for Security Teams to Fight AI with AI
The attack surface has expanded and evolved dramatically in an era where the industry is investing nearly a trillion dollars in cloud infrastructure, operations, and applications. Modern cloud development enables faster application building and...
•
41:19
Play
ISO/IEC 27001:2022 Unpacked: Embracing Auditing Themes
In our latest episode, we delve into the innovative approach of auditing "themes" as introduced in the ISO/IEC 27001:2022 revision. This reorganization of domains marks a significant shift in how we think about and implement information securit...
•
43:33