CINXE.COM
CSA CxO Trust Initiative | CSA
<!DOCTYPE html><html><head><title>CSA CxO Trust Initiative | CSA</title> <meta name="description" content="The CSA CxO Trust initiatives will help CISOs communicate the business risks and compliance issues of cloud computing and cybersecurity to their peers within the C-Suite."> <link rel="canonical" href="https://cloudsecurityalliance.org/cxo-trust"> <link rel="image_src" href="/assets/social-share/facebook-429f9d45f1c2afbf16c63ff940668c3dfc1e7ed3f9155f98eab6691bf6b5fd82.jpg"> <meta property="og:locale" content="en"> <meta property="og:type" content="website"> <meta property="og:title" content="CSA CxO Trust Initiative | CSA"> <meta property="og:description" content="The CSA CxO Trust initiatives will help CISOs communicate the business risks and compliance issues of cloud computing and cybersecurity to their peers within the C-Suite."> <meta property="og:url" content="https://cloudsecurityalliance.org/cxo-trust"> <meta property="og:site_name" content="CSA"> <meta property="og:image" content="/assets/social-share/facebook-429f9d45f1c2afbf16c63ff940668c3dfc1e7ed3f9155f98eab6691bf6b5fd82.jpg"> <meta name="twitter:card" content="summary"> <meta name="twitter:title" content="CSA CxO Trust Initiative | CSA"> <meta name="twitter:description" content="The CSA CxO Trust initiatives will help CISOs communicate the business risks and compliance issues of cloud computing and cybersecurity to their peers within the C-Suite."> <meta name="twitter:site" content="@cloudsa"> <meta name="twitter:site_name" content="CSA"> <meta name="twitter:creator" content="@cloudsa"> <meta name="twitter:image" content="/assets/social-share/facebook-429f9d45f1c2afbf16c63ff940668c3dfc1e7ed3f9155f98eab6691bf6b5fd82.jpg"><meta name="csrf-param" content="authenticity_token" /> <meta name="csrf-token" content="FCyg2mVRRMB5e0u0jW9B9FLjliaSiWTKnpclGvnpbKjruyeU2Ybxhs4PaJRetZtozGD7NPl3KH_ykJP5oa5yqA" /><meta name="csp-nonce" /><meta content="text/html;charset=utf-8" http-equiv="Content-type" /><meta content="width=device-width, initial-scale=1" name="viewport" /><meta content="IE=edge,chrome=1" http-equiv="X-UA-Compatible" /><link href="https://assets.cloudsecurityalliance.org/legacy/local-cdn/global/site/favicon/favicon.ico" rel="Shortcut Icon" type="image/x-icon" /><link href="https://assets.cloudsecurityalliance.org/legacy/local-cdn/global/site/apple-touch-icons/iphone.png" rel="apple-touch-icon" /><link href="https://assets.cloudsecurityalliance.org/legacy/local-cdn/global/site/apple-touch-icons/apple-touch-icon-57x57.png" rel="apple-touch-icon" sizes="57x57" /><link href="https://assets.cloudsecurityalliance.org/legacy/local-cdn/global/site/apple-touch-icons/apple-touch-icon-60x60.png" rel="apple-touch-icon" sizes="60x60" /><link href="https://assets.cloudsecurityalliance.org/legacy/local-cdn/global/site/apple-touch-icons/apple-touch-icon-72x72.png" rel="apple-touch-icon" sizes="72x72" /><link href="https://assets.cloudsecurityalliance.org/legacy/local-cdn/global/site/apple-touch-icons/apple-touch-icon-76x76.png" rel="apple-touch-icon" sizes="76x76" /><link href="https://assets.cloudsecurityalliance.org/legacy/local-cdn/global/site/apple-touch-icons/apple-touch-icon-114x114.png" rel="apple-touch-icon" sizes="114x114" /><link href="https://assets.cloudsecurityalliance.org/legacy/local-cdn/global/site/apple-touch-icons/apple-touch-icon-120x120.png" rel="apple-touch-icon" sizes="120x120" /><link href="https://assets.cloudsecurityalliance.org/legacy/local-cdn/global/site/apple-touch-icons/apple-touch-icon-144x144.png" rel="apple-touch-icon" sizes="144x144" /><link href="https://assets.cloudsecurityalliance.org/legacy/local-cdn/global/site/apple-touch-icons/apple-touch-icon-152x152.png" rel="apple-touch-icon" sizes="152x152" /><link href="https://assets.cloudsecurityalliance.org/legacy/local-cdn/global/site/apple-touch-icons/apple-touch-icon-180x180.png" rel="apple-touch-icon" sizes="180x180" /><link href="https://assets.cloudsecurityalliance.org/legacy/local-cdn/global/site/favicon/favicon-16x16.png" rel="icon" sizes="16x16" type="image/png" /><link href="https://assets.cloudsecurityalliance.org/legacy/local-cdn/global/site/favicon/favicon-32x32.png" rel="icon" sizes="32x32" type="image/png" /><link href="https://assets.cloudsecurityalliance.org/legacy/local-cdn/global/site/favicon/favicon-96x96.png" rel="icon" sizes="96x96" type="image/png" /><link href="https://assets.cloudsecurityalliance.org/legacy/local-cdn/global/site/android-chrome-icons/android-chrome-192x192.png" rel="icon" sizes="192x192" type="image/png" /><link rel="stylesheet" href="/assets/application-edb47d3578f13c17159172f11b23502dad1ffc266101d20c730a81d5b23f56be.css" data-turbolinks-track="reload" /><link href="https://fonts.googleapis.com/css?family=Open+Sans%3A300italic%2C400italic%2C600italic%2C700italic%2C800italic%2C400%2C300%2C600%2C700%2C800&amp;#038;ver=1.0" media="all" rel="stylesheet" type="text/css" /><link href="https://fonts.googleapis.com/css?family=Titillium+Web%3A400%2C600&amp;#038;ver=1.0" media="all" rel="stylesheet" type="text/css" /><link href="https://use.typekit.net/tpr8qgx.css" rel="stylesheet" /><script>window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('consent', 'default', { 'ad_storage': 'denied', 'ad_user_data': 'denied', 'ad_personalization': 'denied', 'analytics_storage': 'denied', }); window.gtag = gtag;</script><!-- Google Tag Manager Head Tag--><script>(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({"gtm.start": new Date().getTime(),event:"gtm.js"});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!="dataLayer"?"&l="+l:"";j.async=true;j.src= "https://www.googletagmanager.com/gtm.js?id=" +i+dl;f.parentNode.insertBefore(j,f); })(window,document,"script","dataLayer",'GTM-WGMWDNB');</script><!-- End Google Tag Manager Head Tag --><script src="/assets/application-95b13f0537351684397b06ae9a0d4a61841d5768ec43461994a2d3f3532499a6.js" data-turbo-track="reload"></script><script async="" defer="" src="https://www.google.com/recaptcha/api.js?render=explicit"></script><script>window.addEventListener("turbo:before-render", function () { window.zEACLoaded = undefined; // this is the "hidden" global var that zendesk uses to check if it's loaded its widget yet });</script></head><body class="csa"><!-- Google Tag Manager Body Tag (noscript) --> <noscript> <iframe src="https://www.googletagmanager.com/ns.html?id=GTM-WGMWDNB" height="0" width="0" style="display:none;visibility:hidden"> </iframe> </noscript> <!-- End Google Tag Manager Body Tag (noscript) --> <style>.callout-banner { text-align: center; position: relative; font-weight: 300; font-size: 12px; } @media screen and (max-width: 1110px) { .callout-banner { margin-top: 40px; } }</style><style>.app_notification a { color: white !important; text-decoration: underline; }</style><header class="csa-c-layout-header"><div class="o-area" id="quicklinks"><div class="c-quicklinks"><div class="o-container"><a class="c-quicklink" href="https://cloudsecurityalliance.org/cloud-newbie">Cloud 101</a><a class="c-quicklink" rel="noopener" target="_blank" href="https://circle.cloudsecurityalliance.org/">Circle</a><a class="c-quicklink" href="https://cloudsecurityalliance.org/events/">Events</a><a class="c-quicklink" href="https://cloudsecurityalliance.org/blog/">Blog</a><form class="c-quicklink" method="post" action="/auth/auth0"><button style="text-transform: uppercase;" data-turbo="false" type="submit">Sign in or Sign Up</button><input type="hidden" name="authenticity_token" value="G4DDD9pORtDhR86jJjxNs3jyyYRDL6x3hy7gTpqbFUNe-fNnvKXEfiKLAe6oItVME-FcQTlfQ9BlcwwC8ZHczw" autocomplete="off" /></form></div></div></div><div id="megamenu"><div class="c-megamenu"><div class="o-container"><div class="o-grid"><a class="c-megamenu__logo o-grid__cell o-grid__cell--width-15@xsmall" href="/"><img src="/assets/CSA-logo-RGB-a0a3855889ad836fa585d60f6caf8d619f241d43904c304c2f64284127fe9bf3.svg" /></a><div class="c-megamenu__categories o-grid__cell o-grid__cell--width-75@xsmall"><div class="c-megamenu__category" data-target="#membership-nav"><div class="c-megamenu__anchor">Membership</div><div class="c-megamenu__category-content" id="membership-nav"><div class="o-container"><div class="o-grid o-grid--small-fit o-grid--medium-fit o-grid--large-fit"><div class="o-grid__cell o-grid__cell--width-25@medium"><div class="c-megamenu__subcategory"><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/membership/">Membership Benefits</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/membership/current/">Our Member Community</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/membership/get-involved/">Get Involved</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/membership/contact/">Become a Member</a></div></div></div><div class="o-grid__cell o-grid__cell--width-25@medium"><div class="c-megamenu__subcategory"><div class="c-megamenu__item"><span>Member-Exclusive Programs</span></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/star/registry/star-enabled-solutions/">STAR Enabled Solutions</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/trusted-cloud-consultant/registry/">Trusted Cloud Consultant</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/trusted-cloud-provider/">Trusted Cloud Provider</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/star/certified-star-auditors/">Certified STAR Auditors</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/csa-startup-showcase/registry/">CSA Startup Showcase</a></div></div></div><div class="o-grid__cell o-grid__cell--width-25@medium"><div class="c-megamenu__subcategory"><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="https://cloudsecurityalliance.my.site.com">Member Portal</a></div></div></div></div></div></div></div><div class="c-megamenu__category" data-target="#star-program-nav"><div class="c-megamenu__anchor">STAR Program</div><div class="c-megamenu__category-content" id="star-program-nav"><div class="o-container"><div class="o-grid o-grid--small-fit o-grid--medium-fit o-grid--large-fit"><div class="o-grid__cell o-grid__cell--width-25@medium"><div class="c-megamenu__subcategory"><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/star/">STAR Home</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" data-turbo="false" href="/star/registry/">STAR Registry</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/star/submit/">Submit to Registry</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/star/feedback/">Provide Feedback</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/star/certified-star-auditors/">Certified STAR Auditors</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/star/star-enabled-solutions/overview/">STAR Enabled Solutions</a></div></div><div class="c-megamenu__subcategory"><div class="c-megamenu__item"><span>Stay compliant in the cloud</span></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/ccak/">CCAK Training</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/star-lead-auditor-training/">STAR Lead Auditor Training</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/gsa-schedule/">Training for Government Agencies</a></div></div></div><div class="o-grid__cell o-grid__cell--width-25@medium"><div class="c-megamenu__subcategory"><div class="c-megamenu__item"><span>Governance, Risk & Compliance Tools</span></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/cloud-controls-matrix/">Cloud Controls Matrix (CCM)</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/cloud-controls-matrix/">Consensus Assessment Initiative Questionnaire (CAIQ)</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/gdpr/eu-cloud-code-of-conduct/">EU Cloud Code of Conduct</a></div></div></div><div class="o-grid__cell o-grid__cell--width-25@medium"><div class="c-megamenu__subcategory"><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" data-turbo="false" href="/star/registry/?level=1">STAR Level 1</a></div><div class="c-megamenu__item-description">At level one organizations submit a self-assessment.</div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" data-turbo="false" href="/star/registry/?level=1">View companies at level one</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/star/#tab_levelOne">Learn about level one</a></div></div></div><div class="o-grid__cell o-grid__cell--width-25@medium"><div class="c-megamenu__subcategory"><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" data-turbo="false" href="/star/registry/?level=2">STAR Level 2</a></div><div class="c-megamenu__item-description">At level two organizations earn a certification or third-party attestation.</div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" data-turbo="false" href="/star/registry/?level=2">View companies at level two</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/star/#tab_levelTwo">Learn about level two</a></div></div></div></div></div></div></div><div class="c-megamenu__category" data-target="#certificates-training-nav"><div class="c-megamenu__anchor">Certificates & Training</div><div class="c-megamenu__category-content" id="certificates-training-nav"><div class="o-container"><div class="o-grid o-grid--small-fit o-grid--medium-fit o-grid--large-fit"><div class="o-grid__cell o-grid__cell--width-25@medium"><div class="c-megamenu__subcategory"><div class="c-megamenu__item"><span>Online Education Platforms</span></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="https://knowledge.cloudsecurityalliance.org">Knowledge Center</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="https://exams.cloudsecurityalliance.org">CSA Exams</a></div></div><div class="c-megamenu__subcategory"><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/events/">Events</a></div><div class="c-megamenu__item-description">Learn and network while you earn CPE credits.</div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" data-turbo="false" href="/events/virtual-and-webinars/">Virtual Events & Webinars</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/sponsor/">Event Sponsorships</a></div></div></div><div class="o-grid__cell o-grid__cell--width-25@medium"><div class="c-megamenu__subcategory"><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/">Certificates</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/ccsk/">Certificate of Cloud Security Knowledge (CCSK)</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/ccak/">Certificate of Cloud Auditing Knowledge (CCAK)</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/cczt/">Certificate of Competence in Zero Trust (CCZT)</a></div></div><div class="c-megamenu__subcategory"><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/digital-badges/">Digital Badges</a></div></div></div><div class="o-grid__cell o-grid__cell--width-25@medium"><div class="c-megamenu__subcategory"><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/">Trainings</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/cloud-infrastructure-security-training">Cloud Infrastructure Security Training</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/star-lead-auditor-training/">STAR Lead Auditor Training</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/advanced-cloud-security-practitioner-training">Advanced Cloud Security Practitioner (ACSP) Training</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/train-the-trainer/">CCSK Train the Trainer</a></div></div></div><div class="o-grid__cell o-grid__cell--width-25@medium"><div class="c-megamenu__subcategory"><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/partner#become_partner">Training Network</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/instructors/">Become an Instructor</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/training-partners/">Become a Training Partner</a></div></div><div class="c-megamenu__subcategory"><div class="c-megamenu__item"><span>Specialized Training Options</span></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/business/">Train my entire team</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/gsa-schedule/">Training for Government Agencies</a></div></div></div></div></div></div></div><div class="c-megamenu__category" data-target="#research-nav"><div class="c-megamenu__anchor">Research</div><div class="c-megamenu__category-content" id="research-nav"><div class="o-container"><div class="o-grid o-grid--small-fit o-grid--medium-fit o-grid--large-fit"><div class="o-grid__cell o-grid__cell--width-25@medium"><div class="c-megamenu__subcategory"><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/">CSA Research</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/publications">Latest Research</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/working-groups/">Working Groups</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/chapters/">Chapters</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/contribute#peer-reviews">Open Peer Reviews</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/topics">Research Topics</a></div></div><div class="c-megamenu__subcategory"><div class="c-megamenu__item"><span>Strategic Initiatives</span></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/working-groups/artificial-intelligence/">AI Safety Initiative</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/zt/">Zero Trust Advancement Center</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/cxo-trust/">CxO Trust</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/trusted-cloud-consultant/">Trusted Cloud Consultant</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/fincloud-security">FinCloud Security</a></div></div><div class="c-megamenu__subcategory"><div class="c-megamenu__item"><span>Thought Leadership</span></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" data-turbo="false" href="/events/virtual-and-webinars/?event_kind=Webinar">CloudBytes Webinars</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/blog/">Blog</a></div></div></div><div class="o-grid__cell o-grid__cell--width-25@medium"><div class="c-megamenu__subcategory"><div class="c-megamenu__item"><span>Getting Started with CSA Research</span></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/guidance/">Cloud security best practices</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/cloud-controls-matrix/">Assess your cloud compliance</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/artifacts/star-level-1-security-questionnaire-caiq-v4/">Security questionnaire for vendors</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/working-groups/top-threats/">Top threats to cloud computing</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/cloud-security-glossary">Cloud Security Glossary</a></div></div><div class="c-megamenu__subcategory"><div class="c-megamenu__item"><span>Awards & Recognition</span></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/juanita-koilpillai/service-award/">Juanita Koilpillai Awards</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/fellowship#fellows">Research Fellows</a></div></div></div><div class="o-grid__cell o-grid__cell--width-25@medium"><div class="c-megamenu__subcategory"><div class="c-megamenu__item"><span>Critical Topics</span></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/working-groups/artificial-intelligence">AI Safety Initiative</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/working-groups/ai-technology-and-risk">AI Technology and Risk</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/working-groups/ai-governance-compliance">AI Governance & Compliance</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/working-groups/ai-controls">AI Controls</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/working-groups/ai-organizational-responsibilities">AI Organizational Responsibilities</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/working-groups/enterprise-architecture">Enterprise Architecture</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/working-groups/blockchain">Blockchain</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/working-groups/zero-trust">Zero Trust</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/working-groups/devsecops">DevSecOps</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/working-groups/top-threats">Top Threats</a></div></div></div></div></div></div></div></div><div class="o-grid__cell c-megamenu__search"><form action="/search" class="input-pair u-mb0" data-turbo="false" method="get" role="search"><label><span class="u-screen-reader">Search for:</span></label><input autocomplete="off" class="c-megamenu__search-input" name="s" placeholder="Search CSA resources, tools, research publications and more…" title="Search for:" type="text" value="" /><button class="c-button c-button--secondary"><i class="fas fa-search"></i></button><div class="c-button c-button--expand"><i class="fas fa-search"></i></div><div class="c-button c-button--close"><div class="i fas fa-times"></div></div></form></div></div></div></div></div><div id="megamenu_mobile"><div class="c-mobile-menu"><div class="c-mobile-menu__head"><a class="c-megamenu__logo" href="/"><img src="/assets/CSA-logo-RGB-a0a3855889ad836fa585d60f6caf8d619f241d43904c304c2f64284127fe9bf3.svg" /></a><span class="c-mobile-menu__search"><a style="color: black" href="/search"><i class="fas fa-search"></i></a></span><span class="c-mobile-menu__hamburger"><i class="fas fa-bars"></i></span></div><div class="o-container c-mobile-menu__body"><div class="c-megamenu__categories"><div class="c-megamenu__category" data-target="#mobile-membership-nav"><div class="c-megamenu__anchor">Membership</div><div class="c-megamenu__category-content" id="mobile-membership-nav"><div class="o-grid__cell o-grid__cell--width-25@medium"><div class="c-megamenu__subcategory"><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/membership/">Membership Benefits</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/membership/current/">Our Member Community</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/membership/get-involved/">Get Involved</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/membership/contact/">Become a Member</a></div></div></div><div class="o-grid__cell o-grid__cell--width-25@medium"><div class="c-megamenu__subcategory"><div class="c-megamenu__item"><span>Member-Exclusive Programs</span></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/star/registry/star-enabled-solutions/">STAR Enabled Solutions</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/trusted-cloud-consultant/registry/">Trusted Cloud Consultant</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/trusted-cloud-provider/">Trusted Cloud Provider</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/star/certified-star-auditors/">Certified STAR Auditors</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/csa-startup-showcase/registry/">CSA Startup Showcase</a></div></div></div><div class="o-grid__cell o-grid__cell--width-25@medium"><div class="c-megamenu__subcategory"><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="https://cloudsecurityalliance.my.site.com">Member Portal</a></div></div></div></div></div><hr /><div class="c-megamenu__category" data-target="#mobile-star-program-nav"><div class="c-megamenu__anchor">STAR Program</div><div class="c-megamenu__category-content" id="mobile-star-program-nav"><div class="o-grid__cell o-grid__cell--width-25@medium"><div class="c-megamenu__subcategory"><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/star/">STAR Home</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" data-turbo="false" href="/star/registry/">STAR Registry</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/star/submit/">Submit to Registry</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/star/feedback/">Provide Feedback</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/star/certified-star-auditors/">Certified STAR Auditors</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/star/star-enabled-solutions/overview/">STAR Enabled Solutions</a></div></div><div class="c-megamenu__subcategory"><div class="c-megamenu__item"><span>Stay compliant in the cloud</span></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/ccak/">CCAK Training</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/star-lead-auditor-training/">STAR Lead Auditor Training</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/gsa-schedule/">Training for Government Agencies</a></div></div></div><div class="o-grid__cell o-grid__cell--width-25@medium"><div class="c-megamenu__subcategory"><div class="c-megamenu__item"><span>Governance, Risk & Compliance Tools</span></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/cloud-controls-matrix/">Cloud Controls Matrix (CCM)</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/cloud-controls-matrix/">Consensus Assessment Initiative Questionnaire (CAIQ)</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/gdpr/eu-cloud-code-of-conduct/">EU Cloud Code of Conduct</a></div></div></div><div class="o-grid__cell o-grid__cell--width-25@medium"><div class="c-megamenu__subcategory"><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" data-turbo="false" href="/star/registry/?level=1">STAR Level 1</a></div><div class="c-megamenu__item-description">At level one organizations submit a self-assessment.</div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" data-turbo="false" href="/star/registry/?level=1">View companies at level one</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/star/#tab_levelOne">Learn about level one</a></div></div></div><div class="o-grid__cell o-grid__cell--width-25@medium"><div class="c-megamenu__subcategory"><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" data-turbo="false" href="/star/registry/?level=2">STAR Level 2</a></div><div class="c-megamenu__item-description">At level two organizations earn a certification or third-party attestation.</div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" data-turbo="false" href="/star/registry/?level=2">View companies at level two</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/star/#tab_levelTwo">Learn about level two</a></div></div></div></div></div><hr /><div class="c-megamenu__category" data-target="#mobile-certificates-training-nav"><div class="c-megamenu__anchor">Certificates & Training</div><div class="c-megamenu__category-content" id="mobile-certificates-training-nav"><div class="o-grid__cell o-grid__cell--width-25@medium"><div class="c-megamenu__subcategory"><div class="c-megamenu__item"><span>Online Education Platforms</span></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="https://knowledge.cloudsecurityalliance.org">Knowledge Center</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="https://exams.cloudsecurityalliance.org">CSA Exams</a></div></div><div class="c-megamenu__subcategory"><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/events/">Events</a></div><div class="c-megamenu__item-description">Learn and network while you earn CPE credits.</div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" data-turbo="false" href="/events/virtual-and-webinars/">Virtual Events & Webinars</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/sponsor/">Event Sponsorships</a></div></div></div><div class="o-grid__cell o-grid__cell--width-25@medium"><div class="c-megamenu__subcategory"><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/">Certificates</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/ccsk/">Certificate of Cloud Security Knowledge (CCSK)</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/ccak/">Certificate of Cloud Auditing Knowledge (CCAK)</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/cczt/">Certificate of Competence in Zero Trust (CCZT)</a></div></div><div class="c-megamenu__subcategory"><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/digital-badges/">Digital Badges</a></div></div></div><div class="o-grid__cell o-grid__cell--width-25@medium"><div class="c-megamenu__subcategory"><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/">Trainings</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/cloud-infrastructure-security-training">Cloud Infrastructure Security Training</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/star-lead-auditor-training/">STAR Lead Auditor Training</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/advanced-cloud-security-practitioner-training">Advanced Cloud Security Practitioner (ACSP) Training</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/train-the-trainer/">CCSK Train the Trainer</a></div></div></div><div class="o-grid__cell o-grid__cell--width-25@medium"><div class="c-megamenu__subcategory"><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/partner#become_partner">Training Network</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/instructors/">Become an Instructor</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/training-partners/">Become a Training Partner</a></div></div><div class="c-megamenu__subcategory"><div class="c-megamenu__item"><span>Specialized Training Options</span></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/business/">Train my entire team</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/gsa-schedule/">Training for Government Agencies</a></div></div></div></div></div><hr /><div class="c-megamenu__category" data-target="#mobile-research-nav"><div class="c-megamenu__anchor">Research</div><div class="c-megamenu__category-content" id="mobile-research-nav"><div class="o-grid__cell o-grid__cell--width-25@medium"><div class="c-megamenu__subcategory"><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/">CSA Research</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/publications">Latest Research</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/working-groups/">Working Groups</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/chapters/">Chapters</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/contribute#peer-reviews">Open Peer Reviews</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/topics">Research Topics</a></div></div><div class="c-megamenu__subcategory"><div class="c-megamenu__item"><span>Strategic Initiatives</span></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/working-groups/artificial-intelligence/">AI Safety Initiative</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/zt/">Zero Trust Advancement Center</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/cxo-trust/">CxO Trust</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/trusted-cloud-consultant/">Trusted Cloud Consultant</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/fincloud-security">FinCloud Security</a></div></div><div class="c-megamenu__subcategory"><div class="c-megamenu__item"><span>Thought Leadership</span></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" data-turbo="false" href="/events/virtual-and-webinars/?event_kind=Webinar">CloudBytes Webinars</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/blog/">Blog</a></div></div></div><div class="o-grid__cell o-grid__cell--width-25@medium"><div class="c-megamenu__subcategory"><div class="c-megamenu__item"><span>Getting Started with CSA Research</span></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/guidance/">Cloud security best practices</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/cloud-controls-matrix/">Assess your cloud compliance</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/artifacts/star-level-1-security-questionnaire-caiq-v4/">Security questionnaire for vendors</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/working-groups/top-threats/">Top threats to cloud computing</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/cloud-security-glossary">Cloud Security Glossary</a></div></div><div class="c-megamenu__subcategory"><div class="c-megamenu__item"><span>Awards & Recognition</span></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/juanita-koilpillai/service-award/">Juanita Koilpillai Awards</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/fellowship#fellows">Research Fellows</a></div></div></div><div class="o-grid__cell o-grid__cell--width-25@medium"><div class="c-megamenu__subcategory"><div class="c-megamenu__item"><span>Critical Topics</span></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/working-groups/artificial-intelligence">AI Safety Initiative</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/working-groups/ai-technology-and-risk">AI Technology and Risk</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/working-groups/ai-governance-compliance">AI Governance & Compliance</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/working-groups/ai-controls">AI Controls</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/working-groups/ai-organizational-responsibilities">AI Organizational Responsibilities</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/working-groups/enterprise-architecture">Enterprise Architecture</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/working-groups/blockchain">Blockchain</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/working-groups/zero-trust">Zero Trust</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/working-groups/devsecops">DevSecOps</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/working-groups/top-threats">Top Threats</a></div></div></div></div></div><hr /><a class="c-megamenu__anchor" href="https://cloudsecurityalliance.org/cloud-newbie">Cloud 101</a><a class="c-megamenu__anchor" rel="noopener" target="_blank" href="https://circle.cloudsecurityalliance.org/">Circle</a><a class="c-megamenu__anchor" href="https://cloudsecurityalliance.org/events/">Events</a><a class="c-megamenu__anchor" href="https://cloudsecurityalliance.org/blog/">Blog</a><div class="u-pb16"><form class="c-megamenu__anchor" method="post" action="/auth/auth0"><button data-turbo="false" type="submit">Sign In</button><input type="hidden" name="authenticity_token" value="U6JgOkmi8KOaEHstoeBMDENjEQAjjEgh_RqOFINcgs4W21BSL0lyDVnctGAv_tTzKHCExVn8p4YfR2JY6FZLQg" autocomplete="off" /></form></div></div></div></div></div><div class="app_notification o-area o-area--inverse u-centered u-inverse u-pt8 u-pb8 u-bg-color-blue-300" data-controller="record-link-interaction" data-record-link-interaction-action-value="click" data-record-link-interaction-interactable-id-value="310" data-record-link-interaction-interactable-type-value="AppNotification"><small class="u-text-color-white"><div class="trix-content"> <div>Help shape cloud security standards! Join CSA’s <a href="https://cloudsecurityalliance.org/research/working-groups/cloud-controls-matrix">Cloud Controls Matrix (CCM) Working Group</a>.</div> </div> </small></div></header><main class="c-layout-main"><div class="c-container"><div class="o-container"></div></div><div class="o-area o-area--layered o-area--separated o-area--inverse o-area--dark-gradient-overlay"><div class="o-area__layer" style="background-image: url(/assets/c-level/cxo-hero-cropped-1b39e7f5b217ddc17e8ef1ba76b5bbe522f3afa6d63c8086c813da4132230d39.jpg);"></div><div class="o-area__top-layer"><div class="o-container"><div class="o-grid o-grid--small-full o-grid--medium-full o-grid--large-fit"></div><div class="o-grid__cell o-grid__cell--width-50@medium"><h1><span>CSA CxO Trust</span></h1><h5 class="u-text-color-gray-50">A broad-based initiative to elevate the knowledge of cloud computing and cybersecurity among organizational executive teams and governing bodies.</h5></div></div></div></div><div class="o-area"><div class="c-nav"><div class="o-container"><div class="c-nav__item"><a class="c-nav__anchor c-nav__anchor--active" href="/cxo-trust">CxO Home</a></div><div class="c-nav__item"><a class="c-nav__anchor" href="/cxo-trust#advisory_council">Advisory Council</a></div><div class="c-nav__item"><a class="c-nav__anchor" target="_blank" href="/research/working-groups/cxo-trust-working-group">Working Group</a></div><div class="c-nav__item"><a data-turbo="false" class="c-nav__anchor" target="_blank" href="/events/virtual-and-webinars?event_topic=cxo">Events</a></div><div class="c-nav__item"><a class="c-nav__anchor" href="/cxo-trust/resources">Resources</a></div></div></div></div><div class="o-area"><div class="o-container"><div class="c-breadcrumbs"><div class="c-breadcrumbs__item"><a href="/">Home</a></div><div class="c-breadcrumbs__item">CSA CxO Trust</div></div></div></div><div class="o-area o-area--separated"><div class="o-container"><div class="o-grid o-grid--small-full o-grid--medium-full o-grid--large-fit"><div class="o-grid__cell o-grid__cell--width-80@medium o-grid__cell--offset-10@medium"><p><span>Our mission is to help Chief Information Security Officers (CISOs) better understand the priorities of their peers within the C-Suite and to also enable CISOs with tools to communicate business risk, governance, and compliance issues of cloud computing and cybersecurity in the proper context to their peers within the C-Suite and their boards of directors. This initiative will be forward looking and innovative in advancing cloud computing and cybersecurity within the C-Suite. If you're interested in learning more, you can</span> <a href="/articles/cloud-security-alliance-announces-cxo-trust-initiative-to-elevate-cloud-and-cybersecurity-knowledge-among-executives">read the press release</a> <span>or email the CSA President, Illena Armstrong, at</span> <a href="/cdn-cgi/l/email-protection#3f5c47504b4d4a4c4b7f5c53504a5b4c5a5c4a4d564b465e5353565e515c5a11504d58"><span class="__cf_email__" data-cfemail="0a6972657e787f797e4a6966657f6e796f697f78637e736b6666636b64696f2465786d">[email protected]</span></a><span>.</span></p></div></div></div></div><div class="o-area o-area--separated o-area--alternating"><div class="o-container"><h2 class="c-heading c-heading--section">Latest News for C-Level Executives</h2><div class="o-true-grid o-true-grid--two-columns"><div class="c-grid-card c-grid-card--actionable"><div class="c-grid-card__image"><img data-retina-src="/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6Mzk4NTcsInB1ciI6ImJsb2JfaWQifX0=--62659bcbe80672c40dd64eaf9d6e54a7f90565ee/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiOTEweDY4Ml4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--bf54585e63998269c54c5320d41e4b0753c3b901/what-is-a-virtual-ciso.jpg" alt="What is a Virtual CISO (vCISO) and Should You Have One on Your Team?" class="b-unified__image" src="/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6Mzk4NTcsInB1ciI6ImJsb2JfaWQifX0=--62659bcbe80672c40dd64eaf9d6e54a7f90565ee/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiNDU1eDM0MV4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--3c8fcab71fdc366ce173ef612890ffae59af748f/what-is-a-virtual-ciso.jpg" /></div><div class="c-grid-card__content"><div class="c-grid-card__item"><h6 class="u-mb0">What is a Virtual CISO (vCISO) and Should You Have One on Your Team?</h6><p class="u-small"></p><div class="u-mb16"> </div><p class="u-text-color-gray-300">February 21, 2025</p></div><a class="u-position-center" target="_blank" rel="noopener" href="https://cloudsecurityalliance.org/blog/2025/02/18/what-is-a-virtual-ciso-vciso-and-should-you-have-one-on-your-team"></a></div></div><div class="c-grid-card c-grid-card--actionable"><div class="c-grid-card__image"><img data-retina-src="/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6Mzk3NzAsInB1ciI6ImJsb2JfaWQifX0=--52133ae33d69d58222c0fed002b95602404d71e9/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJwbmciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiOTEweDY4Ml4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--ebb9d43487e6b6cc28b331af595338fe4bcfc400/CxO%20Trust%20Webinar%20Series%20BrightTALK%20800x600%20latest%20news.png" alt="Navigating the New Year: What to Expect in 2025" class="b-unified__image" src="/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6Mzk3NzAsInB1ciI6ImJsb2JfaWQifX0=--52133ae33d69d58222c0fed002b95602404d71e9/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJwbmciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiNDU1eDM0MV4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--6135f83e51b30915b49861c90a52746426b01e85/CxO%20Trust%20Webinar%20Series%20BrightTALK%20800x600%20latest%20news.png" /></div><div class="c-grid-card__content"><div class="c-grid-card__item"><h6 class="u-mb0">Navigating the New Year: What to Expect in 2025</h6><p class="u-small"></p><div class="u-mb16"> </div><p class="u-text-color-gray-300">February 18, 2025</p></div><a class="u-position-center" target="_blank" rel="noopener" href="https://www.brighttalk.com/webcast/16947/635724"></a></div></div><div class="c-grid-card c-grid-card--actionable"><div class="c-grid-card__image"><img data-retina-src="/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6Mzk3MTgsInB1ciI6ImJsb2JfaWQifX0=--00daa6cc04f2a42d6152601a685c82326a40700d/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiOTEweDY4Ml4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--bf54585e63998269c54c5320d41e4b0753c3b901/repsol.jpg" alt="How Repsol’s DLP Strategy Enables a Fearless Embrace of GenAI" class="b-unified__image" src="/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6Mzk3MTgsInB1ciI6ImJsb2JfaWQifX0=--00daa6cc04f2a42d6152601a685c82326a40700d/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiNDU1eDM0MV4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--3c8fcab71fdc366ce173ef612890ffae59af748f/repsol.jpg" /></div><div class="c-grid-card__content"><div class="c-grid-card__item"><h6 class="u-mb0">How Repsol’s DLP Strategy Enables a Fearless Embrace of GenAI</h6><p class="u-small"></p><div class="u-mb16"> </div><p class="u-text-color-gray-300">February 18, 2025</p></div><a class="u-position-center" target="_blank" rel="noopener" href="https://cloudsecurityalliance.org/blog/2025/02/13/how-repsol-s-dlp-strategy-enables-a-fearless-embrace-of-genai"></a></div></div><div class="c-grid-card c-grid-card--actionable"><div class="c-grid-card__image"><img data-retina-src="/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6Mzk2NTEsInB1ciI6ImJsb2JfaWQifX0=--492c1750b5ed7014ce83ca53da54c27e3000fcef/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiOTEweDY4Ml4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--bf54585e63998269c54c5320d41e4b0753c3b901/20.jpg" alt="2024 to 2025: How GRC Trends are Reshaping the Industry" class="b-unified__image" src="/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6Mzk2NTEsInB1ciI6ImJsb2JfaWQifX0=--492c1750b5ed7014ce83ca53da54c27e3000fcef/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiNDU1eDM0MV4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--3c8fcab71fdc366ce173ef612890ffae59af748f/20.jpg" /></div><div class="c-grid-card__content"><div class="c-grid-card__item"><h6 class="u-mb0">2024 to 2025: How GRC Trends are Reshaping the Industry</h6><p class="u-small"></p><div class="u-mb16"> </div><p class="u-text-color-gray-300">February 13, 2025</p></div><a class="u-position-center" target="_blank" rel="noopener" href="https://cloudsecurityalliance.org/blog/2025/02/05/from-2024-to-2025-how-these-grc-trends-are-reshaping-the-industry"></a></div></div><div class="c-grid-card c-grid-card--actionable"><div class="c-grid-card__image"><img data-retina-src="/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6Mzk1NDUsInB1ciI6ImJsb2JfaWQifX0=--45a47979480b06a0cebb199dbc4685111d592661/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiOTEweDY4Ml4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--bf54585e63998269c54c5320d41e4b0753c3b901/when.jpg" alt="When Technology Isn’t the Problem: The Psychology of IT Transformation" class="b-unified__image" src="/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6Mzk1NDUsInB1ciI6ImJsb2JfaWQifX0=--45a47979480b06a0cebb199dbc4685111d592661/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiNDU1eDM0MV4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--3c8fcab71fdc366ce173ef612890ffae59af748f/when.jpg" /></div><div class="c-grid-card__content"><div class="c-grid-card__item"><h6 class="u-mb0">When Technology Isn’t the Problem: The Psychology of IT Transformation</h6><p class="u-small"></p><div class="u-mb16"> </div><p class="u-text-color-gray-300">February 11, 2025</p></div><a class="u-position-center" target="_blank" rel="noopener" href="https://cloudsecurityalliance.org/blog/2025/02/06/when-technology-isn-t-the-problem-the-psychology-of-it-transformation"></a></div></div><div class="c-grid-card c-grid-card--actionable"><div class="c-grid-card__image"><img data-retina-src="/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6Mzk0NjQsInB1ciI6ImJsb2JfaWQifX0=--8fd4102765033ecbf7d14ec38faeaed4cc6be6e6/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiOTEweDY4Ml4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--bf54585e63998269c54c5320d41e4b0753c3b901/time%20to%20split.jpg" alt="It’s Time to Split the CISO Role if We Are to Save It" class="b-unified__image" src="/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6Mzk0NjQsInB1ciI6ImJsb2JfaWQifX0=--8fd4102765033ecbf7d14ec38faeaed4cc6be6e6/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiNDU1eDM0MV4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--3c8fcab71fdc366ce173ef612890ffae59af748f/time%20to%20split.jpg" /></div><div class="c-grid-card__content"><div class="c-grid-card__item"><h6 class="u-mb0">It’s Time to Split the CISO Role if We Are to Save It</h6><p class="u-small"></p><div class="u-mb16"> </div><p class="u-text-color-gray-300">February 7, 2025</p></div><a class="u-position-center" target="_blank" rel="noopener" href="https://cloudsecurityalliance.org/blog/2024/11/22/it-s-time-to-split-the-ciso-role-if-we-are-to-save-it"></a></div></div></div><p class="u-align-right"><a href="/announcements/cxo-trust"><span>View all announcements</span> <i class="fas fa-long-arrow-alt-right"></i></a></p></div></div><div class="o-area o-area--color-blue-800 o-area--inverse o-area--separated"><div class="o-container"><h3 class="u-centered">Of organizations in the cloud:</h3><div class="o-grid o-grid--small-full o-grid--medium-full o-grid--large-fit u-separate"><div class="o-grid__cell u-centered"><img width="150" src="/assets/c-level/stat-1-e24b9c77dd67bf1187b7b95d8ef1af15a7c8520001ece1db8565c6f02a77c963.svg" /><h5 class="u-mb0"><span class="u-text-color-blue-300">47%</span> <span>are concerned</span></h5><p class="u-text-color-gray-50">about their staff lacking cloud expertise.</p></div><div class="o-grid__cell u-centered"><img width="150" src="/assets/c-level/stat-2-88d6e0148d590f1989a04b82141e3774784bb27768355dd75818d9a1b377be54.svg" /><h5 class="u-mb0"><span class="u-text-color-blue-300">Over 50%</span> <span>are running</span></h5><p class="u-text-color-gray-50">41% or more of their workloads in a public cloud.</p></div><div class="o-grid__cell u-centered"><img width="150" src="/assets/c-level/stat-3-d7195bf9aa61ca07ab214b0c6dba0806bd233abc9dd1dd7817b83fb9538ae626.svg" /><h5 class="u-mb0"><span class="u-text-color-blue-300">41%</span> <span>are unsure</span></h5><p class="u-text-color-gray-50">whether they have experienced a cloud-related operational incident in the last 12 months.</p></div></div><p class="u-text-color-gray-50 u-mb68" style="line-height: 1em;"><small><a href="/artifacts/state-of-cloud-security-concerns-challenges-and-incidents">Source: State of Cloud Security Concerns | CSA</a></small><br /><small>*This survey was submitted to nearly 1900 IT and security professionals.</small></p><h3 class="u-centered">Cloud may be the new normal, but numerous organizations:</h3><div class="o-grid o-grid--small-full o-grid--medium-full o-grid--large-fit"><div class="o-grid__cell u-centered"><img width="150" src="/assets/c-level/stat-4-75da30c659ce085632e0ee54ea96775c984d1619cfb01d3ec29c274c440dfffa.svg" /><h5 class="u-mb0"><span class="u-text-color-orange-500">Are just beginning</span><br /><span class="u-text-color-gray-50">their cloud journeys</span></h5></div><div class="o-grid__cell u-centered"><img width="150" src="/assets/c-level/stat-5-cc100fb8cb2554422c30b449c5e27fef70b422718b8275e3c6e396df5983e236.svg" /><h5 class="u-mb0"><span class="u-text-color-orange-500">Have more sophisticated</span><br /><span class="u-text-color-gray-50">implementations</span></h5></div><div class="o-grid__cell u-centered"><img width="150" src="/assets/c-level/stat-6-84a7c94a0fd68384748ad6819ecc2a3a6aaee959452b07163ac4ca835a19bc78.svg" /><h5 class="u-mb0"><span class="u-text-color-orange-500">Have weaker-than-expected</span><br /><span class="u-text-color-gray-50">knowledge of security requirements</span></h5></div></div></div></div><div class="o-area o-area--separated o-area--alternating"><div class="o-container"><div class="o-grid o-grid--small-full o-grid--medium-full o-grid--large-fit"><div class="o-grid__cell o-grid__cell--width-60@medium o-grid__cell--offset-20@medium"><h2 class="c-heading c-heading--section">Addressing These Challenges</h2></div></div><div class="o-grid o-grid--small-full o-grid--medium-full o-grid--large-fit u-separate"><div class="o-grid__cell o-grid__cell--width-40@medium"><img src="/assets/c-level/stock-f964b4c756fac1f6c663cb85031f83f61d6f16b21ad3eb483bb6f05f1bfbb7c2.jpg" /></div><div class="o-grid__cell"><h5><strong>CSA will form a trusted community of CISOs and other C-level stakeholders</strong> <span>who will leverage the collective voice of this group to further influence and drive the:</span></h5><p><ul class="u-text-color-gray-400"><li>Evolution and common understanding of cloud and cloud-driven technologies knowledge;</li><li>Establishment and advancement of cloud security standards, guidance, research and more;</li><li>Professional development and continuous education of much-needed cloud experts;</li><li>Improvements in cloud and cybersecurity services and products;</li><li>Progression and passage of related and necessary regulations or legislation;</li><li>Unification of cloud and cybersecurity messaging and knowledge sharing among organizations’ C-suite stakeholders, as well as in the wider industry and beyond.</li></ul></p></div></div><p><span>This group will complement existing CISO and cybersecurity networks. If interested in working with us on ours, which is uniquely positioned given our 12 years as a non-profit helping the industry secure the cloud,</span> <a href="/cdn-cgi/l/email-protection#13706b7c676166606753707f7c667760767066617a676a727f7f7a727d70763d7c6174">please reach out to CSA President Illena Armstrong</a><span>.</span></p><h5>Learn more about CSA CxO Trust.</h5><p><span>To gain full access to this group once it’s launched organizations will need to be a</span> <a href="/membership">CSA Corporate Members</a><span>. If you're interested in learning more, please email the CSA President, Illena Armstrong, at</span> <a href="/cdn-cgi/l/email-protection#7013081f040205030430131c1f05140315130502190409111c1c19111e13155e1f0217"><span class="__cf_email__" data-cfemail="294a51465d5b5c5a5d694a45465c4d5a4c4a5c5b405d504845454048474a4c07465b4e">[email protected]</span></a><span>.</span></p></div></div><div class="o-area o-area--separated o-area--alternating"><div class="o-container"><h2 class="c-heading c-heading--section u-mt40">How to Get Involved</h2><div class="o-grid o-grid--small-full o-grid--medium-full o-grid--large-fit"><div class="o-grid__cell"><h3>Research Working Group</h3><p class="u-text-color-gray-400">The CSA CxO Trust Working Group will conduct research consisting of best practices, metrics, surveys, C-level presentations and other tools in support of the overall initiative mission. The working group will be open to professionals and subject-matter experts from both CSA member and non-member organizations. The working group will have its kickoff meeting in Q3 of 2021, interested individuals can informally discuss the issues in our Circle community now.</p><p class="u-text-color-gray-400"><span>Along with other projects, this group will regularly update and maintain a document listing the</span> <a href="/artifacts/top-cloud-priorities-for-cxos">Cloud Priorities for the CxOs</a><span>. The roadmap of other deliverables for this group will include:</span></p><ul class="u-text-color-gray-400 u-separate"><li>Original research publications,</li><li>Executive summaries of CSA research publications with context for C-Suite readers,</li><li>Curation of third-party research and data,</li><li>Joint research with outside groups.</li></ul><p><a class="c-button c-button--primary" href="/research/working-groups/cxo-trust-working-group">Learn More</a></p></div><div class="o-grid__cell o-grid__cell--width-30@medium"><img src="/assets/c-level/Research-ba825fe43837013e30aca0872b02d1424d44582c70c0cc281f8534a7cac41273.png" /></div></div></div></div><div class="o-area o-area--separated o-area--alternating" id="advisory_council"><div class="o-container"><h2 class="c-heading c-heading--section">Advisory Council</h2><div class="o-grid o-grid--small-full o-grid--medium-full o-grid--large-fit u-separate"><div class="o-grid__cell o-grid__cell--width-80@medium o-grid__cell--offset-10@medium"><p><span>CSA looks to our advisory council to contribute to and advise on the overall strategy and roadmap of this broad-based program’s offerings. In addition to generally advising on the C-Suite Initiative and related offerings, the Council also helps guide our</span> <a href="/research/working-groups/cxo-trust-working-group">CxO Research Working Group</a><span>. This council is not only made up of CISOs, but also Chief Information/Chief Technology Officers, Chief Risk Officers, Chief Privacy Officers, Chief Compliance Officers, Chief Operating Officers, Chief Executive Officers and other C-level stakeholders engaged in driving and supporting their organizations’ cloud computing and cloud security programs.</span></p><p><span>This council is reserved for the participation of C-level executives from our</span> <a href="/membership/current">corporate members</a><span>. If you have any questions you can email the CSA President, Illena Armstrong, at</span> <a href="/cdn-cgi/l/email-protection#72110a1d060007010632111e1d071601171107001b060b131e1e1b131c11175c1d0015"><span class="__cf_email__" data-cfemail="3b5843544f494e484f7b5857544e5f485e584e49524f425a5757525a55585e1554495c">[email protected]</span></a><span>.</span></p></div></div><div class="c-headshot-group"><div class="c-combo-headshot "><div data-obscurable="true" data-obscurable-width="500"><div class="c-combo-headshot__content"><div class="c-emblem"><div class="c-emblem__layer"><img data-retina-src="/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NTA0MywicHVyIjoiYmxvYl9pZCJ9fQ==--43a39158fbfade45b91d5bb76e028ec2981b8d40/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiMzYweDQ4MF4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--184082a01f7e1e6415e4d6e03b7cd8002a80db59/mike%20anderson.jpg" alt="Mike Anderson" style="width: 100%; height: 100%; object-fit: cover;" src="/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NTA0MywicHVyIjoiYmxvYl9pZCJ9fQ==--43a39158fbfade45b91d5bb76e028ec2981b8d40/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiMTgweDI0MF4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--ce1f0b273c14895214513c640abe6c284218f1db/mike%20anderson.jpg" /></div></div><div class="c-combo-headshot__label">Mike Anderson</div><div class="c-combo-headshot__label">Chief Digital and Information Officer, Netskope</div></div><div class="b-obscured u-align-left"><p class="u-mb0"><strong>Mike Anderson</strong></p><p class="u-text-color-gray-400">Chief Digital and Information Officer, Netskope</p><p><p>Mike Anderson brings over 20 years of experience to his role as Chief Digital and Information Officer for Netskope, having built and led high-performing teams across a wide range of disciplines, including sales, operations, business development, and information technology. He is considered a thought leader, visionary, and speaker on digital transformation, leadership, and business agility. <br></p></p><p><a href="/profiles/mike-anderson"><span>Read more</span> <i class="fas fa-long-arrow-alt-right"></i></a></p></div></div></div><div class="c-combo-headshot "><div data-obscurable="true" data-obscurable-width="500"><div class="c-combo-headshot__content"><div class="c-emblem"><div class="c-emblem__layer"><img data-retina-src="/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NTA0NiwicHVyIjoiYmxvYl9pZCJ9fQ==--459d317b08f4532093370230f3c873e103e20a5e/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiMzYweDQ4MF4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--184082a01f7e1e6415e4d6e03b7cd8002a80db59/raj%20badhwar.jpg" alt="Raj Badhwar" style="width: 100%; height: 100%; object-fit: cover;" src="/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NTA0NiwicHVyIjoiYmxvYl9pZCJ9fQ==--459d317b08f4532093370230f3c873e103e20a5e/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiMTgweDI0MF4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--ce1f0b273c14895214513c640abe6c284218f1db/raj%20badhwar.jpg" /></div></div><div class="c-combo-headshot__label">Raj Badhwar</div><div class="c-combo-headshot__label">Field Chief Information Security Officer, Oracle</div></div><div class="b-obscured u-align-left"><p class="u-mb0"><strong>Raj Badhwar</strong></p><p class="u-text-color-gray-400">Field Chief Information Security Officer, Oracle</p><p><p>Raj Badhwar has 25+ years of experience within Cybersecurity and IT. He is currently the CISO for Voya Financial and previously held senior Security/IT leadership roles at AIG, BAE Systems, Bank of America, and AOL Time Warner. <br></p></p><p><a href="/profiles/raj-badhwar"><span>Read more</span> <i class="fas fa-long-arrow-alt-right"></i></a></p></div></div></div><div class="c-combo-headshot "><div data-obscurable="true" data-obscurable-width="500"><div class="c-combo-headshot__content"><div class="c-emblem"><div class="c-emblem__layer"><img data-retina-src="/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NTA0OCwicHVyIjoiYmxvYl9pZCJ9fQ==--e3c3d369e91518aa19e756f3e94a590a7d629074/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiMzYweDQ4MF4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--184082a01f7e1e6415e4d6e03b7cd8002a80db59/rolf%20becker.jpg" alt="Rolf Becker" style="width: 100%; height: 100%; object-fit: cover;" src="/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NTA0OCwicHVyIjoiYmxvYl9pZCJ9fQ==--e3c3d369e91518aa19e756f3e94a590a7d629074/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiMTgweDI0MF4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--ce1f0b273c14895214513c640abe6c284218f1db/rolf%20becker.jpg" /></div></div><div class="c-combo-headshot__label">Rolf Becker</div><div class="c-combo-headshot__label">Co-Founder and Chair at UBS</div></div><div class="b-obscured u-align-left"><p class="u-mb0"><strong>Rolf Becker</strong></p><p class="u-text-color-gray-400">Co-Founder and Chair at UBS</p><p><p>Rolf A. Becker is Head Service Control Governance at UBS, globally responsible for Cloud Governance regarding Risk and Control over the UBS Group Cloud adoption and for outsourcing to external cloud-based 3rd party services. Previous roles have been the management of the Cyber and Information Security Portfolio reporting to the UBS CISO at a global level, and the management of the Client Data Confidentiality Program Unstructured Data Protec...</p></p><p><a href="/profiles/rolf-becker"><span>Read more</span> <i class="fas fa-long-arrow-alt-right"></i></a></p></div></div></div><div class="c-combo-headshot "><div data-obscurable="true" data-obscurable-width="500"><div class="c-combo-headshot__content"><div class="c-emblem"><div class="c-emblem__layer"><img data-retina-src="/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NTA0NSwicHVyIjoiYmxvYl9pZCJ9fQ==--019237cb8a52be5790fe2c56eb27b1bf65fa88c6/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiMzYweDQ4MF4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--184082a01f7e1e6415e4d6e03b7cd8002a80db59/rachel%20bierner.jpg" alt="Rachel Bierner" style="width: 100%; height: 100%; object-fit: cover;" src="/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NTA0NSwicHVyIjoiYmxvYl9pZCJ9fQ==--019237cb8a52be5790fe2c56eb27b1bf65fa88c6/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiMTgweDI0MF4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--ce1f0b273c14895214513c640abe6c284218f1db/rachel%20bierner.jpg" /></div></div><div class="c-combo-headshot__label">Rachel Bierner</div><div class="c-combo-headshot__label">Cloud Security Leader, Wells Fargo</div></div><div class="b-obscured u-align-left"><p class="u-mb0"><strong>Rachel Bierner</strong></p><p class="u-text-color-gray-400">Cloud Security Leader, Wells Fargo</p><p><p>Rachel Kim Bierner serves as Cloud Security Leader at Wells Fargo, where she is responsible for the development and delivery of the company’s cloud security strategy and control framework. Prior to joining Wells Fargo, she led various cybersecurity and technology functions over 19 years at Bank of America. Rachel started her career as a consultant with Management implementations for clients around the world.</p></p><p><a href="/profiles/rachel-bierner"><span>Read more</span> <i class="fas fa-long-arrow-alt-right"></i></a></p></div></div></div><div class="c-combo-headshot "><div data-obscurable="true" data-obscurable-width="500"><div class="c-combo-headshot__content"><div class="c-emblem"><div class="c-emblem__layer"><img data-retina-src="/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NTAzNSwicHVyIjoiYmxvYl9pZCJ9fQ==--0454b5b1d4022c33473decf14df81591a5fb6740/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiMzYweDQ4MF4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--184082a01f7e1e6415e4d6e03b7cd8002a80db59/fred%20budd.jpg" alt="Fred Budd" style="width: 100%; height: 100%; object-fit: cover;" src="/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NTAzNSwicHVyIjoiYmxvYl9pZCJ9fQ==--0454b5b1d4022c33473decf14df81591a5fb6740/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiMTgweDI0MF4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--ce1f0b273c14895214513c640abe6c284218f1db/fred%20budd.jpg" /></div></div><div class="c-combo-headshot__label">Fred Budd</div><div class="c-combo-headshot__label">Vice President, Information Security Engineering, Mastercard</div></div><div class="b-obscured u-align-left"><p class="u-mb0"><strong>Fred Budd</strong></p><p class="u-text-color-gray-400">Vice President, Information Security Engineering, Mastercard</p><p><p>Fred Budd is serving as Vice President, Cloud Security for Mastercard. In this role, he is responsible for the protection of Mastercard’s cloud platforms and driving the evolution of security practices. Fred has over 20 years of diverse experience in security architecture, technology strategy and governance, privacy and compliance, identity management, telecommunications, IT operations, and product innovation. In the past decade, he has foc...</p></p><p><a href="/profiles/fred-budd"><span>Read more</span> <i class="fas fa-long-arrow-alt-right"></i></a></p></div></div></div><div class="c-combo-headshot "><div data-obscurable="true" data-obscurable-width="500"><div class="c-combo-headshot__content"><div class="c-emblem"><div class="c-emblem__layer"><img data-retina-src="/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6MjA2NjYsInB1ciI6ImJsb2JfaWQifX0=--d207419b6cea7b944bbc4137b8619912613cd8d4/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJwbmciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiMzYweDQ4MF4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--bd0fa977f46a66c0b0323144f5d9f0f3d0562505/alicja.png" alt="Alicja Cade" style="width: 100%; height: 100%; object-fit: cover;" src="/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6MjA2NjYsInB1ciI6ImJsb2JfaWQifX0=--d207419b6cea7b944bbc4137b8619912613cd8d4/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJwbmciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiMTgweDI0MF4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--eb486f3f6b5873e5a4f4e10b34324e47d456ee46/alicja.png" /></div></div><div class="c-combo-headshot__label">Alicja Cade</div><div class="c-combo-headshot__label">Director, Office of the CISO, Financial Services at Google Cloud</div></div><div class="b-obscured u-align-left"><p class="u-mb0"><strong>Alicja Cade</strong></p><p class="u-text-color-gray-400">Director, Office of the CISO, Financial Services at Google Cloud</p><p><p>Alicja Cade, Director, Office of the Chief Information Security Officer (OCISO), Google Cloud, is responsible for shaping cloud security and compliance approaches for financial sector institutions and partnering with GCP clients throughout their security transformation.</p><p>Prior to Google Cloud, Alicja was CISO Americas and Global Head of Data Confidentiality Operations at UBS and was CISO for Investment Banking, Group Functions and Amer...</p></p><p><a href="/profiles/alicja-cade"><span>Read more</span> <i class="fas fa-long-arrow-alt-right"></i></a></p></div></div></div><div class="c-combo-headshot "><div data-obscurable="true" data-obscurable-width="500"><div class="c-combo-headshot__content"><div class="c-emblem"><div class="c-emblem__layer"><img data-retina-src="/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NTAzNywicHVyIjoiYmxvYl9pZCJ9fQ==--f0c407d26f215ce1fcc2c9eca65a66c8a15ebceb/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiMzYweDQ4MF4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--184082a01f7e1e6415e4d6e03b7cd8002a80db59/james%20cairns.jpg" alt="James Cairns" style="width: 100%; height: 100%; object-fit: cover;" src="/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NTAzNywicHVyIjoiYmxvYl9pZCJ9fQ==--f0c407d26f215ce1fcc2c9eca65a66c8a15ebceb/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiMTgweDI0MF4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--ce1f0b273c14895214513c640abe6c284218f1db/james%20cairns.jpg" /></div></div><div class="c-combo-headshot__label">James Cairns</div><div class="c-combo-headshot__label">IT Security Lead, Bow Valley College</div></div><div class="b-obscured u-align-left"><p class="u-mb0"><strong>James Cairns</strong></p><p class="u-text-color-gray-400">IT Security Lead, Bow Valley College</p><p><p>James Cairns loves the evolving challenges of his career in IT Security. He has spent more than 15 years invested in growing his experience as he implements systems and designs solutions to help students and colleagues learn and work more effectively and efficiently. As Security Lead, Bow Valley College, he has been invited to local and national conversations with CANARIE Joint Security Project, CanSSOC, Cybera AB Secure IT, and most recent...</p></p><p><a href="/profiles/james-cairns"><span>Read more</span> <i class="fas fa-long-arrow-alt-right"></i></a></p></div></div></div><div class="c-combo-headshot "><div data-obscurable="true" data-obscurable-width="500"><div class="c-combo-headshot__content"><div class="c-emblem"><div class="c-emblem__layer"><img data-retina-src="/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NTMyNywicHVyIjoiYmxvYl9pZCJ9fQ==--6787b74b072a7bcb13f644cb5cd437252c8ccf8b/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJwbmciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiMzYweDQ4MF4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--bd0fa977f46a66c0b0323144f5d9f0f3d0562505/2.png" alt="Peter Campbell" style="width: 100%; height: 100%; object-fit: cover;" src="/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NTMyNywicHVyIjoiYmxvYl9pZCJ9fQ==--6787b74b072a7bcb13f644cb5cd437252c8ccf8b/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJwbmciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiMTgweDI0MF4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--eb486f3f6b5873e5a4f4e10b34324e47d456ee46/2.png" /></div></div><div class="c-combo-headshot__label">Peter Campbell</div><div class="c-combo-headshot__label">Chief Information Security Officer, Cigna</div></div><div class="b-obscured u-align-left"><p class="u-mb0"><strong>Peter Campbell</strong></p><p class="u-text-color-gray-400">Chief Information Security Officer, Cigna</p><p><p>Cloud Security Engineering leader responsible for security engineering and security innovation. Enables new and untried technologies, runs proof of concepts, designs and engineers security configurations and enables the business to leverage new technology safely. Led the creation of Cigna’s security assurance framework which ensures that the security vision is consistently executed. Current research focuses on the domains of sec...</p></p><p><a href="/profiles/peter-campbell"><span>Read more</span> <i class="fas fa-long-arrow-alt-right"></i></a></p></div></div></div><div class="c-combo-headshot "><div data-obscurable="true" data-obscurable-width="500"><div class="c-combo-headshot__content"><div class="c-emblem"><div class="c-emblem__layer"><img data-retina-src="/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NTIyNSwicHVyIjoiYmxvYl9pZCJ9fQ==--a2d539da3db237d4eb659f93df60eae120d6c8c5/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJwbmciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiMzYweDQ4MF4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--bd0fa977f46a66c0b0323144f5d9f0f3d0562505/3123.png" alt="Jerry Cochran" style="width: 100%; height: 100%; object-fit: cover;" src="/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NTIyNSwicHVyIjoiYmxvYl9pZCJ9fQ==--a2d539da3db237d4eb659f93df60eae120d6c8c5/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJwbmciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiMTgweDI0MF4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--eb486f3f6b5873e5a4f4e10b34324e47d456ee46/3123.png" /></div></div><div class="c-combo-headshot__label">Jerry Cochran</div><div class="c-combo-headshot__label">CISO & Acting CIO, Cybersecurity & Technical Ops Director & RD2C R&D Initiative Leader (NSD), Pacific Northwest National Laboratory (PNNL)</div></div><div class="b-obscured u-align-left"><p class="u-mb0"><strong>Jerry Cochran</strong></p><p class="u-text-color-gray-400">CISO & Acting CIO, Cybersecurity & Technical Ops Director & RD2C R&D Initiative Leader (NSD), Pacific Northwest National Laboratory (PNNL)</p><p><p>A 35-year+ IT industry veteran, Jerry Cochran serves as Pacific Northwest National Laboratory’s Deputy Chief Information Officer (D/CIO) and division director, Cybersecurity & DigitalOps Division in the Computing & IT Directorate. In this role, Jerry oversees enterprise cybersecurity as well as IT engineering, operations, and support. Jerry also leads a 5-year cybersecurity research & development initiative (LDRD) - RD2C for the National S...</p></p><p><a href="/profiles/jerry-cochran"><span>Read more</span> <i class="fas fa-long-arrow-alt-right"></i></a></p></div></div></div><div class="c-combo-headshot "><div data-obscurable="true" data-obscurable-width="500"><div class="c-combo-headshot__content"><div class="c-emblem"><div class="c-emblem__layer"><img data-retina-src="/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NzcwLCJwdXIiOiJibG9iX2lkIn19--d08845e92cea45a7cd2795cc1cfdff88dffab2d7/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGVnIiwiYXV0b19vcmllbnQiOnRydWUsInJvdGF0ZSI6MCwiZ3Jhdml0eSI6ImNlbnRlciIsInJlc2l6ZSI6IjM2MHg0ODBeIiwiYmFja2dyb3VuZCI6Im5vbmUifSwicHVyIjoidmFyaWF0aW9uIn19--f7fcb22904f5fc371fd077bb2c056b7b67053a07/cullinane.jpeg" alt="Dave Cullinane" style="width: 100%; height: 100%; object-fit: cover;" src="/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NzcwLCJwdXIiOiJibG9iX2lkIn19--d08845e92cea45a7cd2795cc1cfdff88dffab2d7/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGVnIiwiYXV0b19vcmllbnQiOnRydWUsInJvdGF0ZSI6MCwiZ3Jhdml0eSI6ImNlbnRlciIsInJlc2l6ZSI6IjE4MHgyNDBeIiwiYmFja2dyb3VuZCI6Im5vbmUifSwicHVyIjoidmFyaWF0aW9uIn19--bce64e6cd8e04ad10bf1b7b6142bab4d14a520af/cullinane.jpeg" /></div></div><div class="c-combo-headshot__label">Dave Cullinane</div><div class="c-combo-headshot__label">TruSTAR Founder and CSA Chairman</div></div><div class="b-obscured u-align-left"><p class="u-mb0"><strong>Dave Cullinane</strong></p><p class="u-text-color-gray-400">TruSTAR Founder and CSA Chairman</p><p><p>Dave Cullinane is the Founder of TruSTAR Technology. Prior to TruSTAR, Dave served for 5+ years as the Chief Information Security Officer and VP of Global Fraud, Risk and Security for eBay and its many global businesses (StubHub, InternetAuction.co, GSI Commerce). He has more than 30 years of professional security experience building and managing cyber security and incident response teams.</p><p>Dave is also the past President and Chair...</p></p><p><a href="/profiles/dave-cullinane"><span>Read more</span> <i class="fas fa-long-arrow-alt-right"></i></a></p></div></div></div><div class="c-combo-headshot "><div data-obscurable="true" data-obscurable-width="500"><div class="c-combo-headshot__content"><div class="c-emblem"><div class="c-emblem__layer"><img data-retina-src="/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NzcxOCwicHVyIjoiYmxvYl9pZCJ9fQ==--1211a19e7c83971a0cea49e3f7a3da637de152e0/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiMzYweDQ4MF4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--184082a01f7e1e6415e4d6e03b7cd8002a80db59/rickheadshot2.jpg" alt="Rick Doten" style="width: 100%; height: 100%; object-fit: cover;" src="/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NzcxOCwicHVyIjoiYmxvYl9pZCJ9fQ==--1211a19e7c83971a0cea49e3f7a3da637de152e0/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiMTgweDI0MF4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--ce1f0b273c14895214513c640abe6c284218f1db/rickheadshot2.jpg" /></div></div><div class="c-combo-headshot__label">Rick Doten</div><div class="c-combo-headshot__label">VP, Information Security, and Chief Information Security Officer, Healthcare Enterprises, Centene Corporation</div></div><div class="b-obscured u-align-left"><p class="u-mb0"><strong>Rick Doten</strong></p><p class="u-text-color-gray-400">VP, Information Security, and Chief Information Security Officer, Healthcare Enterprises, Centene Corporation</p><p><p>Rick is VP, Information Security at Centene Corporation, and CISO of Carolina Complete Health based in Charlotte, NC. Rick supports both the NC health plan and corporate Centene in a cybersecurity leadership role. </p><p>In his prior role, Rick worked as Virtual CISO supporting international companies. Rick also developed the curriculum for a Cybersecurity Master’s degree program for an International University.</p><p>Rick is an avid speak...</p></p><p><a href="/profiles/rick-doten"><span>Read more</span> <i class="fas fa-long-arrow-alt-right"></i></a></p></div></div></div><div class="c-combo-headshot "><div data-obscurable="true" data-obscurable-width="500"><div class="c-combo-headshot__content"><div class="c-emblem"><div class="c-emblem__layer"><img data-retina-src="/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6MTQ1MjIsInB1ciI6ImJsb2JfaWQifX0=--d4986bbb9c64c01e0706b107f001352e89382b3d/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJKUEciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiMzYweDQ4MF4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--b8db3099f95dae852c707805800b4f49e39e89da/Ian_Farquhar_003.JPG" alt="Ian Farquhar" style="width: 100%; height: 100%; object-fit: cover;" src="/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6MTQ1MjIsInB1ciI6ImJsb2JfaWQifX0=--d4986bbb9c64c01e0706b107f001352e89382b3d/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJKUEciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiMTgweDI0MF4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--59570ba2131096745c0042e3491379ca841e462e/Ian_Farquhar_003.JPG" /></div></div><div class="c-combo-headshot__label">Ian Farquhar</div><div class="c-combo-headshot__label">Field Chief Technology Officer (Global), Gigamon</div></div><div class="b-obscured u-align-left"><p class="u-mb0"><strong>Ian Farquhar</strong></p><p class="u-text-color-gray-400">Field Chief Technology Officer (Global), Gigamon</p><p><p>Ian Farquhar has worked in information security for over 30 years. Previous employers have included RSA/EMC, Cisco, Sun MicroSystems, Silicon Graphics/Cray Research, and Macquarie University. In his role as Global Field CTO for Gigamon, he is responsible for the tactical and strategic planning around information security, especially in the areas of zero trust architecture, high performance cryptography, and advanced threat detection. He has...</p></p><p><a href="/profiles/ian-farquhar"><span>Read more</span> <i class="fas fa-long-arrow-alt-right"></i></a></p></div></div></div><div class="c-combo-headshot "><div data-obscurable="true" data-obscurable-width="500"><div class="c-combo-headshot__content"><div class="c-emblem"><div class="c-emblem__layer"><img data-retina-src="/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NTA1MSwicHVyIjoiYmxvYl9pZCJ9fQ==--e03b8d427b83ea7f7a7c26633a7dd3eb7f979128/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiMzYweDQ4MF4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--184082a01f7e1e6415e4d6e03b7cd8002a80db59/stacey%20halota.jpg" alt="Stacey Halota" style="width: 100%; height: 100%; object-fit: cover;" src="/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NTA1MSwicHVyIjoiYmxvYl9pZCJ9fQ==--e03b8d427b83ea7f7a7c26633a7dd3eb7f979128/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiMTgweDI0MF4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--ce1f0b273c14895214513c640abe6c284218f1db/stacey%20halota.jpg" /></div></div><div class="c-combo-headshot__label">Stacey Halota</div><div class="c-combo-headshot__label">Vice President, Information Security and Privacy, Graham Holdings</div></div><div class="b-obscured u-align-left"><p class="u-mb0"><strong>Stacey Halota</strong></p><p class="u-text-color-gray-400">Vice President, Information Security and Privacy, Graham Holdings</p><p><p>Stacey Halota joined Graham Holdings Company (then The Washington Post Company) in 2003, where she leads the development and implementation of information security and privacy programs, including Sarbanes Oxley, privacy law, Payment Card Industry compliance, and other data protection efforts. Ms. Halota has more than 25 years of experience in the information technology, security, and privacy field. She is a Certified Information Systems Sec...</p></p><p><a href="/profiles/stacey-halota"><span>Read more</span> <i class="fas fa-long-arrow-alt-right"></i></a></p></div></div></div><div class="c-combo-headshot "><div data-obscurable="true" data-obscurable-width="500"><div class="c-combo-headshot__content"><div class="c-emblem"><div class="c-emblem__layer"><img data-retina-src="/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6MTI3NjIsInB1ciI6ImJsb2JfaWQifX0=--0dfd9b93d5cf50935d14bdb61930710dca377318/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiMzYweDQ4MF4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--184082a01f7e1e6415e4d6e03b7cd8002a80db59/Ravi_8x10.jpg" alt="Ravi Ithal" style="width: 100%; height: 100%; object-fit: cover;" src="/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6MTI3NjIsInB1ciI6ImJsb2JfaWQifX0=--0dfd9b93d5cf50935d14bdb61930710dca377318/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiMTgweDI0MF4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--ce1f0b273c14895214513c640abe6c284218f1db/Ravi_8x10.jpg" /></div></div><div class="c-combo-headshot__label">Ravi Ithal</div><div class="c-combo-headshot__label">Chief Technology Officer and Co-Founder, Normalyze</div></div><div class="b-obscured u-align-left"><p class="u-mb0"><strong>Ravi Ithal</strong></p><p class="u-text-color-gray-400">Chief Technology Officer and Co-Founder, Normalyze</p><p><p>Ravi Ithal is the co-founder and CTO of Normalyze. He has an extensive background in enterprise and cloud security. Before Normalyze, Ravi was the co-founder and chief architect of Netskope, a leading provider of cloud-native solutions to businesses for data protection and defense against threats in the cloud. Prior to Netskope, Ravi was one of the founding engineers of Palo Alto Networks (NASDAQ: PANW). Prior to his time at Pal...</p></p><p><a href="/profiles/ravi-ithal"><span>Read more</span> <i class="fas fa-long-arrow-alt-right"></i></a></p></div></div></div><div class="c-combo-headshot "><div data-obscurable="true" data-obscurable-width="500"><div class="c-combo-headshot__content"><div class="c-emblem"><div class="c-emblem__layer"><img data-retina-src="/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NTA2NiwicHVyIjoiYmxvYl9pZCJ9fQ==--467fa714b7a50433dfe029e07ee034d8a99240c6/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJwbmciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiMzYweDQ4MF4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--bd0fa977f46a66c0b0323144f5d9f0f3d0562505/suyesh%20karki2.png" alt="Suyesh Karki" style="width: 100%; height: 100%; object-fit: cover;" src="/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NTA2NiwicHVyIjoiYmxvYl9pZCJ9fQ==--467fa714b7a50433dfe029e07ee034d8a99240c6/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJwbmciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiMTgweDI0MF4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--eb486f3f6b5873e5a4f4e10b34324e47d456ee46/suyesh%20karki2.png" /></div></div><div class="c-combo-headshot__label">Suyesh Karki</div><div class="c-combo-headshot__label">Chief Information Security Officer, Domo</div></div><div class="b-obscured u-align-left"><p class="u-mb0"><strong>Suyesh Karki</strong></p><p class="u-text-color-gray-400">Chief Information Security Officer, Domo</p><p><p>With over 16 years of cybersecurity and risk leadership, strategy, and management experience, Suyesh is responsible for leading Domo’s cloud security, risk, compliance, and security operations. At Domo, Suyesh led Domo through the security and compliance maturity curve, including creating a catalog of security controls, implementing a data classification model, deploying a GRC solution, establishing meaningful security metrics, and creating...</p></p><p><a href="/profiles/suyesh-karki"><span>Read more</span> <i class="fas fa-long-arrow-alt-right"></i></a></p></div></div></div><div class="c-combo-headshot "><div data-obscurable="true" data-obscurable-width="500"><div class="c-combo-headshot__content"><div class="c-emblem"><div class="c-emblem__layer"><img data-retina-src="/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NTA1NiwicHVyIjoiYmxvYl9pZCJ9fQ==--778ab33ef676aa26c79e2c4df889281b8db0112c/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiMzYweDQ4MF4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--184082a01f7e1e6415e4d6e03b7cd8002a80db59/anil%20karmel2.jpg" alt="Anil Karmel" style="width: 100%; height: 100%; object-fit: cover;" src="/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NTA1NiwicHVyIjoiYmxvYl9pZCJ9fQ==--778ab33ef676aa26c79e2c4df889281b8db0112c/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiMTgweDI0MF4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--ce1f0b273c14895214513c640abe6c284218f1db/anil%20karmel2.jpg" /></div></div><div class="c-combo-headshot__label">Anil Karmel</div><div class="c-combo-headshot__label">CEO, C2 Labs</div></div><div class="b-obscured u-align-left"><p class="u-mb0"><strong>Anil Karmel</strong></p><p class="u-text-color-gray-400">CEO, C2 Labs</p><p><p>Anil Karmel is the Co-Founder and CEO of RegScale, which helps organizations start and stay compliant via the world's first real-time GRC platform. Formerly, Anil served as the National Nuclear Security Administration's (NNSA) Deputy Chief Technology Officer. Karmel began his government career as a Technical Staff Member of Los Alamos National Laboratory (LANL) and was responsible for inventing their cloud and collaboration technologies Kar...</p></p><p><a href="/profiles/anil-karmel"><span>Read more</span> <i class="fas fa-long-arrow-alt-right"></i></a></p></div></div></div><div class="c-combo-headshot "><div data-obscurable="true" data-obscurable-width="500"><div class="c-combo-headshot__content"><div class="c-emblem"><div class="c-emblem__layer"><img data-retina-src="/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NTA0NywicHVyIjoiYmxvYl9pZCJ9fQ==--c3d17b7334f54142333bf55ef5cbf015ce32813e/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiMzYweDQ4MF4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--184082a01f7e1e6415e4d6e03b7cd8002a80db59/ricardo%20lafosse.jpg" alt="Ricardo Lafosse" style="width: 100%; height: 100%; object-fit: cover;" src="/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NTA0NywicHVyIjoiYmxvYl9pZCJ9fQ==--c3d17b7334f54142333bf55ef5cbf015ce32813e/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiMTgweDI0MF4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--ce1f0b273c14895214513c640abe6c284218f1db/ricardo%20lafosse.jpg" /></div></div><div class="c-combo-headshot__label">Ricardo Lafosse</div><div class="c-combo-headshot__label">Chief Information Security Officer, Kraft Heinz</div></div><div class="b-obscured u-align-left"><p class="u-mb0"><strong>Ricardo Lafosse</strong></p><p class="u-text-color-gray-400">Chief Information Security Officer, Kraft Heinz</p><p><p>Ricardo Lafosse is the Chief Information Security Officer (CISO) for Kraft Heinz. Lafosse is responsible for IT risk governance, OT security, incident management, technical disaster recovery, and determining enterprise-wide security policies and procedures. Lafosse regularly presents on security topics at global conferences, including MirCon, ISACA CACS, and Secure World.</p></p><p><a href="/profiles/ricardo-lafosse"><span>Read more</span> <i class="fas fa-long-arrow-alt-right"></i></a></p></div></div></div><div class="c-combo-headshot "><div data-obscurable="true" data-obscurable-width="500"><div class="c-combo-headshot__content"><div class="c-emblem"><div class="c-emblem__layer"><img data-retina-src="/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NTAzMiwicHVyIjoiYmxvYl9pZCJ9fQ==--bf3b12f055df5dc7ecc3a18879b8e075f49ff93a/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiMzYweDQ4MF4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--184082a01f7e1e6415e4d6e03b7cd8002a80db59/adrian%20ludwig.jpg" alt="Adrian Ludwig" style="width: 100%; height: 100%; object-fit: cover;" src="/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NTAzMiwicHVyIjoiYmxvYl9pZCJ9fQ==--bf3b12f055df5dc7ecc3a18879b8e075f49ff93a/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiMTgweDI0MF4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--ce1f0b273c14895214513c640abe6c284218f1db/adrian%20ludwig.jpg" /></div></div><div class="c-combo-headshot__label">Adrian Ludwig</div><div class="c-combo-headshot__label">CISO at Atlassian</div></div><div class="b-obscured u-align-left"><p class="u-mb0"><strong>Adrian Ludwig</strong></p><p class="u-text-color-gray-400">CISO at Atlassian</p><p><p>Adrian Ludwig is the Chief Trust Officer at Atlassian. Adrian joined the company in May 2018 and served as the Chief Information Security Officer for three years. Prior to Atlassian, Adrian held a number of security leadership positions at leading technology companies, including building out the security capabilities at Nest, Macromedia, Adobe, and Android (Google). He is also an active cybersecurity advisor and angel investor. As a self-de...</p></p><p><a href="/profiles/adrian-ludwig"><span>Read more</span> <i class="fas fa-long-arrow-alt-right"></i></a></p></div></div></div><div class="c-combo-headshot "><div data-obscurable="true" data-obscurable-width="500"><div class="c-combo-headshot__content"><div class="c-emblem"><div class="c-emblem__layer"><img data-retina-src="/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NTQxNCwicHVyIjoiYmxvYl9pZCJ9fQ==--d73e3d9df9e244dc1cae52c30e1f9d0953aa714d/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiMzYweDQ4MF4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--184082a01f7e1e6415e4d6e03b7cd8002a80db59/AmiLuttwak.jpg" alt="Ami Luttwak" style="width: 100%; height: 100%; object-fit: cover;" src="/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NTQxNCwicHVyIjoiYmxvYl9pZCJ9fQ==--d73e3d9df9e244dc1cae52c30e1f9d0953aa714d/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiMTgweDI0MF4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--ce1f0b273c14895214513c640abe6c284218f1db/AmiLuttwak.jpg" /></div></div><div class="c-combo-headshot__label">Ami Luttwak</div><div class="c-combo-headshot__label">Chief Technology Officer, Head of Wiz Research, & Co-Founder</div></div><div class="b-obscured u-align-left"><p class="u-mb0"><strong>Ami Luttwak</strong></p><p class="u-text-color-gray-400">Chief Technology Officer, Head of Wiz Research, & Co-Founder</p><p><p>Ami Luttwak is Chief Technology Officer and co-founder of Wiz, where he leads the world-renowned Wiz Research team. This team is responsible for identifying some of the year’s biggest novel cloud vulnerabilities, including the OMIGOD, Chaos DB, and Amazon and Google DNS-as-a-Service vulnerabilities. </p><p>Previously, Ami was the CTO of Adallom, a leading Cloud Access Security Broker (CASB), prior to its acquisition by Microsoft i...</p></p><p><a href="/profiles/ami-luttwak"><span>Read more</span> <i class="fas fa-long-arrow-alt-right"></i></a></p></div></div></div><div class="c-combo-headshot "><div data-obscurable="true" data-obscurable-width="500"><div class="c-combo-headshot__content"><div class="c-emblem"><div class="c-emblem__layer"><img data-retina-src="/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6MTc1NDEsInB1ciI6ImJsb2JfaWQifX0=--f3c405c556b61be006cb40fbd0dd985ce30fafcb/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGVnIiwiYXV0b19vcmllbnQiOnRydWUsInJvdGF0ZSI6MCwiZ3Jhdml0eSI6ImNlbnRlciIsInJlc2l6ZSI6IjM2MHg0ODBeIiwiYmFja2dyb3VuZCI6Im5vbmUifSwicHVyIjoidmFyaWF0aW9uIn19--f7fcb22904f5fc371fd077bb2c056b7b67053a07/Kavitha%20Mariappan%20headshot%20July%202022.jpeg" alt="Kavitha Mariappan" style="width: 100%; height: 100%; object-fit: cover;" src="/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6MTc1NDEsInB1ciI6ImJsb2JfaWQifX0=--f3c405c556b61be006cb40fbd0dd985ce30fafcb/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGVnIiwiYXV0b19vcmllbnQiOnRydWUsInJvdGF0ZSI6MCwiZ3Jhdml0eSI6ImNlbnRlciIsInJlc2l6ZSI6IjE4MHgyNDBeIiwiYmFja2dyb3VuZCI6Im5vbmUifSwicHVyIjoidmFyaWF0aW9uIn19--bce64e6cd8e04ad10bf1b7b6142bab4d14a520af/Kavitha%20Mariappan%20headshot%20July%202022.jpeg" /></div></div><div class="c-combo-headshot__label">Kavitha Mariappan</div><div class="c-combo-headshot__label">EVP, Customer Experience and Transformation, Zscaler</div></div><div class="b-obscured u-align-left"><p class="u-mb0"><strong>Kavitha Mariappan</strong></p><p class="u-text-color-gray-400">EVP, Customer Experience and Transformation, Zscaler</p><p><p>Kavitha Mariappan is a seasoned go-to-market executive with a penchant for rapidly translating technology into customer-centric value, mobilizing global teams and operations, and transforming them into high-growth businesses. Over her 20+ year tenure spanning enterprise software and service provider, she has held various high-impact roles spanning marketing, product management, and engineering at industry-leading companies, including Databr...</p></p><p><a href="/profiles/kavitha-mariappan"><span>Read more</span> <i class="fas fa-long-arrow-alt-right"></i></a></p></div></div></div><div class="c-combo-headshot "><div data-obscurable="true" data-obscurable-width="500"><div class="c-combo-headshot__content"><div class="c-emblem"><div class="c-emblem__layer"><img data-retina-src="/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6OTM3OCwicHVyIjoiYmxvYl9pZCJ9fQ==--69b1972cb4e2b6de47269c98d00a444b7deba3d2/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiMzYweDQ4MF4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--184082a01f7e1e6415e4d6e03b7cd8002a80db59/f47b52df.jpg" alt="Paul Martini" style="width: 100%; height: 100%; object-fit: cover;" src="/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6OTM3OCwicHVyIjoiYmxvYl9pZCJ9fQ==--69b1972cb4e2b6de47269c98d00a444b7deba3d2/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiMTgweDI0MF4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--ce1f0b273c14895214513c640abe6c284218f1db/f47b52df.jpg" /></div></div><div class="c-combo-headshot__label">Paul Martini</div><div class="c-combo-headshot__label">CEO, iBoss</div></div><div class="b-obscured u-align-left"><p class="u-mb0"><strong>Paul Martini</strong></p><p class="u-text-color-gray-400">CEO, iBoss</p><p><p>Paul Martini holds over 230 patents in cloud cybersecurity and is a trusted expert on Zero Trust, a modern cybersecurity architecture designed to prevent ransomware, breaches and data loss by making all applications private. Paul has been recognized for his leadership and innovation, receiving the Ernst and Young Entrepreneur of the Year award and being named one of Goldman Sachs' 100 Most Intriguing Entrepreneurs. Paul has also been publis...</p></p><p><a href="/profiles/paul-martini"><span>Read more</span> <i class="fas fa-long-arrow-alt-right"></i></a></p></div></div></div><div class="c-combo-headshot "><div data-obscurable="true" data-obscurable-width="500"><div class="c-combo-headshot__content"><div class="c-emblem"><div class="c-emblem__layer"><img data-retina-src="/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6MTkzOTMsInB1ciI6ImJsb2JfaWQifX0=--2b7b69524e2d8e68411226aeff8db6a5f23bab4d/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiMzYweDQ4MF4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--184082a01f7e1e6415e4d6e03b7cd8002a80db59/Todd-Moore-HighRes.jpg" alt="Todd Moore" style="width: 100%; height: 100%; object-fit: cover;" src="/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6MTkzOTMsInB1ciI6ImJsb2JfaWQifX0=--2b7b69524e2d8e68411226aeff8db6a5f23bab4d/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiMTgweDI0MF4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--ce1f0b273c14895214513c640abe6c284218f1db/Todd-Moore-HighRes.jpg" /></div></div><div class="c-combo-headshot__label">Todd Moore</div><div class="c-combo-headshot__label">Global Vice President of Data Encryption Products, Thales</div></div><div class="b-obscured u-align-left"><p class="u-mb0"><strong>Todd Moore</strong></p><p class="u-text-color-gray-400">Global Vice President of Data Encryption Products, Thales</p><p><p>Todd Moore is the Global Vice President of Data Encryption Products at Thales. He is responsible for setting the business line and go to market strategies for an industry leading cybersecurity business. He routinely helps enterprises build solutions for a wide range of complex data security problems and use cases. Todd holds several management and technical degrees from the University of Virginia, Rochester Institute of Technology, Cornell ...</p></p><p><a href="/profiles/todd-moore"><span>Read more</span> <i class="fas fa-long-arrow-alt-right"></i></a></p></div></div></div><div class="c-combo-headshot "><div data-obscurable="true" data-obscurable-width="500"><div class="c-combo-headshot__content"><div class="c-emblem"><div class="c-emblem__layer"><img data-retina-src="/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NTY0OSwicHVyIjoiYmxvYl9pZCJ9fQ==--725851807f106fc14c0eea8e5bf558f41b928086/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiMzYweDQ4MF4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--184082a01f7e1e6415e4d6e03b7cd8002a80db59/oliver%20newberry.jpg" alt="Oliver Newbury" style="width: 100%; height: 100%; object-fit: cover;" src="/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NTY0OSwicHVyIjoiYmxvYl9pZCJ9fQ==--725851807f106fc14c0eea8e5bf558f41b928086/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiMTgweDI0MF4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--ce1f0b273c14895214513c640abe6c284218f1db/oliver%20newberry.jpg" /></div></div><div class="c-combo-headshot__label">Oliver Newbury</div><div class="c-combo-headshot__label">Chief Information Security Officer, Barclays</div></div><div class="b-obscured u-align-left"><p class="u-mb0"><strong>Oliver Newbury</strong></p><p class="u-text-color-gray-400">Chief Information Security Officer, Barclays</p><p><p>As the Global CISO for Barclays, I am responsible for establishing and maintaining the enterprise vision, strategy, program and operations to ensure information assets and technologies are adequately protected across Barclays Group. Additionally as the deputy CSO, I support continuous development of an integrated approach to effectively manage a wide range of risks facing the bank.<br>My vision is to ensure Barclays has a truly world class ...</p></p><p><a href="/profiles/oliver-newbury"><span>Read more</span> <i class="fas fa-long-arrow-alt-right"></i></a></p></div></div></div><div class="c-combo-headshot "><div data-obscurable="true" data-obscurable-width="500"><div class="c-combo-headshot__content"><div class="c-emblem"><div class="c-emblem__layer"><img data-retina-src="/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6MTkyNDksInB1ciI6ImJsb2JfaWQifX0=--cebfe2b1fc9806f3823a5df2572a28b641353511/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGVnIiwiYXV0b19vcmllbnQiOnRydWUsInJvdGF0ZSI6MCwiZ3Jhdml0eSI6ImNlbnRlciIsInJlc2l6ZSI6IjM2MHg0ODBeIiwiYmFja2dyb3VuZCI6Im5vbmUifSwicHVyIjoidmFyaWF0aW9uIn19--f7fcb22904f5fc371fd077bb2c056b7b67053a07/Noltensmeyer.jpeg" alt="John Noltensmeyer" style="width: 100%; height: 100%; object-fit: cover;" src="/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6MTkyNDksInB1ciI6ImJsb2JfaWQifX0=--cebfe2b1fc9806f3823a5df2572a28b641353511/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGVnIiwiYXV0b19vcmllbnQiOnRydWUsInJvdGF0ZSI6MCwiZ3Jhdml0eSI6ImNlbnRlciIsInJlc2l6ZSI6IjE4MHgyNDBeIiwiYmFja2dyb3VuZCI6Im5vbmUifSwicHVyIjoidmFyaWF0aW9uIn19--bce64e6cd8e04ad10bf1b7b6142bab4d14a520af/Noltensmeyer.jpeg" /></div></div><div class="c-combo-headshot__label">John Noltensmeyer</div><div class="c-combo-headshot__label">Cheif Information Security Officer, IXOPAY</div></div><div class="b-obscured u-align-left"><p class="u-mb0"><strong>John Noltensmeyer</strong></p><p class="u-text-color-gray-400">Cheif Information Security Officer, IXOPAY</p><p>John is a privacy and data security professional with over 20 years of experience in information technology. At IXOPAY, John has responsibility for helping a global client base meet their data protection and compliance obligations, while optimizing business processes. Prior to joining IXOPAY, John's career spanned both the financial services sector and the federal government. While at BAE Systems, he worked for the United States Intelligence C...</p><p><a href="/profiles/john-noltensmeyer"><span>Read more</span> <i class="fas fa-long-arrow-alt-right"></i></a></p></div></div></div><div class="c-combo-headshot "><div data-obscurable="true" data-obscurable-width="500"><div class="c-combo-headshot__content"><div class="c-emblem"><div class="c-emblem__layer"><img data-retina-src="/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NTAzNiwicHVyIjoiYmxvYl9pZCJ9fQ==--194c09925feffe5a9abd2a7e9a6ebd834bf7f4ed/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJwbmciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiMzYweDQ4MF4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--bd0fa977f46a66c0b0323144f5d9f0f3d0562505/gerald%20parham.png" alt="Gerald Parham" style="width: 100%; height: 100%; object-fit: cover;" src="/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NTAzNiwicHVyIjoiYmxvYl9pZCJ9fQ==--194c09925feffe5a9abd2a7e9a6ebd834bf7f4ed/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJwbmciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiMTgweDI0MF4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--eb486f3f6b5873e5a4f4e10b34324e47d456ee46/gerald%20parham.png" /></div></div><div class="c-combo-headshot__label">Gerald Parham</div><div class="c-combo-headshot__label">Global Research Leader, Security & CIO, IBM</div></div><div class="b-obscured u-align-left"><p class="u-mb0"><strong>Gerald Parham</strong></p><p class="u-text-color-gray-400">Global Research Leader, Security & CIO, IBM</p><p><p>Gerald leads the Security and CIO research portfolios within the IBM Institute for Business Value. He advises senior executives and board members on security strategy and cyber value chains, in particular the relationship between strategy, risk, security operations, identity, privacy, and trust. Over the past year, Gerald has authored original research papers on cloud security, cyber risk, business resilience, and zero trust. He has more th...</p></p><p><a href="/profiles/gerald-parham"><span>Read more</span> <i class="fas fa-long-arrow-alt-right"></i></a></p></div></div></div><div class="c-combo-headshot "><div data-obscurable="true" data-obscurable-width="500"><div class="c-combo-headshot__content"><div class="c-emblem"><div class="c-emblem__layer"><img data-retina-src="/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NTA1NCwicHVyIjoiYmxvYl9pZCJ9fQ==--5de73531f7ad172920d20ce972bf72c960bcde3c/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiMzYweDQ4MF4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--184082a01f7e1e6415e4d6e03b7cd8002a80db59/vinay%20patel.jpg" alt="Vinay Patel" style="width: 100%; height: 100%; object-fit: cover;" src="/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NTA1NCwicHVyIjoiYmxvYl9pZCJ9fQ==--5de73531f7ad172920d20ce972bf72c960bcde3c/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiMTgweDI0MF4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--ce1f0b273c14895214513c640abe6c284218f1db/vinay%20patel.jpg" /></div></div><div class="c-combo-headshot__label">Vinay Patel</div><div class="c-combo-headshot__label">Chief Information Security Officer, Zendesk</div></div><div class="b-obscured u-align-left"><p class="u-mb0"><strong>Vinay Patel</strong></p><p class="u-text-color-gray-400">Chief Information Security Officer, Zendesk</p><p><p>As Finastra’s CISO, Vinay is responsible for establishing an intelligence-led, threat-focused information security program capable of detecting and protecting against emerging cyberattacks targeting Finastra and/or its clients.</p></p><p><a href="/profiles/vinay-patel"><span>Read more</span> <i class="fas fa-long-arrow-alt-right"></i></a></p></div></div></div><div class="c-combo-headshot "><div data-obscurable="true" data-obscurable-width="500"><div class="c-combo-headshot__content"><div class="c-emblem"><div class="c-emblem__layer"><img data-retina-src="/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NTA0NCwicHVyIjoiYmxvYl9pZCJ9fQ==--d3c35fad2aab2c4d0a2815cbc6a609075947d07b/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiMzYweDQ4MF4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--184082a01f7e1e6415e4d6e03b7cd8002a80db59/mindy%20player.jpg" alt="Mindy Player" style="width: 100%; height: 100%; object-fit: cover;" src="/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NTA0NCwicHVyIjoiYmxvYl9pZCJ9fQ==--d3c35fad2aab2c4d0a2815cbc6a609075947d07b/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiMTgweDI0MF4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--ce1f0b273c14895214513c640abe6c284218f1db/mindy%20player.jpg" /></div></div><div class="c-combo-headshot__label">Mindy Player</div><div class="c-combo-headshot__label">Director, Public Cloud Security, Lloyds Banking</div></div><div class="b-obscured u-align-left"><p class="u-mb0"><strong>Mindy Player</strong></p><p class="u-text-color-gray-400">Director, Public Cloud Security, Lloyds Banking</p><p><p>Mindy Player is the Director of Cloud Security for Lloyds Banking Group. She has 32 years of work experience, with the last 20 being in cybersecurity. Mindy has led teams accountable for various security disciplines ranging from Identity and Access Management, Investigations and Threat and Vulnerability Management to Security Engineering and Design. More recently, Mindy has been operating in cloud security in the Private Cloud, Adopted Publ...</p></p><p><a href="/profiles/mindy-player"><span>Read more</span> <i class="fas fa-long-arrow-alt-right"></i></a></p></div></div></div><div class="c-combo-headshot "><div data-obscurable="true" data-obscurable-width="500"><div class="c-combo-headshot__content"><div class="c-emblem"><div class="c-emblem__layer"><img data-retina-src="/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NTAzOCwicHVyIjoiYmxvYl9pZCJ9fQ==--11f868e506f988cdc013c623579f483a62d34609/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiMzYweDQ4MF4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--184082a01f7e1e6415e4d6e03b7cd8002a80db59/janice%20reese.jpg" alt="Janice Reese" style="width: 100%; height: 100%; object-fit: cover;" src="/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NTAzOCwicHVyIjoiYmxvYl9pZCJ9fQ==--11f868e506f988cdc013c623579f483a62d34609/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiMTgweDI0MF4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--ce1f0b273c14895214513c640abe6c284218f1db/janice%20reese.jpg" /></div></div><div class="c-combo-headshot__label">Janice Reese</div><div class="c-combo-headshot__label">CEO, Network PDF Cloud</div></div><div class="b-obscured u-align-left"><p class="u-mb0"><strong>Janice Reese</strong></p><p class="u-text-color-gray-400">CEO, Network PDF Cloud</p><p><p>Network PDF Cloud Solutions - CEO</p><p>Global Marketing Technologist, Healthcare Leader, Advisor, Board Member, BPM+ Health Ambassador, WiCyS TN affiliate V.P. - Nashville Beach Co-Founder </p><p>Janice Reese has more than 25 years of technology leadership experience with a specific emphasis on the intersection of information security and business. Janice brings her unique consulting expertise to connect digital transformation to business ...</p></p><p><a href="/profiles/janice-reese"><span>Read more</span> <i class="fas fa-long-arrow-alt-right"></i></a></p></div></div></div><div class="c-combo-headshot "><div data-obscurable="true" data-obscurable-width="500"><div class="c-combo-headshot__content"><div class="c-emblem"><div class="c-emblem__layer"><img data-retina-src="/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6MTMxOTMsInB1ciI6ImJsb2JfaWQifX0=--6aebe08552107892064ce833f6789afc19c5fe11/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJwbmciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiMzYweDQ4MF4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--bd0fa977f46a66c0b0323144f5d9f0f3d0562505/Gordon.png" alt="Dr. Gordon W Romney" style="width: 100%; height: 100%; object-fit: cover;" src="/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6MTMxOTMsInB1ciI6ImJsb2JfaWQifX0=--6aebe08552107892064ce833f6789afc19c5fe11/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJwbmciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiMTgweDI0MF4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--eb486f3f6b5873e5a4f4e10b34324e47d456ee46/Gordon.png" /></div></div><div class="c-combo-headshot__label">Dr. Gordon W Romney</div><div class="c-combo-headshot__label">CISO and HIPAA Security Officer, eVisit Inc.</div></div><div class="b-obscured u-align-left"><p class="u-mb0"><strong>Dr. Gordon W Romney</strong></p><p class="u-text-color-gray-400">CISO and HIPAA Security Officer, eVisit Inc.</p><p><p>Dr. Gordon W. Romney, CISO and HIPAA Security Officer at eVisit Inc., is a computer scientist and Certified Ethical Hacker who helped establish the San Diego region as the Cyber Harbor of the world. eVisit was designated the Forrester Wave 2021 Solo Leader in Virtual Care. His passion is simplifying processes. He joined eVisit following his tenure as Professor and Director of the Center for CyberSecurity Engineering and Technolo...</p></p><p><a href="/profiles/dr-gordon-w-romney"><span>Read more</span> <i class="fas fa-long-arrow-alt-right"></i></a></p></div></div></div><div class="c-combo-headshot "><div data-obscurable="true" data-obscurable-width="500"><div class="c-combo-headshot__content"><div class="c-emblem"><div class="c-emblem__layer"><img data-retina-src="/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NTA0MSwicHVyIjoiYmxvYl9pZCJ9fQ==--c71a5b207cab0ec35a7050fde8be8d1afa8c6e8c/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJwbmciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiMzYweDQ4MF4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--bd0fa977f46a66c0b0323144f5d9f0f3d0562505/marisa%20ruffalo.png" alt="Marisa Ruffolo" style="width: 100%; height: 100%; object-fit: cover;" src="/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NTA0MSwicHVyIjoiYmxvYl9pZCJ9fQ==--c71a5b207cab0ec35a7050fde8be8d1afa8c6e8c/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJwbmciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiMTgweDI0MF4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--eb486f3f6b5873e5a4f4e10b34324e47d456ee46/marisa%20ruffalo.png" /></div></div><div class="c-combo-headshot__label">Marisa Ruffolo</div><div class="c-combo-headshot__label">Cybersecurity R&D Specialist, Chevron</div></div><div class="b-obscured u-align-left"><p class="u-mb0"><strong>Marisa Ruffolo</strong></p><p class="u-text-color-gray-400">Cybersecurity R&D Specialist, Chevron</p><p><p>Marisa Ruffolo is a Cybersecurity R&D Specialist and Distinguished Engineer at Chevron. She is responsible for researching and evaluating advanced technologies to implement Chevron’s cybersecurity guardrails. Prior to joining Chevron, Marisa worked as a systems engineer for national security research programs at Sandia National Laboratories and a technology architect at Accenture. <br></p></p><p><a href="/profiles/marisa-ruffalo"><span>Read more</span> <i class="fas fa-long-arrow-alt-right"></i></a></p></div></div></div><div class="c-combo-headshot "><div data-obscurable="true" data-obscurable-width="500"><div class="c-combo-headshot__content"><div class="c-emblem"><div class="c-emblem__layer"><img data-retina-src="/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6MjQ3MTMsInB1ciI6ImJsb2JfaWQifX0=--1148d0bc9767d628a1c27ea97bd499bfb8eb06d9/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiMzYweDQ4MF4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--184082a01f7e1e6415e4d6e03b7cd8002a80db59/Bernard%20Tan%20.jpg" alt="Bernard Tan" style="width: 100%; height: 100%; object-fit: cover;" src="/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6MjQ3MTMsInB1ciI6ImJsb2JfaWQifX0=--1148d0bc9767d628a1c27ea97bd499bfb8eb06d9/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiMTgweDI0MF4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--ce1f0b273c14895214513c640abe6c284218f1db/Bernard%20Tan%20.jpg" /></div></div><div class="c-combo-headshot__label">Bernard Tan</div><div class="c-combo-headshot__label">Director for Government Cybersecurity Consulting, GovTech</div></div><div class="b-obscured u-align-left"><p class="u-mb0"><strong>Bernard Tan</strong></p><p class="u-text-color-gray-400">Director for Government Cybersecurity Consulting, GovTech</p><p><p>Bernard is a Director in GovTech leading the GovTech Cybersecurity consultancy team to provide risk based consultancy services to architect the cybersecurity of Nationwide and Governmentwide strategic projects.</p><p>Through his 16 years in the public sector, he has undertaken various cybersecurity roles and projects in areas of Homeland security. He held key roles such as Chief Information Security Officer (CISO) and Head of Information se...</p></p><p><a href="/profiles/bernard-tan"><span>Read more</span> <i class="fas fa-long-arrow-alt-right"></i></a></p></div></div></div><div class="c-combo-headshot "><div data-obscurable="true" data-obscurable-width="500"><div class="c-combo-headshot__content"><div class="c-emblem"><div class="c-emblem__layer"><img data-retina-src="/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NzYzMCwicHVyIjoiYmxvYl9pZCJ9fQ==--ac0cbc00263f3bfb4c78bea92beda6eedd0d9f85/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiMzYweDQ4MF4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--184082a01f7e1e6415e4d6e03b7cd8002a80db59/NeilThackerBio2020.jpg" alt="Neil Thacker" style="width: 100%; height: 100%; object-fit: cover;" src="/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NzYzMCwicHVyIjoiYmxvYl9pZCJ9fQ==--ac0cbc00263f3bfb4c78bea92beda6eedd0d9f85/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiMTgweDI0MF4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--ce1f0b273c14895214513c640abe6c284218f1db/NeilThackerBio2020.jpg" /></div></div><div class="c-combo-headshot__label">Neil Thacker</div><div class="c-combo-headshot__label">EMEA CISO, Netskope</div></div><div class="b-obscured u-align-left"><p class="u-mb0"><strong>Neil Thacker</strong></p><p class="u-text-color-gray-400">EMEA CISO, Netskope</p><p><p>Neil Thacker is EMEA CISO for Netskope. He holds over 20 years of experience in the information security industry with previous roles at Swiss Re, Deutsche Bank and Camelot Group. He is co-founder and board member to the Security Advisor Alliance (SAA), with the goal to advocate, mentor and support the next generation of cybersecurity professionals. He is also advisory board member to NeuroCyber, a working group to support neurodiversity in...</p></p><p><a href="/profiles/neil-thacker"><span>Read more</span> <i class="fas fa-long-arrow-alt-right"></i></a></p></div></div></div><div class="c-combo-headshot "><div data-obscurable="true" data-obscurable-width="500"><div class="c-combo-headshot__content"><div class="c-emblem"><div class="c-emblem__layer"><img data-retina-src="/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6MjA2NzgsInB1ciI6ImJsb2JfaWQifX0=--381a33e4e869aa20e68deea115b61eb20c81e2fa/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiMzYweDQ4MF4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--184082a01f7e1e6415e4d6e03b7cd8002a80db59/Thies_Brad%201_web.jpg" alt="Brad Thies" style="width: 100%; height: 100%; object-fit: cover;" src="/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6MjA2NzgsInB1ciI6ImJsb2JfaWQifX0=--381a33e4e869aa20e68deea115b61eb20c81e2fa/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiMTgweDI0MF4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--ce1f0b273c14895214513c640abe6c284218f1db/Thies_Brad%201_web.jpg" /></div></div><div class="c-combo-headshot__label">Brad Thies</div><div class="c-combo-headshot__label">Founder and President at BARR Advisory</div></div><div class="b-obscured u-align-left"><p class="u-mb0"><strong>Brad Thies</strong></p><p class="u-text-color-gray-400">Founder and President at BARR Advisory</p><p><p>As Founder and President of BARR Advisory, Brad Thies leads all aspects of the organization’s global client service delivery and security assessment services including SOC, ISO, PCI, NIST, HITRUST and HIPAA examinations, and cybersecurity consulting services. Under Brad’s leadership, BARR has become one of the most sought-after third-party assessors and consulting providers in the cloud computing space—serving high-growth startups to Fortun...</p></p><p><a href="/profiles/brad-thies"><span>Read more</span> <i class="fas fa-long-arrow-alt-right"></i></a></p></div></div></div><div class="c-combo-headshot "><div data-obscurable="true" data-obscurable-width="500"><div class="c-combo-headshot__content"><div class="c-emblem"><div class="c-emblem__layer"><img data-retina-src="/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NTA0MiwicHVyIjoiYmxvYl9pZCJ9fQ==--f627b5fb24aecad0466a9b16a237ca32d5f8d8e8/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJwbmciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiMzYweDQ4MF4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--bd0fa977f46a66c0b0323144f5d9f0f3d0562505/joe%20zacharias.png" alt="Joe Zacharias" style="width: 100%; height: 100%; object-fit: cover;" src="/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NTA0MiwicHVyIjoiYmxvYl9pZCJ9fQ==--f627b5fb24aecad0466a9b16a237ca32d5f8d8e8/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJwbmciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiMTgweDI0MF4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--eb486f3f6b5873e5a4f4e10b34324e47d456ee46/joe%20zacharias.png" /></div></div><div class="c-combo-headshot__label">Joe Zacharias</div><div class="c-combo-headshot__label">Deputy CISO, Caterpillar</div></div><div class="b-obscured u-align-left"><p class="u-mb0"><strong>Joe Zacharias</strong></p><p class="u-text-color-gray-400">Deputy CISO, Caterpillar</p><p><p>Joe Zacharias is the Deputy CISO for Cybersecurity Risk Management at Caterpillar in Peoria, IL. He began his career at Caterpillar in 2012 as an Incident Response Manager working in the CSIRT within Enterprise Security, leading large-scale advanced threat response, containment, and remediation activities. His principal areas of security leadership practice currently include Caterpillar Connected Asset Security (IoT) for Caterpillar equipme...</p></p><p><a href="/profiles/joe-zacharias"><span>Read more</span> <i class="fas fa-long-arrow-alt-right"></i></a></p></div></div></div><div class="c-combo-headshot "><div data-obscurable="true" data-obscurable-width="500"><div class="c-combo-headshot__content"><div class="c-emblem"><div class="c-emblem__layer"><img data-retina-src="/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NTI5MSwicHVyIjoiYmxvYl9pZCJ9fQ==--9ef24bcdcee2fdfc70c5dd0432959b400538689c/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiMzYweDQ4MF4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--184082a01f7e1e6415e4d6e03b7cd8002a80db59/Erkang_Zheng.jpg" alt="Erkang Zheng" style="width: 100%; height: 100%; object-fit: cover;" src="/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NTI5MSwicHVyIjoiYmxvYl9pZCJ9fQ==--9ef24bcdcee2fdfc70c5dd0432959b400538689c/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiMTgweDI0MF4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--ce1f0b273c14895214513c640abe6c284218f1db/Erkang_Zheng.jpg" /></div></div><div class="c-combo-headshot__label">Erkang Zheng</div><div class="c-combo-headshot__label">CEO, JupiterOne</div></div><div class="b-obscured u-align-left"><p class="u-mb0"><strong>Erkang Zheng</strong></p><p class="u-text-color-gray-400">CEO, JupiterOne</p><p><p>I envision a world where decisions are made on facts, not fear; teams are fulfilled, not frustrated; breaches are improbable, not inevitable. Security is a basic right. I am a cybersecurity practitioner and founder with 20+ years across IAM, pen testing, IR, data, app, and cloud security. An engineer by trade, an entrepreneur at heart, I am passionate about technology and solving real-world challenges. Former CISO, security leader at IBM an...</p></p><p><a href="/profiles/erkang-zheng"><span>Read more</span> <i class="fas fa-long-arrow-alt-right"></i></a></p></div></div></div></div></div></div><div class="o-area o-area--separated o-area--alternating"><div class="o-container"><h2 class="c-heading c-heading--section">Related Resources</h2><div class="o-grid o-grid--small-full o-grid--medium-full o-grid--large-fit"><div class="o-grid__cell o-grid__cell--width-35@medium o-grid__cell--offset-15@medium"><div class="c-card"><div class="c-card__item c-card__item--decoration"><img src="/assets/c-level/CxO-Trust-events-300d762dcee67e40a442ac97bcb6ca794a5df549fc49c7b7fae4da4172341149.jpg" /></div><div class="c-card__item"><h3>Event Recordings</h3><p class="u-text-color-gray-400">Watch recordings from interviews with CISOs and c-level execs as they share their experience securing the cloud.</p><a href="/events/virtual-and-webinars?topic=cxo"><span>Watch Recording</span> <i class="fas fa-long-arrow-alt-right"></i></a></div></div></div><div class="o-grid__cell o-grid__cell--width-35@medium"><div class="c-card"><div class="c-card__item c-card__item--decoration"><img src="/assets/c-level/Resources-08c2692f0a5e7880a76e0ceea189aa665fee2a06b813ae902945450f0e50dc0f.png" /></div><div class="c-card__item"><h3>Resources</h3><p class="u-text-color-gray-400">Access the content created by the CxO Working Group and CSA, from papers to blogs, to videos and more.</p><a href="/cxo-trust/resources"><span>View Resources</span> <i class="fas fa-long-arrow-alt-right"></i></a></div></div></div></div></div></div></main><footer class="c-layout-footer"><div class="o-area"><div class="cookie-banner" style="display: block;"><div data-controller="dynamic-content"><div class="c-notification c-notification--info" id="cookie-banner-main"><div class="c-notification__item c-notification__item--icon"><div class="fas fa-info-circle"></div></div><div class="c-notification__item"><p><strong>We value your privacy.</strong> <span>Our website uses analytics and advertising cookies to improve your browsing experience. Read our full</span> <a href="/legal/privacy-notice/">Privacy Policy</a><span>.</span></p><div class="c-button-group c-button-group--centered u-mb16"><a class="c-button c-button--gray" data-action="click->dynamic-content#update" data-dynamic-content-hide-param="#cookie-banner-main" data-dynamic-content-show-param="#cookie-banner-customize" href="#">Customize</a><a class="c-button c-button--blue" id="cookie-banner-accept-all" data-action="cookie-consent#acceptAll" data-controller="cookie-consent" href="#">Allow</a></div></div></div><div class="c-notification c-notification--info" id="cookie-banner-customize" style="display: none;"><div class="c-notification__item c-notification__item--icon"><div class="fas fa-info-circle"></div></div><div class="c-notification__item"><p class="u-pt12" style="line-height: 1.3em; font-size: 1.2em;"><strong>About the Cookies</strong></p><form class="c-form" data-action="cookie-consent#update" data-controller="cookie-consent" action="/cxo-trust" accept-charset="UTF-8" method="post"><input type="hidden" name="authenticity_token" value="XBNT87NC31R3VSyWzf1LRz6Sgk0Osd7nIThHL8p1htRBCMuJA-DBDPYhr78-Ywd2-BaHQhyHX18C_xeASekO7A" autocomplete="off" /><p><strong>Analytics cookies,</strong> from <a target="_blank" href="https://analytics.google.com/">Google Analytics</a> and <a target="_blank" href="https://clarity.microsoft.com/">Microsoft Clarity</a> help us analyze site usage to continuously improve our website.</p><div class="c-form__item-group c-form__item-group--duo c-form__item-group--checkbox--big"><div class="c-form__item"><input id="analytics" type="checkbox" value="1" checked="checked" name="analytics" /></div><div class="c-form__item c-form__item--label"><label for="analytics">Enable cookies for analytics.</label></div></div><p class="u-pt12"><strong>Advertising cookies,</strong> enable <a target="_blank" href="https://policies.google.com/privacy">Google</a> to collect information to display content and ads tailored to your interests.</p><div class="c-form__item-group c-form__item-group--duo c-form__item-group--checkbox--big"><div class="c-form__item"><input id="advertising" type="checkbox" value="1" checked="checked" name="advertising" /></div><div class="c-form__item c-form__item--label"><label for="advertising">Enable cookies for advertising.</label></div></div><div class="c-button-group c-button-group--centered u-mb16 u-mt16"><a class="c-button c-button--gray" id="cookie-banner-reject-all" data-action="cookie-consent#rejectAll" data-controller="cookie-consent" href="#">Decline All</a><input type="submit" name="commit" value="Confirm" class="c-button c-button--blue" data-disable-with="Confirm" /></div></form></div></div></div></div><div class="c-footer"><div class="o-container"><div class="o-grid o-grid--small-full o-grid--medium-full o-grid--large-fit"><div class="c-footer__item o-grid__cell o-grid__cell--width-30@medium u-align-left"><div class="c-footer__logo u-separate"><img src="/assets/csa-logo-white-33c6ce89081b4488f9fe480c8e4f5e662f8a9723e5467d30359ff832c269b7d6.png" /></div><p class="u-separate"><a class="c-button c-button--social-circle c-button--linkedin" target="_blank" rel="noopener" href="https://www.linkedin.com/groups/1864210/profile"><img src="/assets/social-share/li-icon-09fa81c48d4329077ed9608610eb94677c1598373b57333973e931874e641c30.svg" /></a><a class="c-button c-button--social-circle c-button--twitter" target="_blank" rel="noopener" href="https://twitter.com/intent/tweet?text=&url="><img src="/assets/social-share/x-icon-d5737d8484c6d1c6b2c18ad43c18037db1925464c40f14899cdfdb82fe33a861.svg" /></a><a class="c-button c-button--social-circle c-button--facebook" target="_blank" rel="noopener" href="https://www.facebook.com/csacloudfiles"><img src="/assets/social-share/fb-icon-c0307da13019b8e4ef32e5f2e7039eac01c272bcbc2c3a7aad4ba033c0a27153.svg" /></a><a class="c-button c-button--social-circle c-button--youtube" target="_blank" rel="noopener" href="https://www.youtube.com/channel/UCrcG6ZtsBPz3xkUZU6asVhA"><img src="/assets/social-share/yt-icon-ade320bf2b6ffeae084895dac740b736c7dda9f181a871260f83da2462465ab3.svg" /></a><p class="u-separate"><span>© 2009–</span><span>2025</span> <span>Cloud Security Alliance.</span><br /><span>All rights reserved.</span></p></p></div><div class="c-footer__item o-grid__cell"><div class="o-grid o-grid--small-full o-grid--medium-full o-grid--large-fit"><div class="o-grid__cell"><div class="c-footer__list"><h6><a href="https://cloudsecurityalliance.org/membership/">Corporate Membership</a></h6><a href="https://cloudsecurityalliance.org/membership/enterprises/">Cloud Customers</a><a href="https://cloudsecurityalliance.org/membership/solution-providers/">Cloud Solution Providers</a></div><div class="c-footer__list"><h6><a href="https://circle.cloudsecurityalliance.org/home">Join as an Individual</a></h6><a href="https://cloudsecurityalliance.org/circle/">Circle Community Forum</a><a href="https://cloudsecurityalliance.org/chapters/">Chapters</a><a href="https://cloudsecurityalliance.org/research/working-groups/">Working Groups</a></div><div class="c-footer__list"><h6><a href="https://cloudsecurityalliance.org/research/">Research</a></h6><a href="https://cloudsecurityalliance.org/research/artifacts/">Download Publications</a><a href="https://cloudsecurityalliance.org/research/working-groups/">View Working Groups</a><a href="https://cloudsecurityalliance.org/research/topics">View All Topics</a></div><div class="c-footer__list"><h6><span>Find a...</span></h6><a href="https://cloudsecurityalliance.org/trusted-cloud-consultant">Cloud Consultant</a><a data-turbo="false" href="https://cloudsecurityalliance.org/star/registry/">Cloud Service Provider</a><a href="https://cloudsecurityalliance.org/trusted-cloud-provider">Trusted Cloud Provider</a></div></div><div class="o-grid__cell"><div class="c-footer__list"><h6><a href="https://cloudsecurityalliance.org/education/">Certificates</a></h6><a href="https://cloudsecurityalliance.org/education/ccsk/">CCSK</a><a href="https://cloudsecurityalliance.org/education/ccak/">CCAK</a><a href="https://cloudsecurityalliance.org/education/cczt/">CCZT</a></div><div class="c-footer__list"><h6><a href="https://cloudsecurityalliance.org/events/">Events</a></h6><a href="https://cloudsecurityalliance.org/events/americas">Americas</a><a href="https://cloudsecurityalliance.org/events/emea/">EMEA</a><a href="https://cloudsecurityalliance.org/events/apac/">APAC</a></div><div class="c-footer__list"><h6><a href="https://cloudsecurityalliance.org/education/">Education</a></h6><a href="https://cloudsecurityalliance.org/blog/">Blog</a><a data-turbo="false" href="https://cloudsecurityalliance.org/events/virtual-and-webinars/">Virtual Events & Webinars</a><a href="https://cloudsecurityalliance.org/education/">Training</a><a href="https://cloudsecurityalliance.org/cloud-newbie">Cloud 101</a></div><div class="c-footer__list"><h6><span>Popular Resources</span></h6><a href="https://cloudsecurityalliance.org/research/guidance/">Security Guidance</a><a href="https://cloudsecurityalliance.org/research/cloud-controls-matrix/">CCM</a><a href="https://cloudsecurityalliance.org/research/cloud-controls-matrix/">CAIQ</a><a href="https://cloudsecurityalliance.org/star/">STAR</a><a href="https://cloudsecurityalliance.org/privacy/gdpr/">GDPR</a></div></div><div class="o-grid__cell"><div class="c-footer__list"><h6><a href="https://cloudsecurityalliance.org/about/">About CSA</a></h6><a href="https://cloudsecurityalliance.org/contact/">Contact Us</a><a href="https://cloudsecurityalliance.org/press-releases/">Press Releases</a><a href="https://cloudsecurityalliance.org/membership/current-affiliates/">Affiliates</a><a href="https://cloudsecurityalliance.org/press-coverage/">Press Coverage</a><a href="https://cloudsecurityalliance.org/quality-policy/">Quality Policy</a></div><div class="c-footer__list"><h6><a href="https://cloudsecurityalliance.org/about/csa-staff/">Our Team</a></h6><a data-turbo="false" href="https://cloudsecurityalliance.org/about/board-of-directors/">Board of Directors</a><a data-turbo="false" href="https://cloudsecurityalliance.org/about/csa-staff/">Management & Staff</a><a href="https://cloudsecurityalliance.org/about/careers">Careers</a></div><div class="c-footer__list"><h6><a href="https://cloudsecurityalliance.org/legal/">Legal</a></h6><a href="https://cloudsecurityalliance.org/legal/privacy-notice/">Privacy Notice</a><a href="https://cloudsecurityalliance.org/legal/website-terms-and-conditions/">Terms & Conditions</a></div><div class="c-footer__list"><h6><a href="https://cloudsecurityalliance.org/cloud-security-glossary/">Cloud Security Glossary</a></h6></div></div></div></div></div></div></div><div class="u-scroll-to-top"><span class="c-button c-button--primary c-button--elevated">▴</span></div></div></footer><div class="c-modal"><div class="c-modal__content"></div><span class="c-modal__close-button"></span></div> <script data-cfasync="false" src="/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js"></script><script id="ze-snippet" src="https://static.zdassets.com/ekr/snippet.js?key=2121b371-8db3-4beb-8ca2-5e994ec5fb73"></script> <script type="text/javascript"> var isDesktop = true; // device detection if(/(android|bb\d+|meego).+mobile|avantgo|bada\/|blackberry|blazer|compal|elaine|fennec|hiptop|iemobile|ip(hone|od)|ipad|iris|kindle|Android|Silk|lge |maemo|midp|mmp|netfront|opera m(ob|in)i|palm( os)?|phone|p(ixi|re)\/|plucker|pocket|psp|series(4|6)0|symbian|treo|up\.(browser|link)|vodafone|wap|windows (ce|phone)|xda|xiino/i.test(navigator.userAgent) || /1207|6310|6590|3gso|4thp|50[1-6]i|770s|802s|a wa|abac|ac(er|oo|s\-)|ai(ko|rn)|al(av|ca|co)|amoi|an(ex|ny|yw)|aptu|ar(ch|go)|as(te|us)|attw|au(di|\-m|r |s )|avan|be(ck|ll|nq)|bi(lb|rd)|bl(ac|az)|br(e|v)w|bumb|bw\-(n|u)|c55\/|capi|ccwa|cdm\-|cell|chtm|cldc|cmd\-|co(mp|nd)|craw|da(it|ll|ng)|dbte|dc\-s|devi|dica|dmob|do(c|p)o|ds(12|\-d)|el(49|ai)|em(l2|ul)|er(ic|k0)|esl8|ez([4-7]0|os|wa|ze)|fetc|fly(\-|_)|g1 u|g560|gene|gf\-5|g\-mo|go(\.w|od)|gr(ad|un)|haie|hcit|hd\-(m|p|t)|hei\-|hi(pt|ta)|hp( i|ip)|hs\-c|ht(c(\-| |_|a|g|p|s|t)|tp)|hu(aw|tc)|i\-(20|go|ma)|i230|iac( |\-|\/)|ibro|idea|ig01|ikom|im1k|inno|ipaq|iris|ja(t|v)a|jbro|jemu|jigs|kddi|keji|kgt( |\/)|klon|kpt |kwc\-|kyo(c|k)|le(no|xi)|lg( g|\/(k|l|u)|50|54|\-[a-w])|libw|lynx|m1\-w|m3ga|m50\/|ma(te|ui|xo)|mc(01|21|ca)|m\-cr|me(rc|ri)|mi(o8|oa|ts)|mmef|mo(01|02|bi|de|do|t(\-| |o|v)|zz)|mt(50|p1|v )|mwbp|mywa|n10[0-2]|n20[2-3]|n30(0|2)|n50(0|2|5)|n7(0(0|1)|10)|ne((c|m)\-|on|tf|wf|wg|wt)|nok(6|i)|nzph|o2im|op(ti|wv)|oran|owg1|p800|pan(a|d|t)|pdxg|pg(13|\-([1-8]|c))|phil|pire|pl(ay|uc)|pn\-2|po(ck|rt|se)|prox|psio|pt\-g|qa\-a|qc(07|12|21|32|60|\-[2-7]|i\-)|qtek|r380|r600|raks|rim9|ro(ve|zo)|s55\/|sa(ge|ma|mm|ms|ny|va)|sc(01|h\-|oo|p\-)|sdk\/|se(c(\-|0|1)|47|mc|nd|ri)|sgh\-|shar|sie(\-|m)|sk\-0|sl(45|id)|sm(al|ar|b3|it|t5)|so(ft|ny)|sp(01|h\-|v\-|v )|sy(01|mb)|t2(18|50)|t6(00|10|18)|ta(gt|lk)|tcl\-|tdg\-|tel(i|m)|tim\-|t\-mo|to(pl|sh)|ts(70|m\-|m3|m5)|tx\-9|up(\.b|g1|si)|utst|v400|v750|veri|vi(rg|te)|vk(40|5[0-3]|\-v)|vm40|voda|vulc|vx(52|53|60|61|70|80|81|83|85|98)|w3c(\-| )|webc|whit|wi(g |nc|nw)|wmlb|wonu|x700|yas\-|your|zeto|zte\-/i.test(navigator.userAgent.substr(0,4))) { isDesktop = false; } window.zESettings = { webWidget: { color: { launcherText: '#FFFFFF' } } }; var customizeWidget = function () { // Dodge Recaptcha when it also exists on the page if (typeof grecaptcha !== 'undefined') { $('#launcher').animate({'margin-right': '80px'}); }; }; setTimeout(customizeWidget, 2000); </script> </body></html>