Webinars

Listen to something good for you today.

Search Results 1 - 10 of 67

On-Demand Webinar - May 28, 2020

Secure DevOps Virtual Meetup Europe May

Join us for our European Secure DevOps Virtual Meetup hosted by Chris Kranz from Sysdig. Grab yourself some lunch, dial in and settle in for an hour long recap of everything that’s interesting in the container space.

On-Demand Webinar - May 21, 2020

AWS Observability 101: Kubernetes and Prometheus Monitoring with Sysdig

Challenges abound when it comes to securing and monitoring containers, Kubernetes, and cloud-native applications across development and production. Most notably, scaling Prometheus monitoring beyond a few servers with a few days retention presents issues when trying to troubleshoot issues that span multiple applications or microservices. We’ll share a unique approach that builds upon Prometheus without sacrificing compatibility and discover the insights performance metrics can provide.

On-Demand Webinar - May 14, 2020

AWS Security 101: Securing Amazon EKS with Falco & Sysdig

Amazon’s Managed Kubernetes Service (EKS) offers organizations flexibility as teams ramp up containerized applications in production. And yet, managing security risk for the workloads running on EKS is still the customer’s responsibility. To make your teams as productive as possible, you need to automate and merge security and compliance into the DevOps workflow.

On-Demand Webinar - May 7, 2020

Moving Applications to the Cloud? How Top Financials Reduced their Security and Compliance Risk

Financial institutions are being attacked at an alarming rate. In July 2019, Accenture reported that the average annual cost of cybercrime for a financial service company reached $18.5 million. And that includes only the cost of the incident — not remediation. In order to gain agility benefits of the cloud DevOps teams need to manage risk, mitigate breaches, and gain visibility, without slowing down the CI/CD pipeline. What solutions help deliver for both DevOps and security professionals?

On-Demand Webinar - April 30, 2020

Top 5 Cloud Native Pipeline Security Considerations

In this webinar, we’ll take a deep dive into Booz Allen Hamilton’s award-winning ways of securing modern software development. Specifically, we’ll share strong learnings and best practices to confidently protect your pipeline at each stage.

On-Demand Webinar - April 21, 2020

PCI Compliance in Containers & Kubernetes

Many of your applications are now starting to run on containers in the cloud. This means compliance and managing risk are top priorities. Your security teams understand PCI guidelines, but the challenge is a clear mapping of those PCI controls to container/Kubernetes environments. Ultimately, you need to ensure compliance is not blocking your code from going into production.

On-Demand Webinar - April 20, 2020

Kubernetes Security Master Class: Detecting anomalous activity in Rancher with Falco

Securing Kubernetes requires putting controls in place to detect unexpected behavior that could be malicious. In this webinar, you will learn how to manage security risk at runtime in your RKE environments using Falco, a CNCF project for runtime security. Falco efficiently leverages Extended Berkeley Packet Filter (eBPF), a secure mechanism, to capture system calls and gain deep visibility.

On-Demand Webinar - April 7, 2020

Owning Secure DevOps for Google’s Anthos & GKE

As cloud-native becomes the standard for application deployment, DevOps teams are being asked to take ownership of security and compliance along with application performance and availability. Join us to hear how this is being addressed by customers across the Kubernetes lifecycle. We’ll also demo best practices for vulnerability management, runtime security, and container forensics with Google’s Anthos and GKE.

On-Demand Webinar - April 2, 2020

Automating Security for DevOps Workflows

Your developers need to be productive as you ramp containers and Kubernetes in production — without security being a blocker. With several software updates a day in a cloud-native environment, legacy tools can’t keep up. Running reliable and secure containers requires that security and DevOps work better together. We’ve got some great tips to share about automating and integrating security and compliance into the DevOps workflow, so your cloud applications ship faster.

On-Demand Webinar - March 31, 2020

K8s Limits and Requests: Monitoring and Troubleshooting by example

Are your Kubernetes applications not performing well enough? Is your infrastructure oversized? Kubernetes limits and requests dictate the resources available to your applications, so when they aren’t set correctly your cluster suffers from CPU throttling and Out Of Memory Kills. Oversizing your infrastructure is an easy, but expensive, solution — there must be a better way.