Webinars

Upcoming Live Webinars

Live Webinar - May 25, 2022 10am Pacific | 1pm Eastern

CSPM Best Practices for Multi-Cloud: Beyond Native Tools

Join Sysdig to understand the fundamentals on cloud categories and terms like CSPM, CWPP, CNAPP, etc. so you can move past the acronyms and onto implementing them as best practices.

Live Webinar - Jun 2, 2022 10am Pacific | 1pm Eastern

SOC2 Compliance for Containers and Cloud

After this webinar, you will understand how other organizations are validating SOC2 compliance for their cloud applications.

Live Webinar - Jun 7, 2022 10am Pacific | 1pm Eastern

Getting Started With Sysdig’s Enterprise Prometheus Service

Companies around the world know Sysdig for our deep, granular Kubernetes insights, troubleshooting capabilities, as well as cloud and Kubernetes security solutions. But did you know Sysdig is fully Prometheus compatible?

Live Webinar - Jun 14, 2022 11am Pacific | 2pm Eastern

SANS – FIND, FOCUS, and FIX the Cloud Threats that Matter Solutions Forum

FIND, FOCUS, and FIX the Cloud Threats that Matter: Accenture, AWS, Expel, Snyk, and Sysdig join SANS to share insights. As you move to the cloud, your security teams often feel a loss of control in this new world. Traditional tools and processes don’t work and visibility is fragmented, even more so across multi-cloud infrastructure.

Live Webinar - Jun 23, 2022 10am Pacific | 1pm Eastern

Shifting Security Further Left with IaC Security

Modern DevOps teams are adopting GitOps principles: provisioning workloads using infrastructure-as-code (IaC) tools and managing policies as code using open source tools like Open Policy Agent (OPA)

Search Results 1 - 12 of 161

On-Demand Webinar

CIS compliance for Azure

Sysdig performs threat detection for Microsoft Azure by analyzing this log data against a rich set of security rules based on open-source Falco.

On-Demand Webinar

Manage Excessive Permissions and Entitlements in AWS

Organizations often grant overly permissive privileges to users and services that are often unused. This level of access exposes you, enabling adversaries to hack into the cloud and perform malicious activity.

On-Demand Webinar

Continuous Compliance on Azure 

Organizations must validate compliance with industry standards, like PCI, NIST, and SOC2, during build and runtime and automatically measure progress against CIS benchmarks. 

On-Demand Webinar

Protecting Against Log4j Attacks in AWS Fargate

Join us for a live demo of a Log4j attack on a Fargate task and how to detect it in real-time! We’ll share best practices around detection and mitigation of the log4j vulnerability running in serverless environments.

On-Demand Webinar

Bereid je voor op de volgende log4j!

Bereid u voor op de volgende log4j door samen met Marcel Claassen van ons Solution Engineering-team te leren hoe u kunt bepalen of uw systemen zijn getroffen & hoe u zich kunt beschermen met mitigerende maatregelen.