Webinars

Upcoming Live Webinars

Live Webinar - Dec 9, 2021 10am Pacific | 1pm Eastern

Monitor Plant Health & PiHole Performance with Prometheus

The distinction between your office and your home has never been more blurry. This webinar will showcase how Prometheus (along with Raspi and PiHole) can improve your space with healthy plants and reduce mental clutter by blocking unwanted ads.

Live Webinar - Dec 14, 2021 11am Pacific | 2pm Eastern

Forensics and Incident Response

Conducting forensics and incident response for containers and Kubernetes helps you better understand security breaches, meet compliance requirements and recover quickly.

Live Webinar - Dec 16, 2021 10am Pacific | 1pm Eastern

Compliance with Containers & Cloud

Safeguarding sensitive data and meeting regulatory compliance requirements are top priorities for security teams. With all the agility gained from applications starting to run on containers in the cloud, the last thing the business needs is a slow down when code is ready for production.

Search Results 1 - 12 of 129

On-Demand Webinar

Improve AWS Cloud Threat Detection and Response – MITRE ATT&CK Framework

As cloud threats continue to rise, understanding an adversary’s tactics, techniques and procedures (TTPs) is critical to strengthening cloud security. How can you pull together a unified and simple approach to speed up detection and response for security across your AWS cloud workloads?

On-Demand Webinar

Continuous Compliance on Google Cloud

Meet regulatory compliance standards for Google Cloud containers and services. Continuously validate compliance with industry standards, like PCI, NIST, SOC 2, and HIPAA. Run best practice benchmarks and track cloud compliance progress with interactive dashboards and reports.

On-Demand Webinar

Scale up Threat Detection, Scale Down False Positives in the Cloud

The cloud vendors offer hundreds of cloud services your team may be using. How can you identify threats across these services without drowning in a sea of alerts? Join us to learn how to scale up threat detection and scale down false positives in the cloud.

On-Demand Webinar

Cloud and Container Runtime Security on Google Cloud

Secure containers, Google Kubernetes Engine (GKE), and cloud infrastructure with out-of-the-box policies based on open source Falco. Implement real-time threat detection and posture management for Google Cloud services using Cloud Audit Logs to detect and respond to suspicious activity.

On-Demand Webinar

Image Scanning on Google Cloud

Automate CI/CD pipeline and registry scanning without images leaving your Google Cloud environment. Integrate with GCR, Artifact Registry, and Cloud Build to block vulnerabilities in pre-production.

On-Demand Webinar

Less Spooky Containers with Top Security Best Practices

A well-crafted container avoids using excessive privileges, shipping unused packages, leaking credentials, and will expose a minimal attack surface. By removing known risks in advance, you’ll reduce security management and operational overhead; however, not everything can be known and prevented in advance.

On-Demand Webinar

Securing Google Cloud and Containers

With teams under pressure to accelerate the delivery of applications in the cloud, it can be easy to overlook security. Join Sysdig and Google as we discuss ways to ensure visibility, security, and compliance in a dynamic, constantly changing cloud environment.

On-Demand Webinar

Align Your Cloud Security Plan with the Cybersecurity Exec Order

Global security breaches and the White House Executive Order (EO) have sped up the timeline to modernize cybersecurity for both the public and private sectors. The way applications are developed and deployed (in the cloud and on containers), means taking a look at cloud security, Zero Trust architectures, and regulatory compliance in order to meet the mandates, keep moving ahead of the hackers and reduce risk.

On-Demand Webinar

Kubernetes Monitoring Best Practices

Kubernetes is the most widely adopted container orchestrator; however, insufficient visibility can compromise performance and availability. Join us as we dig into the most common challenges of Kubernetes monitoring and how to solve them.