Webinars

Upcoming Live Webinars

Live Webinar - Apr 22, 2021 10am Pacific | 1pm Eastern

Top Dockerfile Best Practices

A well-crafted Dockerfile will avoid the need for privileged containers, unused packages, leaked credentials, or anything that can be used for an attack. In this webinar, we’ll go deep on Dockerfile best practices for image builds, so you can prevent security issues and optimize containerized applications.

Live Webinar - Apr 29, 2021 10am Pacific | 1pm Eastern

Fighting Fraud – Worldpay Protects Cardholder Data

Safeguarding sensitive credit card data in a massively dynamic multi-cloud infrastructure is no walk in the park. Hear how global payment service provider, Worldpay, is achieving its mission of 100% cloud usage with PCI compliance from development through production. Utilizing a secure DevOps approach with Red Hat OpenShift and Sysdig, Worldpay achieves container security at scale – and so can you.

Live Webinar - May 13, 2021 10am Pacific | 1pm Eastern

Securing Serverless Containers on AWS Fargate

AWS Fargate is a popular choice for running serverless containers, but runtime security is still a major challenge. Level up Fargate security with Sysdig! Join us and AWS to hear how you can confidently secure AWS Fargate serverless containers at scale.

Live Webinar - May 20, 2021 9am Pacific | 12pm Eastern

Preparing for the Certified K8s Security Specialist (CKS) Exam

Becoming a Certified Kubernetes Security Specialist (CKS) is tough. The exam covers a broad range of topics about securing container- and Kubernetes-based apps, making it one of the most difficult Kubernetes certifications to achieve. Don’t go it alone! Join Sysdig and CNCF Ambassador Saiyam Pathak for this session — we’ll go beyond the basics and share expert advice so you can pass!

Search Results 1 - 10 of 106

On-Demand Webinar

Supercharging Kubernetes Labels And Metrics

Kubernetes environments are very dynamic. As a result, they can sometimes feel rather messy and disorganized. This is where labels come in. They can help you distinguish between non-infrastructure related characteristics. For example, “release” vs. “stable” or “production” vs. “dev”. However, labels also have a tendency to multiply to the point where the increased cardinality is difficult to store and query. This is especially true when using Prometheus to collect data about your environment and related services.

On-Demand Webinar

Accelerate Threat Detection Across Clouds and Containers

Staying on top of misconfigurations, suspicious activity and threats across multiple clouds is difficult. Amid all the alerts, which ones actually pose a threat? How can you quickly and efficiently investigate threats with the many siloed container and cloud tools? It’s time for a fresh approach to unify container and cloud security. Take advantage of an open-standards approach that is radically simple to run and scale.

On-Demand Webinar

Consistent Container Vulnerability Scanning with Red Hat & Sysdig

As modern app development moves at a fast pace and container/Kubernetes adoption has grown, security is topping the list of IT concerns. Image vulnerability scanning is a critical first line of defense for security with containers and Kubernetes. What’s challenging is being able to automate security scanning for images AND achieve consistent scan results to assess risk.

On-Demand Webinar

Accelerate your FedRAMP journey for container security with Anitian & Sysdig

Cloud applications are transforming how government organizations fulfill their missions and serve the public. As new technologies, such as cloud, containers and serverless, are being adopted, it’s critical to consider security and compliance requirements, like FedRAMP. However, the time and cost required to meet FedRAMP can be an inhibitor to market entry, especially in complex technological environments. Hear how Anitian, a leader in DevSecOps for government, and Sysdig, a leader in securing cloud-native apps in production, are helping businesses win contracts and enter new Federal markets. Together, they can reduce the time and cost required to meet FedRAMP requirements and dramatically accelerate time-to-revenue and FedRAMP compliance by up to 80%.

On-Demand Webinar

Container Security Best Practices on Azure Kubernetes Service (AKS)

As containers and Kubernetes are adopted in production, security is a critical concern. DevOps teams need to go beyond image scanning, expanding into the areas of runtime security, network visibility and segmentation, incident response and compliance. These use cases become priorities as your Kubernetes security framework matures. Join Eric Carter from Sysdig and Tommy Falgout from Microsoft, as we share an overview of security on Azure Kubernetes Service (AKS), discuss approaches used by open source and commercial tools, and hear how Azure users are keeping their code and containers secure without impacting developer productivity.

On-Demand Webinar

IBM and Sysdig – How to Drive More Security and Reliability

IBM and Sysdig have partnered to help clients run more secure and more robust applications, tools, and services, by providing new levels of intelligence and visibility across your workloads. During this webinar, IBM and Sysdig will share how you can leverage the latest tools to better secure and manage your tools, applications, and services, including demos showing AI in action.

On-Demand Webinar

Kubernetes Attacks: What your cluster is trying to tell you

If an attacker got inside your cluster, would you know about it? Kubernetes has become the defacto standard for container orchestration, bringing with it a new set of security challenges. One of the biggest problems we see, among DevOps and Security teams alike, is a lack of knowing what to look for when it comes to malicious activity. In this session, you’ll learn how to detect and respond to threats at runtime. We’ll share practical strategies for pinpointing malicious activity, and you’ll be armed with the knowledge and confidence to not delay efforts to secure your Kubernetes and container environment. We’ll also look at examples for how many enterprises are already reducing risk with a secure DevOps approach.

On-Demand Webinar

Kubernetes 1.20: Straight talk from the release team

Kubernetes 1.20 and all 43 features have been released. In a recent blog post we collated these together in one place so that you can learn what may affect your clusters and prepare for change. Join this webinar presented by Taylor Dolezal, a Developer Advocate at HashiCorp and the Kubernetes 1.21 Emeritus Advisor. Taylor will share the most exciting and impacting elements of the release.

On-Demand Webinar

Container Security Best Practices: Forensics & Incident Response

Containers are a technology that is here to stay. They’re developer friendly, easy to operationalize, and allow organizations to provide stable and secure services to their customers. While there are clear best practices for what it takes to build and run containers, there isn’t as much knowledge around the performing forensic analysis of incidents that occur inside your containers.

On-Demand Webinar

Getting Started with Runtime Security on Azure Kubernetes Service (AKS)

As containers and Kubernetes are adopted in production, security is a critical concern and DevOps teams need to go beyond image scanning. Use cases such as runtime security, network visibility and segmentation, incident response and compliance become priorities as your Kubernetes security framework matures. In this talk, we’ll share an overview of runtime security, discuss approaches used by open source and commercial tools. and hear how users are getting started quickly without impacting developer productivity.