Live Webinar - April 7, 2020 10:00am PDT / 6:00pm GMT

Owning Secure DevOps for Google Cloud's Anthos & GKE

As cloud-native becomes the standard for application deployment, modern app development and the move to hybrid cloud architectures create new operational challenges. What’s more, DevOps teams are being asked to take ownership of security and compliance along with application performance and availability.

Join us to hear how this is being addressed by Google and Sysdig customers across the Kubernetes lifecycle. We’ll discuss approaches for adopting hybrid cloud and best practices for vulnerability management, runtime security, monitoring, and forensics with Google Cloud’s Anthos and GKE.


  • Eric Carter, Director, Partner Product Marketing
  • Evgeniya Shumakher, Partner Engineering Lead, Anthos


You may also be interested in these upcoming live events:

March 31 – K8s Limits and Requests: Monitoring and…
Are your Kubernetes applications not performing well enough? Is your infrastructure oversized? Kubernetes limits and requests dictate the resources available to your applications, so when they aren’t set correctly your cluster suffers from CPU throttling and Out Of Memory Kills. Oversizing your infrastructure is an easy, but expensive, solution — there must be a better way.

April 2 – Automating Security for DevOps Workflows
Your developers need to be productive as you ramp containers and Kubernetes in production — without security being a blocker. With several software updates a day in a cloud-native environment, legacy tools can’t keep up. Running reliable and secure containers requires that security and DevOps work better together. We’ve got some great tips to share about automating and integrating security and compliance into the DevOps workflow, so your cloud applications ship faster.

April 21 – PCI Compliance in Containers & Kubernetes
Many of your applications are now starting to run on containers in the cloud. This means compliance and managing risk are top priorities. Your security teams understand PCI guidelines, but the challenge is a clear mapping of those PCI controls to container/Kubernetes environments. Ultimately, you need to ensure compliance is not blocking your code from going into production.

April 30 – Top 5 Cloud Native Pipeline Security Considerations
In this webinar, we’ll take a deep dive into Booz Allen Hamilton’s award-winning ways of securing modern software development. Specifically, we’ll share strong learnings and best practices to confidently protect your pipeline at each stage.