Webinars

Listen to something good for you today.

Upcoming Live Webinars

Live Webinar - Feb 4, 2021 10am Pacific | 1pm Eastern

Container Security Best Practices: Forensics & Incident Response

Containers are a technology that is here to stay. They’re developer friendly, easy to operationalize, and allow organizations to provide stable and secure services to their customers. While there are clear best practices for what it takes to build and run containers, there isn’t as much knowledge around the performing forensic analysis of incidents that occur inside your containers.

Live Webinar - Feb 18, 2021 10am Pacific | 1pm Eastern

Kubernetes 1.20: Straight talk from the release team

Kubernetes 1.20 and all 43 features have been released. In a recent blog post we collated these together in one place so that you can learn what may affect your clusters and prepare for change. Join this hands-on-keyboard style webinar presented by Taylor Dolezal, a Developer Advocate at HashiCorp and the Kubernetes 1.21 Emeritus Advisor. Taylor will share the most exciting and impacting elements of the release.

Live Webinar - Feb 25, 2021 10am Pacific | 1pm Eastern

Kubernetes Attacks: What your cluster is trying to tell you

If an attacker got inside your cluster, would you know about it? Kubernetes has become the defacto standard for container orchestration, bringing with it a new set of security challenges. One of the biggest problems we see, among DevOps and Security teams alike, is a lack of knowing what to look for when it comes to malicious activity. In this session, you’ll learn how to detect and respond to threats at runtime. We’ll share practical strategies for pinpointing malicious activity, and you’ll be armed with the knowledge and confidence to not delay efforts to secure your Kubernetes and container environment. We’ll also look at examples for how many enterprises are already reducing risk with a secure DevOps approach.

Live Webinar - Mar 4, 2021 10am Pacific | 1pm Eastern

Container Security Best Practices on Azure Kubernetes Service (AKS)

As containers and Kubernetes are adopted in production, security is a critical concern. DevOps teams need to go beyond image scanning, expanding into the areas of runtime security, network visibility and segmentation, incident response and compliance. These use cases become priorities as your Kubernetes security framework matures. Join Eric Carter of Sysdig and a guest from Microsoft, as we share an overview of security on Azure Kubernetes Service (AKS), discuss approaches used by open source and commercial tools, and hear how Azure users are keeping their code and containers secure without impacting developer productivity.

Live Webinar - Mar 11, 2021 10am Pacific | 1pm Eastern

Accelerate your FedRAMP journey for container security with Anitian & Sysdig

Cloud applications are transforming how government organizations fulfill their missions and serve the public. As new technologies, such as cloud, containers and serverless, are being adopted, it’s critical to consider security and compliance requirements, like FedRAMP. However, the time and cost required to meet FedRAMP can be an inhibitor to market entry, especially in complex technological environments. Hear how Anitian, a leader in DevSecOps for government, and Sysdig, a leader in securing cloud-native apps in production, are helping businesses win contracts and enter new Federal markets. Together, they can reduce the time and cost required to meet FedRAMP requirements and dramatically accelerate time-to-revenue and FedRAMP compliance by up to 80%.

Search Results 91 - 97 of 97

On-Demand Webinar

Principles of Monitoring Microservices.

Containers and Microservices have radically changed how you get visibility into your applications. As developers have started to leverage orchestration…

On-Demand Webinar

Sysdig Secure Overview.

Learn how you can simplify and strengthen your container security posture by combining deep kernel-level container visibility with metadata from…

On-Demand Webinar

Container troubleshooting with Sysdig.

SSHing into a container for troubleshooting or burdening it with additional monitoring tools is kind of an anti-pattern. But… you…

On-Demand Webinar

20 Docker Security Tools Compared.

There are quite a few Docker security tools in the ecosystem; how do they compare? Everyone starts with image vulnerability…