Webinars

Upcoming Live Webinars

Live Webinar - May 19, 2022 10am Pacific | 1pm Eastern

Container and Kubernetes Security Best Practices: Forensics & Incident Response

Conducting forensics and incident response for containers and Kubernetes helps you better understand security breaches, meet compliance requirements and recover quickly. On average, containers live less than 5 minutes, so having a cloud native incident response plan is critical.

Live Webinar - May 25, 2022 10am Pacific | 1pm Eastern

CSPM Best Practices for Multi-Cloud: Beyond Native Tools

Join Sysdig to understand the fundamentals on cloud categories and terms like CSPM, CWPP, CNAPP, etc. so you can move past the acronyms and onto implementing them as best practices.

Live Webinar - Jun 2, 2022 10am Pacific | 1pm Eastern

SOC2 Compliance for Containers and Cloud

After this webinar, you will understand how other organizations are validating SOC2 compliance for their cloud applications.

Live Webinar - Jun 14, 2022 11am Pacific | 2pm Eastern

SANS – FIND, FOCUS, and FIX the Cloud Threats that Matter Solutions Forum

FIND, FOCUS, and FIX the Cloud Threats that Matter: Accenture, AWS, Expel, Snyk, and Sysdig join SANS to share insights. As you move to the cloud, your security teams often feel a loss of control in this new world. Traditional tools and processes don’t work and visibility is fragmented, even more so across multi-cloud infrastructure.

Live Webinar - Jun 23, 2022 10am Pacific | 1pm Eastern

Shifting Security Further Left with IaC Security

Modern DevOps teams are adopting GitOps principles: provisioning workloads using infrastructure-as-code (IaC) tools and managing policies as code using open source tools like Open Policy Agent (OPA)

Search Results 131 - 134 of 160

On-Demand Webinar

Container troubleshooting with Sysdig.

SSHing into a container for troubleshooting or burdening it with additional monitoring tools is kind of an anti-pattern. But… you…

On-Demand Webinar

20 Docker Security Tools Compared.

There are quite a few Docker security tools in the ecosystem; how do they compare? Everyone starts with image vulnerability…