Upcoming Live Webinars
Live Webinar - Oct 28, 2021 10am Pacific | 1pm Eastern
Organizations often grant overly permissive privileges to users and services that are often unused. This level of access exposes you, enabling adversaries to hack into the cloud and perform malicious activity.
Live Webinar - Nov 2, 2021 10am Pacific | 1pm Eastern
Automate CI/CD pipeline and registry scanning without images leaving your Google Cloud environment. Integrate with GCR, Artifact Registry, and Cloud Build to block vulnerabilities in pre-production.
Live Webinar - Nov 4, 2021 10am Pacific | 1pm Eastern
Prometheus uses PromQL to query the vast amount of time series data that it stores. Unlike other query languages that are based on SQL, PromQL has its own syntax and can take a lot of time and practice to master.
Live Webinar - Nov 9, 2021 10am Pacific | 1pm Eastern
Secure containers, Google Kubernetes Engine (GKE), and cloud infrastructure with out-of-the-box policies based on open source Falco. Implement real-time threat detection and posture management for Google Cloud services using Cloud Audit Logs to detect and respond to suspicious activity.
Live Webinar - Nov 11, 2021 10am Pacific | 1pm Eastern
The cloud vendors offer hundreds of cloud services your team may be using. How can you identify threats across these services without drowning in a sea of alerts? Join us to learn how to scale up threat detection and scale down false positives in the cloud.
Live Webinar - Nov 16, 2021 9am Pacific | 12pm Eastern
Meet regulatory compliance standards for Google Cloud containers and services. Continuously validate compliance with industry standards, like PCI, NIST, SOC 2, and HIPAA. Run best practice benchmarks and track cloud compliance progress with interactive dashboards and reports.
Live Webinar - Nov 18, 2021 10am Pacific | 1pm Eastern
Cybercriminals are thriving in the complexity and increased attack surface of cloud-native and Kubernetes environments. SOC teams must reduce their mean time to respond (MTTR) when incidents occur, but how? Join us to learn more.
Customers love Amazon Elastic Container Service (ECS) for its powerful simplicity and because it provides them a path to run containers at scale in an AWS-opinionated way. Join this Partner Roundtable to hear from AWS Partners and learn about the benefits of ECS Anywhere.
AWS Fargate is a popular choice for running serverless containers, but runtime security is still a major challenge. Level up Fargate security with Sysdig! Join us and AWS to hear how you can confidently secure AWS Fargate serverless containers at scale.
Safeguarding sensitive credit card data in a massively dynamic multi-cloud infrastructure is no walk in the park. Hear how global payment service provider, Worldpay, is achieving its mission of 100% cloud usage with PCI compliance from development through production. Utilizing a secure DevOps approach with Red Hat OpenShift and Sysdig, Worldpay achieves container security at scale – and so can you.
A well-crafted Dockerfile will avoid the need for privileged containers, unused packages, leaked credentials, or anything that can be used for an attack. In this webinar, we’ll go deep on Dockerfile best practices for image builds, so you can prevent security issues and optimize containerized applications.
Kubernetes environments are very dynamic. As a result, they can sometimes feel rather messy and disorganized. This is where labels come in. They can help you distinguish between non-infrastructure related characteristics. For example, “release” vs. “stable” or “production” vs. “dev”. However, labels also have a tendency to multiply to the point where the increased cardinality is difficult to store and query. This is especially true when using Prometheus to collect data about your environment and related services.
Staying on top of misconfigurations, suspicious activity and threats across multiple clouds is difficult. Amid all the alerts, which ones actually pose a threat? How can you quickly and efficiently investigate threats with the many siloed container and cloud tools? It’s time for a fresh approach to unify container and cloud security. Take advantage of an open-standards approach that is radically simple to run and scale.
As modern app development moves at a fast pace and container/Kubernetes adoption has grown, security is topping the list of IT concerns. Image vulnerability scanning is a critical first line of defense for security with containers and Kubernetes. What’s challenging is being able to automate security scanning for images AND achieve consistent scan results to assess risk.
Cloud applications are transforming how government organizations fulfill their missions and serve the public. As new technologies, such as cloud, containers and serverless, are being adopted, it’s critical to consider security and compliance requirements, like FedRAMP. However, the time and cost required to meet FedRAMP can be an inhibitor to market entry, especially in complex technological environments. Hear how Anitian, a leader in DevSecOps for government, and Sysdig, a leader in securing cloud-native apps in production, are helping businesses win contracts and enter new Federal markets. Together, they can reduce the time and cost required to meet FedRAMP requirements and dramatically accelerate time-to-revenue and FedRAMP compliance by up to 80%.
As containers and Kubernetes are adopted in production, security is a critical concern. DevOps teams need to go beyond image scanning, expanding into the areas of runtime security, network visibility and segmentation, incident response and compliance. These use cases become priorities as your Kubernetes security framework matures. Join Eric Carter from Sysdig and Tommy Falgout from Microsoft, as we share an overview of security on Azure Kubernetes Service (AKS), discuss approaches used by open source and commercial tools, and hear how Azure users are keeping their code and containers secure without impacting developer productivity.
IBM and Sysdig have partnered to help clients run more secure and more robust applications, tools, and services, by providing new levels of intelligence and visibility across your workloads. During this webinar, IBM and Sysdig will share how you can leverage the latest tools to better secure and manage your tools, applications, and services, including demos showing AI in action.
If an attacker got inside your cluster, would you know about it? Kubernetes has become the defacto standard for container orchestration, bringing with it a new set of security challenges. One of the biggest problems we see, among DevOps and Security teams alike, is a lack of knowing what to look for when it comes to malicious activity. In this session, you’ll learn how to detect and respond to threats at runtime. We’ll share practical strategies for pinpointing malicious activity, and you’ll be armed with the knowledge and confidence to not delay efforts to secure your Kubernetes and container environment. We’ll also look at examples for how many enterprises are already reducing risk with a secure DevOps approach.
Kubernetes 1.20 and all 43 features have been released. In a recent blog post we collated these together in one place so that you can learn what may affect your clusters and prepare for change. Join this webinar presented by Taylor Dolezal, a Developer Advocate at HashiCorp and the Kubernetes 1.21 Emeritus Advisor. Taylor will share the most exciting and impacting elements of the release.