Webinars

Upcoming Live Webinars

Live Webinar - May 19, 2022 10am Pacific | 1pm Eastern

Container and Kubernetes Security Best Practices: Forensics & Incident Response

Conducting forensics and incident response for containers and Kubernetes helps you better understand security breaches, meet compliance requirements and recover quickly. On average, containers live less than 5 minutes, so having a cloud native incident response plan is critical.

Live Webinar - May 25, 2022 10am Pacific | 1pm Eastern

CSPM Best Practices for Multi-Cloud: Beyond Native Tools

Join Sysdig to understand the fundamentals on cloud categories and terms like CSPM, CWPP, CNAPP, etc. so you can move past the acronyms and onto implementing them as best practices.

Live Webinar - Jun 2, 2022 10am Pacific | 1pm Eastern

SOC2 Compliance for Containers and Cloud

After this webinar, you will understand how other organizations are validating SOC2 compliance for their cloud applications.

Live Webinar - Jun 14, 2022 11am Pacific | 2pm Eastern

SANS – FIND, FOCUS, and FIX the Cloud Threats that Matter Solutions Forum

FIND, FOCUS, and FIX the Cloud Threats that Matter: Accenture, AWS, Expel, Snyk, and Sysdig join SANS to share insights. As you move to the cloud, your security teams often feel a loss of control in this new world. Traditional tools and processes don’t work and visibility is fragmented, even more so across multi-cloud infrastructure.

Live Webinar - Jun 23, 2022 10am Pacific | 1pm Eastern

Shifting Security Further Left with IaC Security

Modern DevOps teams are adopting GitOps principles: provisioning workloads using infrastructure-as-code (IaC) tools and managing policies as code using open source tools like Open Policy Agent (OPA)

Search Results 11 - 22 of 160

On-Demand Webinar

How to Prepare for the Next Log4j

Organizations must validate compliance with industry standards, like PCI, NIST, and SOC2, during build and runtime and automatically measure progress against CIS benchmarks. 

On-Demand Webinar

Image Scanning on Azure

Do you want to ensure images are free of vulnerabilities and meet best practices before pushing to production? Image scanning refers to the process of analyzing the contents and the build process of a container image in order to detect security issues, vulnerabilities, or bad practices. Participants will learn how Sysdig Secure can identify vulnerabilities pre-production and at runtime.

On-Demand Webinar

Combat Critical Cloud Vulnerabilities

Cloud and containers are being adopted by a broad set of organizations as they try to maintain a competitive advantage. In our recent Cloud-Native Security and Usage Report, we found that 75% of containers in the cloud have vulnerabilities!

On-Demand Webinar

Modernize and Secure DevOps with Confidence

Join AWS & Sysdig as we unpack and offer answers about where you can focus your efforts to modernize DevOps and provide key business benefits, such as speed, agility, and cost savings.  

On-Demand Webinar

Align Your Cloud Security Plan with the Cybersecurity Exec Order

Global security breaches and the White House Executive Order (EO) have sped up the timeline to modernize cybersecurity for both the public and private sectors. The way applications are developed and deployed (in the cloud and on containers), means taking a look at cloud security, Zero Trust architectures, and regulatory compliance in order to meet the mandates, keep moving ahead of the hackers and reduce risk.

On-Demand Webinar

Continuous Compliance on AWS

Organizations must validate compliance with industry standards, like PCI, NIST, and SOC2, during build and runtime and automatically measure progress against CIS benchmarks. 

On-Demand Webinar

Cloud and Container Runtime Security on AWS

Join us to learn how Sysdig Secure extends the open-source Falco runtime security engine, and saves time creating and maintaining runtime policies. Our rules map to MITRE ATT&CK framework, NIST and PCI, along with other container/Kubernetes runtime detection and cloud security threat policies.