Webinars

Listen to something good for you today.

Upcoming Live Webinars

Live Webinar - July 16 2020 10am Pacific | 7pm CEST

Automating Container Visibility & Security to Accelerate Application Delivery

Ever build a car while driving it? Many cloud teams are feeling this way as they strive to migrate applications to the cloud. Ford Motor Company met the challenge head on by building a culture of collaboration that helped speed innovation, gain cost efficiency and mitigate risk. Join us to hear how Ford gave their developers container visibility and security with Sysdig, thereby, accelerating application delivery.

Live Webinar - July 23 2020 10am Pacific | 7pm CEST

Getting Started with Runtime Security for Containers & Kubernetes

As cloud native technologies mature, security is becoming an important concern for DevOps. In this talk, we’ll share an overview of runtime security, discuss different approaches used by tools today and hear directly from Stella Connect how they got started quickly without impacting developer productivity.

Live Webinar - July 29 2020 10am Pacific | 1pm Eastern

Image Scanning Best Practices for Containers and Kubernetes

DevOps teams are looking to manage security risk without slowing down application delivery. Image scanning is critical to integrate into DevOps, but how can you get started? Join Sysdig’s security team as they share practical guidance and demonstrate five (5) key steps to adopt in your image scanning workflow. You’ll walk away with a short, impactful checklist and be on your way to a more secure environment.

Live Webinar - July 30 2020 12pm BST | 1pm CEST

Secure DevOps Virtual Meetup Europe July

Join us for this month’s European Secure DevOps Virtual Meetup hosted by Chris Kranz from Sysdig. Grab your lunch, dial in, and let’s recap the interesting happenings in containers.

Live Webinar - August 6 2020 10am Pacific | 1pm Eastern

Deploy Faster by Automating Container Security, Monitoring and Compliance

You want to quickly move container apps into production without sacrificing visibility and security. The need to embed security, monitoring and compliance into DevOps workflows is clear, as it helps teams ship cloud apps faster. How can you get started without slowing down your developers? Join us to understand the five core workflows that you need to confidently ramp cloud-native workloads in production.

Live Webinar - August 13 2020 10am Pacific | 7pm CEST

Introduction to Instrumenting Apps with Prometheus

Prometheus, the second most popular project at the CNCF, has a large and growing ecosystem. If you’re a developer looking to get some quick graphs from your application, it’s not always clear where to start. At first, it can seem like a daunting task, but by following some simple examples, you can get up and running in no time. In this webinar, Brian Brazil, author of “Prometheus Up and Running” and long time developer of Prometheus will walk you through the basic steps to get started instrumenting applications with Prometheus.

Search Results 11 - 20 of 74

On-Demand Webinar

Moving Applications to the Cloud? How Top Financials Reduced their Security and Compliance Risk

Financial institutions are being attacked at an alarming rate. In July 2019, Accenture reported that the average annual cost of cybercrime for a financial service company reached $18.5 million. And that includes only the cost of the incident — not remediation. In order to gain agility benefits of the cloud DevOps teams need to manage risk, mitigate breaches, and gain visibility, without slowing down the CI/CD pipeline. What solutions help deliver for both DevOps and security professionals?

On-Demand Webinar

Top 5 Cloud Native Pipeline Security Considerations

In this webinar, we’ll take a deep dive into Booz Allen Hamilton’s award-winning ways of securing modern software development. Specifically, we’ll share strong learnings and best practices to confidently protect your pipeline at each stage.

On-Demand Webinar

PCI Compliance in Containers & Kubernetes

Many of your applications are now starting to run on containers in the cloud. This means compliance and managing risk are top priorities. Your security teams understand PCI guidelines, but the challenge is a clear mapping of those PCI controls to container/Kubernetes environments. Ultimately, you need to ensure compliance is not blocking your code from going into production.

On-Demand Webinar

Kubernetes Security Master Class: Detecting anomalous activity in Rancher with Falco

Securing Kubernetes requires putting controls in place to detect unexpected behavior that could be malicious. In this webinar, you will learn how to manage security risk at runtime in your RKE environments using Falco, a CNCF project for runtime security. Falco efficiently leverages Extended Berkeley Packet Filter (eBPF), a secure mechanism, to capture system calls and gain deep visibility.

On-Demand Webinar

Owning Secure DevOps for Google’s Anthos & GKE

As cloud-native becomes the standard for application deployment, DevOps teams are being asked to take ownership of security and compliance along with application performance and availability. Join us to hear how this is being addressed by customers across the Kubernetes lifecycle. We’ll also demo best practices for vulnerability management, runtime security, and container forensics with Google’s Anthos and GKE.

On-Demand Webinar

Automating Security for DevOps Workflows

Your developers need to be productive as you ramp containers and Kubernetes in production — without security being a blocker. With several software updates a day in a cloud-native environment, legacy tools can’t keep up. Running reliable and secure containers requires that security and DevOps work better together. We’ve got some great tips to share about automating and integrating security and compliance into the DevOps workflow, so your cloud applications ship faster.

On-Demand Webinar

K8s Limits and Requests: Monitoring and Troubleshooting by example

Are your Kubernetes applications not performing well enough? Is your infrastructure oversized? Kubernetes limits and requests dictate the resources available to your applications, so when they aren’t set correctly your cluster suffers from CPU throttling and Out Of Memory Kills. Oversizing your infrastructure is an easy, but expensive, solution — there must be a better way.

On-Demand Webinar

Scaling Prometheus Monitoring, the No-Hacks Way

Getting visibility into containers and Kubernetes is hard. The environment is dynamic, as most containers live less than five minutes. Developers are adopting Prometheus as an open standard for monitoring, but scaling is challenging.  Join us for a real-world perspective on monitoring cloud application health and performance. Plus, be the first to hear about new ways to scale Prometheus monitoring and see a demo.