Upcoming Live Webinars

Live Webinar - May 19, 2022 10am Pacific | 1pm Eastern

Container and Kubernetes Security Best Practices: Forensics & Incident Response

Conducting forensics and incident response for containers and Kubernetes helps you better understand security breaches, meet compliance requirements and recover quickly. On average, containers live less than 5 minutes, so having a cloud native incident response plan is critical.

Live Webinar - May 25, 2022 10am Pacific | 1pm Eastern

CSPM Best Practices for Multi-Cloud: Beyond Native Tools

Join Sysdig to understand the fundamentals on cloud categories and terms like CSPM, CWPP, CNAPP, etc. so you can move past the acronyms and onto implementing them as best practices.

Live Webinar - Jun 2, 2022 10am Pacific | 1pm Eastern

SOC2 Compliance for Containers and Cloud

After this webinar, you will understand how other organizations are validating SOC2 compliance for their cloud applications.

Live Webinar - Jun 14, 2022 11am Pacific | 2pm Eastern

SANS – FIND, FOCUS, and FIX the Cloud Threats that Matter Solutions Forum

FIND, FOCUS, and FIX the Cloud Threats that Matter: Accenture, AWS, Expel, Snyk, and Sysdig join SANS to share insights. As you move to the cloud, your security teams often feel a loss of control in this new world. Traditional tools and processes don’t work and visibility is fragmented, even more so across multi-cloud infrastructure.

Live Webinar - Jun 23, 2022 10am Pacific | 1pm Eastern

Shifting Security Further Left with IaC Security

Modern DevOps teams are adopting GitOps principles: provisioning workloads using infrastructure-as-code (IaC) tools and managing policies as code using open source tools like Open Policy Agent (OPA)

Search Results 21 - 32 of 160

On-Demand Webinar

Zero Trust Security for OpenShift and Hybrid Cloud

The constant risk of security breaches is driving DevOps and cloud teams to embrace a Zero Trust approach to security. It’s critical to lock down your environment, but at the same time, you don’t want to break existing applications and workflows.

On-Demand Webinar

Image Scanning on AWS

Do you want to ensure images are free of vulnerabilities and meet best practices before pushing to production? Participants will learn how Sysdig Secure can identify vulnerabilities pre-production and at runtime. 

On-Demand Webinar

Secure DevOps Best Practices for Multicloud Environments

Multicloud is inevitable. In fact, it’s likely you’re already using different clouds like AWS, Google Cloud, and Azure for various functions. But, how do you address risk and ensure proper security practices across all of your cloud accounts and deployments?

On-Demand Webinar

Addressing the log4j Vulnerability in Containers

Critical zero-days have a way with ruining weekends and holidays. This year’s darling is the log4j vulnerability, which is trivial to exploit and affects pretty much the entire IT world in one way or another. We know you’re patching furiously right now, but that will take forever and sometimes isn’t possible. So take a 30min break and let us help you reduce the risk in the interim.

On-Demand Webinar

Compliance with Containers & Cloud

Safeguarding sensitive data and meeting regulatory compliance requirements are top priorities for security teams. With all the agility gained from applications starting to run on containers in the cloud, the last thing the business needs is a slow down when code is ready for production.

On-Demand Webinar

Forensics and Incident Response

Conducting forensics and incident response for containers and Kubernetes helps you better understand security breaches, meet compliance requirements and recover quickly.

On-Demand Webinar

Monitor Plant Health & PiHole Performance with Prometheus

The distinction between your office and your home has never been more blurry. This webinar will showcase how Prometheus (along with Raspi and PiHole) can improve your space with healthy plants and reduce mental clutter by blocking unwanted ads.

On-Demand Webinar

Improve AWS Cloud Threat Detection and Response – MITRE ATT&CK Framework

As cloud threats continue to rise, understanding an adversary’s tactics, techniques and procedures (TTPs) is critical to strengthening cloud security. How can you pull together a unified and simple approach to speed up detection and response for security across your AWS cloud workloads?

On-Demand Webinar

Continuous Compliance on Google Cloud

Meet regulatory compliance standards for Google Cloud containers and services. Continuously validate compliance with industry standards, like PCI, NIST, SOC 2, and HIPAA. Run best practice benchmarks and track cloud compliance progress with interactive dashboards and reports.

On-Demand Webinar

Scale up Threat Detection, Scale Down False Positives in the Cloud

The cloud vendors offer hundreds of cloud services your team may be using. How can you identify threats across these services without drowning in a sea of alerts? Join us to learn how to scale up threat detection and scale down false positives in the cloud.

On-Demand Webinar

Cloud and Container Runtime Security on Google Cloud

Secure containers, Google Kubernetes Engine (GKE), and cloud infrastructure with out-of-the-box policies based on open source Falco. Implement real-time threat detection and posture management for Google Cloud services using Cloud Audit Logs to detect and respond to suspicious activity.