Webinars

Listen to something good for you today.

Upcoming Live Webinars

Live Webinar - Feb 25, 2021 10am Pacific | 1pm Eastern

Kubernetes Attacks: What your cluster is trying to tell you

If an attacker got inside your cluster, would you know about it? Kubernetes has become the defacto standard for container orchestration, bringing with it a new set of security challenges. One of the biggest problems we see, among DevOps and Security teams alike, is a lack of knowing what to look for when it comes to malicious activity. In this session, you’ll learn how to detect and respond to threats at runtime. We’ll share practical strategies for pinpointing malicious activity, and you’ll be armed with the knowledge and confidence to not delay efforts to secure your Kubernetes and container environment. We’ll also look at examples for how many enterprises are already reducing risk with a secure DevOps approach.

Live Webinar - Mar 1, 2021 7am Pacific | 10am Eastern

IBM and Sysdig – How to Drive More Security and Reliability

IBM and Sysdig have partnered to help clients run more secure and more robust applications, tools, and services, by providing new levels of intelligence and visibility across your workloads. During this webinar, IBM and Sysdig will share how you can leverage the latest tools to better secure and manage your tools, applications, and services, including demos showing AI in action.

Live Webinar - Mar 4, 2021 10am Pacific | 1pm Eastern

Container Security Best Practices on Azure Kubernetes Service (AKS)

As containers and Kubernetes are adopted in production, security is a critical concern. DevOps teams need to go beyond image scanning, expanding into the areas of runtime security, network visibility and segmentation, incident response and compliance. These use cases become priorities as your Kubernetes security framework matures. Join Eric Carter from Sysdig and Tommy Falgout from Microsoft, as we share an overview of security on Azure Kubernetes Service (AKS), discuss approaches used by open source and commercial tools, and hear how Azure users are keeping their code and containers secure without impacting developer productivity.

Live Webinar - Mar 11, 2021 10am Pacific | 1pm Eastern

Accelerate your FedRAMP journey for container security with Anitian & Sysdig

Cloud applications are transforming how government organizations fulfill their missions and serve the public. As new technologies, such as cloud, containers and serverless, are being adopted, it’s critical to consider security and compliance requirements, like FedRAMP. However, the time and cost required to meet FedRAMP can be an inhibitor to market entry, especially in complex technological environments. Hear how Anitian, a leader in DevSecOps for government, and Sysdig, a leader in securing cloud-native apps in production, are helping businesses win contracts and enter new Federal markets. Together, they can reduce the time and cost required to meet FedRAMP requirements and dramatically accelerate time-to-revenue and FedRAMP compliance by up to 80%.

Search Results 31 - 40 of 99

On-Demand Webinar

DevOps Security, Monitoring and Compliance with OpenShift and Sysdig

Ensuring application security and compliance is one of the biggest challenges for any organization deploying applications in production. You need to detect and block vulnerabilities, quickly respond to incidents, and meet compliance standards and policies. With the Sysdig Secure DevOps Platform, you can embed security, maximize availability, and validate compliance—transforming your DevOps workflow into a secure DevOps workflow. In this session, you’ll hear about the Falco open source project, use cases for security in Red Hat OpenShift, and see a real-world demo for securing your OpenShift environment without disrupting application deployments.

On-Demand Webinar

Secure DevOps Virtual Meetup Europe May

Join us for our European Secure DevOps Virtual Meetup hosted by Chris Kranz from Sysdig. Grab yourself some lunch, dial in and settle in for an hour long recap of everything that’s interesting in the container space.

On-Demand Webinar

AWS, Sysdig & LogDNA: Best Practices to Secure Containers and Accelerate Software Delivery

With Kubernetes, you can seamlessly move containerized applications from development to production but it can be difficult to gain security and performance visibility for the service. Hear LogDNA share why it chose the Sysdig Secure DevOps Platform to monitor and secure its containers on Amazon Web Services (AWS). Like many companies, LogDNA, an enterprise-grade log management system, needed a lens into its Kubernetes environment to identify slowdowns and fix security issues early in the development lifecycle. LogDNA now remediates security issues earlier, reduces mean time to resolution (MTTR) by 50% or more, and accelerates delivery of its software services.

On-Demand Webinar

AWS Observability 101: Kubernetes and Prometheus Monitoring with Sysdig

Challenges abound when it comes to securing and monitoring containers, Kubernetes, and cloud-native applications across development and production. Most notably, scaling Prometheus monitoring beyond a few servers with a few days retention presents issues when trying to troubleshoot issues that span multiple applications or microservices. We’ll share a unique approach that builds upon Prometheus without sacrificing compatibility and discover the insights performance metrics can provide.

On-Demand Webinar

AWS Security 101: Securing Amazon EKS with Falco & Sysdig

Amazon’s Managed Kubernetes Service (EKS) offers organizations flexibility as teams ramp up containerized applications in production. And yet, managing security risk for the workloads running on EKS is still the customer’s responsibility. To make your teams as productive as possible, you need to automate and merge security and compliance into the DevOps workflow.

On-Demand Webinar

Moving Applications to the Cloud? How Top Financials Reduced their Security and Compliance Risk

Financial institutions are being attacked at an alarming rate. In July 2019, Accenture reported that the average annual cost of cybercrime for a financial service company reached $18.5 million. And that includes only the cost of the incident — not remediation. In order to gain agility benefits of the cloud DevOps teams need to manage risk, mitigate breaches, and gain visibility, without slowing down the CI/CD pipeline. What solutions help deliver for both DevOps and security professionals?

On-Demand Webinar

Top 5 Cloud Native Pipeline Security Considerations

In this webinar, we’ll take a deep dive into Booz Allen Hamilton’s award-winning ways of securing modern software development. Specifically, we’ll share strong learnings and best practices to confidently protect your pipeline at each stage.

On-Demand Webinar

PCI Compliance in Containers & Kubernetes

Many of your applications are now starting to run on containers in the cloud. This means compliance and managing risk are top priorities. Your security teams understand PCI guidelines, but the challenge is a clear mapping of those PCI controls to container/Kubernetes environments. Ultimately, you need to ensure compliance is not blocking your code from going into production.

On-Demand Webinar

Kubernetes Security Master Class: Detecting anomalous activity in Rancher with Falco

Securing Kubernetes requires putting controls in place to detect unexpected behavior that could be malicious. In this webinar, you will learn how to manage security risk at runtime in your RKE environments using Falco, a CNCF project for runtime security. Falco efficiently leverages Extended Berkeley Packet Filter (eBPF), a secure mechanism, to capture system calls and gain deep visibility.

On-Demand Webinar

Owning Secure DevOps for Google’s Anthos & GKE

As cloud-native becomes the standard for application deployment, DevOps teams are being asked to take ownership of security and compliance along with application performance and availability. Join us to hear how this is being addressed by customers across the Kubernetes lifecycle. We’ll also demo best practices for vulnerability management, runtime security, and container forensics with Google’s Anthos and GKE.