Featured
The K8s Lowdown: Why Kubernetes is Your Cloud’s Best Friend
Ron Eddings, Co-founder, Hacker Valley Media and Alessandra Rizzo, Threat Research Engineer, Sysdig
Kubernetes pros, this one’s for you! In this Kubernetes Tech Talk Series session, we’re digging deeper into why K8s and containers are the backbone of secure, resilient cloud environments. Hosted by Ron Eddings from Hacker Valley Media, this session starts with a quick introduction to the basics of K8s and containers and Kubernetes's critical role in cloud-native security.
Discover how they enable scalable, flexible, and automated defenses against today’s sophisticated threats with real-world examples and insights on containerized application protection. This is your chance to see why Kubernetes and containers are not just orchestration tools but essential allies in modern cloud security.
What You’ll Learn:
- What Kubernetes is and its essential features
- How Kubernetes integrates into CWPP to protect workloads
- Security strategies for containerized applications
- Real-world examples of Kubernetes automating threat defenses
- Key insights from threat research to stay ahead of evolving risks
Whether you’re just starting or looking to expand your expertise, this K8s Tech Talk Series offers actionable insights and practical strategies to make Kubernetes your cloud’s strongest security ally.
All episodes
-
All I Know About Cybersecurity I Learned from Fungus
Alex Lawrence, Field CISO, Sysdig
Have you ever woken up at night wondering why a parasitic fungal infection looks so much like cryptojacking? What about that time you were looking at hyphae under a microscope, and you couldn’t stop thinking about the implications that had on your defense-in-depth strategy? Let's not forget when you fed your pet Slimold and realized the analog it posed to your zero-trust cloud-access project. If, like me, these questions are on your mind 24/7, then this is the talk for you! We will explore the many lessons cybersecurity professionals can learn from our spore-bearing cousins from across the planet. Attendees will come away with newfound knowledge from the world of fungi and best practices in cybersecurity across the spectrum of cloud-native applications.
-
CSI Forensics: Unraveling Kubernetes Crime Scenes
Alberto Pellitteri & Stefano Chierici, Sysdig
In a security breach, employing well-defined DFIR techniques becomes imperative to effectively mitigate the incident's impact. However, with the spread of the adoption of containers, the employment of DFIR processes and capabilities is not just complex but is increasingly so. Join us in an insightful session covering cutting-edge DFIR practices on container environments. After a short overview of the essence of DFIR, we'll direct our focus towards various advanced DFIR techniques within a Kubernetes environment, which can prove highly beneficial in the event of a compromise. Starting from how to checkpoint compromised apps and restore them in a sandboxed environment for further analysis, we will move to conducting memory forensics on container evidence using old-style open-source DFIR tools. At the end of the presentation, the audience will be familiar with the advantages and disadvantages of the latest DFIR capabilities and have the basics to understand how to use them.
-
Unlock Security Efficiency with Sysdig and Docker
Jason Umiker, Solutions Engineer, Sysdig and Zubair Aslam, Senior Solutions Engineer, Docker
For businesses innovating with containers, every second counts. These environments present new attack surfaces for cybercriminals eager to exploit known security gaps in cloud-native settings. Sysdig is partnering with Docker by integrating Sysdig runtime insights into Docker Scout to help developers prioritize vulnerability risk and move faster.
Designed for developers and security professionals, Sysdig and Docker invite you to join our upcoming live webinar to learn use-cases:
- How to identify, prioritize, and fix security issues across the software supply chain to prevent unnecessary breaches
- How to cut through the vulnerability noise using Sysdig Runtime insights
- Hear best practices for accelerating cloud-native application delivery_______________________________________
This event is co-hosted in partnership with Docker and Sysdig. As a result, both Docker and Sysdig are collecting your personal data when you submit such information as part of the registration process above. For more information on each party’s privacy practices, please see:
Docker: https://www.docker.com/legal/docker-privacy-policy/
Sysdig: https://sysdig.com/legal/privacy-policy/Both may use your personal data to inform you about its products, services, and events.
-
Secure Containers at Cloud Speed with Sysdig and AWS
Eric Carter, Director of Product Marketing, Sysdig & Matthew Meck, Sr. WW GTM Security Specialist, AWS
As cloud-native environments evolve, robust and timely security measures become imperative. You only have a few minutes to find and address active risk to protect against exploits. Tools alone are not enough. You must also adopt new skills and mindsets about security. The 5/5/5 Benchmark sets a new standard for cloud security agility, aligned with the current pace of cloud‑native growth. Join AWS and Sysdig for a discussion of how to equip your teams with speed, agility, and automation to achieve faster cloud and container threat detection and response.
-
From Zero to CK(A)(S) Hero: Insider Tips and K8s Certification Exam Strategies with CNCF Ambassador Saiyam Pathak
Saiyam Pathak CK(A)(S)(AD), CNCF Ambassador, Founder, KubeSimplify
Kubernetes certifications, including CKA, CKAD, and CKS, are among the most challenging exams to pass. Becoming a CK(A)(S) certified hero demonstrates a deep understanding of Kubernetes' best practices, from deployment to security, ensuring your organization can build and maintain secure, scalable K8s and container applications.
In this session, CNCF Fellow Saiyam Pathak shares insider strategies, tips, and preparation techniques to help you ace these certification exams. Learn what it takes to crack these exams, from exam preparation and study resources to tackling the most challenging questions. Discover the essential tools and techniques to secure your Kubernetes journey and gain the confidence to ace these certifications.
What You Will Learn:
**An Overview of the CK(A)(S) Exams, including the newly updated question areas
**Real-World Exam Experiences
**Effective Exam Preparation Strategies
**Essential Study Resources
**Approaches to Tackling Challenging Questions -
OWASP Kubernetes Top 10 Projects: What Risks You Need to Prioritize
Nigel Douglas, Senior Cybersecurity Strategist, Sysdig; Moderated by Michael Isbitski, CISSP
When deploying and operating Kubernetes, practitioners often question whether they follow security best practices and maintain effective security posture to mitigate all possible threats. For this reason, OWASP (Open Web Application Security Project) created the OWASP Kubernetes Top 10, identifying the most likely risks. The Top 10 projects are useful awareness and guidance resources for security practitioners and engineers.
In this webinar, we’ll cover:
- How the OWASP Kubernetes Top 10 describes risks specific to Kubernetes platforms in order of commonality or probability.
- Applying additional grouping to the risks adds value to security program work.
- Additional techniques, including extra technical detail and strategic guidance, are included to audit and harden your Kubernetes environments and maintain an effective security posture. -
The K8s Lowdown: Why Kubernetes is Your Cloud’s Best Friend
Ron Eddings, Co-founder, Hacker Valley Media and Alessandra Rizzo, Threat Research Engineer, Sysdig
Kubernetes pros, this one’s for you! In this Kubernetes Tech Talk Series session, we’re digging deeper into why K8s and containers are the backbone of secure, resilient cloud environments. Hosted by Ron Eddings from Hacker Valley Media, this session starts with a quick introduction to the basics of K8s and containers and Kubernetes's critical role in cloud-native security.
Discover how they enable scalable, flexible, and automated defenses against today’s sophisticated threats with real-world examples and insights on containerized application protection. This is your chance to see why Kubernetes and containers are not just orchestration tools but essential allies in modern cloud security.
What You’ll Learn:
- What Kubernetes is and its essential features
- How Kubernetes integrates into CWPP to protect workloads
- Security strategies for containerized applications
- Real-world examples of Kubernetes automating threat defenses
- Key insights from threat research to stay ahead of evolving risksWhether you’re just starting or looking to expand your expertise, this K8s Tech Talk Series offers actionable insights and practical strategies to make Kubernetes your cloud’s strongest security ally.