Featured
The K8s Lowdown: Why Kubernetes is Your Cloud’s Best Friend
Ron Eddings, Co-founder, Hacker Valley Media and Alessandra Rizzo, Threat Research Engineer, Sysdig
Kubernetes pros, this one’s for you! In this Kubernetes Tech Talk Series session, we’re digging deeper into why K8s and containers are the backbone of secure, resilient cloud environments. Hosted by Ron Eddings from Hacker Valley Media and featuring Alessandra Rizzo, Threat Research Engineer at Sysdig, this session starts with a quick intro of the basics of K8s and containers and Kubernetes's critical role in cloud-native security.
Discover how they enable scalable, flexible, and automated defenses against today’s sophisticated threats with real-world examples and insights on containerized application protection. This is your chance to see why Kubernetes and containers are not just orchestration tools but essential allies in modern cloud security.
What You’ll Learn:
What Kubernetes is and its essential features
How Kubernetes integrates into CWPP to protect workloads
Security strategies for containerized applications
Real-world examples of Kubernetes automating threat defenses
Key insights from threat research to stay ahead of evolving risks
Whether you’re just starting or looking to expand your expertise, this K8s Tech Talk Series offers actionable insights and practical strategies to make Kubernetes your cloud’s strongest security ally.
All episodes
-
All I Know About Cybersecurity I Learned from Fungus
Alex Lawrence, Field CISO, Sysdig
Have you ever woken up at night wondering why a parasitic fungal infection looks so much like cryptojacking? What about that time you were looking at hyphae under a microscope, and you couldn’t stop thinking about the implications that had on your defense-in-depth strategy? Let's not forget when you fed your pet Slimold and realized the analog it posed to your zero-trust cloud-access project. If, like me, these questions are on your mind 24/7, then this is the talk for you! We will explore the many lessons cybersecurity professionals can learn from our spore-bearing cousins from across the planet. Attendees will come away with newfound knowledge from the world of fungi and best practices in cybersecurity across the spectrum of cloud-native applications.
-
CSI Forensics: Unraveling Kubernetes Crime Scenes
Alberto Pellitteri & Stefano Chierici, Sysdig
In a security breach, employing well-defined DFIR techniques becomes imperative to effectively mitigate the incident's impact. However, with the spread of the adoption of containers, the employment of DFIR processes and capabilities is not just complex but is increasingly so. Join us in an insightful session covering cutting-edge DFIR practices on container environments. After a short overview of the essence of DFIR, we'll direct our focus towards various advanced DFIR techniques within a Kubernetes environment, which can prove highly beneficial in the event of a compromise. Starting from how to checkpoint compromised apps and restore them in a sandboxed environment for further analysis, we will move to conducting memory forensics on container evidence using old-style open-source DFIR tools. At the end of the presentation, the audience will be familiar with the advantages and disadvantages of the latest DFIR capabilities and have the basics to understand how to use them.
-
Unlock Security Efficiency with Sysdig and Docker
Jason Umiker, Solutions Engineer, Sysdig and Zubair Aslam, Senior Solutions Engineer, Docker
For businesses innovating with containers, every second counts. These environments present new attack surfaces for cybercriminals eager to exploit known security gaps in cloud-native settings. Sysdig is partnering with Docker by integrating Sysdig runtime insights into Docker Scout to help developers prioritize vulnerability risk and move faster.
Designed for developers and security professionals, Sysdig and Docker invite you to join our upcoming live webinar to learn use-cases:
- How to identify, prioritize, and fix security issues across the software supply chain to prevent unnecessary breaches
- How to cut through the vulnerability noise using Sysdig Runtime insights
- Hear best practices for accelerating cloud-native application delivery_______________________________________
This event is co-hosted in partnership with Docker and Sysdig. As a result, both Docker and Sysdig are collecting your personal data when you submit such information as part of the registration process above. For more information on each party’s privacy practices, please see:
Docker: https://www.docker.com/legal/docker-privacy-policy/
Sysdig: https://sysdig.com/legal/privacy-policy/Both may use your personal data to inform you about its products, services, and events.
-
Secure Containers at Cloud Speed with Sysdig and AWS
Eric Carter, Director of Product Marketing, Sysdig & Matthew Meck, Sr. WW GTM Security Specialist, AWS
As cloud-native environments evolve, robust and timely security measures become imperative. You only have a few minutes to find and address active risk to protect against exploits. Tools alone are not enough. You must also adopt new skills and mindsets about security. The 5/5/5 Benchmark sets a new standard for cloud security agility, aligned with the current pace of cloud‑native growth. Join AWS and Sysdig for a discussion of how to equip your teams with speed, agility, and automation to achieve faster cloud and container threat detection and response.
-
From Zero to CK(A)(S) Hero: Insider Tips and K8s Certification Exam Strategies with CNCF Ambassador Saiyam Pathak
Saiyam Pathak CK(A)(S)(AD), CNCF Ambassador, Founder, KubeSimplify
Kubernetes certifications, including CKA, CKAD, and CKS, are among the most challenging exams to pass. Becoming a CK(A)(S) certified hero demonstrates a deep understanding of Kubernetes' best practices, from deployment to security, ensuring your organization can build and maintain secure, scalable K8s and container applications.
In this session, CNCF Fellow Saiyam Pathak shares insider strategies, tips, and preparation techniques to help you ace these certification exams. Learn what it takes to crack these exams, from exam preparation and study resources to tackling the most challenging questions. Discover the essential tools and techniques to secure your Kubernetes journey and gain the confidence to ace these certifications.
What You Will Learn:
**An Overview of the CK(A)(S) Exams, including the newly updated question areas
**Real-World Exam Experiences
**Effective Exam Preparation Strategies
**Essential Study Resources
**Approaches to Tackling Challenging Questions -
The K8s Lowdown: Why Kubernetes is Your Cloud’s Best Friend
Ron Eddings, Co-founder, Hacker Valley Media and Alessandra Rizzo, Threat Research Engineer, Sysdig
Kubernetes pros, this one’s for you! In this Kubernetes Tech Talk Series session, we’re digging deeper into why K8s and containers are the backbone of secure, resilient cloud environments. Hosted by Ron Eddings from Hacker Valley Media and featuring Alessandra Rizzo, Threat Research Engineer at Sysdig, this session starts with a quick intro of the basics of K8s and containers and Kubernetes's critical role in cloud-native security.
Discover how they enable scalable, flexible, and automated defenses against today’s sophisticated threats with real-world examples and insights on containerized application protection. This is your chance to see why Kubernetes and containers are not just orchestration tools but essential allies in modern cloud security.
What You’ll Learn:
What Kubernetes is and its essential features
How Kubernetes integrates into CWPP to protect workloads
Security strategies for containerized applications
Real-world examples of Kubernetes automating threat defenses
Key insights from threat research to stay ahead of evolving risks
Whether you’re just starting or looking to expand your expertise, this K8s Tech Talk Series offers actionable insights and practical strategies to make Kubernetes your cloud’s strongest security ally.