Recent & Upcoming: Talks & Trainings

2020

Defender's Guide to Cloud Native Infrastructure Security
Container Hackfest by Trend Micro & Benchmark
Monthly Meeting: Kubernetes Goat
Hacker Days: Kubernetes Goat
Defenders Guide to Cloud Native Infrastructure Security
Container Security for RED and BLUE Teams!

2019

Breaking & Pwning Docker Containers and Kubernetes Clusters
Defenders' Guide to Container Infrastructure Security
Container Security for Red and Blue Teams
Breaking & Pwning Docker Containers and Kubernetes Clusters
Breaking and Pwning Docker Containers and Kubernetes Clusters
Defenders Guide to Cloud Native Infrastructure Security
Breaking and Pwning Docker Containers and Kubernetes Clusters
Automated Defense using Cloud Services for AWS, Azure and GCP
Attacking and Auditing Docker Containers and Kubernetes Clusters
Automated Defence using Cloud Services for AWS, Azure & GCP

2018

Container Security Monitoring using Open Source
Attacking & Auditing Docker Containers
Continuous security monitoring in CI and CD pipelines
Attacking & Auditing Docker Containers
Container Security Monitoring using Open Source
Attacking & Auditing Docker Containers Using Open Source
Attacking & Auditing Docker Containers Using Open Source
Attacking & Auditing Docker Containers
Automated Defense using Serverless for AWS, Azure and GCP
Hands-On Introduction to Modern Application Security
Automated Defense using Cloud Services for AWS, Azure and GCP

2017

Automated Defence for Cloud Security in AWS using Serverless
Modern Security Operations aka Secure DevOps
Real World Security monitoring & Automated Defence for almost free
Monitoring & Defending Infrastructure Security Attacks
DevOps principles to build your lean startup
Server Hardening and Security Monitoring
Developers guide to security & operations: Introducing DevSecOps
Cloud Security for Everyone
Linux Security Internals
Automated infrastructure security monitoring and defence

2016

Automated Infrastructure Security Monitoring & Defence
Infrastructure Security Monitoring
Ninja level infrastructure monitoring
Ninja level Infrastructure Monitoring : Defensive approach to Security Monitoring & Automation