Recent & Upcoming: Talks & Trainings

2022

A Practical Approach To Breaking & Pwning Kubernetes Clusters
Goa Training - Hacking and Securing Kubernetes Clusters
DEFCON 30 - A Practical Approach to Breaking & Pwning Kubernetes Clusters
FIRST 2022 - Kubernetes Goat: Interactive Kubernetes Security Playground
A Practical Approach To Breaking & Pwning Kubernetes Clusters
Berlin Training - Hacking and Securing Kubernetes Clusters

2021

A Practical Approach To Breaking & Pwning Kubernetes Clusters
Kubernetes Goat - Practical Approach to Learn Kubernetes Security
ABN AMRO CISO Summit 2021 Closing Keynote - Attacking your container
Building Network Security Boundaries in Kubernetes
Kubernetes Goat Demolab at DEF CON 29
Kubernetes Goat - Kubernetes Security Learning
Kubernetes Security - Attackers & Defenders
A Practical Approach To Breaking & Pwning Kubernetes Clusters
Getting Started with Your Journey into Cloud Security
Keynote - Approaching Security in the Cloud Native World
A practical guide to writing secure Dockerfiles

2020

Defender's Guide to Cloud Native Infrastructure Security
Container Hackfest by Trend Micro & Benchmark
Monthly Meeting: Kubernetes Goat
Hacker Days: Kubernetes Goat
Defenders Guide to Cloud Native Infrastructure Security
Container Security for RED and BLUE Teams!

2019

Breaking & Pwning Docker Containers and Kubernetes Clusters
Defenders' Guide to Container Infrastructure Security
Container Security for Red and Blue Teams
Breaking & Pwning Docker Containers and Kubernetes Clusters
Breaking and Pwning Docker Containers and Kubernetes Clusters
Defenders Guide to Cloud Native Infrastructure Security
Breaking and Pwning Docker Containers and Kubernetes Clusters
Automated Defense using Cloud Services for AWS, Azure and GCP
Attacking and Auditing Docker Containers and Kubernetes Clusters
Automated Defence using Cloud Services for AWS, Azure & GCP

2018

Container Security Monitoring using Open Source
Attacking & Auditing Docker Containers
Continuous security monitoring in CI and CD pipelines
Attacking & Auditing Docker Containers
Container Security Monitoring using Open Source
Attacking & Auditing Docker Containers Using Open Source
Attacking & Auditing Docker Containers Using Open Source
Attacking & Auditing Docker Containers
Automated Defense using Serverless for AWS, Azure and GCP
Hands-On Introduction to Modern Application Security
Automated Defense using Cloud Services for AWS, Azure and GCP

2017

Automated Defence for Cloud Security in AWS using Serverless
Modern Security Operations aka Secure DevOps
Real World Security monitoring & Automated Defence for almost free
Monitoring & Defending Infrastructure Security Attacks
DevOps principles to build your lean startup
Server Hardening and Security Monitoring
Developers guide to security & operations: Introducing DevSecOps
Cloud Security for Everyone
Linux Security Internals
Automated infrastructure security monitoring and defence

2016

Automated Infrastructure Security Monitoring & Defence
Infrastructure Security Monitoring
Ninja level infrastructure monitoring
Ninja level Infrastructure Monitoring : Defensive approach to Security Monitoring & Automation
Node JS Security
Keynote - Web & Cloud Security in the real world

2014

My Bug Hunting With Open Source
Fun & Profit ($$$) with Bug Bounties
Basics of Networking Live Demonstration
Hardening Routers and Swithches