Container Security Monitoring using Open Source

Abstract

While developers, operators and enterprises are adopting containers, security is still considered as one of the prime challenges in container utilisation - According to a survey conducted by Forrester 43% of the enterprises reported that their biggest concern to container utilisation is security.

Developers and Operations teams (DevOps) have moved to containers because it makes it easy to build, package and promote an application along with all its dependencies. As the technology advances, so are the attacker’s methodologies to catch up the security flaws.

In this webinar by Madhu Akula you will learn the security techniques on container configurations, exposures, vulnerabilities, security misconfigurations & monitoring containerise applications using Open Source Solutions. Container security is the protection to maintain the integrity of containers and is a continuous process which should be followed by the users. You can discuss your real-world scenarios and gain insights to secure your container assets.

Date
Location
Live, Online

Learn On

  • How to secure the container pipeline & the application
  • How to secure the container deployment & infrastructure
  • How to properly set the enterprise security tools or enhance the existing policies

Who Should Attend

If you’re handling containers/container-based applications, or just beginning exploring containers, you’ll want to attend to understand the security models of containers. Containers have fundamentally changed to varying degrees & the webinar is highly recommended for IT and System Administrators, DevOps and Security Teams.

Avatar
Madhu Akula
Never Ending Learner!

Madhu Akula is a security ninja, published author and cloud native researcher with an extensive experience. Also he is an active member of the international security, devops and cloud native communities. Madhu frequently speaks and runs training sessions at security events and conferences around the world including DEFCON (26, 24), BlackHat USA (2018, 2019), USENIX LISA 2018, Appsec EU 2018, All Day DevOps (2016, 2017, 2018), DevSecCon (London, Singapore, Boston), DevOpsDays India, c0c0n(2018, 2017), Nullcon 2019, SACON 2019, Serverless Summit, null and multiple others. His research has identified vulnerabilities in over 200 companies and organisations including; Google, Microsoft, LinkedIn, eBay, AT&T, WordPress, NTOP and Adobe, etc. He is co-author of Security Automation with Ansible2 (ISBN-13: 978-1788394512), which is listed as a technical resource by Red Hat Ansible.

Next
Previous