Hi [[ session.user.profile.firstName ]]


  • Date
  • Rating
  • Views
  • Incident Response and Forensics in a Cloud Native World
    Incident Response and Forensics in a Cloud Native World Neil Carpenter, Principal Solution Architect, Twistlock & Keith Mokris, Product Marketing Lead, Twistlock Recorded: Aug 22 2018 37 mins
    With the rapid increase in containers and cloud native applications at the enterprise, security teams and incident responders are continually tasked with new requirements and challenges for detecting and investigating security incidents.

    In this webinar, Neil Carpenter from Twistlock will discuss what a transition to containers means for incident response teams and how Twistlock can help to ease the pain.

    Register for this webinar to learn:
    • Approaches to gathering incident data from Cloud Native applications
    • Examples of incidents and investigations
    • Details on Twistlock's brand-new Cloud Native Forensics Platform
  • Operationalizing DevSecOps: 7 Best Practices for Cloud Native Applications
    Operationalizing DevSecOps: 7 Best Practices for Cloud Native Applications Keith Mokris, Product Marketing Lead, Twistlock Recorded: Jul 18 2018 30 mins
    Modern enterprises are implementing both the tools and the cultural changes required to embrace a DevSecOps mindset and approach.

    This webinar will highlight:

    •Risks you can avoid by embracing DevSecOps
    •DevSecOps as it relates to your container development pipeline
    •How to integrate and automate key steps of the process

    Join Twistlock Product Marketing Manager Keith Mokris for a presentation and platform demonstration.
  • Why Cloud Native Requires a New Approach to Firewalls
    Why Cloud Native Requires a New Approach to Firewalls Paul Fox, Principal Solution Architect, Twistlock Recorded: Jun 20 2018 40 mins
    As more organizations deploy containers across the enterprise, network security needs to become more automated and less dependent on static configurations. However, organizations’ network security practices have often not kept pace with the evolution of cloud native technology, and expertise on network security for containers and microservices is lacking.

    Companies often rely primarily on static perimeter based defenses and manually defined VLANs which don’t work well in a cloud native environments because there is no reliable perimeter.

    In this session, Paul Fox, Principal Solution Architect at Twistlock, will:
    • Explain why cloud native environments require a new approach for firewalls
    • Share specific tactics IT and security teams can implement to ensure security across the stack
    • Conduct a live demonstration of Windows to linux container network traffic firewalling
  • How to Modernize Your IT Infrastructure & Secure Your Applications
    How to Modernize Your IT Infrastructure & Secure Your Applications Lee Calcote, SolarWinds, Jim Bugwadia, Robert Starmer, Kumulus Technologies, and John Morello, Twistlock Recorded: Jun 14 2018 46 mins
    Join this live panel discussion with experts at DockerCon to learn how containers and microservices can help modernize your IT infrastructure and increase application security.

    Tune into this interactive Q&A session to hear from Docker, Infrastructure, Cloud and DevOps experts while they discuss the following:

    - The pros and cons to modernizing your monolithic applications
    - Trends and technologies in application security
    - The security risks associated with open source and cloud native applications
    - How containers and microservice architectures can increase security and modernize your IT infrastructure

    This live panel will be streamed directly from DockerCon 2018 in San Francisco! Join us live from the comfort of your desk.

    Moderated by: Lee Calcote, Head of Technology Strategy, SolarWinds
    Panelists: Jim Bugwadia, Founder, Nirmata, Robert Starmer, Cloud Advisor & Founding Partner, Kumulus Technologies and John Morello, CTO, Twistlock
  • Beyond Containers: Going Cloud Native with Serverless Architectures
    Beyond Containers: Going Cloud Native with Serverless Architectures John Morello, CTO, Twistlock and Lee Calcote, Head of Technology Strategy, SolarWinds Recorded: Jun 14 2018 28 mins
    The journey to cloud native can be a winding road, and with more and more organizations starting on this journey, companies are being taken far beyond just simply containerizing applications.

    Join this live Q&A with John Morello, CTO of Twistlock as he discusses how server-less and container-as-a-service platforms like AWS Fargate are changing how organizations deploy applications - and what this means for security.
  • From Development to Production: Securing Today's Cloud Native Infrastructure
    From Development to Production: Securing Today's Cloud Native Infrastructure John Morello, CTO, Twistlock & featured speaker Amy DeMartine, Principal Analyst, Forrester Recorded: Mar 29 2018 61 mins
    From Development to Production: Whats Required to Secure Today's Cloud Native Infrastructure?

    As enterprises embrace containers and other cloud native technologies, they are recognizing the need to shift to a modernized approach to security integrated across the application lifecycle. This new approach requires developers and security teams to rethink their tools and processes in order to ensure best in breed protection covering the full application lifecycle.

    Join Twistlock CTO John Morello and featured speaker Forrester Analyst Amy DeMartine in this webinar to learn:

    •The latest data around container adoption, implementation and security in the enterprise
    •Container and cloud native security best practices across the application lifecycle
    •Specific use cases and practical advice for implementing these best practices for robust cloud native environments

    Register for this webinar to learn more!
  • Securing Containers w/ NIST SP 800-190
    Securing Containers w/ NIST SP 800-190 John Morello, Twistlock CTO & Murugiah Souppaya, Computer Scientist at NIST Recorded: Mar 7 2018 52 mins
    In late 2017, The National Institute of Standards and Technology (NIST) released Special Publication (SP) 800-190, the Container Security Guide, a set of guidelines for securing container applications and infrastructure.

    This panel webinar, hosted by NIST SP 800-190 co-authors, John Morello (CTO, Twistlock), and Murugiah Souppaya (Computer Scientist, NIST) will cover:

    • Why NIST SP 800-190 was created, the open process used to develop it, and how all organizations can benefit from it
    • Some of the specific container risks identified in the SP
    • Top recommended countermeasures for each risk
    Implementation guidance and best practices

    In addition, the session will highlight how organizations can leverage functionality provided by container-focused orchestration and security platforms to automate compliance across the development lifecycle - reducing overall attack surface and delivering comprehensive threat protection.
  • Trends in Container and Cloud Native Cybersecurity
    Trends in Container and Cloud Native Cybersecurity Josh Thorngren, VP of Marketing at Twistlock Recorded: Jan 23 2018 34 mins
    As software eats the world, cloud native tools and methodologies — like containers and devops— are continuously evolving. Organizations that can identify the major trends in this ever-changing landscape and then successfully secure a new cloud native environment will have an advantage in the market.

    Join Twistlock's VP of Marketing, Josh Thorngren, as he shares the macro trends he’s seeing in the cloud native security space and the extended cloud native ecosystem in 2018.

    Specifically, we’ll cover:
    * Rethinking your organization’s approach to defend against the proliferation of easy-to-use, easy-to acquire hacks, exploits and malware
    * How to shift security left by developing an entirely new paradigm and set of principles for software delivery and protection
    * How to modernize legacy workloads with containers
  • Automating Security with Kubernetes
    Automating Security with Kubernetes Kevin Lewis, Solution Architect Recorded: Oct 4 2017 25 mins
    Kubernetes is a leading orchestration tool used by teams large and small to deploy containerized applications. It is also at an ideal point to automate rules that prevent high-risk vulnerabilities and compliance violations don’t enter production environments, and deploy runtime defenses that protect your applications.

    Join Twistlock Solution Architect Kevin Lewis to see how Twistlock integrates directly into Kubernetes to improve your risk and compliance posture without slowing down development.
  • Managing Compliance in Container Environments
    Managing Compliance in Container Environments Patrick Maddox, Sr. Director of SA, Twistlock and Adam Greenfield, Sr. Director of Enterprise Architecture, ClearDATA Recorded: Sep 14 2017 32 mins
    Customers and employees demand easier ways to interact with your organization. At the same time, regulatory requirements like HIPAA and PCI combined with huge amounts of sensitive data raise the stakes around building secure and compliant applications.

    Increasingly, organizations are looking to containers and microservices to provide the agility and scalability needed to satisfy their customers. But there are other crucial and oft-overlooked advantages of migrating to containers and microservices: Compliance and Security. Containers offer a number of opportunities for building and deploying more secure applications and environments.

    We’ll look at how containers enable automated security and compliance checks throughout the entire development lifecycle, from the first line of code through to runtime.

    Attendees will learn:
    •How to enforce compliance across the entire software delivery lifecycle
    •Best practices for securing container environments
    •Strategies and tips to scale application security and compliance

Embed in website or blog