Container Security Best Practices: A How-To Discussion
Application containers like Docker help DevOps work faster and quicken time-to-market, but they also create a major Cyber Exposure gap. Traditional vulnerability management approaches can’t easily secure containers – let alone keep pace with the high-velocity world of DevOps and continuous innovation. But don’t despair. We’ve got just the thing to save you from this nightmarish ordeal. Join us as we discuss a number of container security best practices to help you:
- Learn why “shifting left” is critical to gaining visibility into containers
- Understand how container security is a win for both security and DevOps
- Find out three steps you can take to master container security
RecordedDec 18 201856 mins
Your place is confirmed, we'll send you email reminders
Bob Gilbert, Vice President and Chief Evangelist, Netskope
Recent research shows that more than 85% of web traffic is comprised of cloud services. The rapid adoption of cloud and mobile is fundamentally changing network traffic patterns and the movement of data, rendering existing network and security models obsolete. This shift is resulting in enterprise security teams supplementing next-gen firewalls (NGFWs), secure web gateways (SWGs), and VPNs with cloud access security brokers (CASBs).
While CASBs address a key set of cloud-specific use cases tied to visibility, data security, compliance, and threat protection, your dissolving corporate perimeter is also forcing security teams to rethink their entire legacy security stack. After all, if most of your web traffic is comprised of cloud services, why does a majority of your security spend on security tools that are not effective in this new world?
Join this session to learn about:
- New blind spots that exist with legacy security tools
- Why simply moving legacy security tools to the cloud is not enough
- Top cloud security use cases driving the need for a new perimeter
- The essential requirements for a new, more effective perimeter
Dolly J. Krishnaswamy, Chief of Staff at SecurityScorecard
The cyber landscape is continuing to evolve, and we're seeing digital trends continue to change. Digital technologies are accelerating the ability to do business, and really digitizing everything. In some ways, it's becoming quite common and helping people grow, fast. But at the same time, it raises incredibly significant challenges about cyber security risk, and challenges the way that we should structure our programs - safely. Join us as we discuss how organizations deal with cyber security risk, how they can influence others - all while evolving and transforming their own programs.
Once your organization migrates to the cloud, protecting your people and the data they create becomes more challenging and critical than ever. Cybercriminals are launching wide-scale brute force attacks on cloud services to compromise user accounts. 85% of Office 365 and G Suite tenants are targeted. After taking over your trusted accounts, threat actors use social engineering tactics to trick even the most savvy users to install malware, transfer money or hand over sensitive data. That's why a people-centric approach to your cloud security is one of the most effective ways to provide visibility and control over your cloud applications. So what does a people-centric strategy look like and how can you use it to better your overall cloud security?
Join our experts for a deep dive into how to use a Cloud Access Security Broker (CASB) to protect your organization's IT-approved applications, such as Office 365 and G Suite that contain your most valuable assets: your people and data.
In this session, we'll examine:
- What the most prevalent cloud attacks are and how they target your VAPs, or Very Attacked People
-Why a people-centric approach to cloud security is one of the most effective ways to protect your VAPs
- The different CASB use cases, features, and architectures
- What to look for in a CASB solution to mitigate the risks you're likely to face
Chris Carlson, VP of Product Management at Qualys & Jim Reavies, CEO and Co-founder of CSA
Most people think that a network is a static event. However, with new types of devices, transient workloads, contract and guest participation, the system is fluid. At any given time,15-20% of the network is unseen or unmanaged. This is why the principle of maximum IT asset visibility is a fundamental prerequisite to improving your security posture. Simply put, it is difficult, if not impossible, to secure what we do not know or cannot see.
During the webinar, Jim Reavis, co-founder and CEO of the Cloud Security Alliance, will discuss the challenges facing today's complex and hyper-connected IT environments. Additionally, Qualys' Chris Carlson will explore:
- Why comprehensive visibility is the foundation for your security architecture
- The importance of visibility as it relates to compliance
- A demonstration of the role visibility plays in threat hunting
- Customer success stories highlighting how access to clean, reliable data with visibility and context enabled leads to effective business decisions
Chris Scheels, Director of Product Marketing, Cyxtera
VPNs are dangerous and overly complex. So why are we still pretending that VPNs are an effective security technology?
Join this webinar if you are responsible for implementing Zero Trust or managing complex VPN environments.
- VPNs cannot support your move to Zero Trust
- Managing VPNs is too complex for delivering granular access to a mobile workforce
- Eliminating VPNs can deliver Zero Trust secure access to the cloud, DevOps and third parties
Robert Healey | Senior Director Marketing, Asia Pacific, Tenable
Learn how you can effectively analyze vulnerability data to prioritize patching and remediation to reduce cyber exposure. Overcome vulnerability overload and gain insight into the following topics:
1. Recognizing the value and limitations of CVSS scores for prioritization
2. Identifying vulnerabilities most likely to be exploited in the near term
3. Incorporating asset criticality into your analysis
4. How to compare the effectiveness of your internal operations with industry peers and across internal business units
5. How you can more effectively prioritize your efforts to reduce cyber risks
Jeff Costlow, Deputy CISO, ExtraHop & Craig Balding of CSA
The rush to innovate has resulted in more sophisticated threat defenses, but it has also created a complex web of tools that must be managed by an already overworked and understaffed security team. Heterogeneity of defense systems is itself a defense, so modern security teams need to approach consolidation differently.
In this session, Jeff Costlow, Deputy CISO at ExtraHop will give an abbreviated version of his keynote presentation at the upcoming CSA Summit at (ISC)² and share insights about how data-first approaches and cross-collaboration improve security posture and help reduce tool sprawl.
Tony Morris, Enterprise Architect-Public Cloud, Hyland
Zero Trust is a concept that is typically used to describe the security model for a company's infrastructure and data. Application delivery pipelines are typically managed using a perimeter-centric security model. In this session, we will discuss how to apply the core concepts of Zero Trust to the application delivery pipeline, helping to ensure your applications are delivered to production safely and securely.
Come learn how leading technology companies are optimizing cloud vendor security assessments by leveraging the recently-released CAIQ-Lite in their workflow. Also learn how and why the CAIQ-Lite came to be, as well as best practices from early adopters.
Takeaways from this webinar include...
- An introduction of the history/creation of the CAIQ-Lite
- Best practices for using CAIQ-Lite to perform security assessments of cloud vendors
- A "behind the scenes" look at how technology companies are using both the CAIQ and CAIQ-Lite in their assessment workflows
Over the past several years, we have developed and implemented Common Controls Framework (CCF) across Adobe, enabling our cloud products, services, platforms and operations to achieve compliance with various security certifications, standards, and regulations such as SOC2, ISO, PCI, HIPAA, FedRAMP and others. CCF is the foundational framework and backbone of our companywide security compliance strategy. It also provides the flexibility to quickly adapt to and tackle new compliance and certification requirements as needed for our business and solutions. We have also open-sourced CCF for other peer industries to leverage it for their compliance goals.
As the next level of organic maturity for the CCF strategy @ Adobe, we are now developing and implementing a controls automation framework which will help enable near real time monitoring of the controls operating effectiveness. The CCF controls automation framework is intended to change the controls testing strategy from a point in time/reactive mode to near-real time monitoring, tracking and alerting. This mode of controls assessment via automation not only increases the frequency of testing, but also enable quicker remediation to reduce the risk of controls failure. This framework will also enable with scaling the CCF controls framework by making it easier for new services and product teams to onboard the controls as well as help eliminate the compliance fatigue imposed on the operations and engineering teams, and still reducing risk. During this webcast we will share the automation platform that is being built by Adobe and how it aligns with CCF and Adobe’s approach towards faster adoption of controls.
SDP combines well-proven technical and architectural components to protect networked applications and infrastructure, more efficiently and effectively than with traditional network security tools.
This document serves to explain SDP, educate readers on its benefits, and encourage its adoption.
Jason Georgi, Field Chief Technology Officer for Prisma Access and SaaS, Palo Alto Networks
Cloud adoption for some services is no longer optional, however security is what is overwhelmingly holding organizations back from doing more. Cloud and SaaS themselves are also evolving, which is changing the approach for securing access to them. The right security capabilities will allow you to address risk while having you ready for tomorrow.
Dan Mellen, Accenture & Robert Scheutter, Valvoline & Lamont Orange, Netskope & Nate Smolenski, Netskope
Are you experiencing these common challenges in your cloud security program?
There is no question that the way we work has changed with the rise of cloud and the widespread access to mobile devices. This shift in how we work requires us to also shift how we think about security when it comes to the cloud.
Listen in as our panel of C-Level security leaders discuss common obstacles CISOs encounter when moving to the cloud and how you can overcome them.
Topics covered include:
- Tackling privacy regulations
- Protecting your company's sensitive data
- Shifting your existing security strategies to be more cloud-focused
Want to eliminate passwords? We all do. WebAuthn is a new web standard published by the World Wide Web Consortium (W3C) for users in the era of passwordless authentication for web applications. This new standard offers strong authenticators such as Touch ID or Face ID directly from your browser to keep attackers out while delivering first-class authentication experiences.
Watch this webinar to learn about:
- Use cases: Understand how the new standard enables low friction, phishing-resistant authentication
- Technology: Peak beneath the hood and see the core technical concepts that comprise WebAuthn
- User experience: Look at the user registration and authentication flows
- Business impact: WebAuthn helps security and product forge mutually aligned objectives
It’s no secret that today’s hackers are smarter than ever before - a motivated hacker can use a variety of different methods to steal passwords from unsuspecting users.
While two-factor authentication solutions have been around for a while, they're no longer comprehensive enough to defend the new perimeter. Join us to learn the anatomy of common identity attacks, and how to keep hackers out of your organization.
- Identity attacks that exploit insecure methods of authentication
- How to add a smart layer of security over your critical apps, services, and devices
- What to look for in a multi-factor authentication solution
Matthew McKenna, VP of International Operations at SecurityScorecard
This session will explore the emerging regulatory trends in Vendor Risk Management in APAC and demonstrate how Security Ratings can play a key role in supporting enterprises in the establishment of strong governance and compliance oversight for their vendor landscape.
The session will use a case study based approach and share with you how security ratings work, how to apply them, and how to leverage them to meet the emerging compliance mandates.
Amelie Darchicourt, Cloud Product Marketing Manager & Eric Thomas, Director of Cloud Product Marketing, ExtraHop
Without native network visibility in the cloud, enterprises have been limited to log or agent centric tools to support their cloud migration and to secure their workloads, making it challenging to detect and investigate complex threats in a timely manner. The introduction of Microsoft Azure V-Tap and Amazon VPC Traffic Mirroring finally provides access to context-rich network data for threat detection, investigation and response.
Join this webinar to learn how to gain visibility in your cloud workloads by leveraging the new network tap features released by the leading public cloud providers. During this session, Amelie Darchicourt, Cloud Product Marketing Manager at ExtraHop, will present the benefits of adopting a cloud-first approach to Network Detection and Response (NDR) and will share insights about how SecOps teams can hold up their side of the shared responsibility model and deliver unified security across the hybrid attack surface.
Steve Perkins and Erik Freeland of Nubeva & Anoop Dawani of AWS
Encryption of all traffic in the cloud is a widely adopted best practice. The new TLS 1.3 standard with Elliptic-Curve Diffie Helman (ECDH), perfect forward secrecy and ephemeral keys renders most traditional decryption methods ineffective and out-of-band decryption essentially impossible. Combined with the distributed and elastic nature of cloud computer architectures and the use of third party services, enterprises have been forced to choose between security and visibility or between security and modern architectures.
Join us for a “How To” webinar covering the newest possibilities for decryption in the public cloud. During the session, Steve Perkins, Chief Product Officer and Erik Freeland, Director of Customer Success at Nubeva, will discuss the complications and opportunities surrounding the new TLS 1.3 protocols. They will walk through how organizations can implement encryption best practices and also gain full decrypted traffic visibility for intrusion detection, threat hunting, incident response and beyond with the newly announced Amazon VPC traffic mirroring and industry-leading open source monitoring tools.
Tom Cignarella, Director, Security Coordination Center (SCC) at Adobe
Ten years ago, security leaders couldn’t wait to tell you about their cutting edge use of Linux – nowadays, that’s considered table stakes. Today, the big buzzwords are AI and machine learning – and for good reason. With the computational power we have today, we can apply straightforward math tricks to data and surface insights that are not only interesting and valuable but also may not have been possible five or ten years ago – helping us become faster, more effective and increasingly innovative in our approach to defending systems from the evolving threat landscape we face today.
While the excitement around machine learning is deserved, Tom believes that much like Linux, it will eventually be something everyone in security is doing. In this webcast, Tom will outline how machine learning fits into the broader cyber security toolbox as a tool to augment – not replace – security teams, surfacing data-based insights and automating mundane, time-consuming tasks to free up precious security analysts time. He’ll also include key learnings from Adobe that security organizations should keep in mind as they explore machine learning, including the type of talent needed to succeed and the importance of good data.
Educational series on cloud computing, security and privacy.
CSA CloudBytes was launched as a webinar series to help us educate the industry on all matters related to the cloud. Our channel is designed to inform our audience about trending topics, new technologies, and latest research. It also allows audience members the opportunity to earn (ISC)2 CPE Credits.
Learn more at cloudsecurityalliance.org. Join the Cloud Security Alliance on LinkedIn and follow us on twitter: @cloudsa, @CSAResearchGuy