Kubernetes Threat Model and Risk Management

Logo
Presented by

Piotr Jablonski & Fulya Sengil Prisma Cloud Solutions Architects, Palo Alto Networks;B. Dunlap, Moderator

About this talk

Containerised applications hosted in Kubernetes are now mainstream, thanks in part to workloads moving to the cloud during the pandemic. According to a Palo Alto Networks Unit 42 report, "69% of organisations host more than half of their workloads in the cloud, up from just 31%...in 2020." Your organisation can now create, remove, or modify virtual machine and container workloads, storage, databases, and user access, all in a matter of minutes. It is challenging to manage resources when you create and subsequently destroy microservices in a very brief amount of time, so adding clarity across all the steps in the full application development lifecycle is necessary to ensure security and compliance. Automating this process is often the key to providing continuous visibility. Join Palo Alto and (ISC)² 15 November 2022 at 1:00 p.m. GMT for a Kubernetes security session focused on the top risks and countermeasures. Find out which risks are addressed by compliance standards and which are yet to come.
Related topics:

More from this channel

Upcoming talks (11)
On-demand talks (392)
Subscribers (93623)
ISC2 Security Briefings EMEA offers members in Europe, the Middle East and Africa a chance to learn about the latest trends, tools and best practices in cyber, information, software and infrastructure security while earning CPEs