Hi [[ session.user.profile.firstName ]]

Assembling a Container Security Program

Webinar with Securosis: Containers are scaring security pros because of their lack of transparency. The burden of securing containers falls across Development, Operations, and Security teams — but these groups are not always certain how to tackle the issues.
Join our webinar to:

-Understand what are the primary threats to container environments
-Learn how to set up a security program for virtual containers, from development to runtime
-Hear why dynamic behavior detection should be part of your ongoing security monitoring
Recorded Jan 24 2017 61 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Securosis and Aqua Security
Presentation preview: Assembling a Container Security Program

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Container Security 101 Sep 19 2017 3:00 pm UTC 45 mins
    Tsvi Korren, Sr. Director, Solution Architecture at Aqua Security
    Here is your chance to learn the basics about containers and the associated security challenges. In this webinar, presented by Tsvi Korren, Sr. Director, Solution Architecture at Aqua Security, we will start with a gentle introduction to containers, discuss why they are so popular, and convey the key concepts of container security.
    Join our webinar to learn:
    •What are containers?
    •How to use containers?
    •What are the security challenges they introduce?
  • Container Security 101 Sep 5 2017 5:00 pm UTC 45 mins
    Benjy Portnoy, Director DevSecOps Aqua Security
    Here is your chance to learn the basics about containers and the associated security challenges. In this webinar, presented by Tsvi Korren, Sr. Director, Solution Architecture at Aqua Security, we will start with a gentle introduction to containers, discuss why they are so popular, and convey the key concepts of container security.
    Join our webinar to learn:
    •What are containers?
    •How to use containers?
    •What are the security challenges they introduce?
  • Securing Kubernetes Environments Recorded: Aug 9 2017 32 mins
    Liz Rice, Technology Evangelist and Michael Cherny, Head of Security Research
    The Center for Internet Security (CIS) recently published a Benchmark specification for securing Kubernetes host machines.

    In this webinar we will take a closer look at the CIS Kubernetes Benchmark, and discuss how Kubernetes users can apply best practices from the Benchmark in their own deployments. We will cover aspects of secrets management, user authentication and authorization and the use of least privileges. We will end up with a demonstration of our very own kube-bench, an Open Source tool for testing benchmark compliance.

    Join Michael Cherny, Head of Security Research and Liz Rice, Technology Evangelist, to learn about practical actions you can take to make your Kubernetes deployment more secure.
  • Your Secret’s Safe with Me: Using and Managing Secrets in Containers Recorded: Jun 28 2017 45 mins
    Liz Rice, Technology Evangelist, Aqua Security, and Sagie Dulce, Senior Researcher, Aqua Security
    As organizations adopt containers and prepare to use them in production environments, the issue of managing secrets becomes a major concern:
    How do you assign and deploy secrets to containers while keeping them secure?
    How do you avoid secrets being visible on the network and host, and ensure they do not persist on disk?
    How do update, rotate and revoke secrets without interrupting the containers that use them?
    How do you leverage existing secrets stores (KMSs) and extend their use to containers?

    Join our webinar as we take a closer look into the ‘secrets’ of managing secrets and:
    · Learn some of the “do's and don'ts” of securing secrets
    · Learn the cardinal security requirements of secrets management
    · Watch a live demonstration to learn how secrets can be stolen from a node and how to extract secrets from an encrypted storage.
  • Securing Containers for Production-Ready Environments Recorded: May 24 2017 52 mins
    Amy DeMartine, Principal Analyst, Forrester Research and Rani Osnat, VP Marketing, Aqua Security
    “Containers Are Not Just Small Virtual Machines; They Need New Security Strategies.” - Forrester report: Ten Basic Steps to Secure Software Containers, April 17, 2017.

    While the rise of the Docker runtime environment and container format has brought standardization to container environment - according to the Forrester report, 31% of enterprise cloud developers are using containers during design and testing - risks to containers are on the rise as well. In this webinar, we will go over ten security steps to secure containers.

    Join our webinar to learn how to:
    • Secure containers now, before they put your customers at risk
    • Understand the distinct security implications of the layered container stack
    • Master the 10 tasks to protect your container environment

    Aqua Security webinar featuring Forrester Research.
  • Containers from Scratch Recorded: May 4 2017 46 mins
    Liz Rice, Technology Evangelist
    We’ve all heard of containers, and as Docker’s tagline suggests, they let you “Build, Ship, Run, Distributed Applications, Anywhere”. In some ways they are a bit like a lightweight Virtual Machine, but what does that really mean? In this presentation we will go through some container basics, and then show what a container really is (and how container engines like Docker work) by writing a container in a few lines of code.

    Join our webinar in order to learn:
    •Containers basics
    •How a container engine uses namespaces and control groups to create containers
    •What makes containers so appealing to developers
  • Shift-Left Security: How to Automate Security into Your Pipeline Recorded: Feb 16 2017 37 mins
    Benjy Portnoy, Aqua Security
    As DevOps role in the IT management is growing and virtual containers are rapidly gaining popularity – Docker is the fastest growing DevOps tool – DevOps now need to deal with security issues as well, and rethink their overall security strategy. How can they maintain an enterprise-grade security? Join our webinar to learn:
    •How to manage vulnerabilities in container images at DevOps speed?
    •How to fully automate security tests and bake them into your pipeline?
    •How to satisfy IT security and compliance requirements with minimal effort?
  • Assembling a Container Security Program Recorded: Jan 24 2017 61 mins
    Securosis and Aqua Security
    Webinar with Securosis: Containers are scaring security pros because of their lack of transparency. The burden of securing containers falls across Development, Operations, and Security teams — but these groups are not always certain how to tackle the issues.
    Join our webinar to:

    -Understand what are the primary threats to container environments
    -Learn how to set up a security program for virtual containers, from development to runtime
    -Hear why dynamic behavior detection should be part of your ongoing security monitoring
  • Is Your Software Safer in Containers? Recorded: Oct 26 2016 39 mins
    Aqua Security and WhiteSource
    Are you using containers (e.g. Docker) in your organization? Is your software safer on containers? In this session we will talk about security steps you need to take to make sure your security is aligned with your design process.
  • Achieve Software Delivery Speed and Security With Microservices and Containers Recorded: Sep 22 2016 62 mins
    Forrester Research and Aqua Security
    DevOps aim to increase one’s speed of software delivery, but not with the same old architecture. One also needs microservices and containers (e.g., Docker) to package software for incremental change. But containers are new, and they introduce a range of new security issues that developers and security architects have not had to deal with before.
    Guest presenter, Randy Heffner of Forrester Research, answers questions about microservices and container best practices
Insights, updates and latest news on container security.
With containers being the next major disruption in application technology, this channel features live and on-demand videos with insights, updates and latest news on container security. Watch any video at your convenience or sign up to our channel.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Assembling a Container Security Program
  • Live at: Jan 24 2017 6:00 pm
  • Presented by: Securosis and Aqua Security
  • From:
Your email has been sent.
or close