Hi [[ session.user.profile.firstName ]]

Assembling a Container Security Program

Webinar with Securosis: Containers are scaring security pros because of their lack of transparency. The burden of securing containers falls across Development, Operations, and Security teams — but these groups are not always certain how to tackle the issues.
Join our webinar to:

-Understand what are the primary threats to container environments
-Learn how to set up a security program for virtual containers, from development to runtime
-Hear why dynamic behavior detection should be part of your ongoing security monitoring
Recorded Jan 24 2017 61 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Securosis and Aqua Security
Presentation preview: Assembling a Container Security Program

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Security Lessons Learned from Peers on Hybrid Cloud Environments Apr 11 2018 6:30 pm UTC 60 mins
    Doug Cahill, Senior Analyst, Cybersecurity at Enterprise Strategy Group
    As container adoption is accelerating, the need for container-native security controls that span any environment (multi-cloud, on-premise) is increasing. This webinar, based on results of a survey conducted by ESG, zeros in on the disparity between containerized application deployment plans, to the level of threats facing organizations, and the ensuing lack of sufficient security controls and skills to deal with these challenges.

    Learn from IT colleagues about current top challenges and their plans to incorporate container security controls in hybrid cloud environments. During this webinar, we’ll review:

    •Top attacks organizations are experiencing
    •Operational and readiness gaps mapped to actions
    •A proven container security framework
  • Container Security in the Enterprise Mar 27 2018 5:00 pm UTC 45 mins
    Adrian Lane, Analyst and CTO at Securosis, and Amir Jerbi, co-founder and CTO at Aqua Security
    Following an extensive research update for 2018, join Adrian Lane, analyst and CTO at Securosis, and Amir Jerbi, co-founder and CTO at Aqua Security, for an in-depth look at container security challenges, best practices, and benefits.

    While a lot has changed and improved in the container ecosystem, enterprises are still trying to find the most effective ways to ensure security and compliance. Having researched this topic in 2016, and once again in recent months, Adrian will provide insights into key areas:
    How security risks shift in the era of containers, making traditional security tools insufficient key areas to focus on, including the build pipeline, container contents, host security, runtime security, monitoring, and auditing.

    Best practices and benefits of deploying containers with security in mind
  • Securing Kubernetes at Scale Recorded: Mar 14 2018 45 mins
    Benjy Portnoy, Director of DevSecOps, and Rani Osnat, VP Product Marketing
    Join Aqua security to learn how to secure modern Kubernetes-based applications in an effective and scalable way.
    Kubernetes 1.8 and 1.9 introduced many security constructs that make it possible to secure Kubernetes deployments better than ever. However, recent incidents such as the highly publicized crypto-mining breach at Tesla demonstrate that without adhering to best practices and without proper implementation, Kubernetes-based applications are at risk. In this webinar we will cover this hot topic and demonstrate how to properly secure Kubernetes environments using both K8S-native, open source and commercial tools such as the Aqua Container Security Platform:
    - Embedding and automating security into the CI/CD pipeline
    - Implementing best practices to harden Kubernetes clusters and nodes
    - Using fine-grained access controls to ensure users only have minimal privileges
    - Leveraging Kubernetes constructs (namespaces, deployments) to improve network security
    - Monitoring Kubernetes applications at runtime to detect anomalies
  • Containers: Real-world Solutions for Networking, Security, & Storage Recorded: Feb 28 2018 56 mins
    Gou Rao,Portworx; Rani Osnat, Aqua Security; Bala Ramachandran, Big Switch Networks
    IT organizations are leveraging containers to accelerate cloud-native application delivery, improve development agility, and increase operational efficiency. With this highly-distributed and dynamic application environment, infrastructure components such as networking, storage, and security need to be dynamically managed to operate at the speed of containers. By leveraging software-defined technologies and industry-standard interfaces to support orchestration systems such as Kubernetes, Big Switch’s SDN Fabric, Portworx cloud native storage and Aqua’s security platform overcome these challenges to offer a production-grade solution to deploy and manage containers at scale.

    Watch this recorded webinar to learn why large customers have selected these solutions as the optimal architecture for their container-driven digital transformation. In this webinar, we cover:
    BIG QUESTION #1: How does Big Switch’s Big Cloud Fabric leverage SDN and Container Network Interface (CNI) plugin to simplify network operations and to enhance container visibility?
    BIG QUESTION #2: How can teams get the benefits of Kubernetes storage primitives for dynamic storage provisioning without sacrificing enterprise storage fundamentals such as performance & class of service, HA, backups, snapshots, automated upgrades, and security. BIG QUESTION #3: How can you automate security controls for container deployments, addressing risk and compliance needs, while improving application security well beyond that of traditional applications?

    Joining moderator, Kate Lehman, Head of Communications, Big Switch Networks on the panel are Gou Rao, CTO, Portworx; Rani Osnat, VP Product Marketing, Aqua Security; and Bala Ramachandran, Director of Product Management, Big Switch Networks.
  • Cover Your Base Images: How Early Development Choices Impact Security Recorded: Dec 6 2017 17 mins
    Tsvi Korren, Sr. Director, Solution Architecture at Aqua Security
    Security risks, configuration mistakes, and vulnerabilities in Docker images are often traced to some very early decisions. Before containers, developers could count on the security of the infrastructure, including the operating system and prerequisite components. Dev owned the security of the application--Ops owned what it ran on. This is not the case anymore. Today, development owns the choice of the base operating system, the configuration of the final image, and sourcing all the components used for the build. In order to produce secure and compliant applications, development and operations should work together to establish a practice that secures the base images, reviews configuration at time of build and provides a known risk posture for each image and running container.

    This webinar will guide you through building applications on a secure foundation, performing a risk analysis of your final product, and prepare you to handle compliance requirements.
  • Container Security 101 Recorded: Nov 7 2017 41 mins
    Tsvi Korren, Sr. Director, Solution Architecture at Aqua Security
    Here is your chance to learn the basics about containers and the associated security challenges. In this webinar, presented by Tsvi Korren, Sr. Director, Solution Architecture at Aqua Security, we will start with a gentle introduction to containers, discuss why they are so popular, and convey the key concepts of container security.
    Join our webinar to learn:
    •What are containers?
    •How to use containers?
    •What are the security challenges they introduce?
  • Using Containers for Hybrid Cloud & Cloud Migration Recorded: Oct 18 2017 40 mins
    Amir Jerbi, CTO and co-founder at Aqua Security
    The main benefits of containers vary from speed of development and deployment to scalability, flexibility, and cost-effectiveness – which is what made containers so popular today. But the ability to move containerized applications among different environments, from a public to private cloud for example, is one of the most important benefits of containers, making them enterprise favorites for cloud migration and hybrid cloud architectures.
    In this webinar, we will talk about how to use containers in a hybrid cloud, specifically:
    1.How containers make it easy to migrate and move applications between clouds
    2.What architectural considerations and tooling you need to achieve portability
    3.How to ensure consistency of control, security, and compliance across container cloud deployments
  • Securing Kubernetes Environments Recorded: Aug 9 2017 32 mins
    Liz Rice, Technology Evangelist and Michael Cherny, Head of Security Research
    The Center for Internet Security (CIS) recently published a Benchmark specification for securing Kubernetes host machines.

    In this webinar we will take a closer look at the CIS Kubernetes Benchmark, and discuss how Kubernetes users can apply best practices from the Benchmark in their own deployments. We will cover aspects of secrets management, user authentication and authorization and the use of least privileges. We will end up with a demonstration of our very own kube-bench, an Open Source tool for testing benchmark compliance.

    Join Michael Cherny, Head of Security Research and Liz Rice, Technology Evangelist, to learn about practical actions you can take to make your Kubernetes deployment more secure.
  • Your Secret’s Safe with Me: Using and Managing Secrets in Containers Recorded: Jun 28 2017 45 mins
    Liz Rice, Technology Evangelist, Aqua Security, and Sagie Dulce, Senior Researcher, Aqua Security
    As organizations adopt containers and prepare to use them in production environments, the issue of managing secrets becomes a major concern:
    How do you assign and deploy secrets to containers while keeping them secure?
    How do you avoid secrets being visible on the network and host, and ensure they do not persist on disk?
    How do update, rotate and revoke secrets without interrupting the containers that use them?
    How do you leverage existing secrets stores (KMSs) and extend their use to containers?

    Join our webinar as we take a closer look into the ‘secrets’ of managing secrets and:
    · Learn some of the “do's and don'ts” of securing secrets
    · Learn the cardinal security requirements of secrets management
    · Watch a live demonstration to learn how secrets can be stolen from a node and how to extract secrets from an encrypted storage.
  • Securing Containers for Production-Ready Environments Recorded: May 24 2017 52 mins
    Amy DeMartine, Principal Analyst, Forrester Research and Rani Osnat, VP Marketing, Aqua Security
    “Containers Are Not Just Small Virtual Machines; They Need New Security Strategies.” - Forrester report: Ten Basic Steps to Secure Software Containers, April 17, 2017.

    While the rise of the Docker runtime environment and container format has brought standardization to container environment - according to the Forrester report, 31% of enterprise cloud developers are using containers during design and testing - risks to containers are on the rise as well. In this webinar, we will go over ten security steps to secure containers.

    Join our webinar to learn how to:
    • Secure containers now, before they put your customers at risk
    • Understand the distinct security implications of the layered container stack
    • Master the 10 tasks to protect your container environment

    Aqua Security webinar featuring Forrester Research.
  • Containers from Scratch Recorded: May 4 2017 46 mins
    Liz Rice, Technology Evangelist
    We’ve all heard of containers, and as Docker’s tagline suggests, they let you “Build, Ship, Run, Distributed Applications, Anywhere”. In some ways they are a bit like a lightweight Virtual Machine, but what does that really mean? In this presentation we will go through some container basics, and then show what a container really is (and how container engines like Docker work) by writing a container in a few lines of code.

    Join our webinar in order to learn:
    •Containers basics
    •How a container engine uses namespaces and control groups to create containers
    •What makes containers so appealing to developers
  • Shift-Left Security: How to Automate Security into Your Pipeline Recorded: Feb 16 2017 37 mins
    Benjy Portnoy, Aqua Security
    As DevOps role in the IT management is growing and virtual containers are rapidly gaining popularity – Docker is the fastest growing DevOps tool – DevOps now need to deal with security issues as well, and rethink their overall security strategy. How can they maintain an enterprise-grade security? Join our webinar to learn:
    •How to manage vulnerabilities in container images at DevOps speed?
    •How to fully automate security tests and bake them into your pipeline?
    •How to satisfy IT security and compliance requirements with minimal effort?
  • Assembling a Container Security Program Recorded: Jan 24 2017 61 mins
    Securosis and Aqua Security
    Webinar with Securosis: Containers are scaring security pros because of their lack of transparency. The burden of securing containers falls across Development, Operations, and Security teams — but these groups are not always certain how to tackle the issues.
    Join our webinar to:

    -Understand what are the primary threats to container environments
    -Learn how to set up a security program for virtual containers, from development to runtime
    -Hear why dynamic behavior detection should be part of your ongoing security monitoring
  • Is Your Software Safer in Containers? Recorded: Oct 26 2016 39 mins
    Aqua Security and WhiteSource
    Are you using containers (e.g. Docker) in your organization? Is your software safer on containers? In this session we will talk about security steps you need to take to make sure your security is aligned with your design process.
  • Achieve Software Delivery Speed and Security With Microservices and Containers Recorded: Sep 22 2016 62 mins
    Forrester Research and Aqua Security
    DevOps aim to increase one’s speed of software delivery, but not with the same old architecture. One also needs microservices and containers (e.g., Docker) to package software for incremental change. But containers are new, and they introduce a range of new security issues that developers and security architects have not had to deal with before.
    Guest presenter, Randy Heffner of Forrester Research, answers questions about microservices and container best practices
Insights, updates and latest news on container security.
With containers being the next major disruption in application technology, this channel features live and on-demand videos with insights, updates and latest news on container security. Watch any video at your convenience or sign up to our channel.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Assembling a Container Security Program
  • Live at: Jan 24 2017 6:00 pm
  • Presented by: Securosis and Aqua Security
  • From:
Your email has been sent.
or close