Hi [[ session.user.profile.firstName ]]

Automating Security with Kubernetes

Kubernetes is a leading orchestration tool used by teams large and small to deploy containerized applications. It is also at an ideal point to automate rules that prevent high-risk vulnerabilities and compliance violations don’t enter production environments, and deploy runtime defenses that protect your applications.

Join Twistlock Solution Architect Kevin Lewis to see how Twistlock integrates directly into Kubernetes to improve your risk and compliance posture without slowing down development.
Recorded Oct 4 2017 25 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Kevin Lewis, Solution Architect
Presentation preview: Automating Security with Kubernetes

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • From Development to Production: Securing Today's Cloud Native Infrastructure Recorded: Mar 29 2018 61 mins
    John Morello, CTO, Twistlock & featured speaker Amy DeMartine, Principal Analyst, Forrester
    From Development to Production: Whats Required to Secure Today's Cloud Native Infrastructure?

    As enterprises embrace containers and other cloud native technologies, they are recognizing the need to shift to a modernized approach to security integrated across the application lifecycle. This new approach requires developers and security teams to rethink their tools and processes in order to ensure best in breed protection covering the full application lifecycle.

    Join Twistlock CTO John Morello and featured speaker Forrester Analyst Amy DeMartine in this webinar to learn:

    •The latest data around container adoption, implementation and security in the enterprise
    •Container and cloud native security best practices across the application lifecycle
    •Specific use cases and practical advice for implementing these best practices for robust cloud native environments

    Register for this webinar to learn more!
  • Securing Containers w/ NIST SP 800-190 Recorded: Mar 7 2018 52 mins
    John Morello, Twistlock CTO & Murugiah Souppaya, Computer Scientist at NIST
    In late 2017, The National Institute of Standards and Technology (NIST) released Special Publication (SP) 800-190, the Container Security Guide, a set of guidelines for securing container applications and infrastructure.

    This panel webinar, hosted by NIST SP 800-190 co-authors, John Morello (CTO, Twistlock), and Murugiah Souppaya (Computer Scientist, NIST) will cover:

    • Why NIST SP 800-190 was created, the open process used to develop it, and how all organizations can benefit from it
    • Some of the specific container risks identified in the SP
    • Top recommended countermeasures for each risk
    Implementation guidance and best practices

    In addition, the session will highlight how organizations can leverage functionality provided by container-focused orchestration and security platforms to automate compliance across the development lifecycle - reducing overall attack surface and delivering comprehensive threat protection.
  • Trends in Container and Cloud Native Cybersecurity Recorded: Jan 23 2018 34 mins
    Josh Thorngren, VP of Marketing at Twistlock
    As software eats the world, cloud native tools and methodologies — like containers and devops— are continuously evolving. Organizations that can identify the major trends in this ever-changing landscape and then successfully secure a new cloud native environment will have an advantage in the market.

    Join Twistlock's VP of Marketing, Josh Thorngren, as he shares the macro trends he’s seeing in the cloud native security space and the extended cloud native ecosystem in 2018.

    Specifically, we’ll cover:
    * Rethinking your organization’s approach to defend against the proliferation of easy-to-use, easy-to acquire hacks, exploits and malware
    * How to shift security left by developing an entirely new paradigm and set of principles for software delivery and protection
    * How to modernize legacy workloads with containers
  • Automating Security with Kubernetes Recorded: Oct 4 2017 25 mins
    Kevin Lewis, Solution Architect
    Kubernetes is a leading orchestration tool used by teams large and small to deploy containerized applications. It is also at an ideal point to automate rules that prevent high-risk vulnerabilities and compliance violations don’t enter production environments, and deploy runtime defenses that protect your applications.

    Join Twistlock Solution Architect Kevin Lewis to see how Twistlock integrates directly into Kubernetes to improve your risk and compliance posture without slowing down development.
  • Managing Compliance in Container Environments Recorded: Sep 14 2017 32 mins
    Patrick Maddox, Sr. Director of SA, Twistlock and Adam Greenfield, Sr. Director of Enterprise Architecture, ClearDATA
    Customers and employees demand easier ways to interact with your organization. At the same time, regulatory requirements like HIPAA and PCI combined with huge amounts of sensitive data raise the stakes around building secure and compliant applications.

    Increasingly, organizations are looking to containers and microservices to provide the agility and scalability needed to satisfy their customers. But there are other crucial and oft-overlooked advantages of migrating to containers and microservices: Compliance and Security. Containers offer a number of opportunities for building and deploying more secure applications and environments.

    We’ll look at how containers enable automated security and compliance checks throughout the entire development lifecycle, from the first line of code through to runtime.

    Attendees will learn:
    •How to enforce compliance across the entire software delivery lifecycle
    •Best practices for securing container environments
    •Strategies and tips to scale application security and compliance
  • 6 Reasons Why Dev Should Own Security Recorded: Aug 18 2017 21 mins
    Geva Solomonovich, Snyk and John Morello, Twistlock
    Open source, containers and microservices, and a myriad of DevOps tools reduce the time and friction to deploy code. Oftentimes, security becomes a limiting factor in bringing new innovations to market.

    To build secure applications without slowing development cycles requires a new approach to security: Shift-Left Security. This means moving security to left in the development process and into the purview of developers by integrating it into existing workflows.

    Join us for this to learn:
    - 6 reasons development should own security
    - Best practices to employing Shift-Left security
    - How to deploy secure apps at DevOps speed
  • Automated Security for Jenkins Recorded: Aug 17 2017 26 mins
    Matthew Barker, Solutions Architect, Twistlock
    CI/CD tools like Jenkins enable development teams to deliver software faster. To prevent containers with either high-risk vulnerabilities or compliance violations making it to production, it’s important to integrate automated compliance and vulnerability monitoring that can check, alert on and fail builds. By detecting and remediating security risks early, you reduce overall risk, minimize costly rework, and reduce the effort of downstream security checks.

    Join Twistlock Solution Architect Matthew Barker to see how Twistlock integrates directly into Jenkins to improve your risk and compliance posture without slowing down development.
  • How to Securely Configure a Linux Host to Run Docker Recorded: Jun 1 2017 28 mins
    Kevin Lewis, Solution Architect, Twistlock
    Learn how to securely configure host settings and Docker Engine.

    Docker allows teams to increase the speed and scale that they can deliver software. As a result, adoption rates for docker are accelerating as more organizations are looking for ways to innovate faster.

    As you move down the path to containers, it is important to note that an out-of-the box installation of just about any Linux distribution is capable of running the Docker daemon and Docker containers, but it will leave your host exposed to many security and performance concerns if not configured properly.

    Join us for this webinar to learn how to:
    - Configure host settings to harden and protect it from unauthorized access
    - Install and configure a Docker Engine with minimal attack surface
    - Ensure that the host has the necessary integration with existing enterprise systems like SIEM and enterprise directories
  • Twistlock 2.0 Key Functionality Walkthrough (featuring John Morello) Recorded: Apr 28 2017 7 mins
    John Morello
    Twistlock CTO, John Morello, describes some of the key functionality in Twistlock's 2.0 release, including Runtime Radar, Compliance Explorer, Certificates, and Secrets management.
  • How Twistlock Works With Any Orchestration Tool Recorded: Apr 28 2017 3 mins
    John Morello
    Our CTO digs into how Twistlock works with any orchestration tool, including:
    Kubernetes
    OpenShift
    Amazon ECS
    Docker Swarm
    DC/OS
  • Container Security vs Virtual Machine Security Recorded: Apr 28 2017 5 mins
    John Morello
    The most common question we heard at DockerCon this year was:
    "What’s different about securing Containers versus Virtual Machines?"

    Watch this short video to hear Twistlock CTO John Morello answer this question and discuss how containers enable a new, scalable, and automated approach to securing your container applications.
  • Scaling App Defense for Container Environments Recorded: Apr 18 2017 26 mins
    John Morello
    Twistlock's CTO, John Morello, presents his take on how to scale app defense in containerized environments at Dockercon17.
Cloud native cybersecurity for the modern enterprise
Twistlock is the leading provider of container and cloud native cybersecurity solutions for the modern enterprise. From precise, actionable vulnerability management to automatically deployed runtime protection and firewalls, Twistlock protects applications across the development lifecycle and into production. Purpose built for containers, serverless, and other leading technologies - Twistlock gives developers the speed they want, and CISOs the control they need.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Automating Security with Kubernetes
  • Live at: Oct 4 2017 5:00 pm
  • Presented by: Kevin Lewis, Solution Architect
  • From:
Your email has been sent.
or close