Top 5 Cloud Native Pipeline Security Considerations

Logo
Presented by

Steven Terrana, Senior Lead Technologist, Booz Allen Hamilton and Dan Papandrea, Field CTO, Sysdig

About this talk

In this webinar, we’ll take a deep dive into Booz Allen Hamilton’s award-winning ways of securing modern software development. Specifically, we’ll share strong learnings and best practices to confidently protect your pipeline at each stage. Join us to learn more about these top five (5) cloud-native security considerations: - Turnkey security for your pipelines - Container/host configuration management policies - Protection against runtime threats - Automating rule changes - Post-mortem and prevention
Related topics:

More from this channel

Upcoming talks (2)
On-demand talks (32)
Subscribers (7210)
In the cloud, every second counts. Attacks move at warp speed, and security teams must protect the business without slowing it down. Sysdig stops cloud attacks in real time, instantly detecting changes in risk with runtime insights, a unique AI architecture, and open source Falco. Sysdig delivers live visibility by correlating signals across cloud workloads, identities, and services to uncover hidden attack paths. By knowing what is running, teams can prioritize the vulnerabilities, misconfigurations, permissions, and threats that matter most. From prevention to defense, Sysdig helps enterprises move faster and focus on what matters: innovation. Sysdig. Secure Every Second.