Infrastructure Security: Doing More with Serverless

Presented by

Ryan Petrich, CTO, Capsule8

About this talk

Serverless architecture is an appealing prospect to developers in that it reduces maintenance, cost, testing, and operational overhead. Much of the pomp and circumstance of managing the infrastructure shifts to the cloud provider so that organizations can focus on building their services rather than scaling them and keeping them running. But, as with all new or evolving technologies, there are security implications and considerations that can give security teams pause and serverless applications should be viewed differently from traditionally deployed or containerized services. In this interactive session, Ryan Petrich, CTO at Capsule8, will define serverless as well as explore some of the key benefits of deploying this type of infrastructure with a focus on the impact to an organization’s attack surface. Ryan will dig into some of the key security challenges, including visibility and observability of serverless applications, as well practical tools and approaches to help overcome them and a live demonstration of example attacks to watch out for when choosing such an architecture. Attendees of this webcast will learn: - What a serverless architecture is and why security teams should care - Key security challenges for serverless deployments - Attack vectors and security threats unique to serverless architectures - Practical solutions for overcoming serverless security challenges

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (16)
Subscribers (1033)
Capsule8 provides modern enterprises scalable Linux workload protection. The pioneer behind “ops-friendly” Linux security, Capsule8 Protect is purpose-built to deliver monitoring, detection and response with a single agent that can be deployed across heterogenous production environments. By using Capsule8, security teams have the visibility needed to detect incidents and protect against unwanted behavior, allowing them reduce downtime and avoid costly business disruption.