Modern Workload Security: Addressing the Challenges of K8s

Logo
Presented by

Jeff Vogt, Field CTO, Lacework

About this talk

Kubernetes has rapidly become the de facto standard for container orchestration in modern software development. But rapid iteration often leads to security risks, including misconfigurations and supply chain attacks. Breaches often have a large blast radius, due to overly-privileged network, execution, and identity and access management (IAM) policies. In this webinar, you'll glean insights on how to run K8s with confidence, accelerating usage without compromising security and compliance controls. Attendees will learn: • Common K8s security mistakes and threat vectors (and how to avoid them) • Tips to balance preventive efforts with reactive ones • Best practices to address top security concerns, container image scanning, least-privilege strategies, and runtime breach detection to achieve speed and efficiency goals
Related topics:

More from this channel

Upcoming talks (6)
On-demand talks (946)
Subscribers (71465)
CSA CloudBytes was launched as a webinar series to help us educate the industry on all matters related to the cloud. Our channel is designed to inform our audience about trending topics, new technologies, and latest research. Learn more at cloudsecurityalliance.org. Join the Cloud Security Alliance on LinkedIn and follow us on twitter: @cloudsa