OWASP Top 10: Control Measures for Kubernetes Security

Logo
Presented by

NIgel Douglas, Sr. Cloud Security Strategist, Sysdig

About this talk

In an era where containerized applications are becoming the norm, ensuring the security of Kubernetes environments is more critical than ever. This hands-on webinar, “OWASP Top 10 Training for Kubernetes,” offers an in-depth exploration of how to effectively implement the OWASP Top 10 security controls within Kubernetes. Participants will gain a comprehensive understanding of the most pressing security risks identified by OWASP and how these apply specifically to Kubernetes ecosystems. Through a mix of theoretical insights and practical demonstrations, attendees will learn to identify vulnerabilities, enforce best practices, and utilize security tools tailored for Kubernetes environments. Key topics will include risk assessment, configuration management, access control, and network security measures, all contextualized within the framework of the OWASP Top 10. This interactive session encourages participant engagement, with live demonstrations and case studies illustrating the application of these controls in real-world scenarios. Whether you are a developer, DevOps engineer, or security professional, this session will enhance your skill set and equip you with actionable strategies to safeguard your applications against the most critical threats. Join us to strengthen your Kubernetes security posture and ensure your deployments are resilient against evolving security challenges!
Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (55)
Subscribers (9767)
In the cloud, every second counts. Attacks move at warp speed, and security teams must protect the business without slowing it down. Sysdig stops cloud attacks in real time, instantly detecting changes in risk with runtime insights, a unique AI architecture, and open source Falco. Sysdig delivers live visibility by correlating signals across cloud workloads, identities, and services to uncover hidden attack paths. By knowing what is running, teams can prioritize the vulnerabilities, misconfigurations, permissions, and threats that matter most. From prevention to defense, Sysdig helps enterprises move faster and focus on what matters: innovation. Sysdig. Secure Every Second.