KubeSec Enterprise Online - A Webinar Series

A social distancing approach for sharing content from the planned
KubeSec Enterprise Summit event for March 30.

Explainer_Image

Whether you are just now beginning to roll out your first production implementation of Kubernetes, or are an early adopter looking to learn from the experience of your peers, you are sure to get valuable insights from this educational event.

Agenda includes:

  • End-user presentations sharing their experiences / best practices
  • Emerging trends in Kubernetes security technologies
  • Keynote presentations covering industry and market views, including Q&A

Who should attend? 

  • DevOps & DevSecOps
  • Cloud architects & Product managers
  • Security and compliance professionals
  • Digital Transformation & Business managers

All webinars held on Tuesdays at 2pm UK Time (3pm CET, 9am EST)

Click here to register for the entire series, or explore the available sessions below!

KubeSec Enterprise Online Session Details:
26 May
Kubernetes Secrets - The good, the bad and the ugly

Register for this Webinar Session

Secrets (SQL/LDAP passwords, SSH-keys and API-tokens) are usually kept by applications in configuration files or as source code constants. Kubernetes offers a great feature to store your application's Secrets where your containers can access them on demand. In our talk, we’ll share several use cases and flaws were using Kubernetes built-in Secrets Storage is insufficient, and review several future features of K8s and other concepts available in order to be able to better manage and secure your secrets.

Oded Hareven
CEO and Co-Founder
AKEYLESS
Moderator - Steve Giguere
Senior Solutions Architect
Aqua Security
2 June
kubectl support for PKCS#11 Hardware Security Module

Register for this Webinar Session

How would you react if your laptop was stolen? Are you worried about attackers performing a cold boot attack to extract your Kubernetes credentials? Do you already use a YubiKey for SSH and GPG, and wonder why you cannot use it with kubectl? If yes, then this talk is for you!

Cristian Klein
Cloud Native Architect
Elastisys
Moderator - Liz Rice
VP Open Source
Aqua Security
9 June
The Container Security Checklist

Register for this Webinar Session

Liz's new Container Security book includes a Security Checklist covering items you should at least think about when considering how to secure your deployments running on containers. In this talk, Liz gives an overview of the checklist, and dives into the details on some potential weaknesses that you really need to avoid. The takeaway challenge is for you to check whether your own environments comply with the most important of these recommendations.

Liz Rice
VP of Open Source Engineering
Aqua Security
Moderator - Andy Feit
VP Go To Market
Aqua Security
16 June
Kubernetes in the Context of an ISO 27001 Certification

Register for this Webinar Session

With container technology rapidly entering the IT operations world together with the increasing demand in certifications of the IT environment such as ISO 27001, there is a high chance that you will get in contact with questions regarding operational compliance of your Kubernetes stack.

Based on the current available documentation on security requirements for container environments by the BSI and NIST, we will give an overview about how we would answer those questions for our in-house Kubernetes platform at WEB.DE and GMX.

Adriane Hartmann-Heder
IT Security Professional
1&1
Dr. Sascha Mühlbach
Expert Infrastructure Architect
1&1
23 June
Beyond Vulnerability Scanning

Register for this Webinar Session

Over the past year, the Aqua Security cyber research team has uncovered increasingly sophisticated attacks on containers that use obfuscation and evasion techniques to avoid detection by static scanners. Such attacks utilize novel, innocuous-looking images to embed their own code, which is often encrypted or deployed a as polymorphic malware to avoid detection. The malicious behavior of the image can only be observed when it is run as a container.

Amir Jerbi
CTO and Co Founder
Aqua Security
Moderator - Andy Feit
VP Go To Market
Aqua Security
30 June
Projected Service Accounts and OIDC, exposing an endpoint

Register for this Webinar Session

Kubernetes has an OIDC endpoint on the roadmap for release 1.18 and EKS provided their own OIDC endpoint. This talk will cover the power this will bring with Projected Service Account tokens. We will walk through how you can have secure intercluster RBAC and how to talk to external services.

Jason Smith
Cloud Native Consultant
FikaWorks
Moderator - Liz Rice
VP of Open Source Engineering
Aqua Security
7 July
The Sharp Edges of Kubernetes Security

Register for this Webinar Session

Once you get past the basics of Kubernetes security, locking down your APIs and implementing RBAC you might think you’ve got most of your security issues sorted. However, like any complex system Kubernetes has some sharp security edges. This is a talk about avoiding getting cut by them.

Rory McCune
Principal Security Analyst
NCC Group
Moderator - Liz Rice
VP of Open Source Engineering
Aqua Security
14 July
Achieving security and compliance in a large, multi-cluster Kubernetes fleet

Register for this Webinar Session

Red Hat recently achieved SOC-2 and ISO 27001 certifications for one of our managed Enterprise Kubernetes as a service offerings, OpenShift Dedicated (OSD) on AWS.

Learn how we leveraged the built-in security features of Kubernetes and the mature security expertise of Red Hat to achieve compliance and certification of our large, multi-cluster Kubernetes fleet.

Specifically, topics covered in this session include:

  • How Kubernetes fits into a mature organization’s existing security landscape
  • How the SRE model helps refine security
  • Vulnerability management
  • Authentication and authorization
  • Log aggregation and analysis
  • Future security and compliance challenges
Jason Burrell
Security Lead, OpenShift Dedicated Site Reliability Engineering
Red Hat
Moderator - Steve Giguere
Senior Solutions Architect
Aqua Security
On-Demand
DevOps and Security – An Uneven Journey

Available now on-demand

What does DevOps adoption look like at enterprises, and what is the impact of that on cloud-native security? 451 Research presents results from its quantitative and qualitative research into cloud native security, particularly the relationship between current security practices and DevOps.

Fernando Montenegro
Principal Analyst
451 Research
Moderator - Rani Osnat
VP Strategy & Product Marketing
Aqua Security
Featuring Presenters From:
Sign Up for KubeSec Updates

By clicking submit, you consent to allow Aqua to contact you regarding its respective products, services, and upcoming events and to store and process the information submitted.
You may unsubscribe at any time. Please review our Privacy Policy for more information.