<img src="https://certify.alexametrics.com/atrk.gif?account=8w5fq1Fx9f207i" style="display:none" height="1" width="1" alt="">
Kubernetes Security

Webinar

Think About Your Audience Before Choosing a Webinar Title

Sponsored by Security Boulevard


On Demand
Anytime

Kubernetes security is becoming more challenging as the number of clusters running cloud-native applications continues to multiply rapidly. Challenges range from allowing in only legitimate traffic and enabling least-privileged communications between services to defend against attacks moving laterally between clusters, to validating how a workload is operating within the expected guardrails.

It’s also often assumed that because a container only runs for a few seconds on a Kubernetes cluster, it won’t be compromised. However, containers are starting to run for longer periods and are being used with stateful applications containing sensitive data. Organizations also are paying more attention to Kubernetes as they look to lock down software supply chains in the wake of a series of high-profile breaches.

As Kubernetes becomes ever-present in production environments, it is imperative that organizations understand and take appropriate steps against the threats. In this editorial webinar, our panel of experts will discuss:

  • The state of Kubernetes security
  • What organizations need to address with respect to Kubernetes security in production environments
  • Who should be in charge of Kubernetes security in the age of shift-left
STEVE GIGUERE
Developer Advocate, Bridgecrew by Prisma Cloud
Steve is a Developer Advocate with Bridgecrew by Prisma Cloud specialising in cloud and infrastructure security automation. Steve started his cybersecurity life by being kicked out of his high school computing class for privilege escalation on the school linux system and changing all passwords to "peaches" (his friend’s dog's name). But that was a long time ago. Since then he has worked as a Solution Architect for StackRox and Aqua Security, specialising in container and Kubernetes security, and has spent time with Synopsys establishing DevSecOps best practices for enterprise CI/CD pipelines.
RACHEL SWEENEY
Insights Enablement Engineer, Fairwinds
Rachel is an insights enablement engineer at Fairwinds. Her work consists of helping clients manage their Kubernetes clusters so they can spend more time focusing on delivering value to their customers. She also works with her team to identify common problems in Kubernetes to drive software development for Fairwinds.
Matt Bator
Principal Solutions Enablement Architect, Kasten by Veeam
Matt is a 15+ year IT veteran with a passion for educating others about emerging technologies. From development, to sales, to enablement, Matt’s career has continually focused on creating connections between customer value and technical problem solving. His work at Kasten includes designing and delivering training on both Kasten’s product, as well as Kubernetes, for employees, partners, and the community.
Josh CoffyJohn King
Sr. Sales Engineer, strongDM
After running IT Operations for companies in the Media & Entertainment space, strongDM Sr. Sales Engineer John King started applying his specializations in security, high performance computing and big data, towards helping other enterprise organizations refactor infrastructure access. With broad experience in endpoint management, John assists teams in providing a People First approach to securing access to the modern infrastructure tools in use today.
Jared Curtis
Cloud Architect, Everbridge
Jared has nearly 2 decades of hands-on Operations experience covering a large swath of business sectors. As an Everbridge Cloud Architect, he has led operations teams to develop a stable system for deploying cutting-edge solutions.
Mike Vizard
Chief Content Officer, Techstrong Group
Mike Vizard is a seasoned IT journalist with over 25 years of experience. He also contributed to IT Business Edge, Channel Insider, Baseline and a variety of other IT titles. Previously, Vizard was the editorial director at Ziff-Davis Enterprise as well as editor-in-chief at CRN and InfoWorld.

REGISTER TO WATCH NOW:

What You’ll Learn in This Webinar

You’ve probably written a hundred abstracts in your day, but have you come up with a template that really seems to resonate? Go back through your past webinar inventory and see what events produced the most registrants. Sure – this will vary by topic but what got their attention initially was the description you wrote.

Paint a mental image of the benefits of attending your webinar. Often times this can be summarized in the title of your event. Your prospects may not even make it to the body of the message, so get your point across immediately.  Capture their attention, pique their interest, and push them towards the desired action (i.e. signing up for your event). You have to make them focus and you have to do it fast. Using an active voice and bullet points is great way to do this.

Always add key takeaways. Something like this....In this session, you’ll learn about:

  • You know you’ve cringed at misspellings and improper grammar before, so don’t get caught making the same mistake.
  • Get a second or even third set of eyes to review your work.
  • It reflects on your professionalism even if it has nothing to do with your event.