Tigera Events

Strategy Workshop: Security Governance for Kubernetes and Container Environments

Topics:

Security
Americas
May 31, 2023
10:00 am EDT

Happening this week

Explore Tigera Events

  • AVAILABILITY

  • CATEGORY

  • REGION

  • PARTNER

  • TOPIC

In this AKS-focused security workshop, you will work with Calico and Microsoft Azure experts to learn how to implement zero-trust security for workloads to reduce the attack surface of applications running on AKS. This 90-minute hands-on lab comes with your own Calico Cloud environment and a sample app environment.

The workshop will guide you in implementing:

  • Deploy zero-trust workload access controls (including DNS as policy and egress gateway)
  • Block lateral movement of APTs with identity-aware microsegmentation
  • Secure communication with workload based-WAF at application layer

We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.

Register now to reserve your spot!

  •  Regis Martins

Event Partner: 

In this EKS-focused security workshop, you will work with AWS and Calico experts to learn how to detect and manage vulnerabilities and mitigate risks in EKS.

The 90-minute interactive lab comes with your own provisioned Calico Cloud environment and is designed to help:

  • Scan container images for common vulnerabilities and exposures (CVEs)
  • Build and enforce security policies to block the deployment of vulnerable images
  • Visualize vulnerable workloads and deploy security policies to mitigate exposure risks

We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.

Register now to reserve your spot!

Event Partner: 

Attend this in-depth, hands-on, EKS-focused security workshop with AWS and Calico experts to learn how to protect containers in your Kubernetes cluster from known and zero-day threats based container and network attacks running on EKS. The 90-minute interactive lab comes with your own provisioned Calico Cloud environment and a sample application.

You will leave this workshop with hands-on experience on how to:

  • Visualize security posture of your Kubernetes cluster
  • Preview and customize security guardrails for network-based threats
  • Configure IDS/IPS, workload-centric WAF, and DDoS protection
  • Detect zero-day attacks based on suspicious container activity using syscalls, file access, and process information
  • Preview and enforce security policies to quarantine infected workloads

We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.

Register now to reserve your spot!

Event Partner: 

Attend this in-depth, hands-on, AKS-focused security workshop with Microsoft Azure and Calico experts to learn how to prevent, detect, and mitigate threats in containers running on AKS. The 90-minute interactive lab comes with your own provisioned Calico Cloud environment and a sample application.

You will leave this workshop with hands-on experience on how to:

  • Scan container images and block deployment of vulnerable images
  • Preview and enforce security policies to protect vulnerable workloads
  • Implement workload access controls to secure egress and lateral movement during runtime

We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.

Register now to reserve your spot!

  •  Chris Man

Event Partner: 

In this EKS-focused security workshop, you will work with AWS and Calico experts to learn how to design and deploy best practices to achieve compliance with regulatory frameworks, including but not limited to PCI, SOC 2, HIPAA, and GDPR and secure your Kubernetes environment. This 90-minute hands-on lab comes with your own provisioned Calico Cloud and a sample app environment.

The workshop will guide you in implementing:

  • Kubernetes Security Posture Management (KSPM)
  • Security policies for compliance
  • Evidence and audit reporting

We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.

Register now to reserve your spot!

  •  Regis Martins

Event Partner: 

Attend this in-depth, hands-on security workshop with Calico and Microsoft Azure experts to get insights into Kubernetes cluster traffic, workload interactions, and security policy enforcement. The 90-minute interactive lab comes with your own provisioned Calico Cloud environment and a sample application.

This workshop is designed to provide hands-on experience for you to:

  • View service-to-service communication to assess security risk from network-based threats
  • Get alerts for malware present in workloads
  • Quarantine workloads to prevent the lateral movement of the threat
  • Detect and prevent anomalous behaviors such as attempts to access restricted URLs
  • Build and enforce security policy to stop command and control attack

We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.

Register now to reserve your spot!

  •  Jeremy Guerrand

Event Partner: 

In this AKS-focused security workshop, you will work with Microsoft Azure and Calico experts to learn how to detect and manage vulnerabilities and mitigate risks in AKS. The 90-minute interactive lab comes with your own provisioned Calico Cloud environment and is designed to help:

  • Scan container images for common vulnerabilities and exposures (CVEs)
  • Build and enforce security policies to block the deployment of vulnerable images
  • Visualize vulnerable workloads and deploy security policies to mitigate exposure risks

We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.

Register now to reserve your spot!

Event Partner: 

Attend this in-depth, hands-on, EKS-focused security workshop with AWS and Calico experts to learn how to protect containers in your Kubernetes cluster from known and zero-day threats based container and network attacks running on EKS. The 90-minute interactive lab comes with your own provisioned Calico Cloud environment and a sample application.

You will leave this workshop with hands-on experience on how to:

  • Visualize security posture of your Kubernetes cluster
  • Preview and customize security guardrails for network-based threats
  • Configure IDS/IPS, workload-centric WAF, and DDoS protection
  • Detect zero-day attacks based on suspicious container activity using syscalls, file access, and process information
  • Preview and enforce security policies to quarantine infected workloads

We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.

Register now to reserve your spot!

  •  Chris Man

Event Partner: 

Attend this in-depth, hands-on, EKS-focused security workshop with AWS and Calico experts to learn how to prevent, detect, and mitigate threats in containers running on EKS. The 90-minute interactive lab comes with your own provisioned Calico Cloud environment and a sample application.

You will leave this workshop with hands-on experience on how to:

  • Scan container images and block deployment of vulnerable images
  • Preview and enforce security policies to protect vulnerable workloads
  • Implement workload access controls to secure egress and lateral movement during runtime

We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.

Register now to reserve your spot!

Event Partner: 

In this AKS-focused security workshop, you will work with Calico and Microsoft Azure experts to learn how to implement zero-trust security for workloads to reduce the attack surface of applications running on AKS. This 90-minute hands-on lab comes with your own Calico Cloud environment and a sample app environment.

The workshop will guide you in implementing:

  • Deploy zero-trust workload access controls (including DNS as policy and egress gateway)
  • Block lateral movement of APTs with identity-aware microsegmentation
  • Secure communication with workload based-WAF at application layer

We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.

Register now to reserve your spot!

  •  Anantha Kasetty

Event Partner: