Tigera Events

Hands-on workshop: Cyber Threat Protection Strategies & Tactics for Kubernetes

Topics:

Security
Americas
September 30, 2021
10:00 am PDT

Explore Tigera Events

  • AVAILABILITY

  • CATEGORY

  • REGION

  • TOPIC

In this EKS-focused workshop for Kubernetes security and observability by AWS and Tigera, you will work with a Calico and AWS expert to learn how to design, deploy, and observe security and networking policies in an EKS environment. This 90-minute hands-on lab with your own provisioned Calico Cloud environment is designed to provide more complete knowledge on how to implement:

– Access controls
– DNS policy
– Dynamic Service Graph
– Compliance and reporting
– Observability and troubleshooting

You will come away from this workshop with an understanding of how others in your industry are doing Kubernetes security and observability in AWS EKS, and with best practices that you can implement in your own organization.

We have limited the number of participants for this workshop to ensure adequate attention can be given to each participant.

Register now to reserve your spot!

    A deep-dive interactive workshop with a Calico expert who will help you to design your next step in Kubernetes security. This 90-minute hands-on lab with your own provisioned Calico Cloud environment is designed to provide more complete knowledge on how to implement:

    • Egress access controls
    • DNS policies
    • Dynamic Service Graph
    • Logging
    • Compliance

    You will come away from this workshop with an understanding of how others in your industry are doing Kubernetes security and observability in AWS, Azure, GCP, and private cloud environments, and with best practices that you can implement in your own organization.”

    We have limited the number of participants for this workshop to ensure adequate attention can be given to each participant.

    Register now to reserve your spot!

      With the growth in the Kubernetes environment, teams grapple with various networking, security, and troubleshooting challenges.
      For example:

      • Networking
      • Network encapsulation or routable IPs
      • Prevent IP exhaustion
      • Security-as-policy and data-in-transit encryption
      • Security
      • Workload access controls
      • Cluster-based vs node-based vs pod-based
      • Micro-segmentation
      • Build threat detection and prevention
      • IP address and domain name threat feeds
      • DNS-based attacks and defense
      • Troubleshooting
      • Live visualization with Dynamic Service Graph
      • In-line data aggregation and correlation
      • Dynamic Packet Capture

      JoinIn this webinar, to learn the high-level container and Kubernetes networking decision tradeoffs, and best practices for securing, monitoring and troubleshooting your cloud environment derived from the feedback of hundreds of Calico users.

        In this enterprise compliance focussed workshop for Kubernetes, you will work with a Calico subject matter expert to learn how to design, deploy, and observe security and networking policies to ensure compliance in your Kubernetes environment. This 90-minute hands-on lab with your own provisioned Calico Cloud environment is designed to provide more complete knowledge on how to implement:

        – Migrate and apply PCI, SOC2 compliance policies
        – Microsegmentation to prevent lateral movement
        – Intrusion detection & prevention tactics
        – Generate and leverage audit reports showing security rules in place, and demonstrate proof of compliance
        – pre-defined compliance report formats and custom reports to streamline compliance program

        You will come away from this workshop with an understanding of how others in your industry are doing enterprise security and compliance in Kubernetes environment such as AWS EKS, Microsoft AKS, Rancher, Openshift, on-premises or in public cloud.
        We have limited the number of participants for this workshop to ensure adequate attention can be given to each participant.

        Register now to reserve your spot!

          Due to the ephemeral, dynamic and highly distributed nature of Kubernetes deployments, they are vulnerable to cyber attacks. In this interactive workshop a Kubernetes security expert will help you design how to protect Kubernetes environments from cyber threats. This 90-minute hands-on lab with your own provisioned Calico Cloud environment is designed to provide more complete knowledge on how to implement:

          -Egress access controls & DNS policies to prevent unauthorized access
          -Microsegmentation to prevent lateral movement of cyber threats
          -Intrusion detection & prevention tactics

            In this enterprise compliance focussed workshop for Kubernetes, you will work with a Calico subject matter expert to learn how to design, deploy, and observe security and networking policies to ensure compliance in your Kubernetes environment. This 90-minute hands-on lab with your own provisioned Calico Cloud environment is designed to provide more complete knowledge on how to implement:

            – Migrate and apply PCI, SOC2 compliance policies
            – Microsegmentation to prevent lateral movement
            – Intrusion detection & prevention tactics
            – Generate and leverage audit reports showing security rules in place, and demonstrate proof of compliance
            – pre-defined compliance report formats and custom reports to streamline compliance program

            You will come away from this workshop with an understanding of how others in your industry are doing enterprise security and compliance in Kubernetes environment such as AWS EKS, Microsoft AKS, Rancher, Openshift, on-premises or in public cloud.
            We have limited the number of participants for this workshop to ensure adequate attention can be given to each participant.

            Register now to reserve your spot!

              Due to the ephemeral, dynamic and highly distributed nature of Kubernetes deployments, they are vulnerable to cyber attacks. In this interactive workshop a Kubernetes security expert will help you design how to protect Kubernetes environments from cyber threats. This 90-minute hands-on lab with your own provisioned Calico Cloud environment is designed to provide more complete knowledge on how to implement:

              -Egress access controls & DNS policies to prevent unauthorized access
              -Microsegmentation to prevent lateral movement of cyber threats
              -Intrusion detection & prevention tactics

                In this EKS-focused workshop for Kubernetes security and observability by AWS and Tigera, you will work with a Calico and AWS expert to learn how to design, deploy, and observe security and networking policies in an EKS environment. This 90-minute hands-on lab with your own provisioned Calico Cloud environment is designed to provide more complete knowledge on how to implement:

                – Access controls
                – DNS policy
                – Dynamic Service Graph
                – Compliance and reporting
                – Observability and troubleshooting

                You will come away from this workshop with an understanding of how others in your industry are doing Kubernetes security and observability in AWS EKS, and with best practices that you can implement in your own organization.

                We have limited the number of participants for this workshop to ensure adequate attention can be given to each participant.

                Register now to reserve your spot!

                  SOC 2 compliance is a component of the American Institute of CPAs (AICPA)’s Service Organization Control reporting platform, whose goal is to ensure that systems are enabled to support the five trust service principles: security, availability, processing integrity, confidentiality, and privacy of customer data. The SOC 2 auditing procedure is specifically designed for service providers storing customer data in the cloud. That means SOC 2 applies to nearly every SaaS company, as well as any organization that uses the cloud to store its customers’ information. For security-conscious businesses handling sensitive customer data, SOC 2 compliance is a minimal requirement when considering a SaaS provider.

                  Whether you are using hosts, VMs, containers or Kubernetes, Calico Enterprise and Calico Cloud can help you achieve granular visibility into your SaaS and cloud environments, address security risks and meet SOC 2 audit requirements.

                  In this webinar you will learn:

                  – How to establish data management policies and procedures that are based on the five SOC 2 trust service principles
                  – How to implement audit and reporting capabilities to meet compliance requirements
                  – How to demonstrate security control over the systems and operations associated with your SaaS and cloud environments

                    In this EKS-focused workshop for Kubernetes security and observability, you will work with a Calico and AWS expert to learn how to design, deploy, and observe security and networking policies in an EKS environment. This 90-minute hands-on lab with your own provisioned Calico Cloud environment is designed to provide more complete knowledge on how to implement:

                    – Access controls
                    – DNS policy
                    – Dynamic Service Graph
                    – Compliance and reporting
                    – Observability and troubleshooting

                    You will come away from this workshop with an understanding of how others in your industry are doing Kubernetes security and observability in AWS EKS, and with best practices that you can implement in your own organization.

                    We have limited the number of participants for this workshop to ensure adequate attention can be given to each participant.

                    Register now to reserve your spot!