Virtual Event
November 17–November 20, 2020
Learn More and Register to Attend This Event

The Sched app allows you to build your schedule but is not a substitute for your event registration. You must be registered for KubeCon + CloudNativeCon North America 2020 - Virtual to participate in the sessions. If you have not registered but would like to join us, please go to the event registration page to purchase a registration.

Please note: This schedule is automatically displayed in Eastern Standard Time (UTC–05:00). To see the schedule in your preferred timezone, please select from the drop-down menu to the right, above "Filter by Date." The schedule is subject to change.
Back To Schedule
Tuesday, November 17 • 1:00pm - Friday, November 20 • 7:00pm
Five Hundred Twenty-five Thousand Six Hundred K8s CLI’s - Phillip Wittrock & Gabbi Fisher, Apple

Sign up or log in to save this to your schedule, view media, leave feedback and see who's attending!

Feedback form is now closed.

By accessing this sponsored session, the third party sponsor will receive some of your registration data. This data includes your First Name, Last Name, Title, Company, Address, Email, Standard Demographics Questions (I.e. Company Size, Job Function, Industry), and details about the sponsored content you interacted with. If you choose to access sponsored sessions, you are explicitly consenting to receipt and use of such data by the third-party recipients, which will be subject to their own privacy policies.

This is an on-demand session and will be available for the duration of the event.

Malicious actors are moving as quickly as development teams to exploit weaknesses in cloud native applications. Far too often we see common vulnerabilities and misconfigurations as the culprit of the latest security incident. Securing critical cloud native applications requires the ability to identify the root causes of these risks and the speed to mitigate them pre-production. In this talk we will cover the processes needed to stay ahead of the bad actors and tools needed to inject security throughout the development lifecycle.

1. How security and development teams can succeed together
2. Purpose built security tools that embed security checks directly into familiar DevOps tooling
3. The scanning of IaC templates, K8's manifests and container images in the CI/CD pipeline
4. Enforce zero trust posture and runtime security


Vinay Venkataraghavan

Technical Director, Office of the CTO, Palo Alto Networks

Tuesday November 17, 2020 1:00pm - Friday November 20, 2020 7:00pm EST
Intrado Virtual Event Platform