The Sched app allows you to build your schedule but is not a substitute for your event registration. You must be registered for KubeCon + CloudNativeCon North America 2020 - Virtual to participate in the sessions. If you have not registered but would like to join us, please go to the event registration page to purchase a registration.
Please note: This schedule is automatically displayed in Eastern Standard Time (UTC–05:00). To see the schedule in your preferred timezone, please select from the drop-down menu to the right, above "Filter by Date." The schedule is subject to change.
By accessing this sponsored session, the third party sponsor will receive some of your registration data. This data includes your First Name, Last Name, Title, Company, Address, Email, Standard Demographics Questions (I.e. Company Size, Job Function, Industry), and details about the sponsored content you interacted with. If you choose to access sponsored sessions, you are explicitly consenting to receipt and use of such data by the third-party recipients, which will be subject to their own privacy policies.
This is an on-demand session and will be available for the duration of the event.
Malicious actors are moving as quickly as development teams to exploit weaknesses in cloud native applications. Far too often we see common vulnerabilities and misconfigurations as the culprit of the latest security incident. Securing critical cloud native applications requires the ability to identify the root causes of these risks and the speed to mitigate them pre-production. In this talk we will cover the processes needed to stay ahead of the bad actors and tools needed to inject security throughout the development lifecycle.
1. How security and development teams can succeed together 2. Purpose built security tools that embed security checks directly into familiar DevOps tooling 3. The scanning of IaC templates, K8's manifests and container images in the CI/CD pipeline 4. Enforce zero trust posture and runtime security