Attacking and Defending Containers – Part 1

May 8, 2020

Join us on an investigative journey to explore the containerization and the perspective of IT professionals who embraced the containerization as part of the digital transformation. You’ll look at the synopsis of business challenges around the containers. Further, we will delve into popular attack vectors that have been used to breach a container-based environment with the demonstration and discuss a high-level checklist from a security context to overcome the challenges.

We will explore these topics:

  • Why organizations choose to use containers
  • Common security challenges when deploying containers
  • Popular attack scenarios affecting your container ecosystem
Previous Article
The Intersection of Software Development and Privacy
The Intersection of Software Development and Privacy

June 11th, Thursday; 11 a.m. to 12 p.m. (EST)

Next Flipbook
Role-Based Training (SSP Suites) from Security Compass and (ISC)2
Role-Based Training (SSP Suites) from Security Compass and (ISC)2

Find out how our solution builds security and compliance into software.

Get a Free Demo