Events & Webinars

  • Inside a Docker Cryptojacking Exploit

    Inside a Docker Cryptojacking Exploit

    1:00 PM ET • November 15, 2018

    Read Article
  • AWS re:Invent

    AWS re:Invent

    Las Vegas, NV • November 26 - 30, 2018

    Read Article
  • How to Spend Your Security Budget in a DevOps World22:06

    How to Spend Your Security Budget in a DevOps World

    Learn how to build a scalable, cloud-based security program that fits your organization's budget

    Watch Video
  • Container Security: Taking a Layered Approach to Infrastructure Security47:57

    Container Security: Taking a Layered Approach to Infrastructure Security

    Learn how to take a holistic approach to securing each layer of cloud infrastructure while discussing recent trends and container primitives

    Watch Video
  • Cloud Native DevOps: Securing Modern Applications1:00:49

    Cloud Native DevOps: Securing Modern Applications

    Threat Stack's Todd Morenau sits down with the authors of the new O’Reilly Media book “Cloud Native DevOps with Kubernetes: Building Deploying and Scaling Modern applications in the cloud".

    Watch Video
  • Inside an Enterprise Breach on a Public Cloud Environment45:39

    Inside an Enterprise Breach on a Public Cloud Environment

    Threat Stack CSO walks through the steps of a recent public cloud breach while discussing trends in the rising sophistication of malicious actors and how to monitor your own infrastructure.

    Watch Video
  • Draft and Develop: A Solution to the Cyber Security Skills Shortage30:30

    Draft and Develop: A Solution to the Cyber Security Skills Shortage

    Learn how Outreach CISO developed an apprenticeship program to draft and develop security talent internally

    Watch Video
  • Manage Decades of Technical Debt More Effectively42:13

    Manage Decades of Technical Debt More Effectively

    Watch Video
  • Visualizing Detection and Remediation in the Cloud57:00

    Visualizing Detection and Remediation in the Cloud

    Threat Stack CSO and Graylog CTO discuss how to manage data logs across internal apps and third party vendors and how to analyze risk trends overtime using Threat Stack and Graylog

    Watch Video
  • Who Watches the Watchers: How a Security Company Does Security47:35

    Who Watches the Watchers: How a Security Company Does Security

    How does a security company do security? Learn how Threat Stack automates security into day-to-day processes - making the our organization simultaneously more secure and efficient.

    Watch Video
  • Cyber Attack Simulation: A Crypto Crime in Action24:59

    Cyber Attack Simulation: A Crypto Crime in Action

    See first-hand how hackers bypass security controls and execute a crypto mining attack. Then watch how a security engineer is able to quickly identify the attack before it becomes a breach.

    Watch Video
  • How Sigstr Wins Business through Security48:15

    How Sigstr Wins Business through Security

    Learn how Sigstr builds customer trust and wins business through security with AWS and Threat Stack

    Watch Video
  • How to Build and Mature a SecOps Program in the Cloud39:10

    How to Build and Mature a SecOps Program in the Cloud

    Watch this video for practical advice to help you build and mature a cloud secops program for your organization.

    Watch Video
  • Pick Any Three: Good, Fast, or Safe. DevOps from Scratch39:52

    Pick Any Three: Good, Fast, or Safe. DevOps from Scratch

    Good, fast, or safe? DevOps means you don't have to choose. Threat Stack's Head of Ops, Pete Cheslock, gives advice on turning ideas into reality while maintaining quality & security through DevOps

    Watch Video
  • How to Achieve Type 2 SOC 2 with Zero Exceptions45:08

    How to Achieve Type 2 SOC 2 with Zero Exceptions

    Do you have the chops needed to pass Type 2 SOC 2 with zero exceptions? Watch this video for advice from our Head of Ops and Sr. Infrastructure Security Engineer who recently went through the process.

    Watch Video
  • 52% of Companies Sacrifice Cybersecurity for Speed45:54

    52% of Companies Sacrifice Cybersecurity for Speed

    Recent Threat Stack survey finds that over 50% of companies cut back on security to meet a business objective. Watch this webinar to learn about the misalignment and how you can overcome the obstacles

    Watch Video
  • T-72 Hours to Report a Breach: Are you GDPR Ready?43:57

    T-72 Hours to Report a Breach: Are you GDPR Ready?

    GDPR deadlines are fast approaching and many US companies are behind the curve. Watch this video to learn how you can take a practical, manageable, and cost-effective approach to dealing with GDPR.

    Watch Video
  • Strategies for Monitoring and Measuring in the Cloud1:00:42

    Strategies for Monitoring and Measuring in the Cloud

    Watch this video to learn how to evaluate and measure security in the cloud, and how you can work with service providers to improve it.

    Watch Video
  • 5 Security Questions Your SaaS Business Should be Prepared to Answer in 201848:42

    5 Security Questions Your SaaS Business Should be Prepared to Answer in 2018

    Watch this on-demand webinar to learn from Threat Stack's CSO, Sam Bisbee, about the top security concerns of 2018 and how you can create an actionable plan to address them.

    Watch Video
  • Lean Cloud Security41:35

    Lean Cloud Security

    Check out this video to learn how Allocadia's CISO utilizes a lean security strategy by automating processes and selecting the right tools for his security stack.

    Watch Video
  • loading