Webinars

Listen in on one of our many Webinars, covering a variety of Security Topics and featuring top Cloud Experts.

  • SANS Webinar: Real World Challenges for PCI Compliant Containers59:07

    SANS Webinar: Real World Challenges for PCI Compliant Containers

    Hear how the Lola.com team built a highly elastic and scalable infrastructure without worrying about underlying dependencies all while maintaining PCI compliance.

    Watch Video
  • Get Access to Threat Stack's Cloud Security Platform

    Start Trial
  • How Cloud-Native has Changed Application Security55:11

    How Cloud-Native has Changed Application Security

    <p>Organizations are rapidly shifting to cloud-native environments to capitalize on speed, agility, and scale – in fact, a recent ESG survey finds that 46% of organizations have more complex infrastru

    Watch Video
  • SANS Webinar: Securing Microservices in Containerized Environments1:02:20

    SANS Webinar: Securing Microservices in Containerized Environments

    SANS expert Jake Williams and Threat Stack VP of Application Security Products break down the complexities of securing microservices in containerized cloud environments

    Watch Video
  • How SailPoint Secures Containerized Infrastructure on AWS Cloud36:01

    How SailPoint Secures Containerized Infrastructure on AWS Cloud

    Learn how SailPoint Technologies leverages Threat Stack to secure containerized infrastructure on AWS Cloud

    Watch Video
  • Inside an Active Shellbot Cryptomining Malware Campaign23:00

    Inside an Active Shellbot Cryptomining Malware Campaign

    Threat Stack SOC Analyst walks through the details of the newly discovered cryptomining campaign, including the malware components, actual observed attack path, and future investigations

    Watch Video
  • Architecting and Securing Cloud Infrastructure52:35

    Architecting and Securing Cloud Infrastructure

    451 Analyst and Threat Stack VP of Product help organizations understand exactly what they are getting from their security provider and how to take ownership of their own security responsibility

    Watch Video
  • Anatomy of a Build Server Attack38:47

    Anatomy of a Build Server Attack

    Threat Stack VP of Product, Chris Ford, will walk through the impact of a build system breach and highlight how the attacker leveraged a build server to wage an insidious attack

    Watch Video
  • How to Achieve SOC 2 Compliance in a Containerized  Environment58:50

    How to Achieve SOC 2 Compliance in a Containerized Environment

    Watch now to learn more about the complexities of SOC 2 compliance with specific use cases for Docker containers

    Watch Video
  • Securing Microservices in a Containerized Environment58:16

    Securing Microservices in a Containerized Environment

    Threat Stack's VP of AppSec Products explains how to secure microservices in a containerized environment.

    Watch Video
  • Deploying Compliant Kubernetes52:25

    Deploying Compliant Kubernetes

    Learn how to deploy compliant Kubernetes clusters while maintaining PCI DSS requirements.

    Watch Video
  • AWS Security: Visualizing Security Data in 201935:26

    AWS Security: Visualizing Security Data in 2019

    Security Architect Chris Murdock from Conga discusses data visualization in AWS for your next-get infrastructure.

    Watch Video
  • Get Access to Threat Stack's Cloud Security Platform

    Start Trial
  • Inside a Docker Cryptojacking Exploit22:57

    Inside a Docker Cryptojacking Exploit

    Threat Stack's Ethan Hansen will discuss recently observed Docker exploit attempts from the field, where attackers were looking for web applications vulnerable to command injection

    Watch Video
  • How to Spend Your Security Budget in a DevOps World22:06

    How to Spend Your Security Budget in a DevOps World

    Learn how to build a scalable, cloud-based security program that fits your organization's budget

    Watch Video
  • Container Security: Taking a Layered Approach to Infrastructure Security47:57

    Container Security: Taking a Layered Approach to Infrastructure Security

    Learn how to take a holistic approach to securing each layer of cloud infrastructure while discussing recent trends and container primitives

    Watch Video
  • Security and DevOps with Kubernetes1:00:49

    Security and DevOps with Kubernetes

    Threat Stack's Todd Morenau sits down with the authors of the new O’Reilly Media book “Cloud Native DevOps with Kubernetes: Building Deploying and Scaling Modern applications in the cloud".

    Watch Video
  • Inside an Enterprise Breach on a Public Cloud Environment45:39

    Inside an Enterprise Breach on a Public Cloud Environment

    Threat Stack CSO walks through the steps of a recent public cloud breach while discussing trends in the rising sophistication of malicious actors and how to monitor your own infrastructure.

    Watch Video
  • Draft and Develop: A Solution to the Cyber Security Skills Shortage30:30

    Draft and Develop: A Solution to the Cyber Security Skills Shortage

    Learn how Outreach CISO developed an apprenticeship program to draft and develop security talent internally

    Watch Video
  • Manage Decades of Technical Debt More Effectively42:13

    Manage Decades of Technical Debt More Effectively

    Watch Video
  • Visualizing Detection and Remediation in the Cloud57:00

    Visualizing Detection and Remediation in the Cloud

    Threat Stack CSO and Graylog CTO discuss how to manage data logs across internal apps and third party vendors and how to analyze risk trends overtime using Threat Stack and Graylog

    Watch Video
  • How a Security Company Does Security47:35

    How a Security Company Does Security

    How does a security company do security? Learn how Threat Stack automates security into day-to-day processes - making the our organization simultaneously more secure and efficient.

    Watch Video
  • loading
    Loading More...