Webinars

Listen in on one of our many Webinars, covering a variety of Security Topics and featuring top Cloud Experts.

  • An Inside Look at Security and Compliance at a Hypergrowth Startup50:50

    An Inside Look at Security and Compliance at a Hypergrowth Startup

    Learn how the the Omada Health security team passes SOC 2, HIPAA, HITRUST with less than a 5 person security team

    Watch Video
  • Get Access to Threat Stack's Cloud Security Platform

    Start Trial
  • Automated Activity or Insider Threat: Can you Tell the Difference?20:58

    Automated Activity or Insider Threat: Can you Tell the Difference?

    Learn how to investigate incidents involving automation tools and how you can best prepare your security team for the increased usage of automation tools that include web-based SSH features

    Watch Video
  • Attack Simulation: Docker Application28:45

    Attack Simulation: Docker Application

    Watch now to learn about microservices application design and the unique security concerns associated with this abstracted infrastructure

    Watch Video
  • Designing a Secure Microservices Architecture59:26

    Designing a Secure Microservices Architecture

    Watch now to learn about microservices application design and the unique security concerns associated with this abstracted infrastructure

    Watch Video
  • Attack Simulation: Deconstructing an Attack in a Containerized Application30:20

    Attack Simulation: Deconstructing an Attack in a Containerized Application

    Learn how a full-stack attack in a containerized application unfolds from the app layer, EC2 layer, to the cloud management console.

    Watch Video
  • Inside a Docker Cryptojacking Exploit21:46

    Inside a Docker Cryptojacking Exploit

    Watch Video
  • SANS Webinar: Real World Challenges for PCI Compliant Containers59:07

    SANS Webinar: Real World Challenges for PCI Compliant Containers

    Hear how the Lola.com team built a highly elastic and scalable infrastructure without worrying about underlying dependencies all while maintaining PCI compliance.

    Watch Video
  • How Cloud-Native has Changed Application Security55:11

    How Cloud-Native has Changed Application Security

    <p>Organizations are rapidly shifting to cloud-native environments to capitalize on speed, agility, and scale – in fact, a recent ESG survey finds that 46% of organizations have more complex infrastru

    Watch Video
  • SANS Webinar: Securing Microservices in Containerized Environments1:02:20

    SANS Webinar: Securing Microservices in Containerized Environments

    SANS expert Jake Williams and Threat Stack VP of Application Security Products break down the complexities of securing microservices in containerized cloud environments

    Watch Video
  • How SailPoint Secures Containerized Infrastructure on AWS Cloud36:01

    How SailPoint Secures Containerized Infrastructure on AWS Cloud

    Learn how SailPoint Technologies leverages Threat Stack to secure containerized infrastructure on AWS Cloud

    Watch Video
  • Inside an Active Shellbot Cryptomining Malware Campaign23:00

    Inside an Active Shellbot Cryptomining Malware Campaign

    Threat Stack SOC Analyst walks through the details of the newly discovered cryptomining campaign, including the malware components, actual observed attack path, and future investigations

    Watch Video
  • Get Access to Threat Stack's Cloud Security Platform

    Start Trial
  • Architecting and Securing Cloud Infrastructure52:35

    Architecting and Securing Cloud Infrastructure

    451 Analyst and Threat Stack VP of Product help organizations understand exactly what they are getting from their security provider and how to take ownership of their own security responsibility

    Watch Video
  • Anatomy of a Build Server Attack38:47

    Anatomy of a Build Server Attack

    Threat Stack VP of Product, Chris Ford, will walk through the impact of a build system breach and highlight how the attacker leveraged a build server to wage an insidious attack

    Watch Video
  • How to Achieve SOC 2 Compliance in a Containerized  Environment58:50

    How to Achieve SOC 2 Compliance in a Containerized Environment

    Watch now to learn more about the complexities of SOC 2 compliance with specific use cases for Docker containers

    Watch Video
  • Securing Microservices in a Containerized Environment58:16

    Securing Microservices in a Containerized Environment

    Threat Stack's VP of AppSec Products explains how to secure microservices in a containerized environment.

    Watch Video
  • Deploying Compliant Kubernetes52:25

    Deploying Compliant Kubernetes

    Learn how to deploy compliant Kubernetes clusters while maintaining PCI DSS requirements.

    Watch Video
  • AWS Security: Visualizing Security Data in 201935:26

    AWS Security: Visualizing Security Data in 2019

    Security Architect Chris Murdock from Conga discusses data visualization in AWS for your next-get infrastructure.

    Watch Video
  • Inside a Docker Cryptojacking Exploit22:57

    Inside a Docker Cryptojacking Exploit

    Threat Stack's Ethan Hansen will discuss recently observed Docker exploit attempts from the field, where attackers were looking for web applications vulnerable to command injection

    Watch Video
  • How to Spend Your Security Budget in a DevOps World22:06

    How to Spend Your Security Budget in a DevOps World

    Learn how to build a scalable, cloud-based security program that fits your organization's budget

    Watch Video
  • Container Security: Taking a Layered Approach to Infrastructure Security47:57

    Container Security: Taking a Layered Approach to Infrastructure Security

    Learn how to take a holistic approach to securing each layer of cloud infrastructure while discussing recent trends and container primitives

    Watch Video
  • loading
    Loading More...