Security Webinars

This Stream includes all Threat Stack webinars

  • SANS Webinar: Securing Microservices in Containerized Environments1:02:20

    SANS Webinar: Securing Microservices in Containerized Environments

    SANS expert Jake Williams and Threat Stack VP of Application Security Products break down the complexities of securing microservices in containerized cloud environments

    Watch Video
  • How SailPoint Secures Containerized Infrastructure on AWS Cloud36:01

    How SailPoint Secures Containerized Infrastructure on AWS Cloud

    Learn how SailPoint Technologies leverages Threat Stack to secure containerized infrastructure on AWS Cloud

    Watch Video
  • Request a Demo of Threat Stack's Cloud Security Platform

    Get in Touch
  • Inside an Active Shellbot Cryptomining Malware Campaign23:00

    Inside an Active Shellbot Cryptomining Malware Campaign

    Threat Stack SOC Analyst walks through the details of the newly discovered cryptomining campaign, including the malware components, actual observed attack path, and future investigations

    Watch Video
  • Architecting and Securing Cloud Infrastructure52:35

    Architecting and Securing Cloud Infrastructure

    451 Analyst and Threat Stack VP of Product help organizations understand exactly what they are getting from their security provider and how to take ownership of their own security responsibility

    Watch Video
  • Anatomy of a Build Server Attack38:47

    Anatomy of a Build Server Attack

    Threat Stack VP of Product, Chris Ford, will walk through the impact of a build system breach and highlight how the attacker leveraged a build server to wage an insidious attack

    Watch Video
  • How to Achieve SOC 2 Compliance in a Containerized  Environment58:50

    How to Achieve SOC 2 Compliance in a Containerized Environment

    Watch now to learn more about the complexities of SOC 2 compliance with specific use cases for Docker containers

    Watch Video
  • Securing Microservices in a Containerized Environment58:16

    Securing Microservices in a Containerized Environment

    Threat Stack's VP of AppSec Products explains how to secure microservices in a containerized environment.

    Watch Video
  • Deploying Compliant Kubernetes52:25

    Deploying Compliant Kubernetes

    Learn how to deploy compliant Kubernetes clusters while maintaining PCI DSS requirements.

    Watch Video
  • AWS Security: Visualizing Security Data in 201935:26

    AWS Security: Visualizing Security Data in 2019

    Security Architect Chris Murdock from Conga discusses data visualization in AWS for your next-get infrastructure.

    Watch Video
  • Inside a Docker Cryptojacking Exploit22:57

    Inside a Docker Cryptojacking Exploit

    Threat Stack's Ethan Hansen will discuss recently observed Docker exploit attempts from the field, where attackers were looking for web applications vulnerable to command injection

    Watch Video
  • How to Spend Your Security Budget in a DevOps World22:06

    How to Spend Your Security Budget in a DevOps World

    Learn how to build a scalable, cloud-based security program that fits your organization's budget

    Watch Video
  • Container Security: Taking a Layered Approach to Infrastructure Security47:57

    Container Security: Taking a Layered Approach to Infrastructure Security

    Learn how to take a holistic approach to securing each layer of cloud infrastructure while discussing recent trends and container primitives

    Watch Video
  • Security and DevOps with Kubernetes1:00:49

    Security and DevOps with Kubernetes

    Threat Stack's Todd Morenau sits down with the authors of the new O’Reilly Media book “Cloud Native DevOps with Kubernetes: Building Deploying and Scaling Modern applications in the cloud".

    Watch Video
  • Inside an Enterprise Breach on a Public Cloud Environment45:39

    Inside an Enterprise Breach on a Public Cloud Environment

    Threat Stack CSO walks through the steps of a recent public cloud breach while discussing trends in the rising sophistication of malicious actors and how to monitor your own infrastructure.

    Watch Video
  • Draft and Develop: A Solution to the Cyber Security Skills Shortage30:30

    Draft and Develop: A Solution to the Cyber Security Skills Shortage

    Learn how Outreach CISO developed an apprenticeship program to draft and develop security talent internally

    Watch Video
  • Manage Decades of Technical Debt More Effectively42:13

    Manage Decades of Technical Debt More Effectively

    Watch Video
  • Visualizing Detection and Remediation in the Cloud57:00

    Visualizing Detection and Remediation in the Cloud

    Threat Stack CSO and Graylog CTO discuss how to manage data logs across internal apps and third party vendors and how to analyze risk trends overtime using Threat Stack and Graylog

    Watch Video
  • How a Security Company Does Security47:35

    How a Security Company Does Security

    How does a security company do security? Learn how Threat Stack automates security into day-to-day processes - making the our organization simultaneously more secure and efficient.

    Watch Video
  • Cyber Attack Simulation: A Crypto Crime in Action24:59

    Cyber Attack Simulation: A Crypto Crime in Action

    See first-hand how hackers bypass security controls and execute a crypto mining attack. Then watch how a security engineer is able to quickly identify the attack before it becomes a breach.

    Watch Video
  • How Sigstr Wins Business through Security48:15

    How Sigstr Wins Business through Security

    Learn how Sigstr builds customer trust and wins business through security with AWS and Threat Stack

    Watch Video
  • loading
    Loading More...