Demystifying Kubernetes Vulnerabilities Layer by Layer and How it Relates to Your Risk Management Program

Webinar Registration

Containerizing applications has grown in popularity over the years, making Kubernetes a core part of an organization’s critical workloads. Because these containerized applications are Internet-facing, contain access to critical data, or both, they become targets of cyberattacks.  And it’s not just the container itself; the target can be Kubernetes, Docker, Linux, or even cloud services hosting the environment.

What’s missing is visibility into each layer of your Kubernetes clusters and the applications they host; from misconfigurations to needed patches, to the container code itself – without visibility into where your risks are, it’s impossible to form a mitigation and/or remediation plan.

To add to the problem, containerizing applications and using cloud hosting completely changes who is responsible for security response when vulnerabilities are found, increasing the challenge of ensuring Kubernetes and everything it manages remains secure.

In this real-training-for-free session, Microsoft MVP and cybersecurity expert Nick Cavalancia takes my seat in this webcast, and will first discuss:

  • Why Kubernetes is a target
  • Some of the recent vulnerabilities
  • Why Kubernetes needs to be a part of an overall vulnerability risk management program

Nick will then be joined by Dane Grace, Technical Product Manager, Vulnerability Risk Management at Rapid7 who will discuss:

  • The layers within your Kubernetes environment that can be exposed
  • The vulnerabilities that exist at each layer
  • Techniques used to take advantage of these vulnerabilities
  • Methods of remediation

Then Justin Moss, Security Solutions Engineer at Rapid7, will be giving a live demo of Rapid7’s VRM solutions.

This real training for free event will be jam packed with technical detail and real-world application. Register today!

First Name:   
Last Name:   
Work Email:  
Job Title:  

Your information will be shared with the sponsor.

By clicking "Submit", you're agreeing to our Privacy Policy and consenting to be contacted by us and the sponsor.



Additional Resources