mlns='http://www.w3.org/1999/xhtml'>

Join us December 14 at 11AM PST for the free Black Hat Webinar
 
Black Hat Webinar | Register Now
PLEASE JOIN US FOR THE NEXT INSTALLMENT IN THE BLACK HAT WEBINAR SERIES
Wednesday, December 14, 2022 | 11:00 AM PST
In this hacking session, we’ll exploit an application as an attacker would to showcase some of the most common container vulnerabilities and how they expose your container application to a malicious actor. We’ll then show you clear remediation actions and best practices for each attack scenario. We'll also demonstrate how you can protect your application by automatically detecting container image vulnerabilities in registries like Amazon ECR and monitor Amazon EKS clusters for new vulnerabilities after deployment.


  • Some of the most commonly known exploits in container application
  • How best to plug vulnerability scanning into a container delivery pipeline
  • How to efficiently remediate vulnerabilities and misconfigurations in container workload
  • How to continuously monitor manifests for newly discovered vulnerabilities
Sponsored By:
snyk
Webinar Presenters
Speaker
David Schott
Lead Partner Solutions
Snyk
Speaker
Terry Sweeney
Moderator
Black Hat

Terry Sweeney is a Los Angeles-based writer and editor who's covered business technology for three decades. He's written about cyber security for more than 15 years and was one of the founding editors of Dark Reading. View Full Bio Here