Interested? We have you covered! This popular session will also be overflowed in The Session Viewing Point, West Level 2 Room 2004.
  1. West 2004 Screen 1

As Kubernetes grows in popularity, the sophistication of attackers will improve, and security by obscurity will no longer be sufficient. What could an attacker who understands Kubernetes at a deep level be capable of? Let’s explore the dark corners of clusters and shine a light on several new advanced attacks on Kubernetes, and learn how to detect and prevent them using practical, proven methods.

Pre-Requisites: Familiarity with Linux and networking fundamentals, containers and Kubernetes.

Download pdf
Participants: