SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Virtual
*Sponsored by Sweet Security
Virtual
Kubernetes is powerful but notoriously difficult to secure with point tools alone. Misconfigurations, workload vulnerabilities, excessive permissions, and runtime threats often span multiple layers, making it easy for risks to hide in plain sight. This webinar explains how a Cloud-Native Application Protection Platform (CNAPP) unifies visibility and security across clusters, workloads, identities, and pipelines to deliver true end-to-end K8s protection. Learn why CNAPP is the most effective way to reduce blind spots, detect active threats, and secure Kubernetes at scale.
Virtual
*Sponsored by Fortinet
Virtual
Virtual
Sponsored by Palo Alto Networks
Virtual
Kubernetes security controls traditionally focus on configuration, policy, and pre-deployment validation. However, real-world attacks rarely exploit malicious images or bypass admission checks. Instead, they abuse trusted identities and legitimate workloads at runtime.
This session explains why runtime execution is the only place where meaningful attack behavior becomes visible in Kubernetes. Using a practical attack-path perspective, the talk highlights common runtime techniques used for execution, persistence, and lateral movement, and outlines what effective runtime security looks like in production. You’ll also hear how Upwind approaches this challenge: by embedding eBPF-based sensors at the kernel level to capture workload behavior in real time, enriched with Kubernetes context and cloud metadata. This gives teams live visibility into what’s actually happening in their clusters, so they can stop guessing and start defending with clarity.
Virtual
Virtual