Events, webinars, and
workshops

Packets, Pods & Prompts: Why Open Source is the Future of Cloud Security
live webinar
8/12/2025

Packets, Pods & Prompts: Why Open Source is the Future of Cloud Security

Join this exclusive conversation with three titans of open source—the minds behind Falco, Wireshark, and Kubernetes—as they explore why open-source models are not just resilient, but essential to the next wave of cloud security.

register now
Packets, Pods & Prompts: Why Open Source is the Future of Cloud Security
browse complete library
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Cloud Native Denmark
EVENT
10/7/2025

Cloud Native Denmark

Aarhus, Denmark

save the date
Cloud Native Denmark
Les Assises
EVENT
10/7/2025

Les Assises

Monaco

save the date
Les Assises
it-sa 2025
EVENT
10/7/2025

it-sa 2025

Nürnberg, Germany

save the date
it-sa 2025
Cloud Native Bergen
EVENT
10/27/2025

Cloud Native Bergen

Bergen, Norway

save the date
Cloud Native Bergen
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
WORKSHOP

Kraken Discovery Labs

Looking to deepen your expertise in Kubernetes and cloud-native security? The Falco Kraken Discovery Labs virtual workshop provides participants the opportunity to experience the power of open source Falco firsthand. Run Atomic Red tests, then step into the Blue Team role to detect threats and create custom Falco detection rules. Whether you’re new to the field or an experienced Kubernetes threat detection engineer, you’ll discover how to leverage Falco to craft detection rules that extend MITRE ATT&CK coverage.

watch now
Kraken Discovery Labs
WORKSHOP

Get Hands-on with Sysdig for securing Google Cloud

Get Hands-on with Sysdig for securingGoogle CloudIn this lightweight hands-on interactive workshop, you’ll see how Sysdig helps Google Cloud users secure and accelerate innovation. Get insights into key cloud security use cases such as threat detection and response, vulnerability management & prioritization, posture management, and compliance.

watch now
Get Hands-on with Sysdig for securing Google Cloud
WORKSHOP

Kraken Hunter

This is a half-day course focused on the challenges security professionals face in cloud native applications. In this hands-on class, you will go through various modules covering critical steps within the deployment lifecycle.Upon completion of the class you will have a better understanding of the eccentricities facing security professionals when dealing with cloud native applications as well as Sysdig and the OSS security tools leveraged in the greater ecosystem.

watch now
Kraken Hunter
WORKSHOP

Secure DevOps with AWS and Sysdig

Join our AWS and Sysdig DevDay on Sysdig Secure for Cloud. In this hands-on workshop, you will learn how to use Sysdig’s Unified Vulnerability Scanning, CSPM, and Cloud Threat Detection to run cloud applications in production securely.

watch now
Secure DevOps with AWS and Sysdig
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
LIVE WEBINAR
8/21/2024

NIS2 and DORA: It’s in the Box

Automating NIS2 and DORA Compliance with Out-of-the-Box Policies from Sysdig

watch now
NIS2 and DORA: It’s in the Box
LIVE WEBINAR
8/20/2024

Outpacing Cloud Attackers with GenAI: Advanced AI Strategies for Rapid Threat Detection and Response

With Sysdig founder and CTO Loris Degioanni, discover how AI-driven technology, featuring multi-step reasoning, contextual awareness, and guided response, revolutionizes cloud security.

watch now
Outpacing Cloud Attackers with GenAI: Advanced AI Strategies for Rapid Threat Detection and Response
LIVE WEBINAR
7/18/2024

5-Minute Cloud Security Investigations in Action (APAC Session)

A technical demonstration of how Sysdig accelerates cloud-native investigation.

watch now
5-Minute Cloud Security Investigations in Action (APAC Session)
LIVE WEBINAR
7/17/2024

IAM Confused - Analyzing 8 Identity Breach Incidents

Explore insights from 8 real cloud breaches, dissecting pitfalls in identity management, automation, and social engineering, with actionable advice for enhanced security.

watch now
IAM Confused - Analyzing 8 Identity Breach Incidents

Like what you see?