Events, webinars, and
workshops

Packets, Pods & Prompts: Why Open Source is the Future of Cloud Security
live webinar
8/12/2025

Packets, Pods & Prompts: Why Open Source is the Future of Cloud Security

Join this exclusive conversation with three titans of open source—the minds behind Falco, Wireshark, and Kubernetes—as they explore why open-source models are not just resilient, but essential to the next wave of cloud security.

register now
Packets, Pods & Prompts: Why Open Source is the Future of Cloud Security
browse complete library
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
ITCM Marbella
EVENT
11/18/2025

ITCM Marbella

Marbella, Spain

save the date
ITCM Marbella
AWS re:Invent
EVENT
12/1/2025

AWS re:Invent

Las Vegas, NV

save the date
AWS re:Invent
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
WORKSHOP

Kraken Discovery Labs

Looking to deepen your expertise in Kubernetes and cloud-native security? The Falco Kraken Discovery Labs virtual workshop provides participants the opportunity to experience the power of open source Falco firsthand. Run Atomic Red tests, then step into the Blue Team role to detect threats and create custom Falco detection rules. Whether you’re new to the field or an experienced Kubernetes threat detection engineer, you’ll discover how to leverage Falco to craft detection rules that extend MITRE ATT&CK coverage.

watch now
Kraken Discovery Labs
WORKSHOP

Get Hands-on with Sysdig for securing Google Cloud

Get Hands-on with Sysdig for securingGoogle CloudIn this lightweight hands-on interactive workshop, you’ll see how Sysdig helps Google Cloud users secure and accelerate innovation. Get insights into key cloud security use cases such as threat detection and response, vulnerability management & prioritization, posture management, and compliance.

watch now
Get Hands-on with Sysdig for securing Google Cloud
WORKSHOP

Kraken Hunter

This is a half-day course focused on the challenges security professionals face in cloud native applications. In this hands-on class, you will go through various modules covering critical steps within the deployment lifecycle.Upon completion of the class you will have a better understanding of the eccentricities facing security professionals when dealing with cloud native applications as well as Sysdig and the OSS security tools leveraged in the greater ecosystem.

watch now
Kraken Hunter
WORKSHOP

Secure DevOps with AWS and Sysdig

Join our AWS and Sysdig DevDay on Sysdig Secure for Cloud. In this hands-on workshop, you will learn how to use Sysdig’s Unified Vulnerability Scanning, CSPM, and Cloud Threat Detection to run cloud applications in production securely.

watch now
Secure DevOps with AWS and Sysdig
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
LIVE WEBINAR
9/15/2022

Becoming a Cloud Security Ninja: Sharpen your Cloud Threat Detection Sword with Machine Learning

Cybercriminals have been developing their skills and attack techniques to expand into cloud and container workloads. How do your security teams defend the cloud infrastructure against an evolving threat landscape?

watch now
Becoming a Cloud Security Ninja: Sharpen your Cloud Threat Detection Sword with Machine Learning
LIVE WEBINAR
9/13/2022

How to Improve Security for Cloud-Native App Platforms in 3 Easy Steps for Azure

All the cloud providers (including Microsoft Azure) have default controls suggested to secure your infrastructure. We at Sysdig believe in leveraging these and going beyond by following additional steps.

watch now
How to Improve Security for Cloud-Native App Platforms in 3 Easy Steps for Azure
LIVE WEBINAR
9/6/2022

How Does Your Kubernetes Environment Stack Up?

In this webinar, we will examine real-world data from billions of containers we analyzed in the Sysdig Cloud Native Security and Usage Report.

watch now
How Does Your Kubernetes Environment Stack Up?
LIVE WEBINAR
8/24/2022

5 Easy Ways to Secure Images & Prioritize Risk from Source to Run On AWS

Do you want to ensure images are free of vulnerabilities and meet best practices before pushing to production? Participants will learn how Sysdig Secure can identify vulnerabilities pre-production and at runtime.

watch now
5 Easy Ways to Secure Images & Prioritize Risk from Source to Run On AWS

Like what you see?