Events, webinars, and
workshops

See the Future of Cloud Defense: Agentic Cloud Security in Action

Kraken Discovery Labs
Looking to deepen your expertise in Kubernetes and cloud-native security? The Falco Kraken Discovery Labs virtual workshop provides participants the opportunity to experience the power of open source Falco firsthand. Run Atomic Red tests, then step into the Blue Team role to detect threats and create custom Falco detection rules. Whether you’re new to the field or an experienced Kubernetes threat detection engineer, you’ll discover how to leverage Falco to craft detection rules that extend MITRE ATT&CK coverage.

Get Hands-on with Sysdig for securing Google Cloud
Get Hands-on with Sysdig for securingGoogle CloudIn this lightweight hands-on interactive workshop, you’ll see how Sysdig helps Google Cloud users secure and accelerate innovation. Get insights into key cloud security use cases such as threat detection and response, vulnerability management & prioritization, posture management, and compliance.

Kraken Hunter
This is a half-day course focused on the challenges security professionals face in cloud native applications. In this hands-on class, you will go through various modules covering critical steps within the deployment lifecycle.Upon completion of the class you will have a better understanding of the eccentricities facing security professionals when dealing with cloud native applications as well as Sysdig and the OSS security tools leveraged in the greater ecosystem.

Secure DevOps with AWS and Sysdig
Join our AWS and Sysdig DevDay on Sysdig Secure for Cloud. In this hands-on workshop, you will learn how to use Sysdig’s Unified Vulnerability Scanning, CSPM, and Cloud Threat Detection to run cloud applications in production securely.

A Comprehensive Approach to Cloud Threat Detection and Response
In this webinar, SANS Sr. Instructor Jake Williams and Mike Isbitski, Director of Cybersecurity Strategy, Sysdig, make the case for implementing a combination of agent-based and agentless cloud-native security tooling, an approach that provides outcomes far superior than either solution on its own.

Securing the DevSecOps Pipeline with Shift Left + Runtime Security
Modern DevOps teams are adopting GitOps principles: provisioning workloads using infrastructure-as-code (IaC) tools and managing policies as code using open source tools like Open Policy Agent (OPA)

Kubernetes Monitoring Best Practices
Join us as we dig into the most common challenges of Kubernetes monitoring and how to solve them.

Crack the Exam Code to Become a Certified K8s Security Specialist (CKS)! Tips and Tricks to Prepare with Saiyam Pathak, CNCF Ambassador and Daniel Lemos, CKS
To help you crack the code to pass this exam, join Saiyam Pathak, CNCF Ambassador and Sydig’s most recent CKS, Daniel Lemos in a discussion about what it was really like to take the exam and pass, what worked and what would have helped in passing.