Events, webinars, and
workshops

Packets, Pods & Prompts: Why Open Source is the Future of Cloud Security
live webinar
8/12/2025

Packets, Pods & Prompts: Why Open Source is the Future of Cloud Security

Join this exclusive conversation with three titans of open source—the minds behind Falco, Wireshark, and Kubernetes—as they explore why open-source models are not just resilient, but essential to the next wave of cloud security.

register now
Packets, Pods & Prompts: Why Open Source is the Future of Cloud Security
browse complete library
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
fwd:cloudsec Europe
EVENT
9/15/2025

fwd:cloudsec Europe

Berlin, Germany

save the date
fwd:cloudsec Europe
Proact Container Day Oslo
EVENT
9/18/2025

Proact Container Day Oslo

Oslo, Norway

save the date
Proact Container Day Oslo
Edgecase 2025
EVENT
9/23/2025

Edgecase 2025

Amersfoot, Netherlands

save the date
Edgecase 2025
Cloud Native Denmark
EVENT
10/7/2025

Cloud Native Denmark

Aarhus, Denmark

save the date
Cloud Native Denmark
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
WORKSHOP

Kraken Discovery Labs

Looking to deepen your expertise in Kubernetes and cloud-native security? The Falco Kraken Discovery Labs virtual workshop provides participants the opportunity to experience the power of open source Falco firsthand. Run Atomic Red tests, then step into the Blue Team role to detect threats and create custom Falco detection rules. Whether you’re new to the field or an experienced Kubernetes threat detection engineer, you’ll discover how to leverage Falco to craft detection rules that extend MITRE ATT&CK coverage.

watch now
Kraken Discovery Labs
WORKSHOP

Get Hands-on with Sysdig for securing Google Cloud

Get Hands-on with Sysdig for securingGoogle CloudIn this lightweight hands-on interactive workshop, you’ll see how Sysdig helps Google Cloud users secure and accelerate innovation. Get insights into key cloud security use cases such as threat detection and response, vulnerability management & prioritization, posture management, and compliance.

watch now
Get Hands-on with Sysdig for securing Google Cloud
WORKSHOP

Kraken Hunter

This is a half-day course focused on the challenges security professionals face in cloud native applications. In this hands-on class, you will go through various modules covering critical steps within the deployment lifecycle.Upon completion of the class you will have a better understanding of the eccentricities facing security professionals when dealing with cloud native applications as well as Sysdig and the OSS security tools leveraged in the greater ecosystem.

watch now
Kraken Hunter
WORKSHOP

Secure DevOps with AWS and Sysdig

Join our AWS and Sysdig DevDay on Sysdig Secure for Cloud. In this hands-on workshop, you will learn how to use Sysdig’s Unified Vulnerability Scanning, CSPM, and Cloud Threat Detection to run cloud applications in production securely.

watch now
Secure DevOps with AWS and Sysdig
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
LIVE WEBINAR
2/17/2022

Modernize and Secure DevOps with Confidence

Join AWS & Sysdig as we unpack and offer answers about where you can focus your efforts to modernize DevOps and provide key business benefits, such as speed, agility, and cost savings.

watch now
Modernize and Secure DevOps with Confidence
LIVE WEBINAR
2/10/2022

Align Your Cloud Security Plan with the Cybersecurity Exec Order

Global security breaches and the White House Executive Order (EO) have sped up the timeline to modernize cybersecurity for both the public and private sectors. The way applications are developed and deployed (in the cloud and on containers), means taking a look at cloud security, Zero Trust architectures, and regulatory compliance in order to meet the mandates, keep moving ahead of the hackers and reduce risk.

watch now
Align Your Cloud Security Plan with the Cybersecurity Exec Order
LIVE WEBINAR
2/3/2022

Container and Kubernetes Security Best Practices: Forensics & Incident Response

Conducting forensics and incident response for containers and Kubernetes helps you better understand security breaches, meet compliance requirements and recover quickly. On average, containers live less than 5 minutes, so having a cloud native incident response plan is critical.

watch now
Container and Kubernetes Security Best Practices: Forensics & Incident Response
LIVE WEBINAR
1/25/2022

Continuous Compliance on AWS

Organizations must validate compliance with industry standards, like PCI, NIST, and SOC2, during build and runtime and automatically measure progress against CIS benchmarks.

watch now
Continuous Compliance on AWS

Like what you see?