Containing Your Risk - a Meetup

Details

Our discussion will revolve around the following topics.
  • What are the risks of running containers in the production environment?
  • What controls are available for protecting containers from the threats and associated risks?
  • What tools provide for those controls?

The purpose of this discussion is to explain the security risks associated with containers in the production environment and to make practical recommendations for addressing those risks when planning for, implementing, and maintaining containers.

Presenter:
Korben Kirscht, Information Security Architect, Cloud Security
Master's in Cybersecurity and Information Assurance
CCSP, SSCP, CEH, CHFI, CIH, CESE

With over 35 years in information technology and Cybersecurity, Korben has extensive experience as a developer, database administrator, network administrator, SAN/NAS administrator, cloud administrator, and most importantly performing vulnerability management, risk assessments, and architecture. He has attained multiple degrees related to information security as well as many leading industry certifications including CCSP - Cloud Certified Security Professional (Cloud equivalent to the CISSP), SSCP - System Security Certified Practitioner, CEH - Certified Ethical Hacker, CHFI - Computer Hacking Forensic Investigator, CESE - Certified Encryption Specialist.

Korben has worked for companies like Experian, First American Financial Services, Cisco Systems, Inc, Walt Disney Imagineering, and Washington Mutual.

Date:        Wednesday, January 15th at 7pm
Location:  TBA

Comments

  1. This comment has been removed by the author.

    ReplyDelete
  2. I generally check this kind of article and I found your article which is related to my interest. Genuinely it is good and instructive information. Thankful to you for sharing an article like this.Hire A Verified Hacker

    ReplyDelete
  3. This is excellent information which is shared by you. This information is meaningful and magnificent for us to increase our knowledge about it. Keep sharing this kind of information. Thank you. Read more info about Hire A Cell Phone Hacker

    ReplyDelete
  4. Very Good information, this information is excellent and very important for everyone. I am very very thankful to you for providing this kind of information. Read more info about Hire Hacker For Email Password

    ReplyDelete
  5. I generally want quality content and I found that in your post. The information you have shared about information and cyber security is beneficial and significant for us. Keep sharing these kinds of articles here. Best Cyber Security in India

    ReplyDelete
  6. Excellent knowledge, I am very much thankful to you that you have shared good information with us. Here I got some special kind of knowledge and it is helpful for everyone. Thanks for share it. hire hackers for whatsapp

    ReplyDelete
  7. I will share it with my other friends as the information is really very useful. Hire A Professional Website Hacker. Keep sharing your excellent work.

    ReplyDelete
  8. You wrote this post very carefully.World Class Cybersecurity Solutions Provider The amount of information is stunning and also a gainful article for us. Keep sharing this kind of articles, Thank you.

    ReplyDelete
  9. I generally check this kind of article and I found your article which is related to my interest. Genuinely it is good and instructive information, Cyber Security Trends 2022 Gartner Thankful to you for sharing an article like this.

    ReplyDelete
  10. Enjoyed reading the above article, in fact everything is explained here, the article is very interesting and effective. Thanks, and good luck for the upcoming articles.Hacker for hire

    ReplyDelete

Post a Comment

Popular posts from this blog

Facebook - Trusted Contacts