an on-demand workshop featuring:


         docker sysdig.png                       

KubeCon: Secure your AWS Workloads as you Build with Snyk, Sysdig and Docker

With cloud deployments transforming what was traditionally 'infrastructure' to code, development and security teams face new, increased pressure in their attempt to build secure applications quickly. With developers in the driver's seat, organizations are using modern DevOps processes with integration and deployments happening many times a day and at scale.

See experts from AWS, Docker, Snyk and Sysdig and learn how developer teams are collaborating with operations and security teams to secure workloads from source code to runtime. This hands-on workshop will demonstrate how best to secure your AWS workloads using Snyk's unique integrations with Docker and Sysdig tooling.

We walk through identifying threats, vulnerabilities, and misconfigurations that are common in cloud native applications today. With a focus on fixing issues, the workshop will also cover how to pinpoint must-fix open vulnerabilities in development using runtime signals, while also effectively protecting workloads in production.

Watch On-Demand

In this workshop, you will: 

    • Detect and fix vulnerabilities in containers and source dependencies in Amazon ECR and Amazon EKS workloads during the development phase
    • Upgrade to recommended, secure base images
    • Automate runtime threat detection and alerting across containers and Kubernetes
    • Secure Kubernetes workloads by prioritizing vulnerabilities in container packages used at runtime to eliminate noise
Recommendations: Attendees have basic understanding of EKS, including creating and accessing an EKS cluster, no prior Snyk, Sysdig or Docker experience is necessary.

Marco Morales

Partner Solutions Architect | Snyk

Shy Ruparel

Sr. Developer Advocate | Docker

Alex Lawrence

Principal Security Architect | Sysdig

Akram Al Sheikh

Partner Solution Architect | AWS

Learn more about Snyk

Automatically find and fix vulnerabilities throughout your SDLC workflow