on-demand Hacking session

Exploiting Open Source Code & Containerized Workloads on AWS with Snyk

Containers help you build and scale applications faster, but they can also introduce security risks.

In this hands-on, on-demand hacking session, we exploit vulnerabilities in a containerized workload on AWS and remediate each attack scenario. 

Watch On-demand

Watch the hands-on session to:


  • Get an overview of common high severity open source and container vulnerabilities 
  • Uncover and exploit vulnerabilities, including remote code execution and information disclosure 
  • Remediate the vulnerabilities from each attack scenario 
  • Learn how to detect container image vulnerabilities in popular registries like Amazon ECR and monitor Amazon EKS clusters for new vulnerabilities after deployment

By the end of the session you’ll have exploited and fixed two vulnerabilities and gained insights into best practices for securing your containerized workloads on AWS.

Speakers

Eric_Smalling.jpg

Eric Smalling

Senior Developer
Advocate, Snyk

paul harland 3.png

Paul Harland

Senior Channel Solutions
Engineer, Snyk

Patch Logo Segment Patch Logo Segment Patch Logo Segment Patch Logo Segment Patch Logo Segment Patch Logo Segment Patch Logo Segment Patch Logo Segment Patch Logo Segment Patch Logo Segment Patch Logo Segment Patch Logo Segment Patch Logo Segment