Continuous Security: From tins to containers - now what!


Details
Agenda
1800 - Doors Open served with Pizza and Drinks
1830 - "The Talk"
1930 - Networking + Demolish the remainder of the food
2100 - Finish
"Continuous Security" by Benjy Portnoy
Information Security departments often view containers as challenging to manage (code moves too fast for risk analysis, thousands of containers with limited visibility or control). Government organizations such as NIST have come out with guidelines for Application Container Security, while serverless technologies such as Azure Container Instances or AWS Fargate create additional challenges regarding how security risks are managed.
In this presentation we will look at these challenges and demonstrate how security controls can be continuously embedded into the application lifecycle.

Continuous Security: From tins to containers - now what!