Coffee Talk: Security & Containers: Understanding How It All Ties Together for Enterprises

Date: Tuesday, August 16 at 11am PT / 2pm ET

Join us live to qualify to receive a $5 Starbucks gift card!*

The shift to cloud-native software assembled from microservices in containers is accelerating and along with it, the need for better security to protect all the containers that are constantly travelling the network between clouds. Understanding how to secure containers begins with understanding where the contents of those clouds are sourced from, how those contents must be scanned and proven safe, what the inherent risks from those sources are, and how to best protect against them.

In this session we'll explore how containers are properly prepared, packaged, and protected.

Register now!

About the presenters:

Our Industry Expert

Howard M. Cohen, Sr. Resultant, The TechChannel Partners’ Results Group

He is a 40+ year executive veteran of the Information Technology industry who today writes for and about the IT channel. He’s a frequent speaker at IT industry events that include Microsoft Inspire, Citrix Synergy/Summit, ConnectWise IT Nation, ChannelPro Forums, Cloud Partners Summit, MicroCorp One-On-One, and CompTIA ChannelCon, frequently hosts and presents webinars for many vendors and publications.

Moderated by:
John K. Waters, Editor at Large, Redmondmag.com


Following Our Expert's Presentation, Hear From Our Sponsor
Michael Isbitski, Director of Cybersecurity Strategy, Sysdig

Mike has researched and advised on cybersecurity for over 5 years. He's versed in cloud security, container security, Kubernetes security, API security, security testing, mobile security, application protection, and secure continuous delivery. He's guided countless organizations globally in their security initiatives and supporting their business. Prior to his research and advisory experience, Mike learned many hard lessons on the front lines of IT with over twenty years of practitioner and leadership experience focused on application security, vulnerability management, enterprise architecture, and systems engineering.

*Prize will be distributed to the first 250 attendees who attend the live event for a minimum of 51% of the total presentation. Only valid business e-mail addresses of current employer will be considered. Only eligible for one entry per individual, not per e-mail address. Must be a US resident. No substitutions allowed. False and/or deceptive entries or acts shall render entrants ineligible. No purchase is required. This offer is not valid where prohibited by law. If there is any reason to suspect abuse, fraud, or breach of these terms and conditions, we have the right to void the prize.

Duration: 1 hour


Your e-mail address is used to communicate with you about your registration, related products and services, and offers from select vendors. Refer to our Privacy Policy for additional information.