Palo Alto Networks Announces Intent to Acquire Twistlock. Get the details >

Cloud Native Security Events & Webinars

June 19, 2019

Host Security and Cloud Workload Protection for the Modern Enterprise

  • Webinar

Register

While the cloud native continuum evolves to include CaaS, PaaS, and serverless architectures, VMs continue to be a vital p...

More details
June 25-26, 2019

AWS re:Inforce 2019

  • Boston

  • Conference

Register Cloud Native Summer Camp Kickoff Party

What’s happening with Twistlock at re:Inforce?

•Visit us at booth #801 and print your very own Twistlock t-...

More details
Aug 3-8, 2019

Black Hat USA 2019

  • Las Vegas, NV

  • Conference

Register

Black Hat is the most technical and relevant information security event series in the world. For more than 20 years, Black...

More details
Aug 12-15, 2019

Jenkins World

  • San Francisco, CA

  • Conference

  • Speaking

Register

Jenkins World is the event for everything Jenkins – community, CloudBees, ecosystem and DevOps.

DevOps World...

More details
Oct 7-10, 2019

Pivotal SpringOne

  • Austin, TX

  • Conference

Register

Pivotal Training offers a series of hands-on, technical courses prior to SpringOne Platform. Classes are scheduled two ful...

More details
Nov 18-21, 2019

KubeCon US

  • San Diego, CA

  • Conference

  • Speaking

Register

The Cloud Native Computing Foundation’s flagship conference gathers adopters and technologists from leading open source ...

More details

Cloud Native Compliance: CIS Certified Benchmarks

June 6, 2019
  • Webinar

Increasingly, organizations are looking to containers and microservices to provide the agility and scalability needed to satisfy their customers. While doing so, modern enterprises also need the ability to demonstrate and maintain compliance and be aware of common violations and costs associated with compliance issues.

The number one business issue CISOs face, at a macro level, is managing an organization’s cyber risk. You can state this in a bunch of different ways, but everything the CISO does is to manage risk to information in a digital context.CIS plays a vital role in providing organizations with clear, specific, and measurable compliance requirements for the cloud, native stack and Twistlock provides world-class cloud native cybersecurity.

Watch this webinar to learn:
•How Twistlock checks its customers’ cloud native applications and infrastructure against the consensus-based best practice standards contained in Kubernetes, Docker, Linux, and AWS benchmarks
•Why organizations that leverage Twistlock can ensure that the configurations of their critical assets align with the CIS Benchmarks consensus-based practice standards
•What CIS Benchmarks Twistlock has been awarded CIS Security Software Certification for

Register

Operationalising DevSecOps: 7 Best Practices for Cloud Native Applications

June 5, 2019
  • Webinar

Modern enterprises are implementing both the tools and the cultural changes required to embrace a DevSecOps mindset and approach.

This webinar will highlight:

•Risks you can avoid by embracing DevSecOps
•DevSecOps as it relates to your container development pipeline
•How to integrate and automate key steps of the process

Join Twistlock Principal Solution Architect Ashley Ward for this live webinar presentation.

Register

Full Lifecycle Security with OpenShift + Twistlock

May 15, 2019
  • Webinar

Enterprises across government, healthcare, financial services, and the intelligence community that use Red Hat OpenShift to build, deploy, and manage their containers also use Twistlock to provide complete security protection for their environments. Twistlock open source contributions are already part of OpenShift, and since Twistlock runs as a native OpenShift app, it’s easy to deploy. As a Red Hat OpenShift Primed partner and Kubernetes Technology Partner, you can trust Twistlock to provide reliable, well-integrated defense for OpenShift.

Join Twistlock Director of Product Marketing and Evangelism Sonya Koptyev for this live webinar featuring RedHat Principal Technical Marketing Manager Jason Dobies and Twistlock Principal Solution Architect James Jones to learn more about:

•Vulnerability Prevention from Development to Runtime
•OpenShift Security During Runtime
•Enterprise Compliance
•Risk Prioritization Tailored to Your Environment
•Advanced Threat Intelligence

Register

Cloud Native: Infrastructure Trends, Security Challenges, and Best Practices

Apr 4, 2019
  • Webinar

Today, infrastructure teams have more options than ever before for running cloud workloads to enable developers to build and deploy modern applications faster than ever before. The rise in container adoption, and adjacent cloud native technologies like Kubernetes, serverless, and on-demand container platforms such as AWS Fargate and Microsoft ACI, presents new security challenges.

Cloud native computing truly encompasses a continuum, spanning VMs, containers, serverless, and other emerging technologies. In this webinar, we hope to shine a light on ways security can protect the full cloud native continuum — with speed to enable devops while providing security depth and control required by today’s enterprises.

Join featured speaker 451 Research Senior Analyst Fernando Montenegro and Twistlock CTO John Morello in this webinar to learn:

•Trends in modern infrastructure adoption and how this impacts the enterprise
•Challenges for IT teams and security leaders when protecting cloud native applications and workloads at scale
•Use cases and advice for implementing security best practices

Register for this webinar to learn more.

Register

Securing the Istio Service Mesh: Twistlock Compliance Checks

Mar 27, 2019
  • Webinar

Service meshes are one of the newest innovations in the world of microservices and cloud-native computing. They’re a critical tool for making microservices applications feasible to implement and manage.

At the same time, however, service meshes — like all components of the software stack — must be properly secured. Without sufficient security oversight, service meshes run the risk of becoming a vector for attack into software infrastructure, as well as a compliance liability.

Register now to learn more about:

•How service meshes work and which security considerations apply to them
•Why Twistlock identified Istio compliance checks as an important gap to address for the cloud native community
•The official Twistlock compliance checks for Istio, including proper configurations, risk severity, major threats, and countermeasures

Register

Understanding Risks and How to Secure Serverless Applications

Mar 13, 2019
  • Webinar

According to the New Stack, over 75 percent of organizations are already using or planning to use serverless in the next 18 months.* From AWS Lambda to Google Cloud Functions to Microsoft Azure Functions and KNative, enterprises have more cloud provider options than ever before when integrating serverless into their application portfolio.

In this webinar learn:

• What security concerns there are for serverless applications
• Why serverless adoption is growing
• How to implement best practices for maximizing serverless security

Register

Host Security and Cloud Workload Protection for the Modern Enterprise

June 19, 2019
  • Webinar

While the cloud native continuum evolves to include CaaS, PaaS, and serverless architectures, VMs continue to be a vital part of the modern software stack. Whether you are running your workloads on a single platform or have embraced a hybrid cloud approach, integrating host security alongside visibility and protection for containers and serverless provides incredible benefits.

Protecting standalone VMs, especially for teams managing their hosts like cattle rather than pets, requires a modern security approach; integrating vulnerability management and compliance across the application lifecycle while combining powerful runtime protection and microsegmentation capabilities.

In this webinar, we will cover:

•How VMs fit into the cloud native continuum
•Security requirements for vulnerability management and compliance across the workload lifecycle
•Runtime protection demo, covering application control, file integrity monitoring, host forensics, and network micro-segmentation

Register

AWS re:Inforce 2019

June 25-26, 2019
  • Boston

  • Conference

What’s happening with Twistlock at re:Inforce?

•Visit us at booth #801 and print your very own Twistlock t-shirt
•Hear the latest trends in comprehensive cloud security 12:45pm Tuesday 6/25 in the Security Learning Hub (Expo)

Cloud Native Summer Camp Kickoff Party!
June 25, 6:30 pm – 8:30 pm Westin Boston Waterfront in the Pavilion

Entertainment:
•Shimshi the Illusionist
•A giant mural—help us complete the picture!
•A live DJ
•Games and contests
•Fun giveaways all night

Register Cloud Native Summer Camp Kickoff Party

Black Hat USA 2019

Aug 3-8, 2019
  • Las Vegas, NV

  • Conference

Black Hat is the most technical and relevant information security event series in the world. For more than 20 years, Black Hat Briefings have provided attendees with the very latest in information security research, development, and trends in a strictly vendor-neutral environment. These high-profile global events and Trainings are driven by the needs of the security community, striving to bring together the best minds in the industry. Black Hat inspires professionals at all career levels, encouraging growth and collaboration among academia, world-class researchers, and leaders in the public and private sectors.

Register

Jenkins World

Aug 12-15, 2019
  • San Francisco, CA

  • Conference

  • Speaking

Jenkins World is the event for everything Jenkins – community, CloudBees, ecosystem and DevOps.

DevOps World | Jenkins World brings together DevOps thought leaders, IT executives, continuous delivery practitioners and the Jenkins community and ecosystem in one global event, providing attendees with the opportunity to learn, explore, network face-to-face and help shape the next revolution of Jenkins development and solutions for DevOps. DevOps World | Jenkins World is designed specifically for IT executives, DevOps practitioners, Jenkins users and partners.

Register

Pivotal SpringOne

Oct 7-10, 2019
  • Austin, TX

  • Conference

Pivotal Training offers a series of hands-on, technical courses prior to SpringOne Platform. Classes are scheduled two full days before the conference and provide you and your team an opportunity to receive in-depth, lab-based training across some of the latest Pivotal technologies.

Register

KubeCon US

Nov 18-21, 2019
  • San Diego, CA

  • Conference

  • Speaking

The Cloud Native Computing Foundation’s flagship conference gathers adopters and technologists from leading open source and cloud native communities in San Diego, California from November 18-21, 2019. Join Kubernetes, Prometheus, Envoy, OpenTracing, Fluentd, gRPC, containerd, rkt, CNI, Jaeger, Notary, TUF, Vitess, CoreDNS, NATS, Linkerd, Helm and Harbor as the community gathers for four days to further the education and advancement of cloud native computing.

Register