6:27 IBM Sponsored Session - Protecting Kubernetes Workloads from Attacks - Chris Rosen, IBM CNCF [Cloud Native Computing…
27:59 The Path Less Traveled: Abusing Kubernetes Defaults - Duffie Cooley, VMware & Ian Coldwater, Heroku CNCF [Cloud Native Computing…
28:40 Trusted Software Supply Chain with JTE - Steven Terrana, Booz Allen Hamilton CNCF [Cloud Native Computing…
29:13 Continuous Assurance and Continuous Compliance via Data, Graph, Query and Code - Erkang Zheng CNCF [Cloud Native Computing…
26:14 Slowing Our Role: Moving Towards Policy at Plex - John Reese, Plex Systems CNCF [Cloud Native Computing…
28:02 MLGuard -- Detecting Malicious Web Requests using a Serverless-based Machine L... Abhinav Srivastava CNCF [Cloud Native Computing…
2:00 Palo Alto Networks Sponsored Session - How to Choose Which Cloud Native Technologies... John Morello CNCF [Cloud Native Computing…
35:39 The Devil in the Details: Kubernetes’ First Security Assessment - Jay Beale & Aaron Small CNCF [Cloud Native Computing…