37:22 Dynamic Image Scanning Through System Tracing - Itay Shakury, Aqua Security CNCF [Cloud Native Computing…
30:20 Building Effective Attack Detection in the Cloud- Alfie Champion & Nick Jones, F-Security Consulting CNCF [Cloud Native Computing…
29:06 Cartography: using graphs to improve and scale security decision-ma... Alex Chantavy & Marco Lancini CNCF [Cloud Native Computing…
9:18 Cloud Security and how to leverage the shared responsibility model... Eshrak Assaf & David Lebutsch CNCF [Cloud Native Computing…
26:55 Designing Secure Applications in the Cloud - Adora Nwodo, Microsoft CNCF [Cloud Native Computing…
20:44 Exit Stage Left: Replacing Theater with Chaos - Kelly Shortridge, Capsule8 CNCF [Cloud Native Computing…
9:57 Why OpenID Connect is More Secure then Certificates - Marc Boorshtein, Tremolo Security, Inc. CNCF [Cloud Native Computing…
13:01 Hardware Backed Security For Multitenancy at the Edge with SPIFFE & PAR... Paul Howard & Andres Vega CNCF [Cloud Native Computing…
44:29 Capture the Flag Wrap Up & Summary, Andrew Martin, Control Plane & Magno Logan, Trend Micro CNCF [Cloud Native Computing…
33:14 Event Wrap Up - Andrew Martin, Emily Fox, Brandon Lum, Jeyappragash Jeyakeerthi CNCF [Cloud Native Computing…
38:29 A Tale of a Meshi Kafka: Securing Kafka Deployment When Istio Is... Ariel Shuper & Nikolas Mousouros CNCF [Cloud Native Computing…
38:05 Enabling Autonomous Teams With Policy Enforcement at Yubico - James Alseth & John Reese, Yubico CNCF [Cloud Native Computing…