BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Cloud Native Now - ECPv5.16.4//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:Cloud Native Now
X-ORIGINAL-URL:https://cloudnativenow.com
X-WR-CALDESC:Events for Cloud Native Now
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20230312T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20231105T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230131T130000
DTEND;TZID=America/New_York:20230131T140000
DTSTAMP:20260503T015050
CREATED:20221222T235124Z
LAST-MODIFIED:20230131T203937Z
UID:154604-1675170000-1675173600@cloudnativenow.com
SUMMARY:Live-Hacking Container Workloads on AWS
DESCRIPTION:In this live hacking session\, we’ll exploit an application as an attacker would to showcase some of the most common container vulnerabilities and how they expose your containerized application to a malicious actor. We’ll then show you clear remediation actions and best practices for each attack scenario. We’ll also demonstrate how you can protect your application by automatically detecting container image vulnerabilities in registries like Amazon ECR and monitor Amazon EKS clusters for new vulnerabilities after deployment.
URL:https://cloudnativenow.com/webinar/live-hacking-container-workloads-on-aws/
LOCATION:Webinar\, Boca Raton\, FL\, 33487\, United States
ATTACH;FMTTYPE=image/png:https://cloudnativenow.com/wp-content/uploads/2022/12/On-Demand-2023.01.31-AWS-Snyk-CJ_Landing-_Page_1540-×-660.png
END:VEVENT
END:VCALENDAR