
We never sell attendee lists or contact information, nor do we authorize others to do so.
Space is limited we will confirm your registration via email.

High tempo workshops from some of the industry’s finest, where you will learn:
- - theory and practice of threat modeling cloud native systems
- - advanced, hands-on defensive and offensive techniques against Kubernetes
- - threat detection and remediation in AWS for Kubernetes
- - how to the participate CloudNativeSecurityCon Capture the Flag with a warm-up live hacking session
Making Security Valuable
Presented by Ergonautic
Cloud native computing forced most organizations to evolve their security practices and many organizations have bottlenecks where Kubernetes adoption collides with security and compliance. In this workshop we’ll analyze the value of security as a value stream and security as a contributor to other value streams. The workshop will help you identify key value streams within your organization, then outline how understanding the flow of information and assets within those value streams helps discover potential security risks and vulnerabilities. We’ll have interactive exercises to learn how to integrate security considerations into the overall strategy and measure the effectiveness of controls in protecting the value streams in language that the business understands.
Breaking and Building For Greater Good
Presented by Control Plane
In this hands-on workshop we’ll get things started by demonstrating threat modeling guidance applied to Kubernetes and from there move on to advanced techniques for attacking and defending Kubernetes. We’ll walk through a series of exploits and remediations to highlight common attack vectors and mitigate them. Throughout the workshop, participants work hands-on to reinforce the concepts with the opportunity to ask questions and get expert help.
Securing Kubernetes on AWS
Presented by AWS
As the popularity of Kubernetes grows so does the appeal of targeting Kubernetes and AWS can help keep your clusters secure. In this presentation you will learn AWS principles and tools for securing Kubernetes environments that will apply to both EKS and self managed clusters. We’ll cover practical AWS approaches to security ranging from intrusion detection to controlling pod traffic with security groups.
Schedule
- 9:00-9:10 : Welcome and Agenda Overview - Farrah, Shafer, Andres
- 9:10-10:45 : Making Security Valuable - Jabe Bloom and Sasha Rosenbaum
- 10:45-11:00 Break
- 11:00-12:15 : Attacking and Defending Kubernetes - Marco, Andy Andres
- 12:15-12:45 Lunch
- 12:45-2:45 : Attacking and Defending Kubernetes - Marco, Andy Andres
- 2:45-3:00 Break
- 3:00-4:00 Kubernetes Threat Modeling - Marco, Andy Andres
- 4:00-4:10 Break
- 4:10-5:10 AWS Security Guardrails for K8s - Jeremy Cowan
- 5:10 Wrap up
We never sell attendee lists or contact information, nor do we authorize others to do so.
Space is limited we will confirm your registration via email.
Your Hosts







