Hack an K8s instance: Detect and mitigate vulnerabilities with the DevOps approach

People are under the impression that when you spin up the latest and greatest AKS, EKS, OpenShift or GKE instance, that you’re secure. However with K8S, now more than ever the workload underneath matters. One privileged, neglected, container can compromise an entire setup. Rather than just talking about the risks or best practices, this talk is all about showing how easy it is to do.


Yvo Van Doorn

As Director of Technical Sales & Community, Yvo van Doorn work with customers & prospects seeking to understand the benefits of mondernizing security for the cloud. He has more than a decade ...