Docker webinar part two

Webinar: Part 2 – Verify, don’t trust: Best practices for reducing vulnerability exposure in Docker environments

casey pechan / 12.05.17

Earlier this month we shared with you part one of our webinar series with Holger Schulze: Verify, don’t trust: What you need to know about popular Docker Hub images.

Now it’s time for the release of part two: Verify, don’t trust: Best practices for reducing vulnerability exposure in Docker environments!

Part two of this webinar series continued the discussion of how best to secure our industries growing containerization trend.

As our presenter (CloudPassage solutions engineer Jenks Gibbons) explains, there are a number of guiding principles and best practices for building container images. And choosing to follow them or not can play a large role in the security of your containerization practices.

Part two of this webinar mini-series analyzes:

  • Best practices for reducing vulnerability exposure in Docker environments
  • Processes that enable secure application delivery with Docker
  • What to look for when selecting container security automation tools

We would like to thank Holger Schulze, founder and CEO of Cybersecurity Insiders and head of the LinkedIn Information Security Community for hosting this webinar.

Did you miss our latest webinar? Not a problem. You can view it in its entirety here.