Session
From YAML to Syscalls: Eliminating Improvisation in Security
Security is often treated as a scattered collection of tools, but effective protection requires architectural alignment. In this session, we turn the 4C Model (Cloud, Cluster, Container, Code) into a practical blueprint for securing Kubernetes end-to-end. We will demonstrate how to shift security left with Infrastructure-as-Code scanning using Checkov, analyze container supply-chain risk with Trivy, enforce policy with Kyverno, and detect runtime threats at the syscall level with Falco. By connecting prevention, enforcement, and detection into a cohesive strategy, attendees will leave with a clear, implementable roadmap to secure Kubernetes from CI/CD pipelines to the running kernel.
Security shouldn’t be a guessing game or a scattered collection of tools. This session presents a practical 4C-based framework to align prevention, enforcement, and detection across modern cloud-native environments. Attendees will leave with a clear, structured approach to securing infrastructure, containers, and runtime systems from development pipelines to production.
Miguel De Los Santos
Upwind, Sales Engineer
Boston, Massachusetts, United States
Links
Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.
Jump to top