Session
Security That Ships: Cloud-Native Security Lessons from Real AI & Industrial Deployments
Session Type
20-minute Lightning Talk
Description
Cloud-native security conversations often focus on tools and policies. In production environments supporting AI platforms, industrial data pipelines, and distributed operational systems, security becomes an architectural and delivery challenge that must coexist with uptime, scale, and cross-team execution.
This session shares practical implementation lessons from deploying and governing containerized workloads in environments where system reliability and data integrity directly impact operational outcomes. Drawing on real deployment experiences and case-informed scenarios, the talk highlights how security decisions were embedded into architecture rather than added as afterthoughts.
Examples explored in the session include:
Securing containerized analytics workloads processing operational manufacturing data
Designing access boundaries, secret handling, and pipeline controls to prevent data leakage while maintaining continuous delivery velocity.
Governance safeguards around AI-enabled decision-support services
Implementing runtime visibility and auditability when model-driven services interact with production workflows and enterprise data sources.
Identity and privilege segmentation across distributed teams and environments
Managing access across platform, engineering, and vendor stakeholders without introducing delivery bottlenecks.
Observability-led detection of abnormal service behavior
Using telemetry and monitoring signals to identify configuration drift or unexpected runtime patterns within microservice ecosystems.
Integrating security checks into CI/CD pipelines
Enforcing baseline controls while avoiding developer friction and deployment slowdowns.
Rather than presenting tooling comparisons, this session focuses on architectural patterns, tradeoff decisions, and organizational realities encountered when implementing cloud-native security practices in complex operational settings.
Attendees will leave with actionable insights on how to:
Translate governance requirements into enforceable runtime controls
Align security with delivery velocity
Build visibility into dynamic container environments
Navigate cross-functional adoption challenges
Treat cloud-native security as a systems design discipline
This talk is designed for practitioners and technical leaders responsible for deploying real systems under real constraints seeking to bridge the gap between security theory and operational implementation.
Srishti Jha
Speaker | Sr. Program Development Manager| Volterra Technologies
Toronto, Canada
Links
Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.
Jump to top