<img src="https://certify.alexametrics.com/atrk.gif?account=Zpb+p1uhUo20dG" style="display:none" height="1" width="1" alt="">
2022 Container Security Trends: Expert Panel Livestream


Think About Your Audience Before Choosing a Webinar Title

Sponsored by Snyklogo-vertical-black-removebg-preview

On Demand

The cloud is where applications run today, but the cloud itself is software, managed and run with code such as IaC, Kubernetes and Helm configs and Dockerfiles. Securing your cloud can, and should, follow much the same model as the security of the apps you’re running in it. If you want to know if your cloud resources are misconfigured, you can test them in the IDE or in your deployment pipelines. If you detect drift or unmanaged resources, you can update your code and redeploy instead of manually making fixes in the cloud console. 

Post-deployment, you can continue to follow secure coding practices, using important signals from operations to help engineers improve their designs and fix issues.

In this webinar, Techstrong Research analysts will share new research on securing cloud environments, containers and the need for greater visibility and collaboration between engineers, operations and security teams. In addition, a subject matter expert from Snyk will discuss challenges and successes observed from teams applying developer-first security principles to their cloud native infrastructures. Register now to learn:

  • How businesses approach cloud infrastructure vulnerability and misconfiguration management
  • How organizations configure containers with security in mind
  • The imperative for teams to collaborate to create a secure infrastructure environment


Jim Armstrong
Senior Director of Product Marketing, Snyk
Jim Armstong started his career doing traditional IT security at McAfee, in the days when servers were physical and you still had to screw in network plugs to the back of your computer. As virtual machines took over the world, Jim joined VMware and helped make servers, networks and storage software-defined. Then this cool little tool called Docker started popping up everywhere and he realized containers were going to change the world again, and was lucky enough to join Docker and be part of that revolution. These days, Jim is taking what he has learned at all of his prior stops and helping companies securely build applications using open source, containers and IaC at Snyk.
Eric Carter
Director of Product Marketing, Sysdig
Eric is Director of Product Marketing focused on Sysdig’s partner ecosystem. Eric has worked with enterprise technology solutions across several domains for more than two decades. Prior to Sysdig, Eric led product management and marketing for software-defined storage startup, Hedvig. He has also worked for well-known tech firms including Riverbed and EMC. Eric holds a BA in Public Relations from Pepperdine University.
Daniel (Dan) Kirsch
Managing Director and Co-Founder, Techstrong Research
Dan is a consultant, IT industry analyst and thought leader focused on how emerging technologies such as AI, machine learning and advanced analytics are impacting businesses. Dan is particularly interested in how businesses use these emerging technologies to alter their approaches to information security, governance, risk and ethics. He provides advisory services directly to leadership at technology vendors that design and deliver security solutions to the market, assisting them in aligning their solutions with enterprise requirements. Dan is viewed as an expert in understanding security solutions and mapping them to the complex needs of business across industries. Prior to co-founding Techstrong Research, Dan was managing director at Hurwitz & Associates, an analyst and consulting firm. At Hurwitz & Associates Dan led research on a variety of studies and reports in the areas of data and AI, modern software development, security and multicloud computing.
Dan earned his B.A. in Political Science from Union College in New York and a J.D. from Boston College Law School, where he focused on emerging corporate strategies and intellectual property. As an attorney, Dan represented startups, cloud computing ventures and early stage startups as they sought funding. Dan is a co-author of “Augmented Intelligence: The Business Power of Human-Machine Collaboration” (CRC Press, 2020), “Cloud for Dummies” (John Wiley & Sons 2020), and “Hybrid Cloud for Dummies” (John Wiley & Sons, 2012).

Register to Watch Now:

What You’ll Learn in This Webinar

You’ve probably written a hundred abstracts in your day, but have you come up with a template that really seems to resonate? Go back through your past webinar inventory and see what events produced the most registrants. Sure – this will vary by topic but what got their attention initially was the description you wrote.

Paint a mental image of the benefits of attending your webinar. Often times this can be summarized in the title of your event. Your prospects may not even make it to the body of the message, so get your point across immediately.  Capture their attention, pique their interest, and push them towards the desired action (i.e. signing up for your event). You have to make them focus and you have to do it fast. Using an active voice and bullet points is great way to do this.

Always add key takeaways. Something like this....In this session, you’ll learn about:

  • You know you’ve cringed at misspellings and improper grammar before, so don’t get caught making the same mistake.
  • Get a second or even third set of eyes to review your work.
  • It reflects on your professionalism even if it has nothing to do with your event.