<img src="https://certify.alexametrics.com/atrk.gif?account=Zpb+p1uhUo20dG" style="display:none" height="1" width="1" alt="">
Protecting Cloud-Native Apps and APIs in Kubernetes Environments


Think About Your Audience Before Choosing a Webinar Title

Sponsored by WALLARM

Thursday, January 28, 2021
1 p.m. ET

This practical webinar will cover techniques to build a robust security layer for your apps and APIs with a set of open-source or commercial tools. With the set of modules and tricks, everyone can get security visibility and real-time protection against OWASP Top10 attacks, bots, application abuse, and potential data leakage issues. We will provide practical methods that your Dev, Sec and Ops teams can use.
Topics covered:

Alerting and visibility

    • Building a security dashboard to gain visibility of malicious traffic
    • Easy & flexible alerting with NGINX and ElasticSearch
    • Elegant analysis of web server log files for anomalies
    • Mirroring traffic for async analysis with third party tools

APIs and microservices security

    • Mitigating OWASP Top10 threats (SQL injections, XXE, XSS etc.)
    • Up-to-date WAF options overview
    • Proper WAF configurations and reducing false-positives
    • Detecting information data leakage events
    • Blocking traffic from Tor, data-centers and malicious IP addresses

Protecting from bots and behavioral attacks

    • Fingerprinting and blocking bots, account take-over attacks and identifying good crawlers (Google bot, etc.)
    • Catching scrapers with hidden links and honeypot

Protecting APIs and microservices in your Kubernetes environments and microservices in your Kubernetes environments

    • How and why to add a security layer on top of NGINX Ingress controller in cloud-native environments
    • How and why to add a security layer on top of NGINX Ingress controller in cloud-native environments
    • Sidecar deployment
Wallarm Product Demo
    • Gain visibility and 360-degree protection in your multicloud environments
Stepan Iliyn
Co-Founder - Wallarm

Stepan is the co-founder of Wallarm, which is a Silicon Valley based company that protects customers’ most critical web applications, APIs, and microservices. By overseeing product and growth, Stepan has brought the company from zero to more than a hundred customers, and in addition, millions of dollars worth of revenue.

Victor Gartvich
VP of Security Solutions - Wallarm

Seasoned technology professional, in charge of Wallarm's product management. Most recently Victor was leading security and DevOps efforts at Lacework, another emerging Silicon Valley security company. Prior to that Victor spent four years leading product and engineering activities at an AppSec and performance startup, Nuubit.

On-Demand Viewing:

What You’ll Learn in This Webinar

You’ve probably written a hundred abstracts in your day, but have you come up with a template that really seems to resonate? Go back through your past webinar inventory and see what events produced the most registrants. Sure – this will vary by topic but what got their attention initially was the description you wrote.

Paint a mental image of the benefits of attending your webinar. Often times this can be summarized in the title of your event. Your prospects may not even make it to the body of the message, so get your point across immediately.  Capture their attention, pique their interest, and push them towards the desired action (i.e. signing up for your event). You have to make them focus and you have to do it fast. Using an active voice and bullet points is great way to do this.

Always add key takeaways. Something like this....In this session, you’ll learn about:

  • You know you’ve cringed at misspellings and improper grammar before, so don’t get caught making the same mistake.
  • Get a second or even third set of eyes to review your work.
  • It reflects on your professionalism even if it has nothing to do with your event.