About

Do you want to get ahead with secure coding practices for access control? Do you need to add Kubernetes RBAC to your zero trust initiatives?

In this 2 hour workshop with Jimmy Mesta, CTO and Co-Founder of RAD Security , and Jim Manico, the founder of Manicode for secure coding education, you will:

  • Get an intro from Jim Manico about how to accomplish access control with secure coding
  • Get set up with a (free) local environment to deploy Kubernetes clusters - all you need is a laptop and an internet connection
  • Deploy RAD Security in the local environment
  • Bring your own audit logs or use our sample
    • Use the Cloud Native Identity Threat Detection and Response platform to:
      • Demonstrate FedRAMP and SOX compliance around Kubernetes RBAC
      • Find your riskiest identities, based on broad context across the cluster, including runtime events
      • Complete a user access review
      • Right-size the identities required to gain compliance, or that have caused a breach

Registration for this event has been closed and the event is not available on-demand. Keep on the lookout for our next workshop!

Share  this Post

DOWNLOAD

Whitepaper Download Closed

This document is no longer available for download. Check our resources page for other helpful information

Synopsis

Do you want to get ahead with secure coding practices for access control? Do you need to add Kubernetes RBAC to your zero trust initiatives?

In this 2 hour workshop with Jimmy Mesta, CTO and Co-Founder of RAD Security , and Jim Manico, the founder of Manicode for secure coding education, you will:

  • Get an intro from Jim Manico about how to accomplish access control with secure coding
  • Get set up with a (free) local environment to deploy Kubernetes clusters - all you need is a laptop and an internet connection
  • Deploy RAD Security in the local environment
  • Bring your own audit logs or use our sample
    • Use the Cloud Native Identity Threat Detection and Response platform to:
      • Demonstrate FedRAMP and SOX compliance around Kubernetes RBAC
      • Find your riskiest identities, based on broad context across the cluster, including runtime events
      • Complete a user access review
      • Right-size the identities required to gain compliance, or that have caused a breach

Registration for this event has been closed and the event is not available on-demand. Keep on the lookout for our next workshop!

Share  this Post

REGISTER

This webinar has closed.

This asset is no longer available for download.

Release Date:
February 29, 2024
SYNOPSIS

Do you want to get ahead with secure coding practices for access control? Do you need to add Kubernetes RBAC to your zero trust initiatives?

In this 2 hour workshop with Jimmy Mesta, CTO and Co-Founder of RAD Security , and Jim Manico, the founder of Manicode for secure coding education, you will:

  • Get an intro from Jim Manico about how to accomplish access control with secure coding
  • Get set up with a (free) local environment to deploy Kubernetes clusters - all you need is a laptop and an internet connection
  • Deploy RAD Security in the local environment
  • Bring your own audit logs or use our sample
    • Use the Cloud Native Identity Threat Detection and Response platform to:
      • Demonstrate FedRAMP and SOX compliance around Kubernetes RBAC
      • Find your riskiest identities, based on broad context across the cluster, including runtime events
      • Complete a user access review
      • Right-size the identities required to gain compliance, or that have caused a breach

Registration for this event has been closed and the event is not available on-demand. Keep on the lookout for our next workshop!

Share  this Post

The Speakers

No items found.
SYNOPSIS

Do you want to get ahead with secure coding practices for access control? Do you need to add Kubernetes RBAC to your zero trust initiatives?

In this 2 hour workshop with Jimmy Mesta, CTO and Co-Founder of RAD Security , and Jim Manico, the founder of Manicode for secure coding education, you will:

  • Get an intro from Jim Manico about how to accomplish access control with secure coding
  • Get set up with a (free) local environment to deploy Kubernetes clusters - all you need is a laptop and an internet connection
  • Deploy RAD Security in the local environment
  • Bring your own audit logs or use our sample
    • Use the Cloud Native Identity Threat Detection and Response platform to:
      • Demonstrate FedRAMP and SOX compliance around Kubernetes RBAC
      • Find your riskiest identities, based on broad context across the cluster, including runtime events
      • Complete a user access review
      • Right-size the identities required to gain compliance, or that have caused a breach

Registration for this event has been closed and the event is not available on-demand. Keep on the lookout for our next workshop!

Share  this Post

Put RAD’s AI To Work