About

Synopsis

Does your team need to level up on its offensive and defensive capabilities for Kubernetes in the New Year?

Kick off 2024 right with a Red/Blue teaming workshop led by Jimmy Mesta, CTO and Co-Founder of RAD Security. In this two part series you will deploy high severity security risks into a live environment, and walk through the detection as well as the response for each of them. The workshop has two parts:

Part I - installing clusters:

  • Deploy a local cluster as our learning environment using Docker
  • Deploy RAD Security onto the cluster

Part II - Red/Blue teaming:

  • Upload a dozen high risk scenarios into the cluster and walk through the detection, plus the response to each of them
  • Create and execute an SBOM for log4j (or a CVE of your choosing)
  • Deploy admission control in ‘blocking’ and ‘would block’ mode
  • Upload audit logs and right-size the top riskiest identities

Spots are limited, as this is a hands-on workshop. Register now to reserve your spot!

Share  this Post

DOWNLOAD

Whitepaper Download Closed

This document is no longer available for download. Check our resources page for other helpful information

Synopsis

Synopsis

Does your team need to level up on its offensive and defensive capabilities for Kubernetes in the New Year?

Kick off 2024 right with a Red/Blue teaming workshop led by Jimmy Mesta, CTO and Co-Founder of RAD Security. In this two part series you will deploy high severity security risks into a live environment, and walk through the detection as well as the response for each of them. The workshop has two parts:

Part I - installing clusters:

  • Deploy a local cluster as our learning environment using Docker
  • Deploy RAD Security onto the cluster

Part II - Red/Blue teaming:

  • Upload a dozen high risk scenarios into the cluster and walk through the detection, plus the response to each of them
  • Create and execute an SBOM for log4j (or a CVE of your choosing)
  • Deploy admission control in ‘blocking’ and ‘would block’ mode
  • Upload audit logs and right-size the top riskiest identities

Spots are limited, as this is a hands-on workshop. Register now to reserve your spot!

Share  this Post

REGISTER

This webinar has closed.

This asset is no longer available for download.

Release Date:
February 6, 2024
SYNOPSIS

Synopsis

Does your team need to level up on its offensive and defensive capabilities for Kubernetes in the New Year?

Kick off 2024 right with a Red/Blue teaming workshop led by Jimmy Mesta, CTO and Co-Founder of RAD Security. In this two part series you will deploy high severity security risks into a live environment, and walk through the detection as well as the response for each of them. The workshop has two parts:

Part I - installing clusters:

  • Deploy a local cluster as our learning environment using Docker
  • Deploy RAD Security onto the cluster

Part II - Red/Blue teaming:

  • Upload a dozen high risk scenarios into the cluster and walk through the detection, plus the response to each of them
  • Create and execute an SBOM for log4j (or a CVE of your choosing)
  • Deploy admission control in ‘blocking’ and ‘would block’ mode
  • Upload audit logs and right-size the top riskiest identities

Spots are limited, as this is a hands-on workshop. Register now to reserve your spot!

Share  this Post

The Speakers

No items found.
SYNOPSIS

Synopsis

Does your team need to level up on its offensive and defensive capabilities for Kubernetes in the New Year?

Kick off 2024 right with a Red/Blue teaming workshop led by Jimmy Mesta, CTO and Co-Founder of RAD Security. In this two part series you will deploy high severity security risks into a live environment, and walk through the detection as well as the response for each of them. The workshop has two parts:

Part I - installing clusters:

  • Deploy a local cluster as our learning environment using Docker
  • Deploy RAD Security onto the cluster

Part II - Red/Blue teaming:

  • Upload a dozen high risk scenarios into the cluster and walk through the detection, plus the response to each of them
  • Create and execute an SBOM for log4j (or a CVE of your choosing)
  • Deploy admission control in ‘blocking’ and ‘would block’ mode
  • Upload audit logs and right-size the top riskiest identities

Spots are limited, as this is a hands-on workshop. Register now to reserve your spot!

Share  this Post

Put RAD’s AI To Work