Event | Time | Location |
---|---|---|
Show introducing all talks and sponsors |
|
|
Keynote: The Future is Cloud-native and Your Organization Should Be Too Ciara Carey Developer Relations at Cloudsmith |
|
|
Keynote: Pushing Code: Don't Forget to Flag Your Canaries? Hammad Mushtaq Engineering Manager at Blameless |
|
|
Keynote: Preparing for disaster: going Multi-Region Ana Van Straaten DevOps Engineer at Globant |
|
|
Keynote: Optimizing operations and container lifecycle management Rajalakshmi Srinivasan Director - Product Management at Site24x7, Zoho Corp. |
|
|
Keynote: Understanding Cloud Control Plane Compromise Attacks Josh Stella Chief Architect at Snyk |
|
|
Keynote: Trust by verify - how to provide secure access to your team Nick Bergam Solutions Engineer at Teleport |
|
|
All 50 talks available on demand Pick and choose what order to watch things in |
|
Subscribe |
In 2022, your entire tech stack is likely in the Cloud - so why aren’t your software packages? Whether you’re currently on-premise, have your own in-house solution, or have a bit of a hybrid setup, join Ciara Carey, Developer Relations at Cloudsmith in this session to explore: - What does it mean to be truly cloud native? - Why enterprises are making the move - Case study: the banking sector -...
Reliability is multifaceted. Your approach to releases plays a part in that. It's smart to think forward. What's impacted? What will change? Canary releases, or phased rollouts, allows you to better manage the release lifecycle and understand any impact to reliability. Iteration and canarying is more involved than traditional big releases. You need to look at the code being deployed and flag...
Modern applications are built to run on containerized infrastructure. Businesses are migrating their existing apps from traditional to container deployments. In such a scenario, gaining end-to-end visibility of the complete container environment is a serious challenge for the IT Operators/Administrators. In this talk, we will cover the following: - New-age business complexities - How...
When the headline reads “Cloud Breach Due to Misconfiguration”, this is only a small part of the story, causing teams to focus solely on eliminating cloud resource misconfigurations and getting a false sense of security. What’s missing in these stories is the series of moves attackers make to discover knowledge about the cloud environment, move laterally, and ultimately extract data without...
Security is… well… complex. When it comes to accessing cloud resources, VPN’s have become a popular tool to solve that piece of the security puzzle. But how do traditional VPN’s hold up to today’s evolving threat landscape, and which alternatives should security-minded engineers consider? Speaker bio: Nicholas currently works as a solutions engineer at Teleport, helping companies solve their...
Learn for free, join the best tech learning community for a price of a pumpkin latte.
Event notifications, weekly newsletter
Delayed access to all content
Immediate access to Keynotes & Panels
Access to Circle community platform
Immediate access to all content
Courses, quizes & certificates
Community chats