Workshop
Sponsored
Fr 27 June
BST
11:00 am
EDT
Jun 27
Virtual
Virtual
Virtual
On demand

What supply chain risks are hidden in your Helm charts?

Helm charts simplify Kubernetes deployments but pose security risks. This hands-on workshop covers vulnerabilities, attack scenarios, and best practices for securing Helm charts, ensuring supply chain security and compliance.
Helm is the go-to package manager for Kubernetes. It simplifies deployments but introduces security risks. Misconfigured charts, unverified dependencies, and lax RBAC settings can lead to supply chain attacks. As Kubernetes adoption grows, these challenges increase.


Organizations using Amazon EKS, Google GKE, or self-managed clusters must secure their Helm charts to prevent privilege escalation and data exfiltration. Attendees will be provided with access to an interactive Instruqt lab environment that examines real-world threats and demonstrates how to scan for vulnerabilities using open-source tooling, enforce security best practices, and correctly sign and verify our Helm charts before they go into production Kubernetes.
Workshop
Sponsored
Fr 27 June
Virtual
Virtual
Virtual
On demand

What supply chain risks are hidden in your Helm charts?

Helm charts simplify Kubernetes deployments but pose security risks. This hands-on workshop covers vulnerabilities, attack scenarios, and best practices for securing Helm charts, ensuring supply chain security and compliance.
Fr 27 June
EDT time
EDT
5:00 pm
CEST
11:00 am
EDT
BST
Presented by
Panelist
Panelist
Panelist
Moderator
Nigel Douglas
Head of Developer Relations, Cloudsmith
Tell everyone
Helm is the go-to package manager for Kubernetes. It simplifies deployments but introduces security risks. Misconfigured charts, unverified dependencies, and lax RBAC settings can lead to supply chain attacks. As Kubernetes adoption grows, these challenges increase.


Organizations using Amazon EKS, Google GKE, or self-managed clusters must secure their Helm charts to prevent privilege escalation and data exfiltration. Attendees will be provided with access to an interactive Instruqt lab environment that examines real-world threats and demonstrates how to scan for vulnerabilities using open-source tooling, enforce security best practices, and correctly sign and verify our Helm charts before they go into production Kubernetes.
Workshop
Sponsored
Virtual
LiveDay NYC
LiveDay LDN
On demand
Fr 27 June

What supply chain risks are hidden in your Helm charts?

Helm charts simplify Kubernetes deployments but pose security risks. This hands-on workshop covers vulnerabilities, attack scenarios, and best practices for securing Helm charts, ensuring supply chain security and compliance.
5:00 pm
CEST
BST
11:00 am
EDT
Duration:
90min
60min
Presented by
Tell everyone
Helm is the go-to package manager for Kubernetes. It simplifies deployments but introduces security risks. Misconfigured charts, unverified dependencies, and lax RBAC settings can lead to supply chain attacks. As Kubernetes adoption grows, these challenges increase.


Organizations using Amazon EKS, Google GKE, or self-managed clusters must secure their Helm charts to prevent privilege escalation and data exfiltration. Attendees will be provided with access to an interactive Instruqt lab environment that examines real-world threats and demonstrates how to scan for vulnerabilities using open-source tooling, enforce security best practices, and correctly sign and verify our Helm charts before they go into production Kubernetes.
Workshop
Sponsored
Virtual
LiveDay NYC
LiveDay LDN
On demand
BST
11:00 am
EDT
Jun 27

What supply chain risks are hidden in your Helm charts?

Helm charts simplify Kubernetes deployments but pose security risks. This hands-on workshop covers vulnerabilities, attack scenarios, and best practices for securing Helm charts, ensuring supply chain security and compliance.
Presented by
Panelist
Panelist
Panelist
Host
Nigel Douglas
Head of Developer Relations, Cloudsmith
Tell everyone
Sign up now