Workshop
Sponsored
Virtual
LiveDay NYC
LiveDay LDN
On demand
BST
11:00 am
EDT
Jun 27

What supply chain risks are hidden in your Helm charts?

Helm charts simplify Kubernetes deployments but pose security risks. This talk covers vulnerabilities, attack scenarios, and best practices for securing Helm charts, ensuring supply chain security and compliance.
Helm is the go-to package manager for Kubernetes. It simplifies deployments but introduces security risks. Misconfigured charts, unverified dependencies, and lax RBAC settings can lead to supply chain attacks. As Kubernetes adoption grows, these challenges increase.

Organizations using Amazon EKS, Google GKE, or self-managed clusters must secure their Helm charts to prevent privilege escalation and data exfiltration. This talk examines real-world threats and demonstrates how Cloudsmith’s comprehensive artifact management helps teams verify and secure Helm charts, allowing only trusted assets into their environments.
Workshop
Sponsored
Fr 27 June
Virtual
Virtual
Virtual
On demand

What supply chain risks are hidden in your Helm charts?

Helm charts simplify Kubernetes deployments but pose security risks. This talk covers vulnerabilities, attack scenarios, and best practices for securing Helm charts, ensuring supply chain security and compliance.
Fr 27 June
EDT time
EDT
5:00 pm
CEST
11:00 am
EDT
BST
Presented by
Panelist
Panelist
Panelist
Moderator
Nigel Douglas
Head of Developer Relations, Cloudsmith
Tell everyone
Helm is the go-to package manager for Kubernetes. It simplifies deployments but introduces security risks. Misconfigured charts, unverified dependencies, and lax RBAC settings can lead to supply chain attacks. As Kubernetes adoption grows, these challenges increase.

Organizations using Amazon EKS, Google GKE, or self-managed clusters must secure their Helm charts to prevent privilege escalation and data exfiltration. This talk examines real-world threats and demonstrates how Cloudsmith’s comprehensive artifact management helps teams verify and secure Helm charts, allowing only trusted assets into their environments.
Workshop
Sponsored
Virtual
LiveDay NYC
LiveDay LDN
On demand
Fr 27 June

What supply chain risks are hidden in your Helm charts?

Helm charts simplify Kubernetes deployments but pose security risks. This talk covers vulnerabilities, attack scenarios, and best practices for securing Helm charts, ensuring supply chain security and compliance.
5:00 pm
CEST
BST
11:00 am
EDT
Duration:
90min
60min
Presented by
Tell everyone
Helm is the go-to package manager for Kubernetes. It simplifies deployments but introduces security risks. Misconfigured charts, unverified dependencies, and lax RBAC settings can lead to supply chain attacks. As Kubernetes adoption grows, these challenges increase.

Organizations using Amazon EKS, Google GKE, or self-managed clusters must secure their Helm charts to prevent privilege escalation and data exfiltration. This talk examines real-world threats and demonstrates how Cloudsmith’s comprehensive artifact management helps teams verify and secure Helm charts, allowing only trusted assets into their environments.
Workshop
Sponsored
Virtual
LiveDay NYC
LiveDay LDN
On demand
BST
11:00 am
EDT
Jun 27

What supply chain risks are hidden in your Helm charts?

Helm charts simplify Kubernetes deployments but pose security risks. This talk covers vulnerabilities, attack scenarios, and best practices for securing Helm charts, ensuring supply chain security and compliance.
Presented by
Panelist
Panelist
Panelist
Host
Nigel Douglas
Head of Developer Relations, Cloudsmith
Tell everyone
Sign up now