The Importance of Container Security in Preventing Cyber Threats
IEEE Section Night - NOW AS A WEBINAR!
Webinar link and password will be forwarded to all registered participants after Noon on the day of the meeting. Check your spam folder if you don't see the email.
Webinar is open to all.
The Importance of Container Security in Preventing Cyber Threats
Abstract Container technology has revolutionized the way applications are deployed and run; however, this has also led to an increase in security concerns. Containers are vulnerable to various attacks such as application vulnerabilities, network attacks, configuration errors, and resource exhaustion. To ensure the safety of containers and the data they handle, it is important to implement various security measures, including encryption for sensitive data, access controls, disaster recovery strategies, network segmentation, and regular monitoring. Additionally, it is important to verify the integrity of container images before deploying them and keep the software up-todate with the latest security patches.
What is Container Security? The concept of Container Security refers to the techniques, processes, and tools employed to secure containers. Unlike traditional cybersecurity setups, containerized environments are more intricate and thus necessitate more specific tools and strategies.
What exactly is a Container? A container is a bundle of software files that comprise everything required to run an application, including the application code, runtime, dependencies, libraries, and more. Containers have revolutionized operations by converting physical, single-user computing resources into a more efficient, virtual, and multi-user infrastructure. The container framework, popularized by Docker, streamlines, and quickens application deployment by bundling operating system components, applications, and dependencies into separate layers within a container image.
To put it simply, a container image is an unalterable software package that holds all the necessary components for an application to run. Developers are rapidly adopting containers as they: • Align well with the current cloud-native application development methodologies. • Ensure that applications function identically regardless of the environment they’re run in. • Enable a microservice approach, making rapid application development and deployment more achievable.
Date and Time
Location
Hosts
Registration
- Date: 17 Jun 2025
- Time: 11:00 PM UTC to 12:00 AM UTC
-
Add Event to Calendar
- Starts 21 May 2025 09:00 AM UTC
- Ends 17 June 2025 04:00 PM UTC
- Admission fee ?
Speakers
Enoch Anbu Arasu Ponnuswamy
The Importance of Container Security in Preventing Cyber Threats
Biography:
Enoch is a seasoned Security Architect and Information (Cyber) Security Technology Lead, with over 20 years of experience in a variety of roles across global organizations. A key contributor to enhancing cyber security postures and managing information security risks, Enoch has developed and implemented comprehensive strategies and solutions to mitigate risk, threats, vulnerabilities, and attacks. A visionary and detail-oriented security technologist, Enoch has a proven track record in secure design models, remediation of vulnerabilities, multi-cloud security, and cyber resilience. His expertise spans multiple domains, including cloud security, application/data security, IAM, compliance, risk management, and access control systems. Enoch continually explores emerging technologies to identify and implement innovative security solutions that align with business goals. Passionate about protecting organizations and their data from cyber threats, Enoch remains dedicated to staying current with industry best practices and the latest technologies. His specialties include Cloud Security (AWS/Azure), Security Architecture and Models, Software Development Security, Threat Modeling, Information Security Governance and Risk Management, Security Program Development and Management, Incident Response, Cyber Resilience, Access Control Systems, Business Continuity and Disaster Recovery Planning, and Identity and Access Management (IAM).
Address:United States
Agenda
WEBINAR: 7:00 - 8:00 P.M.
The Zoom Webinar link and password will be forwarded to all registered participants after Noon on the day of the meeting. Check your spam folder if you don't see the email.
Webinar is open to all.
PDH certificates are available and an evaluation form will be emailed to you after the meeting. PDH certificate are sent by IEEE USA 3-4 weeks after the meeting.