|Closed captioning will be available in English and Japanese for all keynotes and RSAC track sessions.
Please note: All times are in SGT.
Orchestration technologies are becoming ubiquitous, but a glance at the headlines (e.g. the Tesla hack) or search in Shodan (e.g. for etcd) demonstrates that securing those technologies is not always easy. In this P2P session, participants will share methods for securing Kubernetes and orchestration: how to track, technical strategies, and processes to ensure orchestration stays robust over time.