Protecting Your Data in Kubernetes


Think About Your Audience Before Choosing a Webinar Title

Sponsored by ZETTASET

Monday, November 2, 2020
1 p.m. EDT
The proliferation of today’s digital work environment, coupled with the sprawl of remote customers and partners, has created an increasingly complex IT infrastructure. To keep up with the constant challenges of this new digital reality, many organizations have ramped up their development and use of cloud technology. Because of this, we are witnessing an increased adoption of containerization and naturally, in order to orchestrate the sprawl of containerized applications, we have also witnessed an uptick in Kubernetes.

This begs the question: How are companies handling the security of Kubernetes deployments? Are they taking the right precautionary measures to ensure the protection of data stored in these cloud-native environments?

This webinar looks at:

  • How organizations are deploying, using and managing containers and Kubernetes
  • Security of Kubernetes deployments
  • The best practices and technologies organizations should consider when approaching the security of data stored in containers and Kubernetes environments
Tim Reilly
CEO at Zettaset

Tim brings more than 25 years of successful public and private experience in the high-tech industry filling key operational roles within product line business units and venture capital funded companies through all stages of growth. During his time at Zettaset, the company has successfully grown its software-defined encryption portfolio to provide a comprehensive data protection solution across all physical, virtual and cloud environments. Prior to joining Zettaset, Tim was VP of finance and operations at Trapeze Networks, where he helped build the company into a leading provider of Wireless LAN equipment which was later acquired by Juniper Networks. Tim also served as VP of finance at Nicira (acquired by VMware), netVmg (acquired by Internap) and in various financial roles at WorldxChange.

Security Strategist | Visionary | Forecaster Historian | Advisor | Speaker
Charles J. Kolodgy is a security strategist, visionary, forecaster, historian, and advisor who has been involved in the cyber security field for over 30 years. His views and understanding of information and computer security were shaped during his years at the National Security Agency. During that time he held a variety of analyst and managerial positions within both the information assurance and operations directorates. Following NSA is was a a research vice president covering security markets for IDC and then a senior security strategist for IBM Security.
Over the years he has identified market trends and authored numerous documents to explain market realities and has been a speaker at many security conferences and events, including the RSA Conference, CIO Conference, CEIG, and IANS. He has been widely quoted in the press.
He is best known for naming and defining the Unified Threat Management (UTM) market which continues to be one of the strongest cyber security markets with vendor revenue of $3 billion per year. He has been a leading analyst on software security, encryption, and the human element.
Charles holds a B.A. in Political Science from the University of Massachusetts at Lowell and an M.A. in National Security Studies from Georgetown University.
Mitchell Ashley
CEO - Accelerated Strategies Group
Mitchell Ashley is a renowned strategist and technology executive. Mitchell has led successful IT, SaaS, and cybersecurity transformations. He’s led multiple teams in developing and bringing to market successful online services, cybersecurity, and networking products and services.
Mitch serves as CEO & Managing Analyst of Accelerated Strategies Group where he leads a team of preeminent experts in digital transformation, DevOps, cloud-native, and cybersecurity. In this role, Mitch works with companies to align digital transformation and technology strategies to achieve disruptive goals and high impact results. Mitch is in high demand as a speaker at conferences the world over, and his popular DevOps Chats podcast engaging with digital leaders is one of the most widely followed in the field.

On-Demand Viewing:

What You’ll Learn in This Webinar

You’ve probably written a hundred abstracts in your day, but have you come up with a template that really seems to resonate? Go back through your past webinar inventory and see what events produced the most registrants. Sure – this will vary by topic but what got their attention initially was the description you wrote.

Paint a mental image of the benefits of attending your webinar. Often times this can be summarized in the title of your event. Your prospects may not even make it to the body of the message, so get your point across immediately.  Capture their attention, pique their interest, and push them towards the desired action (i.e. signing up for your event). You have to make them focus and you have to do it fast. Using an active voice and bullet points is great way to do this.

Always add key takeaways. Something like this....In this session, you’ll learn about:

  • You know you’ve cringed at misspellings and improper grammar before, so don’t get caught making the same mistake.
  • Get a second or even third set of eyes to review your work.
  • It reflects on your professionalism even if it has nothing to do with your event.