4/17 (Thu.) 14:00 - 14:30 4F 4C

How Can Businesses Defend Against the Evolving Attack Methods on K8s and Container Services?

As businesses transition to cloud environments, Kubernetes (K8s) has become an essential tool, offering scalable flexibility for container services, and forming the backbone of modern cloud infrastructure. However, its complexity introduces significant security challenges. Misconfigurations are a primary risk, potentially leading to unauthorized access, data breaches, and service disruptions. With stricter global regulations on data privacy and cybersecurity, organizations must ensure K8s deployments comply with legal requirements. This agenda examines compliance needs, common attack methods targeting K8s and container services, and provides actionable recommendations to help businesses build secure, reliable K8s environments, reducing risks and enhancing operational resilience.

Aspen Yang
SPEAKER
Stark Technology Inc.
Technical Manager

TOPIC / TRACK
Cloud Security Forum
Live Translation Session

LOCATION
Taipei Nangang Exhibition Center, Hall 2
4F 4C

LEVEL
Intermediate Intermediate sessions focus on cybersecurity architecture, tools, and practical applications, ideal for professionals with a basic understanding of cybersecurity.

SESSION TYPE
Breakout Session

LANGUAGE
Chinese
Real-Time Chinese & English Translation

SUBTOPIC
Kubernetes Security
Container Security
Compliance