
Use this report to understand the breadth of Kubernetes’ mandatory security requirements and discover best practices to protect Kubernetes environments.
Get access to a single webinar that is currently outside of your subscription.
Price: $300 (USD)
Partner with Forrester Research to get access to webinars, insights and frameworks aligned to your role. Shorten the time between a great idea and a great outcome, helping your teams win in the age of the customer.
Kubernetes is a complex and abstract set of APIs that orchestrate containerized applications at scale, one that poses new challenges for security teams. Yet the cloud native ecosystem has provided a space for collaboration among open source project maintainers, vendors, and users, who, together, are transforming Kubernetes’ open-by-default architecture into a flexible way to build modern security for containerized applications with a Zero Trust approach. Join us as we walk through the range of Kubernetes security requirements and discuss best practices to protect Kubernetes environments.
Key takeaways:
You'll receive an email with dialing and Webex instructions prior to the Webinar.
See the Webinar FAQs for answers to technical and other Webinar questions.
Use this report to understand the breadth of Kubernetes’ mandatory security requirements and discover best practices to protect Kubernetes environments.
Use this this tool to effectively implement Kubernetes native configurations, community tools, and commercial products for security requirements.
Security leaders should read this report to discover technical and non-technical best practices that they can adopt to protect their containerized application
Ramping up K8s can be challenging. Infrastructure must align with platform team capacity, and development environments require curation.
This report provides an overview of various Kubernetes strategies to help organizations pick the path that will suit them best.
Organizations are moving quickly to embrace agentic AI for a myriad of use cases. Agentic AI, however, introduces cybersecurity challenges that traditional security frameworks and approaches can’t adequately address. Agentic technologies shift cybersecurity paradigms by promoting emergent behaviors to meet objectives, making it essential for security leaders to control intent at scale. As these technologies spread across organizations, establishing enterprise guardrails is critical for secure deployment.This webinar explores the unique cybersecurity challenges posed by agentic AI and strategies to effectively address them. The session will introduce Forrester’s AEGIS Framework, a comprehensive security model based on six domains: governance, identity and access management, data security, application security, threat management, and Zero Trust architecture principles. Attendees will learn best practices for securing agentic AI, emphasizing phased processes, human oversight, “least agency” principles, and dynamic security adjustments as AI systems evolve.Key takeaways: Why securing agentic AI is a challenge security teams must address nowHow the AEGIS framework helps security leaders secure agentic AIWhy intent is as important as outcomesWhat the core principles of securing agentic AI areHow to implement and mature AEGIS in a phased approachTarget audience level: intermediate
Connected product engineering services providers help their clients imagine, design, test, build, sell, or maintain connected products. These connected products combine a physical product with supporting apps and digital services and can include anything from a connected toothbrush or coffee machine to software-defined vehicles and smart factories. In this webinar, we look at our most recent evaluation of providers in this market.Key takeaways: Learn which connected product engineering services providers we evaluated in our research, and how they performed.Understand the broad range of tasks a connected product engineering services provider may be called on to tackle. Explore when and how your organization might want to engage with a connected product engineering services firm.Target audience level: all levels
Every B2B sales rep wants professional development, but no one wants to take time from selling to participate in learning. For years, both HR and sales leaders defaulted to traditional learning management systems to provide sales training for reps, only to see invitations ignored and attendance embarrassingly low.In this webinar, learn how HR-owned LMS tools differ from revenue enablement platforms and how the latter better suit real-time training delivery to improve your sellers' competencies most effectively.Key takeaways: Learn how to reverse-engineer your sales training technology environment to suit learner needs.Discover what high-performing B2B sales organizations do to optimize learning participation and adoption.Identify which best practices in adult learning are best supported by properly integrated technologies.Target audience level: intermediate
Disruptive technologies are a double-edged sword for environmental sustainability, offering both crucial enablers and significant challenges. On the positive side, technology innovations accelerate energy and resource efficiency, aid in climate adaptation and risk mitigation, monitor crucial sustainability metrics, and even help in environmental conservation. However, the necessary compute power, volume of waste, types of materials needed, and scale of implementing these technologies can offset their benefits.In this webinar, we discuss our latest report, which explores the dual roles of six disruptive technologies, and illustrate the beneficial use cases to guide sustainability and technology leaders on how to use them for good.Key takeaways: Explore the case studies and examples on leveraging disruptive technologies to focus on optimization.Learn about the disruptive technologies that will make the most impact in sustainability in 2025.Target audience level: beginner and intermediate
Today’s public sector environment changes daily. Tech leaders in government groups are pushed to maximize the budget they have. The most logical place to start? Portfolio rationalization. Techniques such as project prioritization, resource allocation, and redundancy elimination are essential to streamline operations and enhance overall efficiency. Although these steps will help drive down cost — the goal is creating a more adaptive platform that is responsive to changing needs and capable of integrating advanced technologies, including AI. This AI-ready framework enables agencies to leverage data-driven insights for better decision-making, predictive analytics for future planning, and automation to reduce manual workloads, ultimately driving innovation and delivering superior outcomes for their constituents.Key takeaways: Learn how to assess and rank projects based on strategic importance and resource availability to ensure optimal portfolio composition.Discover techniques to streamline operations by removing overlapping or unnecessary initiatives, thereby improving efficiency.Gain insights into effective resource management strategies that enhance operational effectiveness and drive better outcomes for government agencies.Target audience level: beginner and intermediate
Generative AI (genAI) has distinct security-, efficiency-, and agility-boosting effects in customer identity and access management (IAM), anti-money laundering (AML), and fraud management. This webinar highlights how to use these capabilities.Key takeaways: Learn the uses of genAI in customer IAM.Discover the uses of genAI in fraud management and AML.Explore the risks of genAI and how to overcome them.Target audience level: intermediate and advanced