Loading…
In-person
1-4 April 2025
Learn More and Register to Attend

The Sched app allows you to build your schedule but is not a substitute for your event registration. You must be registered for KubeCon + CloudNativeCon Europe 2025 to participate in the sessions. If you have not registered but would like to join us, please go to the event registration page to purchase a registration.

Please note: This schedule is automatically displayed in British Summer Time (BST) (UTC +1). To see the schedule in your preferred timezone, please select from the drop-down menu to the right, above "Filter by Date." The schedule is subject to change and session seating is available on a first-come, first-served basis. 

Kubernetes has come a long way over the past 10 years, and as it has evolved, so have the security challenges surrounding it. As container security professionals, we can't help but wonder what the security landscape will look like in 2030? Pursuant to that question, we analyzed security data from thousands of clusters — including Wiz customers representing 45% of the Fortune 100 — and identified the most prominent current security trends, as well as the first hints of emerging threats.

In this session, we'll look at:
- What the data tells us today - the security risks that matter most in production right now.
- Lessons learned - which past concerns turned out to be overhyped—and which are still haunting us.
- The next big Kubernetes security challenge - the shifts in attack surfaces that will shape Kubernetes security for the next decade. Particularly, we'll dive into perimeter vulnerabilities (Ingress controllers, CNIs), cloud-cluster integrations, Kubernetes as an AI enabler, and the growing complexity of managed clusters. In addition, we'll explore what these trends mean for security teams preparing for the future. Expect real data, fresh insights, and practical strategies to help you stay ahead of the game in securing Kubernetes through 2030 and beyond.

In order to facilitate networking and business relationships at the event, you may choose to visit a third party’s booth or access sponsored content. You are never required to visit third party booths or to access sponsored content. When visiting a booth or participating in sponsored activities, the third party will receive some of your registration data. This data includes your first name, last name, title, company, address, email, standard demographics questions (i.e. job function, industry), and details about the sponsored content or resources you interacted with. If you choose to interact with a booth or access sponsored content, you are explicitly consenting to receipt and use of such data by the third-party recipients, which will be subject to their own privacy policies.

Speakers
avatar for Shay Berkovich​

Shay Berkovich​

Threat Researcher, Wiz
Shay is part of the Threat Research team in Wiz working on various aspects of container and cloud security with the emphasis on Kubernetes emerging threats. He worked previously at BlackBerry, Symantec and BlueCoat on a range of security products (CWPP, WAF, SWG) doing applied security... Read More →
Log in to leave feedback.

Sign up or log in to save this to your schedule, view media, leave feedback and see who's attending!

Share Modal

Share this link via

Or copy link