Session Title | Attacking & Securing Kubernetes Clusters
This session aims to explain how Kubernetes works and the effective role it plays in the Devops lifecycle. The session also discusses different techniques in which Kubernetes Clusters can be attacked, explaining some real world scenarios for those attacks and the best practices through which to protect them from cyber attacks.
Mohammad Khreesha, a Cybersecurity Consultant, Manager, Youtuber, blogger, and public speaker from Jordan with +15 years of experience in IT especially in Security. He is OWASP Amman Chapter Leader and Founder of technawi blog, founder of JISCTF which is the first CTF in Jordan with more 150+ yearly participants. His research interests in digital forensics, malware analysis, web & network security, Threat Hunting, and their integration with AI. He has a YouTube channel in which he publishes training courses and tips in Cybersecurity field to feed the Arabic content on the internet.” Mohammad gained the following Technical Certificates: CEH, CHFI, ECSA, LPT Master, CRTP, OSCP, eCPPT, eCPTXv2, eWPT, eWPTXv2, ISO 27001 LI. He has a MSc. in Cyber Security from the University of Bedfordshire.