Is everything OK with your Kubernetes?

Dear friends,

Today, we'll continue introducing you to the speakers of the Tech Internals Conf 2024. We'll be highlighting talks on Kubernetes security. But first, let's talk about a special offer for you and your friends ;)

We've decided to support those of you who love attending conferences with friends and prefer to buy tickets on your own. Starting today, when you buy two tickets at once, you'll get a 10% discount on both. Just enter the promo code DOUBLETICKET when making purchase.

Book your tickets 

This offer is only valid for individual attendees. If you're interested in corporate discounts, please email us at support@internals.tech.


Kubernetes, an open-source platform for container management, focuses on automation and easy configuration. With its growing ecosystem and extensive tools, securing your container infrastructure becomes essential to protect data, prevent breaches, and guarantee dependable app performance. Hence, it's one of the key topics at our conference.

Artem BachevskyContainer and Kubernetes: modern attacks and mitigations by Artem Bachevsky from MTS RED (Kyrgyzstan)

Each new technology brings us not only speed and convenience, but also dozens of attack vectors, which, in turn, give new defense tools.

And solving the problem of protecting your container infrastructure, it would be nice to understand the tactics and techniques of attacks on it, as well as to understand how to prevent and detect them.

In the talk we will try to understand the top of the threats of containers on each stage of attack and operation mapped on popular framework matrices. And what to check after you return to the office!

Roman LevkinSecuring Kubernetes: why you should master the Admission Control by Roman Levkin from Exness (Limassol)

The "New Linux" as it is sometimes called, Kubernetes relies on the same "old" information security controls we are used to. But it also brings the fresh ones! This technical talk aims to get you familiar with one of them – Admission Control. 

Beginning with the overview and the reason to use, going further providing non-obvious use cases accompanied with practical tips and tricks, we arise a provocative question – is this the most important control you should pay attention to when hardening your clusters?

Book your tickets 


See you soon!
The Tech Internals Conf Team