Andrew Martin


Hacking Kubernetes: Live Demo Marathon

Wednesday February 8th, 5:00pm-5:30pm GMT
Churchill, Ground Floor
Andrew Martin photo

Hacking Kubernetes: Live Demo Marathon

In a live evocation of the recent O’Reilly title Hacking Kubernetes (Martin, Hausenblas, 2021), this ultimate guide to threat-driven Kubernetes defence threat models and details how to attack and defend your precious clusters from nefarious adversaries.

This broad and detailed appraisal of end-to-end cluster security teaches you how to attack and defend against a range of historical and current CVEs, misconfigurations, and advanced threats:

– See the historical relevance of CVEs and demonstrations of attacks against your containers, pods, supply chain, network, storage, policy, and wider organisation
– Understand when to use next-generation runtimes like gVisor, firecracker, and Kata Containers
– Delve into workload identity and advanced runtime hardening
– Consider the trust boundaries in soft- and hard-multitenant systems to appraise and limit the effects of compromise
– Learn to navigate the choppy waters of advanced Kubernetes security


Andrew has an incisive security engineering ethos gained building and destroying high-traffic web applications.

Proficient in systems development, testing, and operations, he is at his happiest profiling and securing every tier of a cloud native system, and has battle-hardened experience delivering containerised solutions to enterprise and government.

He is co-author of Hacking Kubernetes published by O’Reilly Media in 2022,

He is founder and CEO at