With the advent of cloud computing, securing Containers is becoming ever more critical to organizations adopting a nimbler approach to delivering services and applications. In this presentation, Scott will share some of the basic paradigms of Container security, specifically detailing how Vulnerability Scanning is best designed. Understand the pros and cons of different models and strategies for ensuring code is deployed and maintained in a secure fashion. I have a unique view and a strong opinion about the best strategies to scan these systems for vulnerabilities, building on my experience analyzing thousands of vulnerabilities over two decades.