In-Person Event

Security Symposium, New England 2019

December 12, 2019Waltham, MassachusettsThe Westin Waltham Boston

Presentations

SECURING THE MODERN ENTERPRISE USING OPEN SOURCE

Join the Security Symposium, where cybersecurity professionals can learn and network alongside Red Hat and Intel security experts, partners, and industry peers. No one can solve IT security issues alone. Solving problems together as a community is the future of technology.

 

WHAT TO EXPECT

The Security Symposium is a full-day event with industry experts covering the latest upstream and enterprise security developments. Attendees will network and collaborate with peers and Red Hat engineers to discuss security challenges organizations face.

 

WHO SHOULD ATTEND

IT business leaders, security professionals, operations professionals, and application developers who are focused on securing their organization’s infrastructure and applications.

8:00 a.m. - 8:30 a.m.
Registration and breakfast
8:30 a.m. - 9:15 a.m.
Red Hat welcome and Intel presentation, Security built-in and built to last
Jason Lamb, Data Center Cloud Technology Strategist and Digital Transformation Expert, Intel
9:15 a.m. - 10:00 a.m.
Automating security and compliance in the world of containers and hybrid cloud
Lucy Kerner, Senior Principal Security Global Technical Evangelist and Strategist, Red Hat
10:00 a.m. - 10:15 a.m.
Break
10:15 a.m. - 11:15 a.m.
Security concerns in container runtimes
Dan Walsh, Senior Distinguished Engineer, Red Hat
11:15 p.m. - 12:00 p.m.
Simplifying security through Red Hat Satellite and Insights
Bill Hirsch, Principal Solutions Architect, Red Hat
12:00 p.m. - 12:30 p.m.
Networking lunch
12:30 p.m. - 3:00 p.m.
Hands-on security workshop: Defending your hybrid-cloud with Red Hat automation and security technologies
Dave Sirrine, Senior Solution ArchitectRed Hat
Kenny Peeples, Principal Consultant, Red Hat
12:30 p.m. - 2:00 p.m.
“Ask the experts” office hours, stop by to speak with our security experts to have your questions answered one-on-one
3:00 p.m. - 4:00 p.m. Join us for a holiday networking happy hour

Location
The Westin Waltham Boston
70 3rd Avenue
Waltham, Massachusetts  02451


Time: 8:00 a.m. – 4:00 p.m.

Parking is free, validated on-site by Red Hat.

Any questions? Please contact infrastructure@redhat.com

Creating Customized Security Policy Content to Automate Security Compliance

This lab will introduce you to the ComplianceAsCode project, the ultimate tool that creates content for automated security tools.  ComplianceAsCode enables automated evaluation and fast and efficient remediations against security controls for compliance with regulatory or custom profiles and for automated configuration compliance. It allows you to produce a tailor-made security policy for your company with minimal effort, and the OpenSCAP ecosystem can do the scanning and support for problem resolution.

Implementing Proactive Security and Compliance Automation and DevSecOps

In this hands-on lab, you’ll learn how to implement security and compliance automation at scale for the infrastructure, operations, and application across a hybrid environment, in a controlled way, using a combination of various Red Hat products and technologies. You will experience how to create and enforce control policies in an automated way, perform automated security scans and remediations for various different security profiles and security controls, do proactive security and automated risk management, implement automated web application hardening, and more.

Defend Yourself Using Built-in Red Hat Enterprise Linux Security Technologies

In this lab, you’ll learn how you can build defense-in-depth in the OS by implementing the key security technologies available to you in the latest version of Red Hat Enterprise Linux. You will implement security compliance with OpenSCAP, Audit, AIDE, session recording, and system wide crypto policies; physical security with USBGuard; network security with firewalld, SELinux port security, and IPSec; access management with Ansible system roles, Identity Management, and SELinux process isolation; and data security with Linux Unified Key Setup(LUKS), Network Bound Disk Encryption, and GNU Privacy Guard.