Join the Security Symposium, where cybersecurity professionals can learn and network alongside Red Hat and Intel security experts, partners, and industry peers. No one can solve IT security issues alone. Solving problems together as a community is the future of technology.
The Security Symposium is a full-day event with industry experts covering the latest upstream and enterprise security developments. Attendees will network and collaborate with peers and Red Hat engineers to discuss security challenges organizations face.
IT business leaders, security professionals, operations professionals, and application developers who are focused on securing their organization’s infrastructure and applications.
Important Notice | |
|
|
8:00 a.m. - 8:30 a.m.
|
Registration and breakfast
|
8:30 a.m. - 9:15 a.m.
|
Red Hat welcome and Intel presentation, Security built-in and built to last
Jason Lamb, Data Center Cloud Technology Strategist and Digital Transformation Expert, Intel
|
9:15 a.m. - 10:00 a.m.
|
Automating security and compliance in the world of containers and hybrid cloud
Lucy Kerner, Senior Principal Security Global Technical Evangelist and Strategist, Red Hat
|
10:00 a.m. - 10:15 a.m.
|
Break
|
10:15 a.m. - 11:15 a.m.
|
Security concerns in container runtimes
Dan Walsh, Senior Distinguished Engineer, Red Hat
|
11:15 p.m. - 12:00 p.m.
|
Simplifying security through Red Hat Satellite and Insights
Bill Hirsch, Principal Solutions Architect, Red Hat
|
12:00 p.m. - 12:30 p.m.
|
Networking lunch
|
12:30 p.m. - 3:00 p.m.
|
Hands-on security workshop: Defending your hybrid-cloud with Red Hat automation and security technologies
Dave Sirrine, Senior Solution Architect, Red Hat
Kenny Peeples, Principal Consultant, Red Hat
|
12:30 p.m. - 2:00 p.m.
|
“Ask the experts” office hours, stop by to speak with our security experts to have your questions answered one-on-one
|
3:00 p.m. - 4:00 p.m. | Join us for a holiday networking happy hour |
Location:
The Westin Waltham Boston
70 3rd Avenue
Waltham, Massachusetts 02451
Time: 8:00 a.m. – 4:00 p.m.
Parking is free, validated on-site by Red Hat.
Any questions? Please contact infrastructure@redhat.com
Creating Customized Security Policy Content to Automate Security Compliance
This lab will introduce you to the ComplianceAsCode project, the ultimate tool that creates content for automated security tools. ComplianceAsCode enables automated evaluation and fast and efficient remediations against security controls for compliance with regulatory or custom profiles and for automated configuration compliance. It allows you to produce a tailor-made security policy for your company with minimal effort, and the OpenSCAP ecosystem can do the scanning and support for problem resolution.
Implementing Proactive Security and Compliance Automation and DevSecOps
In this hands-on lab, you’ll learn how to implement security and compliance automation at scale for the infrastructure, operations, and application across a hybrid environment, in a controlled way, using a combination of various Red Hat products and technologies. You will experience how to create and enforce control policies in an automated way, perform automated security scans and remediations for various different security profiles and security controls, do proactive security and automated risk management, implement automated web application hardening, and more.
Defend Yourself Using Built-in Red Hat Enterprise Linux Security Technologies
In this lab, you’ll learn how you can build defense-in-depth in the OS by implementing the key security technologies available to you in the latest version of Red Hat Enterprise Linux. You will implement security compliance with OpenSCAP, Audit, AIDE, session recording, and system wide crypto policies; physical security with USBGuard; network security with firewalld, SELinux port security, and IPSec; access management with Ansible system roles, Identity Management, and SELinux process isolation; and data security with Linux Unified Key Setup(LUKS), Network Bound Disk Encryption, and GNU Privacy Guard.