We use cookies on our websites to deliver our online services. Details about how we use cookies and how you may disable them are set out in our Privacy Statement. By using this website you agree to our use of cookies.
Join the EMEA Security Symposium, where cybersecurity professionals can learn and network alongside Red Hat security experts, partners, and industry peers. No one can solve IT security issues alone. Solving problems together as a community is the future of technology.
WHAT TO EXPECT
The EMEA Security Symposium is a half-day event with industry experts covering the latest upstream and enterprise security developments. Attendees will network and collaborate with peers and Red Hat engineers to discuss security challenges open source organizations face.
Virtual event discussion topics will include:
Security Compliance the Open Source Way
Security Automation
Container security
Red Hat Openshift Dedicated Security
DevOps Security
WHO SHOULD ATTEND
IT business leaders, security professionals, operations professionals, and application developers who are focused on securing their organization’s infrastructure and applications.
Important Notice
EMEA Security Symposium Live Stream has already ended. Please come back later to watch EMEA Security Symposium On-Demand.
KEYNOTE: Tackling Security in the World of Containers and Hybrid Cloud
In this keynote, we'll discuss some prescriptive steps you can take to tackle security successfully in the world of containers and hybrid cloud. Mike Bursell, Chief Security Architect, Red Hat
BREAKOUT SESSIONS: Security and Compliance Automation
10:40 - 11:05
Security Compliance and Data Privacy the Open Source Way
In this session, we’ll discuss the importance of security and privacy by design from both Policy and Technical advisors' viewpoints. Dwayne Strange, Office of Technical Governance, Red Hat Jamie Parker, Office of Technical Governance, Red Hat
11:05 - 11:50
Improving Security and Compliance in Hybrid Cloud with Automation
In this session, you will learn how a consistent automation strategy across the infrastructure operations, application, and security operations center can help improve security and compliance. Lucy Kerner, Security Global Technical Evangelist and Strategist Massimo Ferrari, Consulting Product Manager, Red Hat
10:35 - 11:15
Implementing a Hybrid Cloud using Security & Compliance Automation
The webinar will cover a myriad of Red Hat Technologies such as Red Hat Satellite, Red Hat Ansible Automation Platform, Red Hat Insights and introduce Red Hat Advanced Cluster Manager for Kubernetes. Ted Brunell, Principal Solution Architect, Red Hat Mike Epley, Principal Solutions Architect, Red Hat
11:15 - 11:50
Achieving security and compliance in Red Hat Openshift Dedicated
OpenShift Dedicated (OSD) offers IT organizations a way to consume OpenShift as a service, managed by Red Hat, running in the public cloud. OSD recently achieved SOC-2 certification as a secure cloud service, and continues to pursue additional security certifications. Bill Montgomery, Senior Manager, OpenShift, Red Hat
11:50 - 12:40
Open discussion panel - Securing your IT environments through open technology.
Approaching DevSecOps is a journey that involves people, processes, and technologies working together to implement security and compliance within each layer of the application and infrastructure stack and life cycle—for both traditional and cloud-native environments. Listen to Paul Costall, Simon Cashmore and Mike Bursell during the discussion moderated by Massimo Ferrari about their experiences. Massimo Ferrari, Consulting Product Manager, Ansible Security, Red Hat (moderator) Mike Bursell, Chief Security Architect, Red Hat Paul Costall, Head of Application Engineering Services, BP Simon Cashmore, Distinguished Engineer / Director - UK Regional Head of Middleware | Head of PaaS Middleware Engineering, Barclays Bank Dirk Herrmann, Manager of Systems Engineering, Palo Alto Networks
12:40 - 13:00
Break
BREAKOUT SESSIONS: Containers and Kubernetes Security
13:00 - 13:30
Securing a multi-tenant Kubernetes cluster with Red Hat
In this session, Red Hat’s Kirsten Newcomer will identify the most common layers in a typical container deployment and discuss technologies and deployment patterns you can use to ensure strong multi-tenancy at each layer. Kirsten Newcomer, OpenShift Product Management, Red Hat
13:30 - 14:00
State of Container Security
How to make containers more secure without requiring any user intervention. This session will cover a new feature we have been adding to Buildah, Podman, Skopeo and CRI-O to enhance container security. Dan Walsh, Senior Distinguished Engineer, Red Hat
14:00 - 14:30
DevOps Security, Monitoring & Compliance with OpenShift and Sysdig
In this session, you’ll hear about the Falco open source project, use cases for security in Red Hat OpenShift, and see a real-world demo for securing your OpenShift environment without disrupting application deployments. Eric Carter, Director of Product Marketing, Sysdig Dave Meurer, Principal Solution Architect, Security Partners, Red Hat
13:00 - 13:40
The security implications of running software in containers
In this session we will cover the security implications of running software in containers. Scott McCarty, Product Management, Containers, Red Hat Enterprise Linux & OpenShift, Red Hat
13:40 - 14:15
Automating TLS provisioning with OpenShift Service Mesh
In this session we will go through the importance of using mutual TLS (mTLS), including some nuances about its setup. Brian "Red Beard" Harrington, Principal Product Manager, Istio/OpenShift service mesh, Red Hat
14:15 - 14:45
Manage Secrets throughout DevSecOps with Red Hat and CyberArk
Learn about the benefits of CyberArk's certified integrations with Red Hat OpenShift and Ansible which enable secrets to be centrally managed and Ansible Tower playbooks to securely and easily access the credentials they need to automate IT processes. Uzi Ailon, VP DevOps, CyberArk Dave Meurer, Principal Solutions Architect, Red Hat Security, ISV