We use cookies on our websites to deliver our online services. Details about how we use cookies and how you may disable them are set out in our Privacy Statement. By using this website you agree to our use of cookies.
Securely managing secrets and privileged access for systems, applications, and user accounts is a critical requirement for any IT enterprise. CyberArk is a comprehensive Privileged Access Management (PAM) platform that is deployed at many of the world's largest enterprises and is the leader in Gartner's Magic Quadrant for PAM solutions. Red Hat® OpenShift® and Ansible® Automation Platform can work directly with CyberArk to simplify secrets management, strengthen container security, and securely deploy applications and automation at scale. CyberArk secures Red Hat OpenShift and Ansible Automation Platform by leveraging out-of-the-box certified integrations. Please join us at the next virtual New Jersey Red Hat User Group for a demo of these technologies in action. Jody Hunt, SE Director at CyberArk, will demonstrate these integrations and give practical guidance on their use. In this technical session, you’ll learn how to leverage and adopt security industry best practices without impeding developer velocity.
This session will provide a clear understanding of:
CyberArk, the global leader in privileged access management, offers the industry’s most complete solution for securing both the credentials and secrets used by applications, playbooks, scripts and other non-human identities, as well as human users. CyberArk solutions are deployed at many of the world’s largest enterprises including over half the Fortune 500.
AGENDA:
About the speaker: Jody has held diverse technical roles in software development, sales and marketing. He has been an enthusiastic promoter of DevOps principles since 2010. In 2015 he became aware of the growing security gap represented by automation. That led him to Conjur, Inc. in January of 2017, just 4 months before its acquisition by CyberArk. He graduated from the University of Texas at Austin with a BA in Computer Science.
Important Notice | |
|
|
SESSION | TIME |
---|---|
REGISTRATION & BREAKFAST | 7:30 AM – 8:30 AM |
WELCOME lorem ipsum |
8:30 AM – 8:45 AM |
KEYNOTE: lorem ipsum lorem ipsum Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse porta, nibh nec fringilla dignissim, purus ex tempus ex, eu elementum nisl massa imperdiet risus. Etiam nec orci placerat, tempor dolor eu, viverra libero. |
8:45 AM – 9:15 AM |
BREAK NETWORKING |
9:15 AM – 9:30 AM |
Lorem Ipsum
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse porta, nibh nec fringilla dignissim, purus ex tempus ex, eu elementum nisl massa imperdiet risus. Etiam nec orci placerat, tempor dolor eu, viverra libero. |
9:30 AM – 10:30 AM |
BREAK NETWORKING & SNACKS |
10:30 AM – 10:45 AM |
Lorem Ipsum 2
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse porta, nibh nec fringilla dignissim, purus ex tempus ex, eu elementum nisl massa imperdiet risus. Etiam nec orci placerat, tempor dolor eu, viverra libero. |
10:45 AM – 11:45 AM |
BREAK NETWORKING |
11:45 AM – 12:00 PM |
Lorem Ipsum
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse porta, nibh nec fringilla dignissim, purus ex tempus ex, eu elementum nisl massa imperdiet risus. Etiam nec orci placerat, tempor dolor eu, viverra libero. |
12:00 PM – 12:45 PM |
CLOSING REMARKS John Doe, Partner-In-Charge of Nonprofit |
12:45 PM – 12:55 PM |
LUNCH & NETWORKING | 12:55 PM – 2:00 PM |
Location:
BlueJeans
Bluejeans
Bluejeans, North Carolina Bluejeans
Time: X:XX p.m. - X:XX p.m.
Hear from our experts
Cras sed luctus libero. Donec id orci quis justo tincidunt placerat.