Join the Security Symposium, where cybersecurity professionals can learn and network with Red Hat® security experts, partners, and industry peers to solve IT security issues together as a community.
The Security Symposium is a half-day event with industry experts where attendees can discuss hybrid cloud security challenges organizations face and solutions to tackle these challenges.
Security teams increasingly find it challenging to keep up with the complexity of changing risks, compliance requirements, tools, and architectural changes introduced by new technologies - such as containers, Kubernetes, software-defined infrastructure, and cloud technologies. As traditional infrastructure evolves to a mix of bare-metal, virtual, cloud, and container environments, learn how you can maintain security, governance, and compliance, while reducing risk.
Time: Now available on-demand
Date: Aired on July 13, 2021
Any questions? Please email infrastructure@redhat.com
*Available on-demand until one year after event date.
Important Notice | |
|
|
Time | Session |
11:00 a.m. - 11:45 a.m.
|
Keynote: Tackling security in the world of containers, hybrid cloud, and DevSecOps
Speaker: Lucy Kerner, Director, Security Global Strategy and Evangelism, Red Hat
|
11:45 a.m. - 12:30 p.m.
|
Customer Panel: Tackling security challenges in a cloud-native world with BP and AT&T
Speaker(s): Rupesh Chokshi, Vice President, AT&T Cybersecurity
Paul Costall, Head of Application Engineering Services, BP Hosted by: Lucy Kerner, Director, Security Global Strategy and Evangelism, Red Hat
Dave Sirrine, Solution Architect, Red Hat |
12:45 p.m. - 1:15 p.m.
|
Data security in hybrid cloud
Speakers: Mark Thacker, Product Manager, Red Hat + Uday Boppana, Sr. Product Manager, Red Hat
Data security, from secure foundation provided by RHEL which Red Hat storage is built on top of to provide data security for hybrid cloud across the stack
|
1:30 p.m. - 2:00 p.m.
|
Securing containers and Kubernetes in hybrid cloud
Speakers: Kirsten Newcomer, Director, Cloud and DevSecOps Strategy, Red Hat + Wei Dang, Sr. Director Product Management, Red Hat
How to secure containers and Kubernetes in hybrid cloud to build, run, and deploy containerized applications securely across the entire container lifecycle
|
2:15 p.m. - 2:45 p.m.
|
Demystifying DevSecOps practices and tooling in container environments
Speakers: Dave Meurer, Principal Solution Architect, Security Partners, Red Hat + Neil Carpenter, Solution Architect, Red Hat
How do you build containerized apps more securely with RH and Partners
|
3:00 p.m. - 3:30 p.m.
|
Maintaining compliance and governance in hybrid cloud
Speakers: Jason Burrell, OpenShift Security Lead, Red Hat + Umoja Thomas, Compliance Manager, Red Hat
How to maintain compliance and governance in hybrid cloud with real life examples from OpenShift Dedicated SRE security and cloud compliance teams
|
3:30 p.m. | Closing |
Location:
BlueJeans
Bluejeans
Bluejeans, North Carolina Bluejeans
Time: X:XX a.m. - X:XX p.m.
Hear from our experts
Presenter(s): Lucy Kerner
Abstract: Security teams are increasingly finding it challenging to keep up with the changing risks, compliance requirements, tools, and architectural changes introduced by new technologies - such as containers, kubernetes, software-defined infrastructure, and cloud technologies. As traditional infrastructure evolves to a mix of bare metal, virtual, cloud, and container environments, how do you approach security, governance, compliance and reduce risk amid this growing complexity?
Traditional perimeter-based network security does not work in this new world of containers and hybrid cloud. Security teams must rethink their approach to security in this new world with automation and DevSecOps, where security is built-in, continuously addressed, and continuously monitored across the entire application lifecycle, infrastructure lifecycle, and supply chain.
In this keynote, we'll discuss some prescriptive steps you can take to tackle security successfully in this new environment and how Red Hat can help.
Presenter(s): Uday Boppana + Mark Thacker
Abstract: Data security practices and assumptions are challenged when moving your workloads to the hybrid cloud. Are you aware of what they may be? In this overview session, we will explore these challenges as we look at data at rest, in motion and in use within the hybrid cloud. We’ll explore the topics of access control, confidentiality and integrity of data and what may differ in a hybrid cloud use case. Finally, we’ll discuss how the Red Hat product portfolio can help you to address some of these challenges as well as what are future areas of development.
Presenter(s): Kirsten Newcomer+ Wei Lien Dang
Abstract: Containers and Kubernetes introduce both security challenges and advantages. One of the security advantages of containers and Kubernetes is they can be treated as immutable – what’s running should never be patched or changed but rather destroyed and recreated from a common template when new updates are needed.
Simultaneously, the distributed nature of containerized applications across hybrid environments can make it challenging to monitor and investigate which running workloads might have vulnerabilities, may be misconfigured, or pose the greatest risks to your organization.
In this session, we will discuss some of the security challenges you’re likely to encounter when using containers and Kubernetes, especially in production and at scale. We will also show you how to get the most out of the security capabilities built into Red Hat OpenShift and how to get started with integrating security into each phase of the container lifecycle -build, deploy, and run - by helping you:
Presenter(s): Dave Meurer + Neil Carpenter
Abstract: Like DevOps, DevSecOps is composed of equal parts culture and process as well as tooling. DevSecOps is founded on the idea that security is a shared responsibility across the engineering and security teams.
The tools and processes the teams use to protect containerized applications must imbue DevSecOps principles by implementing security earlier in the container life cycle, integrating and automating security into existing developer workflows, and empowering developers as security users.
In this session, we will discuss how you can leverage Red Hat and its partner ecosystem to integrate DevSecOps principles in order to build, deploy, and secure containerized applications. You will learn about the tools and processes that will help you:
Presenter(s): Jason Burrell + Umoja Thomas
Abstract: In this session, Red Hat’s Site Reliability Engineering(SRE)-Platform Security and Service Delivery Compliance teams will discuss how we work to maintain, expand, and mature our compliance efforts for Red Hat’s OpenShift as-a-Service platforms.
Specific topics we will cover include: