Join the Security Symposium, where cybersecurity professionals can learn and network with Red Hat® security experts, partners, and industry peers to solve IT security issues together as a community.
The Security Symposium is a half-day event with industry experts where attendees can discuss hybrid cloud security challenges organizations face and solutions to tackle these challenges.
Security teams increasingly find it challenging to keep up with the complexity of changing risks, compliance requirements, tools, and architectural changes introduced by new technologies - such as containers, Kubernetes, software-defined infrastructure, and cloud technologies.
As traditional infrastructure evolves to a mix of bare-metal, virtual, cloud, and container environments, learn how you can maintain security, governance, and compliance, while reducing risk.
Time: 11:00 a.m. - 3:30 p.m.
Date: July 13, 2021
Any questions? Please email infrastructure@redhat.com
Important Notice | |
|
|
Time | Session |
11:00 a.m.
|
Keynote: Tackling security in the world of containers , hybrid cloud, and DevSecOps
Speaker: Lucy Kerner, Security Global Strategy and Evangelism Director, Red Hat
|
12:00 p.m. - 12:30 p.m.
|
Lessons learned: Tackling hybrid cloud security challenges and making DevSecOps real
Speaker(s): Red Hat Open Innovation Labs and Red Hat Consulting Services
Red Hat Open Innovation Labs and Red Hat Consulting Services share lessons learned on how they helped customers tackle hybrid cloud security, DevSecOps, and people & process challenges
|
12:45 p.m. - 1:15 p.m.
|
Data security in hybrid cloud
Speakers: Mark Thacker, Product Manager, Red Hat + Uday Boppana, Sr. Product Manager, Red Hat
Data security, from secure foundation provided by RHEL which Red Hat storage is built on top of to provide data security for hybrid cloud across the stack
|
1:30 p.m. - 2:00 p.m.
|
Securing containers and Kubernetes in hybrid cloud
Speakers: Kirsten Newcomer, Director, Cloud and DevSecOps Strategy, Red Hat + Wei Dang, Sr. Director Product Management, Red Hat
How to secure containers and Kubernetes in hybrid cloud to build, run, and deploy containerized applications securely across the entire container lifecycle
|
2:15 p.m. - 2:45 p.m.
|
Demystifying DevSecOps practices and tooling in container environments
Speakers: Dave Meurer, Principal Solution Architect, Security Partners, Red Hat + Neil Carpenter, Solution Architect, Red Hat
How do you build containerized apps more securely with RH and Partners
|
3:00 p.m. - 3:30 p.m.
|
Maintaining compliance and governance in hybrid cloud
Speakers: Jason Burrell, OpenShift Security Lead, Red Hat + Umoja Thomas, Compliance Manager, Red Hat
How to maintain compliance and governance in hybrid cloud with real life examples from OpenShift Dedicated SRE security and cloud compliance teams
|
3:30 p.m. - 3:45 p.m.
|
Closing + Call to Action |
Location:
Retransmisión en directo
Online
Online,
Time: X:XX a.m. - X:XX p.m.
Hear from our experts
Presenter(s): Red Hat Open Innovation Labs and Red Hat Consulting Services
Abstract: Red Hat Open Innovation Labs and Red Hat Consulting Services share lessons learned on how they helped customers tackle hybrid cloud security, DevSecOps, and people & process challenges.
Presenter(s): Uday Boppana + Mark Thacker
Abstract: Data security practices and assumptions are challenged when moving your workloads to the hybrid cloud. Are you aware of what they may be? In this overview session, we will explore these challenges as we look at data at rest, in motion and in use within the hybrid cloud. We’ll explore the topics of access control, confidentiality and integrity of data and what may differ in a hybrid cloud use case. Finally, we’ll discuss how the Red Hat product portfolio can help you to address some of these challenges as well as what are future areas of development.
Presenter(s): Kirsten Newcomer+ Wei Lien Dang
Abstract: Containers and Kubernetes introduce both security challenges and advantages. One of the security advantages of containers and Kubernetes is they can be treated as immutable – what’s running should never be patched or changed but rather destroyed and recreated from a common template when new updates are needed.
Simultaneously, the distributed nature of containerized applications across hybrid environments can make it challenging to monitor and investigate which running workloads might have vulnerabilities, may be misconfigured, or pose the greatest risks to your organization.
In this session, we will discuss some of the security challenges you’re likely to encounter when using containers and Kubernetes, especially in production and at scale. We will also show you how to get the most out of the security capabilities built into Red Hat OpenShift and how to get started with integrating security into each phase of the container lifecycle -build, deploy, and run - by helping you:
Presenter(s): Dave Meurer + Neil Carpenter
Abstract: Like DevOps, DevSecOps is composed of equal parts culture and process as well as tooling. DevSecOps is founded on the idea that security is a shared responsibility across the engineering and security teams.
The tools and processes the teams use to protect containerized applications must imbue DevSecOps principles by implementing security earlier in the container life cycle, integrating and automating security into existing developer workflows, and empowering developers as security users.
In this session, we will discuss how you can leverage Red Hat and its partner ecosystem to integrate DevSecOps principles in order to build, deploy, and secure containerized applications. You will learn about the tools and processes that will help you:
Presenter(s): Jason Burrell + Umoja Thomas
Abstract: In this session, Red Hat’s Site Reliability Engineering(SRE)-Platform Security and Service Delivery Compliance teams will discuss how we work to maintain, expand, and mature our compliance efforts for Red Hat’s OpenShift as-a-Service platforms.
Specific topics we will cover include: