Webinar

Bell Security Automation and Containers

June 17, 202112:00 PM - 1:30 PM(GMT-04:00) Eastern Time (US & Canada)

As our industry and technology continue to evolve, we are faced with new security challenges that cannot be addressed with traditional processes. Red Hat® is hosting an exclusive Bell security session covering both automation and containers best practices to help protect your application environments. We will delve into the two topics hosting back to back sessions.  You can select one or both sessions. 

Security Automation

In this session we will show examples of using Ansible® to automate security which helps coordinate enterprise security systems.  We will explore uses cases such as:

  • INVESTIGATION ENRICHMENT
    • Collect logs across firewalls, intrusion detection systems (IDS) and other security systems programmatically, enabling on-demand enrichment of triage activities performed through security information and event management systems (SIEMs).
  • THREAT HUNTING
    • Automatically tune the level of logging, create new intrusion detection system (IDS) rules and new firewall policies facilitating the detection of more threats in less time.
  • INCIDENT RESPONSE
    • Remediate faster-automating actions like blacklisting attacking IP addresses or domains, whitelisting non-threatening traffic or isolating suspicious workloads for further investigation.

Click here to learn more.

Speaker: Will Tome, Principal Specialist Solution Architect, Red Hat 

Containers Security

In this session, we will discuss the growing adoption of containers, short and frequent development cycles, and the integration of security measures into business processes pose a significant challenge for businesses. We will explore this new paradigm and observe how these new models have impacted technology and business processes. Finally, we will try to understand how to adapt to the new IT landscape and align with the security recommendations specific to containers.

Speaker: Kirsten Newcomer, Director, Cloud Security Strategy, Red Hat 


Webinar details

Date: June 17, 2021

Security Automation session: 12:00 p.m. - 12:45 p.m. EDT 

Container Security session: 12:45 p.m. - 1:30 p.m. EDT 

Any questions? Please email amassey@redhat.com

Agenda instruction text goes here
SESSION TIME
REGISTRATION & BREAKFAST 7:30 AM – 8:30 AM
WELCOME
lorem ipsum
8:30 AM – 8:45 AM
KEYNOTE: lorem ipsum
lorem ipsum
 

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse porta, nibh nec fringilla dignissim, purus ex tempus ex, eu elementum nisl massa imperdiet risus. Etiam nec orci placerat, tempor dolor eu, viverra libero.

8:45 AM – 9:15 AM
BREAK
NETWORKING
9:15 AM – 9:30 AM
Lorem Ipsum

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse porta, nibh nec fringilla dignissim, purus ex tempus ex, eu elementum nisl massa imperdiet risus. Etiam nec orci placerat, tempor dolor eu, viverra libero.

9:30 AM – 10:30 AM
BREAK
NETWORKING & SNACKS
10:30 AM – 10:45 AM
Lorem Ipsum 2

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse porta, nibh nec fringilla dignissim, purus ex tempus ex, eu elementum nisl massa imperdiet risus. Etiam nec orci placerat, tempor dolor eu, viverra libero.

10:45 AM – 11:45 AM
BREAK
NETWORKING
11:45 AM – 12:00 PM
Lorem Ipsum

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse porta, nibh nec fringilla dignissim, purus ex tempus ex, eu elementum nisl massa imperdiet risus. Etiam nec orci placerat, tempor dolor eu, viverra libero.

12:00 PM – 12:45 PM
CLOSING REMARKS
John Doe, Partner-In-Charge of Nonprofit
12:45 PM – 12:55 PM
LUNCH & NETWORKING 12:55 PM – 2:00 PM

Location
BlueJeans
Bluejeans
Bluejeans, North Carolina  Bluejeans


Time: X:XX a.m. - X:XX p.m.

Speakers

Hear from our experts

Sponsors

Cras sed luctus libero. Donec id orci quis justo tincidunt placerat.

Gold

Silver