Organizations rely on infrastructure and software to build and deploy applications foundational to their respective business. The software composing these applications is procured from external sources and vendors and is typically developed, integrated and released via a delivery pipeline for consumption across multi-cloud environments. Therefore, establishing a framework for continuous security to prevent breaches and to protect the integrity of this software throughout the sourcing, distribution and execution phases is both an imperative and an increasingly complex challenge.
Please join us to learn how Red Hat® is leveraging innovative open source technologies to address these challenges by defining guiding principles for mitigating risks in this software chain of custody while adhering to the governance and compliance requirements of the enterprise.
Brings more than 20 years of engineering, business and technical experience to the financial and telecommunications industry. His extensive and multi-disciplinary knowledge of distributed systems, cloud architectures, emerging technologies, and data platforms have resulted in solution designs and scalable implementations encompassing cloud-native platforms, decentralized finance, blockchain, 5G connectivity, edge computing, AI and process automation.
Time: 1:00 PM - 2:00 PM ET
Date: April 5, 2022
Any questions? Please email lvillanu@redhat.com
Important Notice | |
|
|
SESSION | TIME |
---|---|
REGISTRATION & BREAKFAST | 7:30 AM – 8:30 AM |
WELCOME lorem ipsum |
8:30 AM – 8:45 AM |
KEYNOTE: lorem ipsum lorem ipsum Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse porta, nibh nec fringilla dignissim, purus ex tempus ex, eu elementum nisl massa imperdiet risus. Etiam nec orci placerat, tempor dolor eu, viverra libero. |
8:45 AM – 9:15 AM |
BREAK NETWORKING |
9:15 AM – 9:30 AM |
Lorem Ipsum
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse porta, nibh nec fringilla dignissim, purus ex tempus ex, eu elementum nisl massa imperdiet risus. Etiam nec orci placerat, tempor dolor eu, viverra libero. |
9:30 AM – 10:30 AM |
BREAK NETWORKING & SNACKS |
10:30 AM – 10:45 AM |
Lorem Ipsum 2
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse porta, nibh nec fringilla dignissim, purus ex tempus ex, eu elementum nisl massa imperdiet risus. Etiam nec orci placerat, tempor dolor eu, viverra libero. |
10:45 AM – 11:45 AM |
BREAK NETWORKING |
11:45 AM – 12:00 PM |
Lorem Ipsum
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse porta, nibh nec fringilla dignissim, purus ex tempus ex, eu elementum nisl massa imperdiet risus. Etiam nec orci placerat, tempor dolor eu, viverra libero. |
12:00 PM – 12:45 PM |
CLOSING REMARKS John Doe, Partner-In-Charge of Nonprofit |
12:45 PM – 12:55 PM |
LUNCH & NETWORKING | 12:55 PM – 2:00 PM |
Location:
BlueJeans
Bluejeans
Bluejeans, North Carolina Bluejeans
Time: X:XX a.m. - X:XX p.m.
Hear from our experts
Cras sed luctus libero. Donec id orci quis justo tincidunt placerat.