Join the Security Symposium, where cybersecurity professionals can learn and network with Red Hat® and Intel security experts, partners, and industry peers to solve IT security issues together as a community.
The Security Symposium is a combination of presentations and a hands-on workshop where attendees can discuss hybrid cloud security challenges organizations face and solutions to tackle these challenges.
Security teams increasingly find it challenging to keep up with the complexity of changing risks, compliance requirements, tools, and architectural changes introduced by new technologies - such as containers, Kubernetes, software-defined infrastructure, and cloud technologies. As traditional infrastructure evolves to a mix of bare-metal, virtual, cloud, and container environments, learn how you can maintain security, governance, and compliance, while reducing risk.
Masks are encouraged but optional. All attendees must be fully vaccinated against the COVID-19 virus.
Important Notice | |
|
|
SESSION | TIME |
---|---|
Breakfast & registration | 8:30 AM – 9:00 AM |
Welcome | 9:00 AM – 9:15 AM |
Back to security basics
In this session, we’ll open the day with a security overview, share a Red Hat Product Security risk report, and dive into Software Bill of Materials (SBOM) and DevSecOps. Attendees will learn about varying solutions available to help secure their organizations
|
9:15 AM - 10:00 AM |
Security panel with Red Hat, Intel, CyberArk, and Zettaset | 10:00 AM – 10:45 AM |
Morning break - refreshments provided to in-person attendees | 10:45 AM - 11:00 AM |
Enabling Confidential Computing for Red Hat OpenShift with Intel Software Guard Extensions (Intel SGX)
This session will provide an overview of Confidential Computing and it can be enabled in Red Hat OpenShift® with Intel Software Guard Extensions (Intel® SGX). Confidential computing protects data while in use, using a hardware and software stack based on a CPU root of trust, to isolate sensitive data and code. The session will highlight use cases such as secure enclaves and DevSecOps from partners like Fortanix, Anjuna, and HashiCorp.
|
11:00 AM - 11:30 AM |
Zero trust security with OpenShift Service Mesh
This session will go over what zero trust security model is and how it can be achieved with OpenShift ServiceMesh and remove the burden of addressing security requirements from your application development teams building microservices freeing them to focus on functions that provide direct value to customers. Attendees will learn about all the components of OpenShift Service Mesh, how to install and configure them for Zero trust security architecture
|
11:30 AM - 12:15 PM |
Lunch break | 12:15 PM – 1:15 PM |
*Hands-on security workshop
In this hands-on lab, we will cover the comprehensive container and Kubernetes security capabilities available in Red Hat OpenShift. You will gain experience with:
*Workshop only available to in person attendees at Seattle venue |
1:15 PM – 4:00 PM |
IN-PERSON:
Time: 8:30 AM - 4:00 PM PT
Location:
Bell Harbor International Conference Center
2211 Alaskan Way, Pier 66
Seattle, Washington 98121
*Red Hat will validate parking at the Bell Harbor Conference Center.
VIRTUAL:
Time: 8:30 AM - 4:00 PM PT
*A virtual meeting link will be sent before the event
Hear from our experts
Cras sed luctus libero. Donec id orci quis justo tincidunt placerat.