In-Person Event

Ansible Automates 2022

June 28, 2022Herndon, VirginiaThe Westin Washington Dulles Airport

Ansible® Automates 2022 is an in-person only conference hosted by Red Hat®. The right IT automation solution can unify teams and processes across an organization, ultimately transforming the way IT is delivered.
Red Hat Ansible Automation Platform supports extensive possibilities and is designed with hybrid cloud infrastructure in mind. It is a flexible, scalable, and multifaceted automation solution that works across your enterprise, wherever your organization might be in its automation journey. 

Why attend?

Join #AnsibleAutomates2022 to learn how to create an automation-first approach for your organization. You will learn how to create, scale, and implement automation across your enterprise from top experts and industry thought leaders. Discover more about Ansible Automation Platform and its benefits, and become better informed to make the right decisions for your organization's automation practice.

Your team Your business
Align your group with other IT teams through DevOps practices.
Create opportunities for collaboration and a culture of success while you navigate hybrid cloud.

Who should attend?

#AnsibleAutomates2022 is for IT business leaders, technologists, and their teams:

  • IT decision makers
  • IT operations leaders and managers
  • DevOps leads
  • Enterprise architects
  • IT Ops Directors, Vice Presidents
  • Chief information officers
  • Security professionals, and anyone interested in IT automation.

This event is not meant to provide technical instruction and training on Ansible Automation Platform. For all technical training, please view our Red Hat Training courses or our Ansible technical workshops.

*Masks are encouraged but optional. In addition to having no present symptoms of COVID-19, Red Hat expects all attendees attending the event to be one or more of the following: fully vaccinated against COVID-19, recently recovered from COVID-19 or have a negative COVID-19 test result within 24 hours prior to attending the event. 

9:15 AM 

10:00 AM Introduction Angela Andrews, Solutions Architect, Red Hat
10:10 AM
The Role of Automation in Zero Trust
Traditional approaches to information security are reactive and probably insufficient. In an era of on-demand computing, we can no longer afford to be reactive: we need to revolutionize all security practices as a holistic, enterprise capability. Zero Trust is the model we need and it is the future of cybersecurity. Explore how zero trust works to tackle the threats to modern IT systems – and how Ansible Automation is critical to comprehensive automation across the tactical and enterprise IT landscape. 
Michael Epley, Chief Architect and Security Strategist, Red Hat North America Public Sector
10:45 AM
SecOps with Ansible Automation
Configuration Drift, Manual Validation, Human Error; these are all words we often associate with our system security posture.  Utilizing today’s automation technologies these can all be things of the past by bringing development proven CI/CD techniques and jumping into the world of SecOps.  Deploying consistent, automated, and repeatable instances across your entire enterprise using these solutions will ensure you know what your security posture looks like at any given moment without the massive man hours required for manual validation for every request.
During this presentation you will learn:
  • How Ansible can be used for security compliance
  • Infrastructure as code techniques that will help secure your enterprise
  • How Automation can be leveraged to expedite the ATO process
Christopher Grimm, Solutions Architect, Red Hat
11:20 AM
Self-Remediating Infrastructure as a Compliance Tool 
As infrastructure and security teams simultaneously take on the tasks of controlling and managing larger scale infrastructure with an ever-increasing number of threat vectors, automation has become an increasingly important tool in the fight to keep our businesses safe.  Ansible is uniquely suited, due to its expansive reach of control and ease of use, to act as a central orchestrator and management tool to keep machines and networks aligned with security and compliance needs.  In this talk, we will be exploring the possibilities of using self-remediating infrastructure as a means to maintaining safety within our networks, and how Ansible can reduce the burden of operations teams and security teams to mitigate threats.
Adam Pippert, Associate Principal Solutions Architect, Red Hat
11:55 AM Lunch break  
12:45 PM
Breaking Down Walls: How Ansible and IBM Qradar SOAR Unite Operations, Security, and Development Teams To Secure Organizations 
Organizations today still operate off the premise that their teams for operations, development, and security are and should be independent silos. The operations team deploys and maintains the very infrastructure that the security and development team uses. The development team builds and maintains applications that the operations team deploys and [potentially] the security team uses. The security team uses applications that the operations team deploys and [potentially] the development team builds to protect the overall infrastructure. But what if the security team doesn’t have access to the very infrastructure that it needs to secure? How does the operations team know what tools the security team needs to deploy? How does the development team know what applications to build for the security team?
Then, what if I told you the efficacy of your security solution was purely based on how well your operations, security, and development team work together. What if I told you that IBM and Red Hat have co-authored a way to break down those silos and bring the operations, security, and development team together in their approach to security. In this presentation, we are going to walk through the day in the life of a security analyst using the IBM QRadar SOAR platform to conduct their incident response steps almost entirely by running Ansible Playbooks the operations team provided.  
Gerald Trotman, Worldwide OCP SOAR + Connect Technical Sales Lead, IBM Security
1:20 PM
Automate system hardening on Windows hosts with Ansible Automation using CIS/STIG as a guideline
In this session, we will walk through how you can run a security hardening automation pipeline in Ansible Automation Platform. In this pipeline, OpenSCAP security scan report will be generated on a set of windows hosts before and after applying CIS hardening baseline. The report will be emailed as part of the demonstration, importantly compliance status for each system is tracked in Ansible Automation Platform inventory where you can interrogate externally via REST API and incorporate into other monitoring and reporting tools such as Splunk, Elk Stack or others.
Orcun Atakan, Global Ansible Specialist Solutions Architect, Red Hat
1:55 PM
Network Resource Modules for Compliance 
With today's complexities with Network security and compliance, it is a mission that every organization must prioritize to address. Accidental changes and manually doing CLI updates are now a mundane job of the past. Using Ansible to automate all of the tasks to keep the largest infrastructures in a simple, consistent compliant state while allowing your organization to focus on other business objectives. Ansible allows you to define your systems to meet your security and compliance goals with a library of automation modules that allow you quickly perform tasks without complicated scripting. Once written, you have the option to reused these repeatable playbooks across your entire infrastructure. 
Michael Beasley, Solutions Architect, Red Hat
2:30 PM Panel Q&A and discussion   

The Westin Washington Dulles Airport
2520 Wasser Terrace
Herndon, Virginia  20171

Time: 9:15 AM - 3:00 PM ET

Any questions? Please email


Orcun Atakan, Global Ansible Specialist Solutions Architect, Red Hat
Orcun is the Global Ansible Specialist SA role leader at Red Hat. He joined Red Hat in 2016, bringing broad technical leadership experience in consulting & pre-sales, solution design & architecture and technical enablement. His experience includes architecting Automation, Hybrid Cloud and DevOps solutions and lead business transformations at large clients.
During Orcun's five years at Red Hat, he played a critical role in expanding Ansible adoption in North America as part of NA Ansible Tiger team. Orcun also has a keen interest in applying and scaling data science for business applications. He recently completed a post graduate program in Artificial Intelligence and Machine Learning: Business Applications at The University of Texas at Austin.
Michael Beasley, Solutions Architect, Red Hat
I am a Senior Specialist Solutions Architect for the Southeast Region and I’ve been with Red Hat for over 2 years. Prior to working with Red Hat, I completed my Bachelors in Computer Information Systems from Guilford College while interning at Cisco Systems. I worked as a Solutions Engineer for Cisco Systems, Dimension Data (R&S, and Physical Security), Arrow ECS (VMware NSX), Real Wear (Augmented Reality - first voice driven head-worn tablet). I have 14 years of IT experience. I am also U.S Marine Veteran. I was born and raised in York, Pa., and I’ve lived in Japan, Panama, and North Carolina. Today, I call Atlanta, Ga. my home.
Christopher Grimm, Solutions Architect, Red Hat
Chris Grimm is a Solutions Architect with Red Hat with over 15 years of experience in Information Systems Architecture, Engineering and Security, he has a breadth of knowledge across the IT sector.  An advocate of implementing security during the design phase, he has been driving IT systems toward innovative and upcoming technology in an effort to migrate away from ailing legacy systems.
Prior to joining Red Hat, Chris was a CyberSecurity Engineer, leading accreditation & security efforts for DHA, VA, and USAF systems along with extensive engineering & design support.  Chris has spent a large portion of his career in the public sector supporting the defense industry as a civilian as a United States Marine.  Chris graduated from Limestone College with a Bachelor's Degree in Computer Science that included a focus on Information Systems Security.  
Chris is an active member of the information security community regularly attending conferences and participating in local security events such as B-Sides Charleston where he helped develop the CTF (Capture the Flag) event and is also a Red Team member of the Palmetto Cyber Defense Competition.
Michael Epley, Chief Architect and Security Strategist, Red Hat North America Public Sector
Michael Epley has been helping the US defense and National Security communities use and adopt open source software over the last 2 decades with practical experience as a software developer and enterprise architect. During his tenure at Red Hat, Michael has passionately driven adoption of key technology: cloud and kubernetes, tactical edge/forward deployed systems, data analytics tools and platforms, and disconnected operations -- always in the context of security and compliance concerns unique to this sector. Michael has BS degrees in Mathematics and Mechanical Engineering from Virginia Tech and a JD from The University of Texas School of Law.
Adam Pippert, Associate Principal Solutions Architect, Red Hat
Adam has been working at Red Hat since 2018 as a Solutions Architect, covering a wide range of Red Hat portfolio technologies in both account and specialist roles.  Prior to joining Red Hat, he worked for Intel, EMC, and DellEMC in a variety of customer facing and technical roles.  In his spare time, Adam enjoys traveling with family and playing a number of musical instruments.
Gerald Trotman, Worldwide OCP SOAR + Connect Technical Sales Lead, IBM Security
I am the Worldwide Technical Sales Lead For OpenShift Platform SOAR + Connect for IBM Security and have been with IBM Security for about 4 years. Prior to joining IBM, I completed my Masters in Software Engineering from Harvard University while interning at Google. I have over 15 years of experience in IT working for companies like Apple and Microsoft. I was an instructor for the Mechanical Engineering Department at MIT. I was born and raised in Boston, MA and have been living in San Diego, CA since 2019.


Cras sed luctus libero. Donec id orci quis justo tincidunt placerat.