Ansible® Automates 2022 is an in-person only conference hosted by Red Hat®. The right IT automation solution can unify teams and processes across an organization, ultimately transforming the way IT is delivered.
Red Hat Ansible Automation Platform supports extensive possibilities and is designed with hybrid cloud infrastructure in mind. It is a flexible, scalable, and multifaceted automation solution that works across your enterprise, wherever your organization might be in its automation journey.
Join #AnsibleAutomates2022 to learn how to create an automation-first approach for your organization. You will learn how to create, scale, and implement automation across your enterprise from top experts and industry thought leaders. Discover more about Ansible Automation Platform and its benefits, and become better informed to make the right decisions for your organization's automation practice.
|Your team||Your business|
|Align your group with other IT teams through DevOps practices.||
Create opportunities for collaboration and a culture of success while you navigate hybrid cloud.
#AnsibleAutomates2022 is for IT business leaders, technologists, and their teams:
This event is not meant to provide technical instruction and training on Ansible Automation Platform. For all technical training, please view our Red Hat Training courses or our Ansible technical workshops.
|REGISTRATION & BREAKFAST|
|10:00 AM||Introduction||Angela Andrews, Solutions Architect, Red Hat|
The Role of Automation in Zero Trust
Traditional approaches to information security are reactive and probably insufficient. In an era of on-demand computing, we can no longer afford to be reactive: we need to revolutionize all security practices as a holistic, enterprise capability. Zero Trust is the model we need and it is the future of cybersecurity. Explore how zero trust works to tackle the threats to modern IT systems – and how Ansible Automation is critical to comprehensive automation across the tactical and enterprise IT landscape.
|Michael Epley, Chief Architect and Security Strategist, Red Hat North America Public Sector|
SecOps with Ansible Automation
Configuration Drift, Manual Validation, Human Error; these are all words we often associate with our system security posture. Utilizing today’s automation technologies these can all be things of the past by bringing development proven CI/CD techniques and jumping into the world of SecOps. Deploying consistent, automated, and repeatable instances across your entire enterprise using these solutions will ensure you know what your security posture looks like at any given moment without the massive man hours required for manual validation for every request.
During this presentation you will learn:
|Christopher Grimm, Solutions Architect, Red Hat|
Self-Remediating Infrastructure as a Compliance Tool
As infrastructure and security teams simultaneously take on the tasks of controlling and managing larger scale infrastructure with an ever-increasing number of threat vectors, automation has become an increasingly important tool in the fight to keep our businesses safe. Ansible is uniquely suited, due to its expansive reach of control and ease of use, to act as a central orchestrator and management tool to keep machines and networks aligned with security and compliance needs. In this talk, we will be exploring the possibilities of using self-remediating infrastructure as a means to maintaining safety within our networks, and how Ansible can reduce the burden of operations teams and security teams to mitigate threats.
|Adam Pippert, Associate Principal Solutions Architect, Red Hat|
|11:55 AM||Lunch break|
Breaking Down Walls: How Ansible and IBM Qradar SOAR Unite Operations, Security, and Development Teams To Secure Organizations
Organizations today still operate off the premise that their teams for operations, development, and security are and should be independent silos. The operations team deploys and maintains the very infrastructure that the security and development team uses. The development team builds and maintains applications that the operations team deploys and [potentially] the security team uses. The security team uses applications that the operations team deploys and [potentially] the development team builds to protect the overall infrastructure. But what if the security team doesn’t have access to the very infrastructure that it needs to secure? How does the operations team know what tools the security team needs to deploy? How does the development team know what applications to build for the security team?
Then, what if I told you the efficacy of your security solution was purely based on how well your operations, security, and development team work together. What if I told you that IBM and Red Hat have co-authored a way to break down those silos and bring the operations, security, and development team together in their approach to security. In this presentation, we are going to walk through the day in the life of a security analyst using the IBM QRadar SOAR platform to conduct their incident response steps almost entirely by running Ansible Playbooks the operations team provided.
|Gerald Trotman, Worldwide OCP SOAR + Connect Technical Sales Lead, IBM Security|
Automate system hardening on Windows hosts with Ansible Automation using CIS/STIG as a guideline
In this session, we will walk through how you can run a security hardening automation pipeline in Ansible Automation Platform. In this pipeline, OpenSCAP security scan report will be generated on a set of windows hosts before and after applying CIS hardening baseline. The report will be emailed as part of the demonstration, importantly compliance status for each system is tracked in Ansible Automation Platform inventory where you can interrogate externally via REST API and incorporate into other monitoring and reporting tools such as Splunk, Elk Stack or others.
|Orcun Atakan, Global Ansible Specialist Solutions Architect, Red Hat|
Network Resource Modules for Compliance
With today's complexities with Network security and compliance, it is a mission that every organization must prioritize to address. Accidental changes and manually doing CLI updates are now a mundane job of the past. Using Ansible to automate all of the tasks to keep the largest infrastructures in a simple, consistent compliant state while allowing your organization to focus on other business objectives. Ansible allows you to define your systems to meet your security and compliance goals with a library of automation modules that allow you quickly perform tasks without complicated scripting. Once written, you have the option to reused these repeatable playbooks across your entire infrastructure.
|Michael Beasley, Solutions Architect, Red Hat|
|2:30 PM||Panel Q&A and discussion|
The Westin Washington Dulles Airport
2520 Wasser Terrace
Herndon, Virginia 20171