Join the Security Symposium, where IT security professionals can learn and network with Red Hat® and Intel security experts, partners, and peers to solve security issues together as a community.
The Security Symposium is a full-day event with presentations from experts and a Q&A panel with all speakers. Attendees will learn about hybrid cloud security challenges organizations face and solutions to tackle these challenges.
Why attend
Security teams increasingly find it challenging to keep up with the complexity of changing risks, compliance requirements, tools, and architectural changes introduced by new technologies - such as containers, Kubernetes, software-defined infrastructure, and cloud technologies. As traditional infrastructure evolves to a mix of bare-metal, virtual, cloud, and container environments, learn how you can maintain security, governance, and compliance, while reducing risk.
During this event, we’ll cover:
Time: 10:00 AM - 3:00 PM ET
Date: Wednesday, July 20, 2022
*The link to join virtually will be sent to registrants via email before the event.
Any questions? Please email Infrastructure@redhat.com
Important Notice | |
|
|
SESSION | TIME |
---|---|
Welcome
Matt Smith, Managing Architect, Northeast Regional Office of Technology, Red Hat
|
10:00 AM |
Enabling Confidential Computing for Red Hat OpenShift® with Intel® Software Guard Extensions (Intel® SGX)
Phil King, Cloud Solutions Architect, Intel
This session will provide an overview of Confidential Computing and it can be enabled in Red Hat® OpenShift®. with Intel® Software Guard Extensions (Intel® SGX). Confidential computing protects data while in use, using a hardware and software stack based on a CPU root of trust, to isolate sensitive data and code. The session will highlight use cases such as secure enclaves and DevSecOps from partners like Fortanix, Anjuna, and HashiCorp.
|
10:00 AM – 10:30 AM |
Container Security Concepts with Podman and RHEL for Edge
Dan Walsh, Senior Distinguished Engineer, Red Hat Podman (Pod Manager) has continued to evolve over the last year with many new features and heightened popularity. This talk will cover the new features including Podman on MAC and Windows, Podman as a service, and new security features added to Podman on RHEL. The talk will also explain key features that make Podman the ideal tool for running Podman containers on RHEL for Edge devices.
|
10:30 AM – 11:15 AM |
From Juggling Acts to Compliance Automation
Andrea Hall, Senior Specialist Solutions Architect, Red Hat
Memorable cyber attacks and emerging policies highlight the importance of not just ensuring our systems meet our security baselines, but how we ensure our systems remain configured to the required specifications over time. Organizations are challenged by the rapid evolution of cybersecurity compliance requirements and regulatory scrutiny, continuously juggling multiple priorities. To help alleviate these burdens, Red Hat is developing and codifying technical standards to provide solutions that are at the same time turn-key and customizable with compliance automation.
In this session, we will be exploring the capabilities Red Hat brings to bare in the compliance space via Ansible, Insights, and Satellite, as well as the direction towards codifying and automating a variety of common industry compliance standards such as the DISA STIG, CIS, PCI-DSS, etc. to provide the following benefits:
|
11:15 AM – 12:00 PM |
Lunch Break
|
12:00 PM – 12:45 PM |
Secrets Management in dynamic environments
Uzi Ailon, VP, DevSecOps Solutions, CyberArk
This talk will discuss the critical area of Secrets Management in the emerging landscape of dynamic environments.
|
12:45 PM – 1:30 PM |
The Big Bang! Zero Trust AND Supply Chain Security
Kirsten Newcomer, Director, Security Product Management, Hybrid Platforms, Red Hat
We live in an interconnected world where information is only a tap, swipe, or click away. This degree of access, whether it be from within the largest cities or the most remote locations, is enabled by the adoption of cloud-native technologies which make it easier to deliver solutions for the data center and the edge. These solutions enable increased delivery speeds and accessibility, driving new opportunities for business and personal use alike. However, easier access requires that we pay close attention to securing the applications and data that drive business value. How do you get closer to the end consumer while providing a secure experience for both the operator managing the solution and the end consumer?
In this session, attendees will learn key considerations for securing the software supply chain AND for implementing a zero trust deployment. We will cover the types of security controls that should be applied, the tools that can be used, and how to automate safe development and operations.
|
1:30 PM – 2:15 PM |
DevYesOps
Dave Sirrine, Principal Solutions Architect, Red Hat
With the increasing complexity of modern application project management, security teams are often finding themselves in the position where they have to delay delivery while they try to “play catch up” and understand the risks and exposure of projects. While this may be frustrating to the project teams, it’s equally frustrating for the security teams as they look to apply an ever changing set of regulations and policies.
In this session, attendees will learn from the experiences of two of Red Hats technical field resources, Andrew Block and Dave Sirrine, on how to reduce friction and get to “yes” faster by engaging key security stakeholders early and often. Upon completion of this session, attendees will have a fundamental understanding of a typical DevSecOps delivery pipeline, as well as the confidence in understanding the stakeholders that should be including in every step of the delivery process, how to present the information to those stakeholders, and empowered to encourage a “fail early, fail fast, fail loud” method of delivery.
|
2:15 PM – 2:45 PM |
Q&A Panel
All speakers
|
2:45 PM – 3:00 PM |
Location:
BlueJeans
Bluejeans
Bluejeans, North Carolina Bluejeans
Time: X:XX a.m. - X:XX p.m.
Cras sed luctus libero. Donec id orci quis justo tincidunt placerat.