Your Red Hat account gives you access to your member profile and preferences, and the following services based on your customer status:
Not registered yet? Here are a few reasons why you should be:
- Browse Knowledgebase articles, manage support cases and subscriptions, download updates, and more from one place.
- View users in your organization, and edit their account information, preferences, and permissions.
- Manage your Red Hat certifications, view exam history, and download certification-related logos and documents.
Your Red Hat account gives you access to your member profile, preferences, and other services depending on your customer status.
For your security, if you're on a public computer and have finished using your Red Hat services, please be sure to log out.Log out
In accordance with recent federal mandates, and in pursuit of innovative and powerful solutions, the emphasis on implementing open source software in the federal government has increased. While the government's digital transformation marks an exciting chapter in government technology, it can also introduce new cyber security challenges.
That’s why we created Red Hat’s Defense in Depth event – to give the best minds in government IT security an opportunity to come together to discuss solutions to these challenges.
This year, during our fourth annual Defense in Depth event, government employees, contractors and Red Hat partners will gather in Tysons Corner, Va. to discuss how open source can help accelerate innovation in government IT, and discuss best practices for open source security. Red Hat certified engineers, product managers and solution architects will also be on site to answer specific questions and to discuss government IT’s evolving security needs.
The 2016 Red Hat Defense in Depth event will feature break out sessions and speakers, including:
Delivering trusted clouds with software-defined architectures: Steve Orrin, Intel
Securing the open source supply chain: Josh Bressers, Red Hat
Extending the FedRAMP security boundary to the premise: John Keese, CSRA
Triggering insider threats using Auditd - Using the Linux audit subsystem to meet insider threats: Mark St. Laurent, Praxis
Emerging tech show and tell: application whitelisting: Steve Grubb, Red Hat
open sourced: NSA System Integrity Management Platform (SIMP): Trevor Vaughan, Onyx Point
Automating DoD STIG compliance with OpenSCAP: Martin Preisler and Robin Price, Red Hat
A proactive approach to detecting advanced threats in Linux: Victor Martinez, Forcepoint
This promises to be a premier event on government IT security and how open source software can help address those challenges.
Defense in Depth will be held on Oct. 6, 2016, in Tysons Corner, Va. Visit the official event site for more details and to register.