In person event
Red Hat at Black Hat USA 2025
Connect with Red Hat at Black Hat USA 2025 on August 2-7. Red Hat is the leader in open source infrastructure and application development solutions for enterprise organizations. We provide a broad portfolio of trusted open source software that helps organizations implement security, in a layered approach, across the infrastructure and application stack and life cycle to help secure workloads on-premise, in the cloud, or at the edge.
Stop by the Red Hat booth #5021 and speak to one of our experts to learn more, try a mini lab exercise, and grab some Red Hat swag!
Show Details
Location: Mandalay Bay Convention Center
Show Dates: August 2-7, 2025
Expo Hall Dates: August 6-7, 2025
Wednesday, August 7: 10:00am - 6:00pm
Thursday, August 8: 10:00am - 4:00pm
Red Hat Booth: #5021
Mini Lab Exercises
Visit the Red Hat Booth (#5021) and try one of our hands-on mini lab exercises for a chance to win a Back to the Future Time Machine Lego Set!
Red Hat Enterprise Linux Security
Learn about key Red Hat Enterprise Linux security technologies that can help monitor and remediate vulnerabilities, protect data and file privacy, meet compliance, and more.
Security automation with Red Hat Ansible Automation Platform
Through this series of mini-exercises, learn about how Red Hat Ansible Automation Platform can help with key security automation use cases such as Palo Alto Networks firewall automation and more.
Enhancing Developer Efficiency and Security with Red Hat Advanced Developer Suite
Explore the integration of security into development and deployment practices using Red Hat OpenShift and various Red hat security tools.
Locating and stopping workloads with log4shell vulnerabilities with Red Hat Advanced Cluster Security for Kubernetes
Apply DevSecOps principles to identify and prevent the deployment of the log4shell exploit in a Kubernetes environment.
In-Booth Theater Sessions
Learn from Red Hat experts and partners by attending the following presentations:
WednesdayAugust, 06, 2025
|
||||
|---|---|---|---|---|
|
11:30 a.m. |
Strengthen security in your software supply chainWhat is Trusted Software Supply Chain and why does it matter? An overview of the products included in the Advanced Developer Suite Sean Rickerd, Principal Technical Marketing Manager, Red Hat |
|||
|
1:00 p.m. |
Teaching Old Dogs New Tricks: Rethinking Secure Access for Virtual Machines in a Multi-Cloud WorldFor years, static secrets and long-lived credentials have been the loyal guardians of virtual machine (VM) security—reliable, familiar, and always on duty. Like a trusted old dog, they’ve watched over your infrastructure faithfully. But these old-school secrets were built for a different time. They're most comfortable when workloads stay put—inside the datacenter, behind a firewall, in environments they understand. Now, with virtualized workloads using Red Hat OpenShift Virtualization and reaching out to public cloud APIs, that once-reliable guard dog can’t always tell whether a request for access is genuine—or a disguised threat slipping through the cracks. He still stands firm and sturdy—but he’s not equipped or trained for unpredictable, fast-evolving and highly ephemeral public and private cloud environments. But this old dog can learn new tricks. Join CyberArk at the Red Hat booth to see how CyberArk Secure Workload Access Solution empowers Red Hat OpenShift Virtualization with dynamic, verifiable workload identities—turning legacy VMs into cloud-ready workloads that can seamlessly and securely connect to services like AWS without ever exposing static secrets. We’ll describe real world access scenarios using CyberArk’s Secure Workload Access and Secrets Manager that seamlessly connect Red Hat OpenShift virtualized workloads directly to AWS IAM Roles Anywhere, enabling VMs to authenticate natively and securely using short-lived credentials. Let your workloads roam safely, with the trust and control security teams demand—without losing the loyalty of your existing infrastructure. Michael Foster, Principal Technical Marketing Manager, Red Hat Sitaram Iyer, Area VP Emerging Technologies, Global Architects, CyberArk |
|||
|
1:30 p.m. |
Scaling Threat Hunting on a Container EnvironmentKenny Peeples, AI TDP, Principal Architect |
|||
|
2:00 p.m. |
Cyberproofing Red Hat OpenShift virtual machines and dataPlease join us for the Cohesity and Red Hat session and hear how organizations can more easily secure and protect data from virtual machines and containers in their Red Hat OpenShift Virtualization environments with Cohesity DataProtect and NetBackup. George James, Sr Solutions Architect, Global Ecosystem, Red Hat Tony Benitez, Sr. Sales Engineer, Cohesity |
|||
|
2:30 p.m. |
Protecting against active attacks - ACS vs CVE-2024-53677A demo on how ACS can mitigate an attack in progress Sean Rickerd, Sean Rickerd, Principal Technical Marketing Manager, Red Hat |
|||
|
3:00 p.m. |
Evolving Kubernetes security with Vault + OpenShiftKubernetes may be the de facto container orchestration platform, but its default security posture leaves secrets dangerously exposed. Many platform teams start with base64-encoded secrets and manual key rotation–and this approach doesn’t scale in a multi-team, hybrid environment. This session will explore how teams can evolve from insecure defaults, fragmented tools, and brittle scripts, to centralized, automated secret management using Vault and OpenShift. We’ll walk through real-world patterns and workflows that show how Vault can enhance security across all layers of the OpenShift stack: - Application workloads: Leverage Vault as an external secrets manager for OpenShift clusters to enable ephemeral secrets, audit-ready access, and centralized SecOps control. We’ll cover common integration patterns using Vault Secrets Operator (VSO) and the Secrets Store CSI Driver. - Platform security*: Explore how upcoming KubeKMS support could allow Vault to serve as the external key provider for etcd encryption—boosting the security posture of OpenShift at its core. - OpenShift Layered products: Strengthen zero-trust architecture in OpenShift Service Mesh by integrating Vault with cert-manager and OpenShift’s native mesh capabilities. - OpenShift Platform Plus: Secure container registries like Quay.io with short-lived tokens generated by Vault + External Secrets Operator (ESO), improving both security and operational agility. Michael Foster, Principal Technical Marketing Manager, Red Hat Paul Stamp, Director of Product Management, HashiCorp |
|||
|
3:30 p.m. |
RHELevant Security Practices: Creating Custom FAPolicyd policiesJoshua Loscar, Senior Technical Marketing Manager, Red Hat |
|||
|
4:00 p.m. |
Security automation done rightKenny Peeples, AI TDP, Principal Architect |
|||
|
5:00 p.m. |
Post-quantum cryptography in LinuxJoshua Loscar, Senior Technical Marketing Manager, Red Hat |
|||
ThursdayAugust, 07, 2025
|
||||
|---|---|---|---|---|
|
11:00 a.m. |
RHELevant Security Practices: Automating configuration and management of Linux systems with system rolesJoshua Loscar, Senior Technical Marketing Manager, Red Hat |
|||
|
11:30 a.m. |
Using event-driven automated AIOps for fast security responseKenny Peeples, AI TDP, Principal Architect |
|||
|
12:00 p.m. |
RHELevant Security Practices: AIDE 101Joshua Loscar, Senior Technical Marketing Manager, Red Hat |
|||
|
12:30 p.m. |
RHELevant Security Practices: AIDE 101Joshua Loscar, Senior Technical Marketing Manager, Red Hat |
|||
|
1:00 p.m. |
Secure AI API’s with F5 and Red Hat OpenShift AIThis presentation will discuss how F5 in combination with Red HatOpenShift AI can help protect AI data factories with F5’s AI Gateway. We will provide an overview of a new offering to aid on premises and hybrid cloud deployments. This session will also provide a brief look at how F5 and Ansible Automation Platform can help organizations in automating application security with Event-Driven Ansible. George James , Sr. Solutions Architect, Red Hat Corey Marshall, Sr. Solutions Architect, F5 |
|||
|
1:30 p.m. |
Teaching Old Dogs New Tricks: Rethinking Secure Access for Virtual Machines in a Multi-Cloud World"For years, static secrets and long-lived credentials have been the loyal guardians of virtual machine (VM) security—reliable, familiar, and always on duty. Like a trusted old dog, they’ve watched over your infrastructure faithfully. But these old-school secrets were built for a different time. They're most comfortable when workloads stay put—inside the datacenter, behind a firewall, in environments they understand. Now, with virtualized workloads using Red Hat OpenShift Virtualization and reaching out to public cloud APIs, that once-reliable guard dog can’t always tell whether a request for access is genuine—or a disguised threat slipping through the cracks. He still stands firm and sturdy—but he’s not equipped or trained for unpredictable, fast-evolving and highly ephemeral public and private cloud environments. But this old dog can learn new tricks. Join CyberArk at the Red Hat booth to see how CyberArk Secure Workload Access Solution empowers Red Hat OpenShift Virtualization with dynamic, verifiable workload identities—turning legacy VMs into cloud-ready workloads that can seamlessly and securely connect to services like AWS without ever exposing static secrets. We’ll describe real world access scenarios using CyberArk’s Secure Workload Access and Secrets Manager that seamlessly connect Red Hat OpenShift virtualized workloads directly to AWS IAM Roles Anywhere, enabling VMs to authenticate natively and securely using short-lived credentials. Let your workloads roam safely, with the trust and control security teams demand—without losing the loyalty of your existing infrastructure." Michael Foster, Principal Technical Marketing Manager, Red Hat Sitaram Iyer, Area VP Emerging Technologies, Global Architects, CyberArk |
|||
|
2:00 p.m. |
RHELevant Security Practices: SELinux for the winJoshua Loscar, Senior Technical Marketing Manager, Red Hat |
|||
|
2:30 p.m. |
Signed, Attested, Admitted: Leveraging Sigstore for Secure Kubernetes ContainersDiscover how to leverage Sigstore’s keyless signatures and attestations to ensure container image integrity and provenance throughout the build and deployment pipeline. This demo will show how integrating Sigstore with Kubernetes admission controller on OpenShift enables only validated, securely built images to run—using organizational identity instead of long-lived private keys for a seamless, secure workflow. Veda Shankar, Senior Principal Product Manager, Red Hat |
|||
|
3:00 p.m. |
Automating compliance across multi-cloud AI pipelinesRegulations are tightening, and AI systems need to comply with data residency, access controls, and audit requirements. In this session, we'll show you how you can use Vault and OpenShift with Ansible Automation Platform to build secure, compliant AI pipelines. We’ll cover strategies for automating secrets rotation, access audits, and policy enforcement across data sources, clouds, and containerized workloads giving security and compliance teams confidence without slowing down innovation. This talk explores how Vault and OpenShift with Ansible Automation Platform combine to automate secrets management, certificate issuance, access auditing, and data encryption across AI pipelines deployed in hybrid and multi-cloud environments. You’ll walk away with a clear understanding of how to integrate compliance into the development lifecycle from day one. Key takeaways: - Why compliance is becoming a blocker for AI adoption, and how to solve it - How Vault supports automated, auditable AI workloads - How Ansible Automation is critical for managing and scaling the Vault environment for secure access, - Patterns for enforcing policy in OpenShift-powered multi-cloud pipelines - Reducing regulatory risk without stalling product teams Tim Coulter, Principal Specialist Solution Architect, Red Hat Paul Stamp, Director of Product Management, HashiCorp |
|||
Solutions
See below to learn more about how Red Hat, a leader in open source infrastructure and application development solutions for enterprise organizations, provides a broad portfolio of trusted open source software that helps organizations implement security, in a layered approach, across the infrastructure and application stack and life cycle to better secure workloads on-premise, in the cloud, or at the edge.
Explore AI from Red Hat
Put AI to work for you, the open source way
Artificial intelligence (AI) is powering new discoveries and experiences across fields and industries. Use Red Hat platforms to build, deploy, monitor, and use AI models and applications, accelerated by the speed, trust, and transparency of the open source community.
Red Hat Enterprise Linux
The leading enterprise Linux operating system, certified on hundreds of clouds and with thousands of vendors. Built-in tools help you with compliance and increase security.
Red Hat OpenShift
An enterprise-ready Kubernetes container platform to build, modernize, and deploy applications across a hybrid cloud environment at scale. Increase containers and Kubernetes security with built-in security and compliance capabilities
Red Hat Ansible Automation Platform
A platform for implementing consistent enterprise-wide automation, no matter where you are in your automation journey. Reduce the risks caused by misconfigurations and manual errors with automation, and streamline your security operations with automation while integrating security into the process, with access control, logging and auditing capabilities.
Red hat Advanced Cluster Security for Kubernetes
Powered by StackRox technology to protect your vital containerized Kubernetes applications across build, deploy, and runtime.
Red Hat Trusted Software Supply Chain
A solution that enhances resilience to software supply chain vulnerabilities by helping organizations build security into the components, processes, and practices in their software supply chain from the start.
Resources
Red Hat Ansible Automation Platform
Red Hat Enterprise Linux
Red Hat OpenShift and Red Hat Advanced Cluster Security for Kubernetes
Opportunities are Open
Open unlocks the world's potential
At Red Hat, our commitment to open source extends beyond technology into virtually everything we do. We collaborate and share ideas, create inclusive communities, and welcome diverse perspectives from all Red Hatters, no matter their role. It’s what makes us who we are.