In-person event

Red Hat at Black Hat USA 2025

August 2, 2025 - August 7, 2025 Las Vegas, NVMandalay Bay
Event menu

In person event

Red Hat at Black Hat USA 2025

Connect with Red Hat at Black Hat USA 2025 on August 2-7. Red Hat is the leader in open source infrastructure and application development solutions for enterprise organizations. We provide a broad portfolio of trusted open source software that helps organizations implement security, in a layered approach, across the infrastructure and application stack and life cycle to help secure workloads on-premise, in the cloud, or at the edge. 

Stop by the Red Hat booth #5021 and speak to one of our experts to learn more, try a mini lab exercise, and grab some Red Hat swag!

Show Details

Location: Mandalay Bay Convention Center

Show Dates: August 2-7, 2025

Expo Hall Dates: August 6-7, 2025

Wednesday, August 7: 10:00am - 6:00pm

Thursday, August 8: 10:00am - 4:00pm

Red Hat Booth: #5021

BH25_Logo_USA_Lockup_k.png

Mini Lab Exercises

Visit the Red Hat Booth (#5021) and try one of our hands-on mini lab exercises for a chance to win a Back to the Future Time Machine Lego Set!

BTTF LEGO

Red Hat Enterprise Linux Security

Learn about key Red Hat Enterprise Linux security technologies that can help monitor and remediate vulnerabilities, protect data and file privacy, meet compliance, and more.

Security automation with Red Hat Ansible Automation Platform

Through this series of mini-exercises, learn about how Red Hat Ansible Automation Platform can help with key security automation use cases such as Palo Alto Networks firewall automation and more.

Enhancing Developer Efficiency and Security with Red Hat Advanced Developer Suite

Explore the integration of security into development and deployment practices using Red Hat OpenShift and various Red hat security tools.

Locating and stopping workloads with log4shell vulnerabilities with Red Hat Advanced Cluster Security for Kubernetes

Apply DevSecOps principles to identify and prevent the deployment of the log4shell exploit in a Kubernetes environment.

In-Booth Theater Sessions

Learn from Red Hat experts and partners by attending the following presentations: 

Wednesday

August, 06, 2025

11:30 a.m.

Strengthen security in your software supply chain

What is Trusted Software Supply Chain and why does it matter? An overview of the products included in the Advanced Developer Suite

Sean Rickerd,

Principal Technical Marketing Manager, Red Hat

1:00 p.m.

Teaching Old Dogs New Tricks: Rethinking Secure Access for Virtual Machines in a Multi-Cloud World

For years, static secrets and long-lived credentials have been the loyal guardians of virtual machine (VM) security—reliable, familiar, and always on duty. Like a trusted old dog, they’ve watched over your infrastructure faithfully. But these old-school secrets were built for a different time. They're most comfortable when workloads stay put—inside the datacenter, behind a firewall, in environments they understand. Now, with virtualized workloads using Red Hat OpenShift Virtualization and reaching out to public cloud APIs, that once-reliable guard dog can’t always tell whether a request for access is genuine—or a disguised threat slipping through the cracks. He still stands firm and sturdy—but he’s not equipped or trained for unpredictable, fast-evolving and highly ephemeral public and private cloud environments. But this old dog can learn new tricks. Join CyberArk at the Red Hat booth to see how CyberArk Secure Workload Access Solution empowers Red Hat OpenShift Virtualization with dynamic, verifiable workload identities—turning legacy VMs into cloud-ready workloads that can seamlessly and securely connect to services like AWS without ever exposing static secrets. We’ll describe real world access scenarios using CyberArk’s Secure Workload Access and Secrets Manager that seamlessly connect Red Hat OpenShift virtualized workloads directly to AWS IAM Roles Anywhere, enabling VMs to authenticate natively and securely using short-lived credentials. Let your workloads roam safely, with the trust and control security teams demand—without losing the loyalty of your existing infrastructure.

Michael Foster,

Principal Technical Marketing Manager, Red Hat

Sitaram Iyer,

Area VP Emerging Technologies, Global Architects, CyberArk

1:30 p.m.

Scaling Threat Hunting on a Container Environment

Kenny Peeples,

AI TDP, Principal Architect

2:00 p.m.

Cyberproofing Red Hat OpenShift virtual machines and data

Please join us for the Cohesity and Red Hat session and hear how organizations can more easily secure and protect data from virtual machines and containers in their Red Hat OpenShift Virtualization environments with Cohesity DataProtect and NetBackup.

George James,

Sr Solutions Architect, Global Ecosystem, Red Hat

Tony Benitez,

Sr. Sales Engineer, Cohesity

2:30 p.m.

Protecting against active attacks - ACS vs CVE-2024-53677

A demo on how ACS can mitigate an attack in progress

Sean Rickerd,

Sean Rickerd, Principal Technical Marketing Manager, Red Hat

3:00 p.m.

Evolving Kubernetes security with Vault + OpenShift

Kubernetes may be the de facto container orchestration platform, but its default security posture leaves secrets dangerously exposed. Many platform teams start with base64-encoded secrets and manual key rotation–and this approach doesn’t scale in a multi-team, hybrid environment. This session will explore how teams can evolve from insecure defaults, fragmented tools, and brittle scripts, to centralized, automated secret management using Vault and OpenShift. We’ll walk through real-world patterns and workflows that show how Vault can enhance security across all layers of the OpenShift stack: - Application workloads: Leverage Vault as an external secrets manager for OpenShift clusters to enable ephemeral secrets, audit-ready access, and centralized SecOps control. We’ll cover common integration patterns using Vault Secrets Operator (VSO) and the Secrets Store CSI Driver. - Platform security*: Explore how upcoming KubeKMS support could allow Vault to serve as the external key provider for etcd encryption—boosting the security posture of OpenShift at its core. - OpenShift Layered products: Strengthen zero-trust architecture in OpenShift Service Mesh by integrating Vault with cert-manager and OpenShift’s native mesh capabilities. - OpenShift Platform Plus: Secure container registries like Quay.io with short-lived tokens generated by Vault + External Secrets Operator (ESO), improving both security and operational agility.

Michael Foster,

Principal Technical Marketing Manager, Red Hat

Paul Stamp,

Director of Product Management, HashiCorp

3:30 p.m.

RHELevant Security Practices: Creating Custom FAPolicyd policies

Joshua Loscar,

Senior Technical Marketing Manager, Red Hat

4:00 p.m.

Security automation done right

Kenny Peeples,

AI TDP, Principal Architect

5:00 p.m.

Post-quantum cryptography in Linux

Joshua Loscar,

Senior Technical Marketing Manager, Red Hat

Thursday

August, 07, 2025

11:00 a.m.

RHELevant Security Practices: Automating configuration and management of Linux systems with system roles

Joshua Loscar,

Senior Technical Marketing Manager, Red Hat

11:30 a.m.

Using event-driven automated AIOps for fast security response

Kenny Peeples,

AI TDP, Principal Architect

12:00 p.m.

RHELevant Security Practices: AIDE 101

Joshua Loscar,

Senior Technical Marketing Manager, Red Hat

12:30 p.m.

RHELevant Security Practices: AIDE 101

Joshua Loscar,

Senior Technical Marketing Manager, Red Hat

1:00 p.m.

Secure AI API’s with F5 and Red Hat OpenShift AI

This presentation will discuss how F5 in combination with Red HatOpenShift AI can help protect AI data factories with F5’s AI Gateway. We will provide an overview of a new offering to aid on premises and hybrid cloud deployments. This session will also provide a brief look at how F5 and Ansible Automation Platform can help organizations in automating application security with Event-Driven Ansible.

George James ,

Sr. Solutions Architect, Red Hat

Corey Marshall,

Sr. Solutions Architect, F5

1:30 p.m.

Teaching Old Dogs New Tricks: Rethinking Secure Access for Virtual Machines in a Multi-Cloud World

"For years, static secrets and long-lived credentials have been the loyal guardians of virtual machine (VM) security—reliable, familiar, and always on duty. Like a trusted old dog, they’ve watched over your infrastructure faithfully. But these old-school secrets were built for a different time. They're most comfortable when workloads stay put—inside the datacenter, behind a firewall, in environments they understand. Now, with virtualized workloads using Red Hat OpenShift Virtualization and reaching out to public cloud APIs, that once-reliable guard dog can’t always tell whether a request for access is genuine—or a disguised threat slipping through the cracks. He still stands firm and sturdy—but he’s not equipped or trained for unpredictable, fast-evolving and highly ephemeral public and private cloud environments. But this old dog can learn new tricks. Join CyberArk at the Red Hat booth to see how CyberArk Secure Workload Access Solution empowers Red Hat OpenShift Virtualization with dynamic, verifiable workload identities—turning legacy VMs into cloud-ready workloads that can seamlessly and securely connect to services like AWS without ever exposing static secrets. We’ll describe real world access scenarios using CyberArk’s Secure Workload Access and Secrets Manager that seamlessly connect Red Hat OpenShift virtualized workloads directly to AWS IAM Roles Anywhere, enabling VMs to authenticate natively and securely using short-lived credentials. Let your workloads roam safely, with the trust and control security teams demand—without losing the loyalty of your existing infrastructure."

Michael Foster,

Principal Technical Marketing Manager, Red Hat

Sitaram Iyer,

Area VP Emerging Technologies, Global Architects, CyberArk

2:00 p.m.

RHELevant Security Practices: SELinux for the win

Joshua Loscar,

Senior Technical Marketing Manager, Red Hat

2:30 p.m.

Signed, Attested, Admitted: Leveraging Sigstore for Secure Kubernetes Containers

Discover how to leverage Sigstore’s keyless signatures and attestations to ensure container image integrity and provenance throughout the build and deployment pipeline. This demo will show how integrating Sigstore with Kubernetes admission controller on OpenShift enables only validated, securely built images to run—using organizational identity instead of long-lived private keys for a seamless, secure workflow.

Veda Shankar,

Senior Principal Product Manager, Red Hat

3:00 p.m.

Automating compliance across multi-cloud AI pipelines

Regulations are tightening, and AI systems need to comply with data residency, access controls, and audit requirements. In this session, we'll show you how you can use Vault and OpenShift with Ansible Automation Platform to build secure, compliant AI pipelines. We’ll cover strategies for automating secrets rotation, access audits, and policy enforcement across data sources, clouds, and containerized workloads giving security and compliance teams confidence without slowing down innovation. This talk explores how Vault and OpenShift with Ansible Automation Platform combine to automate secrets management, certificate issuance, access auditing, and data encryption across AI pipelines deployed in hybrid and multi-cloud environments. You’ll walk away with a clear understanding of how to integrate compliance into the development lifecycle from day one. Key takeaways: - Why compliance is becoming a blocker for AI adoption, and how to solve it - How Vault supports automated, auditable AI workloads - How Ansible Automation is critical for managing and scaling the Vault environment for secure access, - Patterns for enforcing policy in OpenShift-powered multi-cloud pipelines - Reducing regulatory risk without stalling product teams

Tim Coulter,

Principal Specialist Solution Architect, Red Hat

Paul Stamp,

Director of Product Management, HashiCorp

Solutions

See below to learn more about how Red Hat, a leader in open source infrastructure and application development solutions for enterprise organizations,  provides a broad portfolio of trusted open source software that helps organizations implement security, in a layered approach, across the infrastructure and application stack and life cycle to better secure workloads on-premise, in the cloud, or at the edge.

Explore AI from Red Hat

Put AI to work for you, the open source way

Artificial intelligence (AI) is powering new discoveries and experiences across fields and industries. Use Red Hat platforms to build, deploy, monitor, and use AI models and applications, accelerated by the speed, trust, and transparency of the open source community.

AI icon

Red Hat Enterprise Linux

The leading enterprise Linux operating system, certified on hundreds of clouds and with thousands of vendors. Built-in tools help you with compliance and increase security.

RHEL

Red Hat OpenShift

An enterprise-ready Kubernetes container platform to build, modernize, and deploy applications across a hybrid cloud environment at scale. Increase containers and Kubernetes security with built-in security and compliance capabilities

openshift

Red Hat Ansible Automation Platform

A platform for implementing consistent enterprise-wide automation, no matter where you are in your automation journey. Reduce the risks caused by misconfigurations and manual errors with automation, and streamline your security operations with automation while integrating security into the process, with access control, logging and auditing capabilities.

ansible

Red hat Advanced Cluster Security for Kubernetes

Powered by StackRox technology to protect your vital containerized Kubernetes applications across build, deploy, and runtime.  

kubernetes

Red Hat Trusted Software Supply Chain

A solution that enhances resilience to software supply chain vulnerabilities by helping organizations build security into the components, processes, and practices in their software supply chain from the start.

Security

Resources

Opportunities are Open

Open unlocks the world's potential

At Red Hat, our commitment to open source extends beyond technology into virtually everything we do. We collaborate and share ideas, create inclusive communities, and welcome diverse perspectives from all Red Hatters, no matter their role. It’s what makes us who we are.