Contact us
Account Log in


Secure Foundations for Today and Tomorrow

  • November 18, 2015

Where are you storing your most critical data? How are you protecting your infrastructure from vulnerabilities? In today's technology landscape, we're asked these questions every day. 

Gain a deeper understanding of the critical role of secure technology in your IT strategy in  Secure Foundations for Today and Tomorrow | A Red Hat virtual event.

Join security subject matter experts and Red Hat customers to discuss topics including: 

  • Tools and technologies designed to keep your infrastructure secure
  • Real-world perspectives on vulnerability detection and response
  • Red Hat's proactive, open source approach to IT security

This virtual event includes a keynote presentation, followed by 3 unique breakout sessions featuring live Q-and-A. Get the details below, and join us on November 18 to get your key security questions answered live.

KEYNOTE: Secure foundations

Security is top-of-mind for IT organizations large and small. It's important to know where your critical data is stored, and a trusted technology platform is the foundation of your security strategy.

In this session, Marco Bill-Peter will discuss: 

  • Evolving security demands in today's technology landscape
  • Importance of security end-to-end in the software supply chain
  • How Red Hat secures open source solutions for our enterprise customers

Speaker: Marco Bill-Peter, vice president, Customer Experience & Engagement








Using hybrid cloud technologies to manage security

Organizations large and small face security challenges in a distributed, fast-changing environment. 

This session discusses how technologies like SELinux, containers, and hybrid management can help you create a new approach to IT security.

Speaker: Lars Herrmann, senior director, Integrated Solutions Business Unit, Red Hat

Securing the software supply chain

The way we build our infrastructure and applications is evolving at an unprecedented rate. Open source software and methodologies are becoming more pervasive in today's technology landscape. Do you know who is responsible for building it? 

In this session, we'll explore: 

  • How Red Hat secures its software supply chain.
  • Why Red Hat is a trustworthy software provider.
  • What questions you should be asking your developers and vendors about their software security.

Speaker: Josh Bressers, security strategist, Platform Business Unit, Red Hat

IKEA vs. Shellshock: 1-0

With a large installed base of servers, patching can become a nightmare--especially when you have to patch urgently. Learn how 2 people at IKEA were able to patch 3500+ Red Hat Enterprise Linux servers, spread over 400 sites, 35 countries, and 4 continents, within hours.

In this session, we will:

  • Discuss IKEA's Linux-based standard operating environment (SOE) and identify key features, processes, and blueprints that enable IKEA to handle its installed base of Red Hat Enterprise Linux.
  • Walk through the key documentation and processes for IKEA’s SOE.
  • See how IKEA maintains crucial PCI-DSS compliance using the SOE.

Speaker: Magnus Glantz, product responsible, IKEA



Date: Wednesday, November 18

Time*: 11 a.m. (ET) / 4 p.m. (UTC)

*Please note: This event will be recorded and available on-demand. Please register now to access the recorded content after the live event concludes on November 18.


Join the conversation