Overview
Modern organizations are navigating an increasingly complex security landscape—balancing risk mitigation with regulatory compliance, digital sovereignty, and secure supply chains across hybrid cloud environments. At the same time, the rise of AI-driven workloads, zero trust architectures, automation, and the need to prepare for post-quantum cryptography are reshaping how security is approached at every level.
The Reinforce your security foundation: Designed to be trusted virtual event will explore how these challenges can be addressed with a unified approach—where security is continuous across every layer, not a final checkpoint. Through the keynote, expert-led sessions, and live panel discussion, we’ll show how Red Hat embeds security across its products, services, and support using open source security principles to help organizations protect infrastructure and maintain full data control.
Following the keynote, choose the expert-led session most relevant to your needs. As these sessions run concurrently, they will all be available on-demand after the event if you’d like to watch more than one.
Agenda
| TIME | SESSION |
| 10:00 AM CEST | Security for an AI-driven world Stop using 1990s patching for 2026 AI threats. Build a layered, automated defense for your AI foundation and supply chain with Red Hat’s "default-on" security and "security plumbing" approach. Speakers: Vincent Danen, Vice President Product Security, Red Hat |
| 10:50 AM CEST | Zero trust through automation: Hardening infrastructure with Ansible Learn how Red Hat Ansible® Automation Platform acts as a Policy Enforcement Point (PEP) in a Zero Trust architecture. Automate access decisions, configuration control, and real-time policy validation for active security. Speaker: Nuno Martins, Senior Principal Technical Marketing Manager, Red Hat |
| 10:50 AM CEST | How to trust your AI with automated red teaming Scale AI with confidence. Learn AI red teaming to identify risks, apply remediation, and measure safety with clear metrics. Discover the path to demonstrably secure enterprise AI. Speaker: Stuart Battersby, AI Safety & Model Evaluation Architect, Red Hat |
| 10:50 AM CEST | The chain of trust: Open source supply chain security in action Software is assembled, not built. Learn how Red Hat OpenShift® creates a verifiable chain of trust to secure your supply chain and meet EU Cyber Resilience Act mandates. Security for developers! Speaker: Natale Vinto, Technical Director, Evangelism, Red Hat |
| 10:50 AM CEST | The top 10 security features in Red Hat Enterprise Linux that support a zero trust architecture Explore 10 advanced security features in RHEL 10 designed for Zero Trust. From immutable builds to Identity Management, learn to secure your infrastructure and meet strict compliance demands. Speakers: Jose Angel de Bustos, Senior Specialist Solution Architect - RHEL, Red Hat, |
| 11:50 AM CEST | Q&A / closing remarks |
Speakers
Vincent Danen
Vice President Product Security, Red Hat
Lucy Kerner
Security Global Strategy and Evangelism Director, Red Hat
Nuno Martins
Senior Principal Technical Marketing Engineer, Red Hat
Stuart Battersby
AI Safety & Model Evaluation Architect, Red Hat
Natale Vinto
Technical Director, Evangelism, Red Hat
Jose Angel de Bustos
Senior Specialist Solution Architect - RHEL, Red Hat
Alessandro Rossi
Associate Principal Specialist Solution Architect - RHEL, Red Hat
Juan van der Breggen
Associate Principal Specialist Solution Architect - RHEL, Red Hat
Rodrigo Alvares
Associate Principal Specialist Solution Architect, OpenShift - Cross Segment, Red Hat