Security Symposium On-Demand Series
Join our on-demand Security Symposium webinar series, where IT security professionals can learn from Red Hat® and Intel security experts, partners, and peers to solve security issues together as a community.
This Security Symposium is an on-demand, six-session webinar series with presentations from experts discussing hybrid cloud security challenges that organizations face and solutions to tackle these challenges.
During this series, we’ll cover how to activate confidential computing, container security concepts, compliance automation, secrets management in dynamic environments, Zero Trust and supply chain security, how to get to yes in the DevSecOps delivery pipeline in less time, and more.
Session 1: Enabling confidential computing for Red Hat OpenShift with Intel Software Guard Extensions (Intel SGX)
This on-demand webinar session will provide an overview of confidential computing and how it can be used in Red Hat® OpenShift® with Intel® Software Guard Extensions (Intel® SGX). Confidential computing protects working data while using a hardware and software stack based on a central processing unit (CPU) root of trust to isolate sensitive data and code.
In this webinar session we’ll highlight:
- Secure Enclaves and DevSecOps partners like Fortanix, Anjuna, and HashiCorp.
- Confidential computing solutions used by Red Hat and Intel.
- How confidential computing uses CPU root of trust to protect data.
Speakers: Matt Smith and Phil King
Session 2: Container security concepts with Podman and Red Hat Enterprise Linux for edge devices
Podman (Pod Manager) has continued to evolve over the last year with many new features and heightened popularity. This webinar will cover the new features, including Podman on Mac and Windows, Podman as a service, and new security features added to Podman on Red Hat® Enterprise Linux®. The talk will also explain key features that make Podman the ideal tool for running Podman containers on Red Hat Enterprise Linux for edge devices.
During this webinar session, we’ll cover:
- Podman on Mac and Windows.
- Podman-as-a-service.
- New security features.
- Running Podman containers on Red Hat Enterprise Linux.
Speaker: Dan Walsh
Session 3: From juggling acts to compliance automation
Memorable cyber attacks and emerging policies highlight the importance of ensuring your systems meet the required security baselines and remain configured to these required specifications. Organizations are challenged by the rapid evolution of cybersecurity compliance requirements and regulatory scrutiny, continuously juggling multiple priorities. To help alleviate these burdens, Red Hat is developing and codifying technical standards to provide turnkey solutions that are customizable with compliance automation. In this webinar session, we will explore the capabilities Red Hat brings to compliance with Red Hat® Ansible® Automation Platform, Red Hat Insights, and Red Hat Satellite, and towards codifying and automating a variety of common industry compliance standards such as the Defense Information Systems Agency (DISA), Security Technical Implementation Guide (STIG), Center for Internt Security (CIS), and Payment Card Industry Data Security Standard (PCI-DSS).
During this webinar session, we’ll cover:
- Visibility and reporting through tools like Red Hat Insights, Red Hat Satellite, and the OpenShift Compliance Operator.
- Automation, remediation, and continued validation through collaboration with the compliance-as-code community.
Speaker: Andrea Hall
Session 4: Secrets management in dynamic environments
Cyber attacks can target secrets that often spread beyond an initial breach. Secrets management allows organizations to enforce security policies consistently and provides assurance that resources across tool stacks, platforms, and cloud environments can only be accessed by authenticated and authorized entities. In this on-demand webinar session, we’ll discuss the critical topic of secrets management in the developing landscape of dynamic environments that includes the market, risks, and emerging trends.
During this session, we’ll cover:
- Secrets management: Market dynamics, risks and trends.
- The overview, technical description, and the advantages of CyberArk Secrets Manager solution in Red Hat® environments.
- How to build a secrets management program for your enterprise.
Speaker: Uzi Ailon
Session 5: The big bang, Zero Trust, and supply chain security
We live in an interconnected world where information is only a tap, swipe, or click away. This access, whether it comes from within the largest cities or the most remote locations, is prompted by the adoption of cloud-native technologies that make it more simple to deliver solutions for the datacenter and the edge. These solutions allow increased delivery speeds and accessibility, offering new opportunities for business and personal use alike. However, swift access requires that we pay close attention to safeguarding the applications and data that increases business value. Consider, how your business can get closer to the end consumer while providing a security-focused experience for both the operator managing the solution and the end consumer?
In this webinar session, attendees will hear about key considerations for safeguarding the software supply chain and for implementing a Zero Trust deployment. We’ll cover the security-focused controls that should be applied, the tools that can be used, and how to automate safe development and operations.
During this webinar session, we’ll cover:
- Key considerations for implementing a Zero Trust deployment.
- The types of security controls that should be applied.
- How to automate safe development and operations.
Speaker: Kirsten Newcomer
Session 6: DevYesOps
With the increasing complexity of modern application project management, security teams often find themselves in a position where they have to delay delivery while trying to understand the risks and exposure of their projects. While this may frustrate the project teams, it’s equally frustrating for the security teams that need to apply emergent, ever changing regulations and policies. In this webinar session, attendees will hear about the experiences of two Red Hat field technicians on how to reduce friction by engaging key security stakeholders.
By the end of this on-demand webinar session, attendees should have a fundamental understanding of a typical DevSecOps delivery pipeline, the importance of including key stakeholders throughout the delivery process, and how to present critical information to stakeholders—to encourage a “fail early, fail fast, fail loud” delivery method.
During this webinar session, we’ll cover:
- The fundamentals of a DevSecOps delivery pipeline.
- Key stakeholders that should be included in the delivery process.
- Tips on how to present information to critical stakeholders.
Speaker: Dave Sirrine