In-Person Event

Security Symposium, Atlanta 2018

novembre 6, 2018Atlanta, GAThe Garage at Tech Square

Thank you for your interest. Online registration is closed at this time. Questions? Please contact infrastructure@redhat.com.

Now available on-demand:
Security Symposium Live

SECURING THE MODERN ENTERPRISE USING OPEN SOURCE

Join the Security Symposium, where cybersecurity professionals can learn and network alongside Red Hat and Intel security experts, partners, and industry peers. No one can solve IT security issues alone. Solving problems together as a community is the future of technology.

WHAT TO EXPECT

The Security Symposium is a full-day event with industry experts covering the latest upstream and enterprise security developments. Attendees will network and collaborate with peers and Red Hat engineers to discuss security challenges open source organizations face.

EVENT KEYNOTE SPEAKER—Theresa Payton, Former White House CIO & Cybersecurity Authority

As the star of the CBS TV series, Hunted, Theresa Payton identifies emerging trends and techniques to help combat cyber threats, from the impact of the Internet of Things to securing Big Data.

The first female to serve as White House chief information officer, and named #4 on IFSEC Global’s list of the world’s Top 50 cybersecurity influencers in security & fire 2017, Theresa is one of America’s most respected authorities on Internet security, data breaches and fraud mitigation. With real-world strategies and solutions, she helps public and private sector organizations protect their most valuable resources.

Drawing from her experience as a veteran cybercrime fighter and entrepreneur of her successful, rapidly-growing and 2018 Cybersecurity 500 recognized firm, Fortalice, Theresa masterfully blends memorable anecdotes with cutting-edge insights to heighten awareness of the perils of our uber-connected world. As she delves into the cyber-underworld and the new kinds of threats that can lead to tomorrow’s breaches and insider risks, she offers a proven blueprint for audiences to stay a step ahead with practical steps for thinking like the adversary, while managing cybersecurity risk.

WHO SHOULD ATTEND

IT business leaders, security professionals, operations professionals, and application developers who are focused on securing their organization’s infrastructure and applications.

Tuesday, November 6, 2018

9:00–9:30 a.m.

Check-in and Registration

9:30–10:30 a.m.

Keynote: Hype or reality? Your workplace and blockchain, cryptocurrency, artificial intelligence, machine learning & the Internet of Things

Theresa Payton

10:30–11:15 a.m.

Container security and new container technologies

Dan Walsh

consulting engineer, Red Hat

11:15–11:30 a.m.

Break

11:30 a.m.–12:30 p.m.

Enterprise compliance & security with Ansible

Walter Bentley

automation practice architect, Red Hat

12:30–1:30 p.m.

Food Truck Lunch

1:30–2:15 p.m.

The future of automation, cybersecurity, and artificial intelligence

Jeff Towle

Global Security Architect, Intel

2:15–3:00 p.m.

Blockchain: A relationship requiring security, privacy, and trust

Gordon Haff

technology evangelist, Red Hat

3:00–3:45 p.m.

Panel and Q&A

3:45–5:00 p.m.

Happy Hour

Abstracts

Blockchain: A relationship requiring security, privacy, and trust, Gordon Haff, technology evangelist, Red Hat

Cryptocurrencies may get most of the press, but blockchain is about a whole lot more. In this session, Red Hat technology evangelist Gordon Haff will discuss which use cases are a good fit with blockchain—and why others may not be such an ideal match. Understanding the opportunities for blockchain requires evaluating blockchain in light of a number of factors, including security and privacy considerations as well as who the users will be and how they're willing to interact.

Enterprise compliance & security with Ansible, Walter Bentley, automation practice architect, Red Hat

Abstract: Ansible Tower, Insights, and Satellite 6 provide a complete automated proactive security solution. In this session, we'll provide useful examples and details about the why and how these tools are better together. You'll learn how to abstract Satellite 6 to use as a dynamic inventory source, use Insights to detect issues and create playbooks, and Ansible Tower to automate with workflow and reporting.

The future of automation, cybersecurity, and artificial intelligence, Jeff Towle, Global Security Architect, Intel

Cybersecurity has traditionally been focused on endpoints and network traffic (both on the Cloud and on premises) inspection with security controls that feed events back to be scored and made actionable with a Security Information Event Management (SIEM) method. While useful for rules-based violations that can be programmed into sensors and malware listeners, there are myriad of threats that can evade these controls or circumvent them altogether. Equally as important, the volume and velocity of data has increased such that it is very difficult to understand what constitutes a risky behavior with a person, software, or system. This is where artificial intelligence can become an equalizer. This presentation will talk about use cases around cyber risk that have been solved with powerful perception, logic, and learning with machine and deep learning precision.

Container security and new container technologies, Dan Walsh, consulting engineer, Red Hat

This talk explains the key components required to run a container image on a host and standardization of the format.

Once we have these standards, we can start examining technologies that can take advantage of these standards for doing things like:

  • Pulling/installing and running applications without requiring a Container Daemon to be running. (We call these system containers.)
  • Ability to build containers in new ways outside of Dockerfile, as well as building them without requiring a container daemon. Introducing Buildah.
  • Ability to copy containers between all different container storage including the Docker daemon, container registries, local repositories, OSTree, new container Next Generation Container Technologies | SCALE 16x
  • Support running containers with a dedicated container runtime for Kubernetes. CRI-O will be introduced

Date: November 6, 2018

Time: 9:00 a.m. – 4:00 p.m.

Location:
The Garage at Tech Square, 848 Spring St NW, Atlanta, GA 30308

Complimentary Parking is available at the Centergy Parking Deck for all attendees. Vouchers will be provided at registration.
The closest MARTA stop is the Midtown Transit Station.

Theresa Payton

Theresa Payton

former White House CIO & cybersecurity authority

9:30–10:30 a.m.

As the star of the CBS TV series, Hunted, Theresa Payton identifies emerging trends and techniques to help combat cyber threats, from the impact of the Internet of Things to securing Big Data.

The first female to serve as White House chief information officer, and named #4 on IFSEC Global’s list of the world’s Top 50 cybersecurity influencers in security & fire 2017, Theresa is one of America’s most respected authorities on Internet security, data breaches and fraud mitigation. With real-world strategies and solutions, she helps public and private sector organizations protect their most valuable resources.

Drawing from her experience as a veteran cybercrime fighter and entrepreneur of her successful, rapidly-growing and 2018 Cybersecurity 500 recognized firm, Fortalice, Theresa masterfully blends memorable anecdotes with cutting-edge insights to heighten awareness of the perils of our uber-connected world. As she delves into the cyber-underworld and the new kinds of threats that can lead to tomorrow’s breaches and insider risks, she offers a proven blueprint for audiences to stay a step ahead with practical steps for thinking like the adversary, while managing cybersecurity risk.

Gordon Haff

Red Hat

Gordon Haff

technology evangelist, Red Hat

10:30–11:15 a.m.

Gordon Haff is a technology evangelist at Red Hat where he works on emerging technology product strategy; writes about tech, trends, and their business impact; and is a frequent speaker at customer and industry events. Among the topics he tries to keep up with are DevOps, Internet of Things, blockchain, AI, cloud computing, containers, and next-generation application architectures. His books include: From Pots and Vats to Programs and Apps and How Open Source Ate Software. Prior to Red Hat, as an industry analyst, Gordon wrote hundreds of research notes and was frequently quoted in major publications on a wide range of IT topics, as well as advised clients on product and marketing strategies.

Walter Bentley

Red Hat

Walter Bentley

automation practice architect, Red Hat

11:30 a.m.–12:30 p.m.

Walter Bentley is a Red Hat Automation Practice Lead and author with a diverse background in production systems administration and solutions architecture. He has more than 15 years of experience in sectors such as online marketing, financial, insurance, aviation, the food industry, education, and technology. In the past, he was typically the requestor, consumer and trusted advisor to companies in use of customer-facing technologies. Today he’s an automation advocate and cloud educator. He presents and speaks regularly at AnsibleFest, OpenStack Summits and other technology conferences, plus webinars, blog posts and technical reviews. His first book, ‘OpenStack Administration with Ansible’ was released in 2016.
Twitter: @djstayflypro

Jeff Towle

Intel

Jeff Towle

global security architect Manager, Intel

1:30–2:15 p.m.

Jeff Towle is a 15-year cybersecurity industry veteran. He has expert level experience in Information Security, Governance, Risk and Compliance industries. His background spans from knowledge management systems, to cybersecurity reference architectures. He has extensive experience managing teams that assess and operationalize cyber security controls infrastructures. He specializes in optimizing security design and reference architectures to contend with modern-day threat vectors.

At Intel, Jeff manages a global team of security architects. He leads Intel’s silicon-based security capabilities in ISG as they intersect with recent investments in Big Data (Cloudera), FPGA technology (Altera), Artificial Intelligence (Nervana) and Memory Based Behavioral Pattern Recognition (Saffron). The volume and velocity of data flows with IoT, Cloud, mobility and virtualization require new approaches to understand risk. By leveraging big data, machine learning and artificial intelligence, it is now possible to scale cyber risk mitigation in a timely and efficient manner. He holds a BA in Music Performance from Hamline University, Saint Paul, Minnesota.

Dan Walsh

Red Hat

Dan Walsh

consulting engineer, Red Hat

2:30–3:30 p.m.

Daniel Walsh is a Red Hat consulting engineer. Dan has led the Red Hat Container Engineering team since August 2013, but has been working on container technology for several years. He’s made many contributions to the Docker project, has done a lot of the software development on the Atomic project, and has led the SELinux project, concentrating on applications and policy development. Dan helped develop sVirt, secure virtualization, and the SELinux sandbox, an early desktop container tool in Red Hat® Enterprise Linux® 6. Prior to Red Hat, Dan worked at BindView (formerly Netect) on vulnerability assessment products and at Digital Equipment Corporation on the Athena project, and at AltaVista on their firewall/tunnel (VPN) products.
Twitter: @rhatdan
Blog: danwalsh.livejournal.com
Email: dwalsh@redhat.com
Container Blogs