Virtual event

Reinforce your security foundation : Designed to be trusted

Jump to section

Modern organizations are navigating an increasingly complex security landscape—balancing risk mitigation with regulatory compliance, digital sovereignty, and secure supply chains across hybrid cloud environments. At the same time, the rise of AI-driven workloads, zero trust architectures, automation, and the need to prepare for post-quantum cryptography are reshaping how security is approached at every level.

The Reinforce your security foundation: Designed to be trusted virtual event will explore how these challenges can be addressed with a unified approach—where security is continuous across every layer, not a final checkpoint. Through the keynote, expert-led sessions, and live panel discussion, we’ll show how Red Hat embeds security across its products, services, and support using open source security principles to help organizations protect infrastructure and maintain full data control.

Following the keynote, choose the expert-led session most relevant to your needs. As these sessions run concurrently, they will all be available on-demand after the event if you’d like to watch more than one.

TIMESESSION
10:00 AM CEST

Security for an AI-driven world

Why are we still applying 1990s patching mentalities to a 2026 AI threat landscape? How do you build layered defense for the AI-driven enterprise? In an era where exploits are weaponized by the very technology we aim to deploy, an "AI-ready" enterprise is only as resilient as its weakest architectural layer. A siloed approach to security doesn't just fail to scale—it leaves your models and data exposed at the foundation.

Red Hat® is shifting the paradigm: security is no longer a gatekeeper, but the essential "security plumbing" that enables innovation to flow from the operating system to the autonomous agent.

In this session, we explore how to move beyond the noise of vulnerability counting toward a layered, pragmatic architecture. We will discuss how Red Hat helps you:

  • Harden the foundation: Secure the underlying Linux® OS and container platforms to ensure a trusted environment for AI workloads.
  • Protect the pipeline: Integrate automated security standards throughout the software lifecycle—from upstream open source to production.
  • Secure the intelligence: Implement guardrails for AI agents and models to maintain data sovereignty and operational integrity.
  • Automate by default: Transform security from a manual compliance burden into a seamless, automated catalyst for AI scale.

By delivering a layered cross-portfolio architecture that is trustworthy by design, we weave resilience into the very fabric of your infrastructure, ensuring your AI journey is built on a foundation of "default-on" security.

Speakers: Vincent Danen, Vice President Product Security, Red Hat and  Lucy Kerner, Security Global Strategy and Evangelism Director, Red Hat

10:50 AM CEST

Zero trust through automation: Hardening infrastructure with Ansible

Discover how Red Hat Ansible® Automation Platform integrates into zero trust architecture (ZTA) as a powerful Policy Enforcement Point (PEP). 

You’ll learn how Ansible:

  • Enforces access decisions, validates policies, and mediates resource requests in real-time.
  • Controls configuration changes, applies least-privilege access at execution, and continuously validates compliance.
  • Communicates with Policy Decision Points (PDPs) to ensure every action aligns with zero trust policies.
  • Acts as a scalable, active security control layer when positioned as a PEP.

Speaker: Nuno Martins, Senior Principal Technical Marketing Manager, Red Hat

10:50 AM CEST

How to trust your AI with automated red teaming

For AI to scale in the enterprise, it must not only be efficient and performant, but also safe and secure. To build stakeholder trust, these qualities must be measurable and backed by clear metrics.

This session introduces the key concepts of AI red teaming, with a practical walk through on how to test your AI use case, identify risks, apply remediation, and retest.  

Discover the path to demonstrably secure AI.

Speaker: Stuart Battersby, AI Safety & Model Evaluation Architect, Red Hat 

10:50 AM CEST

The chain of trust: Open source supply chain security in action

Software is no longer built—it’s assembled. As supply chain attacks increase, security has evolved from a siloed checkpoint into a core part of modern software delivery. 

Whether you’re writing code, architecting platforms, or managing infrastructure, the integrity of your open source dependencies is now everyone’s responsibility To meet mandates like the EU Cyber Resilience Act, technical teams must implement a verifiable chain of trust.

In this session, we’ll demonstrate how Red Hat OpenShift® turns security into something developers can work with—not around.

Speaker: Natale Vinto, Technical Director, Evangelism, Red Hat

10:50 AM CEST

The top 10 security features in Red Hat Enterprise Linux that support a zero trust architecture

With rising security breaches and stricter compliance demands, understanding the zero trust aligned security capabilities of Red Hat Enterprise Linux 10 is key to protecting critical data.

In this session, we’ll explore 10 advanced security features in the latest release that help secure your infrastructure and meet regulatory requirements—from immutable builds with image mode, to Red Hat Identity Management and access control.

Whether you're an experienced system administrator or new to enterprise Linux, you’ll gain practical insights for building more resilient, secure systems.

Speakers: Jose Angel de Bustos, Senior Specialist Solution Architect - RHEL, Red Hat, Alessandro Rossi, Associate Principal Specialist Solution Architect - RHEL, Red Hat, and Juan van der Breggen, Associate Principal Specialist Solution Architect - RHEL, Red Hat 

11:50 AM CESTQ&A / closing remarks

 

 

Speakers


Vincent Danen

Vincent Danen

Vice President Product Security, Red Hat

Lucy Kerner

Lucy Kerner

Security Global Strategy and Evangelism Director, Red Hat

Nuno Martins

Nuno Martins

Senior Principal Technical Marketing Engineer, Red Hat

Stuart Battersby

Stuart Battersby

AI Safety & Model Evaluation Architect, Red Hat

Natale Vinto

Natale Vinto

Technical Director, Evangelism, Red Hat

Jose Angel de Bustos

Jose Angel de Bustos

Senior Specialist Solution Architect - RHEL, Red Hat

Alessandro Rossi

Alessandro Rossi

Associate Principal Specialist Solution Architect - RHEL, Red Hat

Juan van der Breggen

Juan van der Breggen

Associate Principal Specialist Solution Architect - RHEL, Red Hat

Rodrigo Alvares

Rodrigo Alvares

Associate Principal Specialist Solution Architect, OpenShift - Cross Segment, Red Hat