Organizations large and small consider IT security a critically important initiative. Have you determined your security strategy?
Join Secure Foundations, Part 2 | A Red Hat virtual event on February 17, and learn more about innovative, open source technologies to keep your infrastructure secure.
In this event, you'll hear from the experts on topics including:
- Container security and scanning.
- SELinux and access control.
- Identity management and authentication.
- Maintaining system security with OpenSCAP
- Proactive risk identification technology.
Join the live event
Wednesday, February 17
11 a.m. (ET) | 4 p.m (UTC)
Keynote: Security trends and insightsThe future of security is no longer focused on just prevention. Instead, it's about understanding that every organization lives with security risks and must mitigate those risks to an acceptable level. In the keynote session, Gunnar Hellekson will discuss:
Gunnar will also highlight key topics we'll focus on throughout the virtual event. Speaker: Gunnar Hellekson, director, Product Management, Red Hat |
|
From insights to action: Mayo Clinic's approach to intercepting risks before the strikeManaging large numbers of servers, combined with the aggressive speed of security changes, keep everyone wondering what is currently vulnerable. Red Hat Insights provides a timely window into the quickly exploitable surface at an enterprise level, allowing us to make better informed decisions about security, performance and availability. Speakers:
|
|
SECURE TECHNOLOGY |
SECURE APPROACH |
---|---|
Security Enhanced Linux for Mere Mortals: An IntroductionWhile Security-Enhanced Linux (SELinux) is an incredibly powerful tool for securing Linux servers, it has historically had a reputation for being difficult to configure, and as a result many system administrators would simply turn it off. Fortunately, the incredible amount of work done by the SELinux community in recent years has made SELinux much more system administrator-friendly. In this session, attendees will learn the basics of SELinux, which include configuring, analyzing, and correcting SELinux errors, as well writing basic policies to enable non-SELinux aware applications to work on SELinux protected systems. Real-world examples will be used to better demonstrate how to use SELinux. Speaker: Thomas Cameron, Global Solutions Architect Leader, Red Hat |
Container security: Do containers actually contain and why should you care?As container-use gains popularity, container security is more important than ever. In this session, Dan Walsh will discuss:
Speaker: Dan Walsh, consulting engineer, Red Hat |
Security compliance with OpenSCAPSCAP is a set of specifications related to security compliance. The primary use-case is to ensure a system is configured according to a predefined policy. It is heavily used in government, defense and finance industries. In this session we will explore how to use SCAP to perform vulnerability assessment and security compliance of bare-metal and virtual machines, and containers. Speaker: Martin Priesler, software engineer, Red Hat |
Managing Enterprise Identity with Red Hat Enterprise LinuxTechnologies such as Kerberos and LDAP have long been a cornerstone of identity security for enterprise infrastructure. Red Hat Identity Management (included in Red Hat Enterprise Linux) eases the burden of integrating and deploying these fundamental technologies, providing the consistent identity necessary to meet common compliance requirements and improve operational provisioning of access. Hear how Identity Management includes the ability to integrate with an existing Active Directory, cohesive management of system policy such as sudo rules and host-based access control, and its advanced features such as Two Factor Authentication - all managed via a simple web interface or comprehensive command line interface. Speaker: Matt Smith, Senior Solution Architect, Red Hat |
Join the live event
- Wednesday, February 17
- 11 a.m. (ET) | 4 p.m. (UTC)