Shawn Wells, Chief Security Strategist, Red Hat, Jeffery Blank, Technical Director, NSA, and Christopher Apsey, Deputy Director, Technical College, Army Cyber School present in this breakout session at Red Hat Summit 2017.
As security models converge on perimeter-less infrastructure and the need to protect raw data, we must move beyond "STIG compliance," 2FA, and encrypting all data. This technical session will step through evolving thinking on trusted infrastructure: tokenization is a recent data protection method, but what is it and when can it be used? What work is being done on Trusted Platform Modules, and what is trusted boot? What are new cryptographic models, including quantum cryptography and blockchain? How does this fit into containerization and server-less computing? How is open source confronting these challenges?
- Tempo de execução