In-Person Event

Security Symposium, Atlanta 2018

novembro 6, 2018Atlanta, GAThe Garage at Tech Square

SECURING THE MODERN ENTERPRISE USING OPEN SOURCE

Join the Security Symposium, where cybersecurity professionals can learn and network alongside Red Hat and Intel security experts, partners, and industry peers. No one can solve IT security issues alone. Solving problems together as a community is the future of technology.

WHAT TO EXPECT

The Security Symposium is a full-day event with industry experts covering the latest upstream and enterprise security developments. Attendees will network and collaborate with peers and Red Hat engineers to discuss security challenges open source organizations face.

EVENT KEYNOTE SPEAKER—Theresa Payton, Former White House CIO & Cybersecurity Authority

As the star of the CBS TV series, Hunted, Theresa Payton identifies emerging trends and techniques to help combat cyber threats, from the impact of the Internet of Things to securing Big Data.

The first female to serve as White House chief information officer, and named #4 on IFSEC Global’s list of the world’s Top 50 cybersecurity influencers in security & fire 2017, Theresa is one of America’s most respected authorities on Internet security, data breaches and fraud mitigation. With real-world strategies and solutions, she helps public and private sector organizations protect their most valuable resources.

Drawing from her experience as a veteran cybercrime fighter and entrepreneur of her successful, rapidly-growing and 2018 Cybersecurity 500 recognized firm, Fortalice, Theresa masterfully blends memorable anecdotes with cutting-edge insights to heighten awareness of the perils of our uber-connected world. As she delves into the cyber-underworld and the new kinds of threats that can lead to tomorrow’s breaches and insider risks, she offers a proven blueprint for audiences to stay a step ahead with practical steps for thinking like the adversary, while managing cybersecurity risk.

WHO SHOULD ATTEND

IT business leaders, security professionals, operations professionals, and application developers who are focused on securing their organization’s infrastructure and applications.

Tuesday, November 6, 2018

9–9:30 a.m.

Check-in/Registration

9:30–10:30 a.m.

Keynote: Hype or reality? Your workplace and blockchain, cryptocurrency, artificial intelligence, machine learning, & the Internet of Things

Theresa Payton

10:30–11:15 a.m.

Blockchain: A relationship requiring security, privacy, and trust

Gordon Haff

technology evangelist, Red Hat

11:15 a.m.

Break

11:30 a.m.–12:30 p.m.

Enterprise compliance & security with Ansible

Walter Bentley

automation practice architect, Red Hat

12:30–1:30 p.m.

Food Truck Lunch

1:30–2:15 p.m.

The future of automation, cybersecurity, and artificial intelligence

Jeff Towle

global security architect manager, Intel

2:15 p.m.

Break

2:30–3:30 p.m.

Container security and new container technologies

Dan Walsh

consulting engineer, Red Hat

3:30–4:00 p.m.

Panel and Q&A

4 p.m.

Happy Hour

Date: November 6, 2018

Time: 9:00 a.m. – 4:00 p.m.

Location:
The Garage at Tech Square, 848 Spring St NW, Atlanta, GA 30308

Theresa Payton

Theresa Payton

former White House CIO & cybersecurity authority

9:30–10:30 a.m.

As the star of the CBS TV series, Hunted, Theresa Payton identifies emerging trends and techniques to help combat cyber threats, from the impact of the Internet of Things to securing Big Data.

The first female to serve as White House chief information officer, and named #4 on IFSEC Global’s list of the world’s Top 50 cybersecurity influencers in security & fire 2017, Theresa is one of America’s most respected authorities on Internet security, data breaches and fraud mitigation. With real-world strategies and solutions, she helps public and private sector organizations protect their most valuable resources.

Drawing from her experience as a veteran cybercrime fighter and entrepreneur of her successful, rapidly-growing and 2018 Cybersecurity 500 recognized firm, Fortalice, Theresa masterfully blends memorable anecdotes with cutting-edge insights to heighten awareness of the perils of our uber-connected world. As she delves into the cyber-underworld and the new kinds of threats that can lead to tomorrow’s breaches and insider risks, she offers a proven blueprint for audiences to stay a step ahead with practical steps for thinking like the adversary, while managing cybersecurity risk.

Gordon Haff

Red Hat

Gordon Haff

technology evangelist, Red Hat

10:30–11:15 a.m.

Gordon Haff is cloud evangelist for Red Hat, the leading provider of commercial open source software. Prior to Red Hat, as an IT industry analyst, Gordon wrote hundreds of research notes, was frequently quoted in publications such as The New York Times on a wide range of IT topics, and advised clients on product and marketing strategies. Earlier in his career, he was responsible for bringing a wide range of computer systems, from minicomputers to large Unix servers, to market while at Data General. Gordon has engineering degrees from MIT and Dartmouth and an MBA from Cornell's Johnson School of Management. Today, he is most focused on open source, DevOps, IoT, cloud-native computing, and emerging technology areas such as blockchain and AI.
Twitter: @ghaff

Walter Bentley

Red Hat

Walter Bentley

automation practice architect, Red Hat

11:30 a.m.–12:30 p.m.

Walter Bentley is a Red Hat Automation Practice Lead and author with a diverse background in production systems administration and solutions architecture. He has more than 15 years of experience in sectors such as online marketing, financial, insurance, aviation, the food industry, education, and technology. In the past, he was typically the requestor, consumer and trusted advisor to companies in use of customer-facing technologies. Today he’s an automation advocate and cloud educator. He presents and speaks regularly at AnsibleFest, OpenStack Summits and other technology conferences, plus webinars, blog posts and technical reviews. His first book, ‘OpenStack Administration with Ansible’ was released in 2016.
Twitter: @djstayflypro

Jeff Towle

Intel

Jeff Towle

global security architect Manager, Intel

1:30–2:15 p.m.

Jeff Towle is a 15-year cybersecurity industry veteran. He has expert level experience in Information Security, Governance, Risk and Compliance industries. His background spans from knowledge management systems, to cybersecurity reference architectures. He has extensive experience managing teams that assess and operationalize cyber security controls infrastructures. He specializes in optimizing security design and reference architectures to contend with modern-day threat vectors.

At Intel, Jeff manages a global team of security architects. He leads Intel’s silicon-based security capabilities in ISG as they intersect with recent investments in Big Data (Cloudera), FPGA technology (Altera), Artificial Intelligence (Nervana) and Memory Based Behavioral Pattern Recognition (Saffron). The volume and velocity of data flows with IoT, Cloud, mobility and virtualization require new approaches to understand risk. By leveraging big data, machine learning and artificial intelligence, it is now possible to scale cyber risk mitigation in a timely and efficient manner. He holds a BA in Music Performance from Hamline University, Saint Paul, Minnesota.

Dan Walsh

Red Hat

Dan Walsh

consulting engineer, Red Hat

2:30–3:30 p.m.

Daniel Walsh is a Red Hat consulting engineer. Dan has led the Red Hat Container Engineering team since August 2013, but has been working on container technology for several years. He’s made many contributions to the Docker project, has done a lot of the software development on the Atomic project, and has led the SELinux project, concentrating on applications and policy development. Dan helped develop sVirt, secure virtualization, and the SELinux sandbox, an early desktop container tool in Red Hat® Enterprise Linux® 6. Prior to Red Hat, Dan worked at BindView (formerly Netect) on vulnerability assessment products and at Digital Equipment Corporation on the Athena project, and at AltaVista on their firewall/tunnel (VPN) products.
Twitter: @rhatdan
Blog: danwalsh.livejournal.com
Email: dwalsh@redhat.com
Container Blogs