Bem-vindo,
Faça login na sua conta Red Hat
Uma conta da Red Hat dá acesso ao seu perfil, preferências e também aos seguintes serviços, de acordo com o seu status de cliente:
- Portal do cliente
- Recursos para parceiros
- Gerenciamento de usuários
- Central de certificações
Ainda não se cadastrou? Veja aqui alguns motivos para criar sua conta da Red Hat:
- Acesse artigos da base de conhecimento, gerencie casos de suporte, subscrições, faça o download de atualizações e muito mais - tudo de um único lugar.
- Visualize os usuários da sua organização e edite informações, preferências e permissões da conta.
- Gerencie suas certificações Red Hat, visualize o histórico de exames e faça o download de logotipos e documentos relacionados à certificação.
Uma conta da Red Hat dá acesso ao seu perfil, preferências e também aos seguintes serviços, de acordo com o seu status de cliente:
Para sua segurança, se você estiver em um computador público e terminar de utilizar os serviços Red Hat, não se esqueça de sair.
SairOverview
Thank you for your interest. Online registration is closed at this time. Questions? Please contact infrastructure@redhat.com.
Now available on-demand:
Security Symposium Live

SECURING THE MODERN ENTERPRISE USING OPEN SOURCE
Join the Security Symposium, where cybersecurity professionals can learn and network alongside Red Hat and Intel security experts, partners, and industry peers. No one can solve IT security issues alone. Solving problems together as a community is the future of technology.
WHAT TO EXPECT
The Security Symposium is a full-day event with industry experts covering the latest upstream and enterprise security developments. Attendees will network and collaborate with peers and Red Hat engineers to discuss security challenges open source organizations face.
EVENT KEYNOTE SPEAKER—Theresa Payton, Former White House CIO & Cybersecurity Authority
As the star of the CBS TV series, Hunted, Theresa Payton identifies emerging trends and techniques to help combat cyber threats, from the impact of the Internet of Things to securing Big Data.
The first female to serve as White House chief information officer, and named #4 on IFSEC Global’s list of the world’s Top 50 cybersecurity influencers in security & fire 2017, Theresa is one of America’s most respected authorities on Internet security, data breaches and fraud mitigation. With real-world strategies and solutions, she helps public and private sector organizations protect their most valuable resources.
Drawing from her experience as a veteran cybercrime fighter and entrepreneur of her successful, rapidly-growing and 2018 Cybersecurity 500 recognized firm, Fortalice, Theresa masterfully blends memorable anecdotes with cutting-edge insights to heighten awareness of the perils of our uber-connected world. As she delves into the cyber-underworld and the new kinds of threats that can lead to tomorrow’s breaches and insider risks, she offers a proven blueprint for audiences to stay a step ahead with practical steps for thinking like the adversary, while managing cybersecurity risk.
WHO SHOULD ATTEND
IT business leaders, security professionals, operations professionals, and application developers who are focused on securing their organization’s infrastructure and applications.
Agenda
Tuesday, November 6, 2018 | |
---|---|
9:00–9:30 a.m. | Check-in and Registration |
9:30–10:30 a.m. | Keynote: Hype or reality? Your workplace and blockchain, cryptocurrency, artificial intelligence, machine learning & the Internet of ThingsTheresa Payton |
10:30–11:15 a.m. | Container security and new container technologiesDan Walsh, consulting engineer, Red Hat |
11:15–11:30 a.m. | Break |
11:30 a.m.–12:30 p.m. | Enterprise compliance & security with AnsibleWalter Bentley, automation practice architect, Red Hat |
12:30–1:30 p.m. | Food Truck Lunch |
1:30–2:15 p.m. | The future of automation, cybersecurity, and artificial intelligenceJeff Towle, Global Security Architect, Intel |
2:15–3:00 p.m. | Blockchain: A relationship requiring security, privacy, and trustGordon Haff, technology evangelist, Red Hat |
3:00–3:45 p.m. | Panel and Q&A |
3:45–5:00 p.m. | Happy Hour |
Abstracts
Blockchain: A relationship requiring security, privacy, and trust, Gordon Haff, technology evangelist, Red Hat
Cryptocurrencies may get most of the press, but blockchain is about a whole lot more. In this session, Red Hat technology evangelist Gordon Haff will discuss which use cases are a good fit with blockchain—and why others may not be such an ideal match. Understanding the opportunities for blockchain requires evaluating blockchain in light of a number of factors, including security and privacy considerations as well as who the users will be and how they're willing to interact.
Enterprise compliance & security with Ansible, Walter Bentley, automation practice architect, Red Hat
Abstract: Ansible Tower, Insights, and Satellite 6 provide a complete automated proactive security solution. In this session, we'll provide useful examples and details about the why and how these tools are better together. You'll learn how to abstract Satellite 6 to use as a dynamic inventory source, use Insights to detect issues and create playbooks, and Ansible Tower to automate with workflow and reporting.
The future of automation, cybersecurity, and artificial intelligence, Jeff Towle, Global Security Architect, Intel
Cybersecurity has traditionally been focused on endpoints and network traffic (both on the Cloud and on premises) inspection with security controls that feed events back to be scored and made actionable with a Security Information Event Management (SIEM) method. While useful for rules-based violations that can be programmed into sensors and malware listeners, there are myriad of threats that can evade these controls or circumvent them altogether. Equally as important, the volume and velocity of data has increased such that it is very difficult to understand what constitutes a risky behavior with a person, software, or system. This is where artificial intelligence can become an equalizer. This presentation will talk about use cases around cyber risk that have been solved with powerful perception, logic, and learning with machine and deep learning precision.
Container security and new container technologies, Dan Walsh, consulting engineer, Red Hat
This talk explains the key components required to run a container image on a host and standardization of the format.
Once we have these standards, we can start examining technologies that can take advantage of these standards for doing things like:
- Pulling/installing and running applications without requiring a Container Daemon to be running. (We call these system containers.)
- Ability to build containers in new ways outside of Dockerfile, as well as building them without requiring a container daemon. Introducing Buildah.
- Ability to copy containers between all different container storage including the Docker daemon, container registries, local repositories, OSTree, new container Next Generation Container Technologies | SCALE 16x
- Support running containers with a dedicated container runtime for Kubernetes. CRI-O will be introduced
Information
Date: November 6, 2018
Time: 9:00 a.m. – 4:00 p.m.
Location:
The Garage at Tech Square, 848 Spring St NW, Atlanta, GA 30308
Complimentary Parking is available at the Centergy Parking Deck for all attendees. Vouchers will be provided at registration.
The closest MARTA stop is the Midtown Transit Station.