SECURING THE MODERN ENTERPRISE USING OPEN SOURCE
Join the Security Symposium, where cybersecurity professionals can learn and network alongside Red Hat and Intel security experts, partners, and industry peers. No one can solve IT security issues alone. Solving problems together as a community is the future of technology.
WHAT TO EXPECT
The Security Symposium is a full-day event with industry experts covering the latest upstream and enterprise security developments. Attendees will network and collaborate with peers and Red Hat engineers to discuss security challenges open source organizations face.
FEATURED SPEAKER—Mike Bursell, chief security architect, Red Hat
It's not all tech: Cultural changes for DevSecOps
Many DevOps proponents in our organizations come from a technical background or are so immersed in technology that every problem looks like it can be solved with new technology or new tooling. This featured presentation will argue that the move to a true DevSecOps model is at least as much about cultural change as it is about the technologies and the methodologies. Getting developers to talk to the security experts in your organization may be hard enough, but in order to succeed, you need to include operations, product management, testing, and even involve management.
This session will address some of the cultural changes you may have already come across, as well as some that you may not have yet encountered, and will present approaches that will help you ease the various parts of your organization into a DevSecOps mindset.
WHO SHOULD ATTEND
IT business leaders, security professionals, operations professionals, and application developers who are focused on securing their organization’s infrastructure and applications.
Wednesday, December 12, 2018
Check-in and Registration
vice president, central region sales, Red Hat
Featured Speaker: It's not all tech: cultural changes for DevSecOps
chief security architect, Red Hat
Red Hat hybrid cloud security roadmap
principal technical product manager, Red Hat
Charting the course of API security over time: Past, present and future
senior solution architect, middleware & API management, Red Hat
11:45 a.m.–12:30 p.m.
Enterprise compliance & security with Ansible
automation practice lead, Red Hat
Lunch & Mobile Portfolio Center is open to tour and view self-paced demos over the lunch hour
Automating security and compliance for hybrid environments
security global technical evangelism, marketing, and strategy, Red Hat
The future of automation, cybersecurity, and artificial intelligence
Global Security Architect, Intel
Panel and Live Q&A with speakers and subject matter experts
Happy Hour and Mobile Portfolio Center Tour
Date: December 12, 2018
Time: 8:45 a.m. – 5:30 p.m.
LEGENDS at Toyota Stadium, 9200 World Cup Way, Suite 200, Frisco, TX 75033
Please enter through the West Gate entrance.
chief security architect, Red Hat
Mike Bursell joined Red Hat in August 2016, following previous roles at Intel and Citrix working on security, virtualization, and networking. After training in software engineering, he specialized in distributed systems and security, and has worked in architecture and technical strategy for the past few years. His responsibilities at Red Hat include forming security strategy, external and internal visibility, and thought leadership.
Mike has been closely involved in the telco market and ETSI NFV since mid-2013, with contributions in the phase I SEC, INF, and SWA groups, and is rapporteur for three security work items. He has served for two years as the vice chairman for the ETSI NFV Security Working Group, and has also been involved in the OPNFV project. He regularly speaks at industry events in Europe, North America, and APAC. His professional interests include: Linux, Open Source Software, security, distributed systems, blockchain, NFV, SDN, and virtualization (including Linux Containers and hypervisors).
Mike has an MA from the University of Cambridge and an MBA from The Open University.
Global Security Architect Manager, Intel
Jeff Towle is a 15-year cybersecurity industry veteran. He has expert-level experience in information security, governance, risk and compliance industries. His background spans from knowledge management systems, to cybersecurity reference architectures. He has extensive experience managing teams that assess and operationalize cybersecurity controls infrastructures. He specializes in optimizing security design and reference architectures to contend with modern-day threat vectors.
At Intel, Jeff manages a global team of security architects. He leads Intel’s Silicon-based security capabilities in ISG as they intersect with recent investments in big data (Cloudera), FPGA technology (Altera), artificial intelligence (Nervana) and Memory-Based Behavioral Pattern Recognition (Saffron). The volume and velocity of data flows with IoT, cloud, mobility, and virtualization require new approaches to understand risk. By leveraging big data, machine learning, and artificial intelligence, it is now possible to scale cyber risk mitigation in a timely and efficient manner. He holds a BA in Music Performance from Hamline University, Saint Paul, Minnesota.
global security technical strategist and evangelist, Red Hat
Lucy Kerner is currently the global security technical strategist and evangelist at Red Hat and helps drive thought leadership and the global go-to-market strategy for security across the entire Red Hat portfolio. Lucy creates and delivers security-related technical content to the field, customers, and partners and has spoken at numerous internal and external events. She is a 2017 and 2016 Red Hat Summit Top Presenter. Prior to her current role, she was a Senior Cloud Solutions Architect for the North America Public Sector team at Red Hat. Lucy has over 15 years of professional experience as both a software and hardware development engineer and a pre-sales solutions architect. Prior to joining Red Hat, she worked at IBM as both a Mainframe microprocessor design engineer and a pre-sales solutions architect for IBM x86 servers. She has also interned at Apple, Cadence, Lockheed Martin, and MITRE, where she worked on both software and hardware development. Lucy graduated from Carnegie Mellon University with an MS and BS in Electrical and Computer Engineering and a minor in Spanish.
automation practice architect, Red Hat
Walter Bentley is a Red Hat automation practice lead and author with a diverse background in production systems administration and solutions architecture. He has more than 15 years of experience in sectors such as online marketing, financial, insurance, aviation, the food industry, education, and technology. In the past, he was typically the requestor, consumer, and trusted advisor to companies in use of customer-facing technologies. Today, he’s an automation advocate and cloud educator. He regularly presents and speaks at AnsibleFest, OpenStack Summits, and other technology conferences, in addition to leading webinars and writing blog posts and technical reviews. His first book, OpenStack Administration with Ansible, was released in 2016.
senior solution architect, API & agile integration, Red Hat
Focusing on enterprise solutions that leverage API integration and management platforms as part of the Red Hat middleware team. Yossi has been involved in the SOA and API integration projects since 2008 and has worked closely with the Red Hat middleware products as a partner until 2015. Later, he joined Red Hat as part of the 3scale acquisition. He has extensive experience in application and API integration technologies and solutions enabling IT and enterprise digital transformation.
principal technical product manager, Red Hat
Mark Thacker has over 25 years in the IT industry with a concentration on enterprise computing and an emphasis on security solutions. He has authored deployment guides on multi-level labeled security, firewalls, network separation, role-based access control, encryption, and identity management.
Mark has been a featured speaker at several Red Hat Summit events, Defense in Depth, and regularly presents to a wide variety of customers at the Executive Briefing Center. He particularly enjoys working with people to translate complex technology into deployments with practical, real-world benefits.