红帽全局偏好设置

Event

Secure Foundations, Part 2 | A Red Hat virtual event

  • 2016年 2月 17日
We've built the foundation. What's next?

Organizations large and small consider IT security a critically important initiative. Have you determined your security strategy?

Join Secure Foundations, Part 2 | A Red Hat virtual event on February 17, and learn more about innovative, open source technologies to keep your infrastructure secure. 

In this event, you'll hear from the experts on topics including: 

  • Container security and scanning.
  • SELinux and access control.
  • Identity management and authentication.
  • Maintaining system security with OpenSCAP
  • Proactive risk identification technology.

 

Join the live event

Wednesday, February 17

11 a.m. (ET) | 4 p.m (UTC)

Hear from security experts

Keynote: Security trends and insights

The future of security is no longer focused on just prevention. Instead, it's about understanding that every organization lives with security risks and must mitigate those risks to an acceptable level. In the keynote session, Gunnar Hellekson will discuss:

  • Top security trends for 2016 according to IT professionals
  • Identifying, understanding, and reacting to security risks
  • Approaches and technologies to help monitor and mitigate security issues

Gunnar will also highlight key topics we'll focus on throughout the virtual event.

Speaker: Gunnar Hellekson, director, Product Management, Red Hat

From insights to action: Mayo Clinic's approach to intercepting risks before the strike

Managing large numbers of servers, combined with the aggressive speed of security changes, keep everyone wondering what is currently vulnerable. Red Hat Insights provides a timely window into the quickly exploitable surface at an enterprise level, allowing us to make better informed decisions about security, performance and availability.

Speakers:

  • Robert P. Nix, Senior IT Systems Engineer, Data Center Infrastructure Services, Mayo Clinic 
  • Will Nix, senior software engineer, Customer Experience & Engagement, Red Hat

SECURE TECHNOLOGY

SECURE APPROACH

Security Enhanced Linux for Mere Mortals: An Introduction

While Security-Enhanced Linux (SELinux) is an incredibly powerful tool for securing Linux servers, it has historically had a reputation for being difficult to configure, and as a result many system administrators would simply turn it off. Fortunately, the incredible amount of work done by the SELinux community in recent years has made SELinux much more system administrator-friendly. In this session, attendees will learn the basics of SELinux, which include configuring, analyzing, and correcting SELinux errors, as well writing basic policies to enable non-SELinux aware applications to work on SELinux protected systems. Real-world examples will be used to better demonstrate how to use SELinux.

Speaker: Thomas Cameron, Global Solutions Architect Leader, Red Hat

Container security: Do containers actually contain and why should you care?

As container-use gains popularity, container security is more important than ever. In this session, Dan Walsh will discuss:

  • Container policy and how to manage container vulnerabilities
  • Security measures and upcoming security enhancements to container management
  • Authentication updates being made to the server to control who’s able to manipulate a container, and learn how developers are splitting functions that an authenticated user is allowed to do on the server

Speaker: Dan Walsh, consulting engineer, Red Hat

Security compliance with OpenSCAP

SCAP is a set of specifications related to security compliance. The primary use-case is to ensure a system is configured according to a predefined policy. It is heavily used in government, defense and finance industries.

In this session we will explore how to use SCAP to perform vulnerability assessment and security compliance of bare-metal and virtual machines, and containers.

Speaker: Martin Priesler, software engineer, Red Hat

Managing Enterprise Identity with Red Hat Enterprise Linux

Technologies such as Kerberos and LDAP have long been a cornerstone of identity security for enterprise infrastructure.  Red Hat Identity Management (included in Red Hat Enterprise Linux) eases the burden of integrating and deploying these fundamental technologies, providing the consistent identity necessary to meet common compliance requirements and improve operational provisioning of access.

Hear how Identity Management includes the ability to integrate with an existing Active Directory, cohesive management of system policy such as sudo rules and host-based access control, and its advanced features such as Two Factor Authentication - all managed via a simple web interface or comprehensive command line interface.

Speaker: Matt Smith, Senior Solution Architect, Red Hat

 

Connect with security experts

Join the live event

  • Wednesday, February 17
  • 11 a.m. (ET) | 4 p.m. (UTC)

社交

Join the conversation