Join the Security Symposium, where cybersecurity professionals can virtually learn with Red Hat security experts, partners, and industry peers.
To gain access, select one of the tracks below and individually register for each session.
Tackling Security in the World of Containers and Hybrid Cloud
Security teams are increasingly finding it challenging to keep up with the changing risks, compliance requirements, tools, and architectural changes introduced by new technologies – such as containers, kubernetes, software-defined infrastructure, and cloud technologies. As traditional infrastructure evolves to a mix of bare metal, virtual, cloud, and container environments, how can you…
As networks and infrastructures grow and become more complex, automation is needed to ensure that deployments and distributed architectures are secure, compliant, and performing as…
The security requirements are the same, but the technologies and approach are changing. Every deployment includes a distinct operating system, applications are disaggregated and communicating…
In the past, the role of security was isolated to a specific team in the final stage of development. That wasn’t as problematic when development…
Global Security Technical Strategist, Evangelist
Brian “Redbeard” Harrington
Red Hat® OpenShift® Senior Principal Product Manager
Director of Product Marketing
Principal Solution Architect, Security ISVs