Special Webinar Series Strengthening Your Linux Security: Building a Framework For Enterprise Resilience

Presented By

  • Future B2B
  • Red Hat
WIN A $250 Amazon Gift Card

REGISTER NOW & YOU COULD WIN A $250 Amazon.com Gift Card!

About This Summit

Most agree that Linux is more secure than other common operating systems, but enterprises should not rely solely on that perception. Proactive measures are essential to strengthen Linux deployments and mitigate potential risks. This four-part webinar series will delve into the key areas of consideration that any enterprise should consider when leveraging Linux. Starting from the foundation, steps need to be taken to ensure that each deployment incorporates key security baselines. How you ingrain security into your next build will impact your team's future CVE responses, compliance audits, time-to-resolution metrics and how much downtime your enterprise will experience. Register for the entire series or these specific topics:

  • Session 1: Shift Security Left to Standardize Your OS
  • Session 2: Simplifying Security with Red Hat Insights and Image Builder
  • Session 3: Securing Your Infrastructure Across Hybrid Cloud Environments
  • Sessionr 4: Leveraging Red Hat Enterprise Linux to Execute Successful Zero Trust Architecture

Full Agenda

  1. Shift Security Left to Standardize Your OS

    Amy Farley
    Amy Farley Senior Product Manager Red Hat

    This session will explore how even someone with little to no cybersecurity experience can ensure they take appropriate steps to set their organization up for success and minimize headaches down the road in these key areas:

    • Software supply chain security
    • Security incident response planning
    • Compliance and certifications
    • Image hardening
    • Ongoing monitoring and management

  2. Simplifying Security with Red Hat Insights and Image Builder

    Amy Farley
    Amy Farley Senior Product Manager Red Hat

    Join Senior Product Manager, Amy Farley, for a deep dive into how to:

    • Drastically reduce time frames for key security/compliance tasks
    • Easily view and prove which of your systems are in compliance
    • Establish a security baseline and make it part of your ongoing deployment pipeline

  3. Securing Your Infrastructure Across Hybrid Cloud Environments

    Mohit Goyal
    Mohit Goyal Senior Principal Product Manager Red Hat
    John Spinks
    John Spinks Senior Product Marketing Manager Red Hat

    In this episode we will:

    • Take a closer look at the key security services within Red Hat Insights
    • Walk through the use cases they each address
    • Run a brief demo of the services

  4. Leveraging Red Hat Enterprise Linux to Execute Successful Zero Trust Architecture

    Amy Farley
    Amy Farley Senior Product Manager Red Hat

    This webinar, hosted by Red Hat Senior Product Manager, Amy Farley, will explain how you can execute an effective Zero Trust strategy for your environment with a three-part focus on how to:

    • Build with a smart, secure baseline using trusted, and up-to-date content
    • Protect data using strong encryption and access policies
    • Trust but verify by leveraging strong Identity and Access Management policies and practices