Special Webinar Series Strengthening Your Linux Security: Building a Framework For Enterprise Resilience
Presented By

REGISTER NOW & YOU COULD WIN A $250 Amazon.com Gift Card!
About This Summit
Most agree that Linux is more secure than other common operating systems, but enterprises should not rely solely on that perception. Proactive measures are essential to strengthen Linux deployments and mitigate potential risks. This four-part webinar series will delve into the key areas of consideration that any enterprise should consider when leveraging Linux. Starting from the foundation, steps need to be taken to ensure that each deployment incorporates key security baselines. How you ingrain security into your next build will impact your team's future CVE responses, compliance audits, time-to-resolution metrics and how much downtime your enterprise will experience. Register for the entire series or these specific topics:
- Session 1: Shift Security Left to Standardize Your OS
- Session 2: Simplifying Security with Red Hat Insights and Image Builder
- Session 3: Securing Your Infrastructure Across Hybrid Cloud Environments
- Sessionr 4: Leveraging Red Hat Enterprise Linux to Execute Successful Zero Trust Architecture
Full Agenda
-
Shift Security Left to Standardize Your OS
Amy Farley Senior Product Manager Red Hat
This session will explore how even someone with little to no cybersecurity experience can ensure they take appropriate steps to set their organization up for success and minimize headaches down the road in these key areas:
• Software supply chain security
• Security incident response planning
• Compliance and certifications
• Image hardening
• Ongoing monitoring and management -
Simplifying Security with Red Hat Insights and Image Builder
Amy Farley Senior Product Manager Red Hat
Join Senior Product Manager, Amy Farley, for a deep dive into how to:
• Drastically reduce time frames for key security/compliance tasks
• Easily view and prove which of your systems are in compliance
• Establish a security baseline and make it part of your ongoing deployment pipeline -
Securing Your Infrastructure Across Hybrid Cloud Environments
Mohit Goyal Senior Principal Product Manager Red Hat
John Spinks Senior Product Marketing Manager Red Hat
In this episode we will:
• Take a closer look at the key security services within Red Hat Insights
• Walk through the use cases they each address
• Run a brief demo of the services -
Leveraging Red Hat Enterprise Linux to Execute Successful Zero Trust Architecture
Amy Farley Senior Product Manager Red Hat
This webinar, hosted by Red Hat Senior Product Manager, Amy Farley, will explain how you can execute an effective Zero Trust strategy for your environment with a three-part focus on how to:
• Build with a smart, secure baseline using trusted, and up-to-date content
• Protect data using strong encryption and access policies
• Trust but verify by leveraging strong Identity and Access Management policies and practices