Overview
Explore Red Hat's comprehensive security strategy in this 39-minute conference talk. Gain insights into technologies, architectures, and future themes as Mike Bursell from Red Hat's Office of the CTO delves into key security concerns applicable to all Red Hat products. Discover organizations' interests in risk management, open controls, service layer interactions, and application deployment. Learn about trust execution environments, sensitive data handling, and emerging technologies like SGX and AMD. Examine potential downsides and future directions while considering open-source approaches. Understand what actions can be taken to enhance security measures and stay ahead in the ever-evolving landscape of IT security.
Syllabus
Introduction
Office of the CTO
What is this session
What are organizations interested in
Cricket
Security
Risk Management
Disclaimer
Vote
Open Control
Service
Layer interactions
Service architecture
Application deployment
Trust execution environment
Sensitive data
SGX
AMD
Other uses
Downsides
Whats next
Keeping things open
What could we do
What can we do
Taught by
Red Hat