YoVDO

Getting Strategic About Security

Offered By: Red Hat via YouTube

Tags

Red Hat Summit Courses Cybersecurity Courses Risk Management Courses Application Deployment Courses

Course Description

Overview

Explore Red Hat's comprehensive security strategy in this 39-minute conference talk. Gain insights into technologies, architectures, and future themes as Mike Bursell from Red Hat's Office of the CTO delves into key security concerns applicable to all Red Hat products. Discover organizations' interests in risk management, open controls, service layer interactions, and application deployment. Learn about trust execution environments, sensitive data handling, and emerging technologies like SGX and AMD. Examine potential downsides and future directions while considering open-source approaches. Understand what actions can be taken to enhance security measures and stay ahead in the ever-evolving landscape of IT security.

Syllabus

Introduction
Office of the CTO
What is this session
What are organizations interested in
Cricket
Security
Risk Management
Disclaimer
Vote
Open Control
Service
Layer interactions
Service architecture
Application deployment
Trust execution environment
Sensitive data
SGX
AMD
Other uses
Downsides
Whats next
Keeping things open
What could we do
What can we do


Taught by

Red Hat

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network