Improve your security in the cloud with technology you already have

Improve your security in the cloud with technology you already have

On demand

Cloud computing can speed your development and increase deployment flexibility while reducing your IT costs using assets you already have. Taking the initial steps to understand how you adopt cloud technologies should involve interpreting security and governance as part of your core design philosophy. And understanding how risk management and security controls should evolve as part of your internal processes is critical.

What you’ll learn in this webinar

Join Red Hat’s Ellen Newlands and Richard Morrell in discovering how security works in the cloud and to learn how to:

  • Enhance your security in the cloud by leveraging your existing infrastructure.
  • Strengthen security in public, private and hybrid cloud environments. 
  • Build and manage your open cloud more securely with technology that’s built in to Red Hat® products and services.
Registrants will receive a link to the on-demand recording after the live webinar.


Speakers:


Richard Morrell, Cloud evangelist/cloud security lead, Red Hat

Richard heads up Cloud evangelism in EMEA and is cloud security lead in the EU. He is a 16-year open source veteran; former staffer at Linuxcare and VA Linux; founder staffer at Zimbra (pre-Yahoo acquisition); head of Internet security at Virgin Group; CiSO and co-author of UK- and US-headquartered SmoothWall with more than 14 million installations worldwide; co-author of SchoolGuardian (US government K-12 mandated security and content filter for school districts); and UK/US government advisor (CESG CLAS certified) on cybersecurity and lead open source architect.

Ellen Newlands, Identity and access management product manager, Red Hat
Ellen Newlands is a product manager in the Red Hat Cloud business unit, concentrating on secure identity and access management. She is currently responsible for the new identity management solution shipping in Red Hat Enterprise Linux®. Prior to joining Red Hat, she was the product manager for federated identity products at CA Technologies and the co-chair of the Kantara Initiative’s Interoperability Review Board for SAML-compliant software interoperability testing and certification. She is a graduate of the Sloan School of Management at MIT and of the University of Massachusetts at Amherst.

Email*

 

First Name*

 

Last Name*

 

Country*

 

Address*

 

City*

 

State/Province*


Postal Code*

 

Company*

 

Job Title*

 

Phone*

 

Department*

 

I understand Red Hat often uses authorized business partners to best serve its customers, particularly in the public and education sectors. Red Hat may share my contact information with those partners.*