Red Hat global preferences

Explore

Learn what's happening for Red Hat customers around the world:

Event

2016 Defense in Depth

  • October 6, 2016
  • Tysons Corner, VA
  • Tysons Corner Marriott

SECURING THE MODERN ENTERPRISE USING OPEN SOURCE

No one can solve IT security issues alone. Connecting with a community and solving problems together is the future of technology.

Please join Defense in Depth 2016 where public sector Cybersecurity professionals can learn and network alongside Red Hat security experts and industry peers.

WHAT TO EXPECT

Since 2013, the Defense in Depth event has brought Red Hat Security Engineering leads to Washington, D.C. for a full day of collaboration and networking. It's a chance to learn about the latest developments (upstream and enterprise) from government and industry experts, and for Red Hat engineering to hear from you about the challenges you face.

WHO SHOULD ATTEND

This event is intended for government employees, contractors, and partners with a security focus.

A FULL DAY OF DISCUSSION AND COLLABORATION

This year's agenda will cover topics including:

  • Automating DoD STIG Compliance with OpenSCAP
  • Secure Software Supply Chain
  • Containers and Atomic Host
  • Identity and Access Management
  • DevOps Security
  • FedRamp High Certified OpenStack

 

TIME SESSION
8:00 - 8:30 a.m. Registration, Breakfast, and Networking
8:30 - 9:00 a.m. Red Hat Opening Remarks
9:00 - 9:15 p.m. Break
9:15 - 10:00 a.m. Track 1: Packet Capture in the Enterprise Ecosystem
Presented by Josh Williams and Jim Ball | Alliance Technology Group

Track 2: Securing the Open Source Supply Chain
Presented by Josh Bressers | Red Hat

Track 4: Extending the FedRAMP Security Boundary to the Premise
Presented by John Keese | CSRA

10:15 - 11:00 a.m. Track 1: Creating a Cloud Stronghold: Strategies and Methods to Manage and Secure Your Cloud
Presented by Ted Brunell | Red Hat

Track 2: Red Hat Identity and Access Management Vision, Solution, and Roadmap
Presented by Dmitri Pal | Red Hat

Track 3: Emerging Tech Show & Tell: Application Whitelisting
Presented by Steve Grubb | Red Hat

Track 4: Container Security
Presented by Dan Walsh | Red Hat

11:15 a.m. - 12:00 p.m. Track 1: Delivering Trusted Clouds: How Intel and Red Hat Integrate Solutions for Secure Cloud Computing
Presented by Steve Orrin | Intel Corporation

Track 2: Practical Use Cases: SELinux
Presented by Simon Sekidde | Red Hat

Track 3: Open Sourced: NSA System Integrity Management Platform (SIMP)
Presented by Trevor Vaughan | Onyx Point

Track 4: Integrating Data for Visualization and Modeling for Proactive Cyber Management
Presented by John Williams | CyVision Technologies

1:30 - 2:15 p.m. Track 1: Automating DoD STIG compliance with OpenSCAP
Presented by Martin Preisler and Robin Price II | Red Hat

Track 2: The Intersection Between Security and Compliance
Presented by Jason Callaway | Red Hat

Track 3: Triggering Insider Threat Using Auditd - Using the Linux Audit Subsystem to Meet Insider Threat
Presented by Mark St. Laurent | Praxis Engineering

Track 4: Container Security in Context with osquery and Elastic Stack 5.0
Presented by George Young | Elastic

2:30 - 3:15 p.m. Track 1: A Proactive Approach to Detecting Advanced Threats in Linux
Presented by Victor Martinez | Forcepoint

Track 2: The Intersection Between Security and Compliance
Presented by Jason Callaway | Red Hat

Track 3: Open Container Security
Presented by Jamie Duncan | Red Hat

Track 4: Red Hat Security Roadmap
Presented by Josh Bressers | Red Hat

3:30 - 4:15 p.m. Track 1: Surviving Risk Management Framework
Presented by Donny Davis | Red Hat

Track 2: Compliance, Security Automation, and Remediation with Red Hat CloudForms, Red Hat Satellite, and Ansible Tower by Red Hat
Presented by Lucy Kerner | Red Hat

Track 3: Container Security
Presented by Dan Walsh | Red Hat

Packet Capture in the Enterprise Ecosystem

9:15 - 10:00 a.m.
Jim Ball, VP of Engineered Systems, Alliance Technology Group
Josh Williams, VP of Security, Alliance Technology Group
Several facets of the inflection point in which our industry finds itself are driving an emerging model of an authoritative data source leveraged, referenced, informed and instrumented to both open source and commercial tools.

Back to top

Securing the Open Source Supply Chain

9:15 - 10:00 a.m.
Josh Bressers, Security Strategist, Red Hat
Code hygiene is becoming a hot topic in a world where nobody knows who to trust anymore. The days of not understanding what bits you are consuming are long gone. If we're working with open source, how does this change our supply chain? Who can we ask for help? When we are told to "trust but verify", how can we verify, who can we trust?

Back to top

Extending the FedRAMP Security Boundary to the Premise

9:15 - 10:00 a.m.
John Keese, Director of Government Cloud Services, CSRA
In this session, you'll learn about:
• Growing government customer desires to implement commercial cloud solution (a Hybrid Cloud approach) on premise
• How CSPs can extend their FedRAMP cloud security boundaries into a customer data center
• Why this boundary extension allows customers to achieve significant operational efficiencies and reduced cost without compromising security.
• Why open cloud technologies assist with this process and examples of cloud technologies being delivered in this on premise fashion

Back to top

Creating a Cloud Stronghold: Strategies and Methods to Manage and Secure Your Cloud

10:15 - 11:00 a.m.
Ted Brunell, Red Hat
More and more IT shops are turning to the cloud and are being faced with questions about ensuring the proper governance is in place to properly secure and manage the environment. this session, Ted Brunell will discuss various methods that can be used to manage and secure a hybrid cloud environment. Topic will include security fundamentals, how to create governance across multiple hosting environments - on-premise and off, as well as how deploying an API driven infrastructure can significantly reduce human error that can often contribute to security issues.

Back to top

Red Hat Identity and Access Management Vision, Solution, and Roadmap

10:15 - 11:00 a.m.
Dmitri Pal, Director of Engineering at Red Hat
Identity management and authentication are core elements of the security fabric that connects all layers of the modern enterprise.
In this session, you'll learn about:
– Red Hat's vision in identity and access management (IAM) problem space
– Learn about Red Hat plan to accomplish this vision
– Hear guidelines and recommendations
– Become familiar with the currently available solutions

Back to top

Emerging Tech Show & Tell: Application Whitelisting

10:15 - 11:00 a.m.
Steve Grubb, Senior Principal Software Engineer, Red Hat

Back to top

Container Security

10:15 - 11:00 a.m.
Dan Walsh, Consulting Engineer, Red Hat
This talk will cover all sections of container security including: 1)The importance of the Kernel. 2) Where should your applications run? - separate Servers, VM's, containers, same machine? 3) What kind of container platform should you use? 4)How are containers kept separate? 5) What should you run inside of your container and 6) container image signing and 7) Image scanning

Back to top

Delivering Trusted Clouds: How Intel and Red Hat Integrate Solutions for Secure Cloud Computing

11:15 a.m. - 12:00 p.m.
Steve Orrin
Federal Chief Technologist, Intel Corporation
In order to meet the increasing demands on IT, organizations are looking to the cloud to help them decrease their infrastructure hardware costs, improve agility and flexibility of their infrastructure, and reduce vendor lock-in from proprietary solutions. With reduced budgets, IT professionals are looking to reduce network complexity and cost while simultaneously increasing flexibility and agility.

Additionally, new security challenges must be considered along with all the benefits that a software-defined IT infrastructure provides. Intel and Red Hat have teamed up to help solve the challenges of the software defined cloud environments. Red Hat software is able to leverage the Cloud Integrity Technology developed by Intel to enforce security from the silicon up through the stack. In the Public Sector market two configurations were built, each with their own purpose.

The first was to build out a secure OpenStack based reference architecture using Red Hat Cloud Infrastructure software coupled with Intel CIT technology that would provide a trusted boot into an integrated IaaS system that would provide both software defined storage (SDS) and software defined networking SDN to virtualize network functions (NFV). This system was built for speed and reliability using Intel solid state drives coupled with NEC's servers and programmable flow SDN controller.

The second reference architecture was built to provide a highly secure, FedRAMP FISMA High compliant, IaaS architecture and to undergo rigorous validation, scrutiny and testing. The solution was built by CSRA on Dell hardware and Red Hat Cloud Infrastructure software and also leverage Intel Cloud Integrity Technology that provides a trusted boot into an integrated IaaS system that also provides software defined storage (SDS).

Back to top

Practical Use Cases: SELinux

11:15 a.m. - 12:00 p.m.
Simon Sekidde, Red Hat
In this session we demonstrate how SELinux is able to reduce vulnerability to privilege escalation attacks by using the Bash Code Injection Vulnerability (Shellshock Exploit) as an example.

Back to top

Open Sourced: NSA System Integrity Management Platform (SIMP)

11:15 a.m. - 12:00 p.m.
Trevor Vaughn, Engineering Lead and Co-Founder of Onyx Point, Inc
This presentation will focus on providing users with a look at a Red Hat-focused compliance automation framework, SIMP, released as Open Source from the NSA and maintained as Open Source project by Onyx Point. The goals of the project will be covered as well as a look at the technologies and how they fit into the Red Hat ecosystem. The audience should expect to gain an understanding of different types of compliance automation as well as methods for promoting change in the standards as developed by the SCAP Security Guide project.

Back to top

Integrating Data for Visualization and Modeling for Proactive Cyber Management

11:15 a.m. - 12:00 p.m.
John Williams, CEO CyVision Technologies
Cyber security is much more than adding another firewall. It is much more than another monitoring tool. The amount of cyber “surface area” susceptible to attacks it growing exponentially due to the variety of technologies and the sophistication of the advisories. Cyber first responders have to prioritize efforts. Cyber management has to control costs and communicate with the technical and non-technical. Cyber disciplines have to coordinate. Everyone has to respond at "cyber appropriate" speed.

We will demonstrate an automated process and technology for fusing disparate data sets into a visualization tool for modeling optimum change management - to address these issues.

Back to top

Automating DoD STIG compliance with OpenSCAP

1:30 - 2:15 p.m.
Martin Preisler, Senior Software Engineer, Red Hat
Robin Price II, Senior Platform Solutions Architect, Red Hat
In this session we will discuss, install and configure a RHEL7 virtual machine to DISA STIG standards. We’ll utilize OpenSCAP for scanning, the SCAP Workbench for content tailoring, and remediation. The idea is to goa bit deeper than "download and scan," and understand how the code works, answering questions like what is XCCDF, OVAL, and OCIL?

Back to top

The Intersection Between Security and Compliance

1:30 - 2:15 p.m.
Jason Callaway, Red Hat

Back to top

Triggering Insider Threat Using Auditd - Using the Linux Audit Subsystem to Meet Insider Threat

1:30 - 2:15 p.m.
Mark St. Laurent, Praxis Engineering

Back to top

Container Security in Context with osquery and Elastic Stack 5.0

1:30 - 2:15 p.m.
George Young, Elastic
Containers are still vulnerable to exploits in their shared application libraries and the Linux guest OS. In this presentation, we'll use osquery's SQL-for-your-system and elastic's new 5.0 release to show how devops teams identify and alarm on malicious behavior.

Back to top

A Proactive Approach to Detecting Advanced Threats in Linux

2:30 - 3:15 p.m.
Victor Martinez, Federal Sales Engineering Manager, Forcepoint
A discussion on the use of malware analysis techniques, memory forensic techniques, and package and kernel integrity validation techniques to better protect the critical Linux infrastructure.

Back to top

The Intersection Between Security and Compliance

2:30 - 3:15 p.m.
Jason Callaway, Red Hat

Back to top

Open Container Security

2:30 - 3:15 p.m.
Jamie Duncan, Cloud Solutions Architect, Red Hat
Containers enable government agencies to deliver outcomes faster. The demands of modern application development and IT operation can’t be addressed through old methodologies. Linux containers, and Docker as a container packaging format, are radically transforming IT and drawing tremendous interest because of their multifaceted benefits to how applications are built, shipped, deployed and managed.

In this session we will talk about the fundamental technologies that make up modern Linux containers, how they can be properly secured and the best practices around implementing them securely.

Back to top

Red Hat Security Roadmap

2:30 - 3:15 p.m.
Josh Bressers, Security Strategist, Red Hat
Security has never been more important or a bigger topic than it is today. Red Hat has been a leader in security for more than 10 years. We've pushed for open standards and helped encourage technologies such as SELinux, SVirt, SCAP, and CVE. Red Hat has a track record for producing security updates that is second to none. Unequivocally, Red Hat has played a leading role in security technology. Even though Red Hat is at the forefront of security, we certainly aren't standing still. We're helping make security part of new computing paradigms such as cloud and containers. In addition to updating existing products and projects, there's a number of new projects in the works. In this session you'll learn what's coming in the future of Red Hat security. We'll take a high level look at what we have in store for SELinux, OpenSCAP, virtualization, compliance, cloud, containers, security updates, security features, new products, existing products, documentation, support, and what we think the future holds for security. By the end of this session, you'll understand the future of Red Hat security, how it might affect you, and how you can help us build and shape that future.

Back to top

Surviving Risk Management Framework

3:30 - 4:15 p.m.
Donny Davis, Red Hat
Risk Management Framework (RMF), provides a disciplined and structured process that integrates information security and risk management activities into the system development life cycle. This can be a complicated process, and the aim of this presentation is to explain what RMF is, how to navigate the process, and offer some tools to help get through RMF with your sanity. Participants can expect to learn where to go to get started with RMF, where to go when they have issues, and how they can leverage tools and collaboration to make the process easier.

Back to top

Compliance, Security Automation, and Remediation with Red Hat CloudForms, Red Hat Satellite, and Ansible Tower by Red Hat

3:30 - 4:15 p.m.
Lucy Kerner, Senior Cloud Solutions Architect, Red Hat
In this session, you'll learn how to quickly detect and remediate security and compliance issues in your hybrid, virtual, and cloud computing environments. We’ll discuss possible compliance challenges and show how a combination of Red Hat CloudForms, Red Hat Satellite, and Ansible Tower by Red Hat can help you achieve compliance, security automation, and remediation in a short time. By integrating Red Hat CloudForms with Red Hat Satellite and Ansible Tower, and utilizing the OpenSCAP integration in Red Hat Satellite, you can perform audit scans and remediations on client systems at the push of a button. This CloudForms/Satellite/OpenSCAP/Ansible Tower integration can automate security compliance and ensure compliance against various profiles such as the U.S. Government Configuration Baseline (USGCB), DISA STIG, Centralized Supercomputing Facility (CSCF) baseline, U.S. Government Commercial Cloud Services (C2S) baseline, Certified Cloud and Service Provider (CCSP) baseline, Center for Internet Security (CIS) Security Benchmarks, and Payment Card Industry Data Security Standard (PCI DSS).

Back to top

Container Security

3:30 - 4:15 p.m.
Dan Walsh, Consulting Engineer, Red Hat
This talk will cover all sections of container security including: 1)The importance of the Kernel. 2) Where should your applications run? - separate Servers, VM's, containers, same machine? 3) What kind of container platform should you use? 4)How are containers kept separate? 5) What should you run inside of your container and 6) container image signing and 7) Image scanning

Back to top

 

 

 

JOIN US AT DEFENSE IN DEPTH 2016

Date: Thursday, October 6

Time: 8 a.m. - 5 p.m.

Lucy Kerner, Red Hat

Lucy Kerner Lucy Kerner is a Senior Cloud Solutions Architect for the North America Public Sector team at Red Hat. In this role, she supports the Red Hat cloud sales efforts by presenting and designing Red Hat cloud solutions for a wide range of Public Sector customers. She has over 13 years of professional experience as both a software and hardware development engineer and a pre-sales solutions architect. Prior to joining Red Hat, she worked at IBM as both a microprocessor design engineer for Mainframe microprocessors and a pre-sales solutions architect for IBM x86 servers. She has also interned at Apple, Cadence, Lockheed Martin, and MITRE, where she worked on both software and hardware development. Lucy graduated from Carnegie Mellon University with a Master of Science (M.S.) and Bachelor of Science (B.S.) in Electrical and Computer Engineering. She also graduated from Carnegie Mellon University with a Minor in Spanish.
 
Trevor Vaughan, Onyx Point

Trevor Vaughan Trevor is the Engineering Lead and Co-Founder of Onyx Point, Inc and has been supporting Government customers in various capacities for over 15 years. He has used, and advocated the use of, Open Source software and open standards whenever practical. His experience ranges from software development, through security implementation and analysis, and into the design and implementation of complex multi-national architectures. He is currently the development lead on the Open Source SIMP project and is constantly advocating for improved system automation with a focus on security and compliance.
 
John Keese, CSRA

John Keese John Keese is the Director of Government Cloud Services for CSRA. Previously John was the Founder/President and CEO of Autonomic Resources, and John successfully led his firm through the strategic acquisition by CSRA. Autonomics' ARC-P Cloud was the first FedRAMP and DoD authorized commercial cloud service that is used by the US government for community and private cloud services. Autonomics’ ARC-P cloud offers highly secure IaaS, PaaS (ARCWRX), and SaaS platforms that have met the Federal Civilian and Department of Defense security standards at FedRAMP FISMA HIGH baseline impact levels. Within John’s current role as Director of CSRA Government Cloud Services, he has responsibility for cloud delivery services for CSRA’s public sector business that includes ARC-P and ARCRWX oriented strategic partnerships and cloud technology direction through a CSRA Center of Excellence. These duties also include FedRAMP and Department of Defense security authorizations and continuous compliance. Additionally, John has held leadership positions as a Silver Member of the Linux Foundation (Open Virtualization Alliance), Platinum Level Member of the Open Source Software Institute.


Prior to founding Autonomic Resources, John’s experience includes executive leadership in business development for a large commercial technology services firm and as a Corporate Information Director for a large regional security firm in the New York. John holds a Bachelor’s Degree from the State University of New York College at Brockport. John resides in Chapel Hill, NC, and works between North Carolina, Louisiana and the Washington DC area.
 
Josh Bressers, Red Hat

John Keese Josh Bressers is a Security Strategist for Red Hat in the Platform Business Unit. Josh has been involved in security for more than 20 years, with a heavy focus on open source. Josh spent more than 12 years at Red Hat as part of various security teams, everything from security response, open source security development lifecycle, security product management, security strategy, and helping open source projects deal with their security problems. Josh is currently focusing on Red Hat’s security strategy around the operating system, containers, storage, networking, virtualization, and understanding how everything fits together in the new IT landscape as well as the open source communities.
 
Dmitri Pal, Red Hat

Dmitri Pal Dmitri Pal is a Director of Engineering at Red Hat responsible for the security and identity management projects and products in Red Hat Enterprise Linux and Red Hat portfolio, including Red Hat Directory Server, Certificate System, Samba, Kerberos, OpenSCAP, SELinux, SSSD (System Security Services Daemon), and the IdM server built using FreeIPA (Identity, Policy, Audit) technology. Dmitri has more than 19 years of security-related software engineering and product management experience.
 
Jamie Duncan, Red Hat

Jamie Duncan Jamie has been at Red Hat for 5 years, focusing on the problems unique to Public Sector customers. Prior to Red Hat, Jamie worked in the ‘big web’ world and spent some time at a bioinformatics startup.

At Red Hat, Jamie focuses on cloud-enabling technologies like OpenStack, docker, kubernetes and OpenShift among others. With most of these technologies, he has been involved with them since their infancy.
 
Jason Callaway, Red Hat

Jason Callaway Jason Callaway is a senior solutions architect at Red Hat, specializing in Intelligence Community cloud computing. In his current role, Jason is the technical lead working across the IC agencies to help implement the ICITE strategy and their migration to the cloud. Prior to joining Red Hat, Jason deployed the first mission OpenShift Platform as a Service environment in the IC. Jason speaks frequently at open source and cyber security meetups, his blog is at https://jasoncallaway.com
 
Jim Ball, Alliance Technology Group

Jim Ball Jim Ball is currently Vice President, Engineered Systems for Alliance Technology Group in Hanover, Maryland where he is responsible for the purpose built systems team managing solutions such as the SentryWire, Packet Capture Platform. Prior to joining Alliance, Jim ran the server, storage and networking business for Hewlett Packard Federal and before HP, Jim ran most of the East for EMC’s Telecommunications, Media and Entertainment sales organization. Before EMC, Jim spent 14 years with StorageTek/Sun Microsystems where he ran the US Storage Sales Organization.
 
Josh Williams, Alliance Technology Group

Josh Williams A cyber security executive with more than 35 years of strong technical and leadership experience, in both the public and private sectors. Vice President and Chief Security Officer for Alliance Technology Group, a global IT Infrastructure Solutions, Data Storage and Cloud Services firm headquartered in the Fort Meade, MD area. Josh conceived and is implementing the first Cyber Security Apprenticeship Program. His Federal career culminated with command of the lead element, tactical Scientific & Technical Intelligence (S&TI) community.
 
Steve Grubb, Red Hat

A cyber security executive with more than 35 years of strong technical and leadership experience, in both the public and private sectors. Vice President and Chief Security Officer for Alliance Technology Group, a global IT Infrastructure Solutions, Data Storage and Cloud Services firm headquartered in the Fort Meade, MD area. Josh conceived and is implementing the first Cyber Security Apprenticeship Program. His Federal career culminated with command of the lead element, tactical Scientific & Technical Intelligence (S&TI) community.
 
Dan Walsh, Red Hat

Dan Walsh Daniel Walsh has worked in the computer security field for over 30 years. Dan is a Consulting Engineer at Red Hat. He joined Red Hat in August 2001. Dan leads the Red Hat Container Engineering team since August 2013, but has been working on container technology for several years. Dan has made many contributions to the docker project. Dan has also developed a lot of the software on Project Atomic. He has led the SELinux project, concentrating on the application space and policy development. Dan helped developed sVirt, Secure Virtualization as well as the SELinux Sandbox back in RHEL6 an early desktop container tool. Previously, Dan worked Netect/Bindview's on Vulnerability Assessment Products and at Digital Equipment Corporation working on the Athena Project, AltaVista Firewall/Tunnel (VPN) Products.

Dan has a BA in Mathematics from the College of the Holy Cross and a MS in Computer Science from Worcester Polytechnic Institute.
Twitter: rhatdan
Blog: danwalsh.livejournal.com
Email: dwalsh@redhat.com
 
Robin Price, Red Hat

Robin Price Robin Price II is the Senior Platform Solutions Architect of Red Hat's Inside Public Sector organization specializing in the application of open source enterprise technologies at federal, state, and local government agencies, and educational institutions. Robin achieved the Top Presenter award from the top 10% presenters at Red Hat Summit 2016 coming in 2nd place.
 
Ted Brunnel, Red Hat

Ted Brunnel Ted Brunell is a Principal Solution Architect and is the Chief Architect for DoD Programs. During his 5 years at Red Hat, Ted has been a member of several teams, including the public sector Cloud SA Team where he supported DoD Customers. In his spare time, Ted lives in the Fredericksburg, VA, area and help organize a Linux Users Group there. In his spare time, he enjoys kayak fishing, craft beer, tinkering with technology.
 
Steve Orrin, Intel Corp

Steve Orrin is chief technologist for Intel Corp’s Federal Division & Intel Federal LLC and is responsible for cyber security and cloud strategy, solution architecture and engagements. Steve has held architectural leadership positions at Intel where he has led strategy and projects on Identity, anti-malware, HTML5 security, cloud and virtualization security, and is the creator of Trusted Compute Pools Secure Cloud Architecture and co-author of NIST’s IR-7904 Trusted Geo-Location in the Cloud. Steve joined Intel as part of the acquisition of Sarvega, Inc. where he was their CSO. Steve was previously CTO of Sanctum, a pioneer in Web application security testing and firewall software. Prior to joining Sanctum, Steve was CTO and co-founder of LockStar, Inc. LockStar provided enterprises with the means to secure and XML/Web Service enable legacy mainframe and enterprise applications for e-business. Steve joined LockStar from SynData Technologies, Inc. where he was CTO and chief architect of their desktop e-mail and file security product. Steve is a recognized expert and frequent lecturer on enterprise security and was named one of InfoWorld's Top 25 CTO's of 2004 and, in 2009, was named a fellow at the Center for Advanced Defense Studies. Steve is a member of AFCEA, INSA, ISACA, OASIS, IACR and is a co-Founder and Officer of WASC (Web Application Security Consortium) and is the vice-chair of the NSITC/IDESG Security Committee.
 
John Williams, CyVision

John Williams John is the CEO of CyVision Technologies, an advanced technology cyber company that blends disparate cyber data for visualization and modeling for optimum change management. John is responsible for overall direction and performance of CyVision. John leads all strategic partnerships and product integrations and offerings.

John is a technology evangelist with over 33 years of CEO experience, specifically P&L and Balance Sheet responsibility, in various areas of technology. While everyone knows DRM (Digital Rights Management) from either iTunes or Windows10, John was in the room when it was invented in 1991. John has over 33 years of experience in the field. For the past 25 years, Mr. Williams has been involved in emerging technology and patent backed technologies as an operating officer and as an investor.
 
Mark St. Laurent, Praxis Engineering

Mr. St. Laurent is a Chief Cyber Security Engineer/Architect with Praxis Engineering. Prior working with Praxis and early on in his 26 year computer security and forensics career, Mr. St. Laurent performed Common Criteria evaluations on Unix systems. Mr. St. Laurent was also a senior Network Intrusion Analyst and senior Information Systems Security Engineer (ISSE) for the National Security Agency (NSA). Mr. St. Laurent was a senior Computer Forensics Examiner (Unix/Linux) for the Federal Bureau of Investigation's (FBI) Computer Analysis Response Team (CART), and has worked hundreds of network and computer forensics cases using Red Hat Enterprise Linux as his primary platform.
 
Martin Preisler, Red Hat

Martin Preisler Martin Preisler works as a Software Engineer at Red Hat, Inc. He is working in the Security Technologies team, focusing on security compliance using Security Content Automation Protocol. He is the principal author of SCAP Workbench, a frequent contributor to OpenSCAP and SCAP Security Guide, and a contributor to the SCAP standard specifications.

Travel Information

Venue

Tysons Corner Marriott

8028 Leesburg Pike

Tysons, VA 22182

Get directions.

Tysons Corner

Social

Join the conversation

Rocket Fuel