Главная
Study mode:
on
1
Intro
2
What is needed to build trusted infrastructures
3
Continuous monitoring
4
Cyber security
5
State of patching
6
Cloud migration
7
Application software
8
Common threads
9
Time limits
10
Automated test battery
11
SCAP
12
Roadmap
13
GitHub
14
People Tracking
Description:
Explore evolving concepts in trusted infrastructure security during this 40-minute breakout session from Red Hat Summit 2017. Gain insights from industry experts as they discuss moving beyond traditional security measures like STIG compliance and two-factor authentication. Delve into advanced data protection methods such as tokenization, Trusted Platform Modules, and trusted boot. Examine emerging cryptographic models including quantum cryptography and blockchain. Learn how these concepts apply to containerization and serverless computing, and discover open source approaches to addressing modern security challenges. The session covers topics like continuous monitoring, cyber security, patching strategies, cloud migration, and application software security. Understand the importance of automated testing, SCAP implementation, and effective roadmapping in building robust, trusted infrastructures for government and education sectors.

What Is Needed to Build Trusted Infrastructures

Red Hat
Add to list