<img src="https://certify.alexametrics.com/atrk.gif?account=Zpb+p1uhUo20dG" style="display:none" height="1" width="1" alt="">
Shifting Security Left: Streamlining Enterprise Secrets Management Workflows With Self-Service With CyberArk and Red Hat OpenShift

Webinar

Think About Your Audience Before Choosing a Webinar Title


Sponsored by RED HAT marketplace


Tuesday, July 13, 2021
1 p.m. ET

Automation is a critical part of improving the operational efficiency and time to market application development teams. But recent supply chain breaches like the SolarWinds attack demonstrated why it’s important to secure, authenticate, and audit access to sensitive data, containers and microservices early in the software development process. Unprotected secrets (credentials, keys, tokens, etc.) embedded within code, automation scripts, etc., could grant attackers access to additional sensitive enterprise and/or customer data and turn a small breach into a disaster. While OpenShift gives you a secure platform for your containers, you will still need to manage secrets amongst containers. CyberArk and Red Hat have teamed up to manage secrets on OpenShift. Development, operations, and security teams need to collaborate and implement efficient security practices from the start to achieve and maintain strong, consistent security postures. By shifting security left, your teams become more efficient and more secure

Integrating security into CI/CD pipelines is essential, but it also needs to have minimal application development disruption and integrate into the workflows of sophisticated organizations.

In this webinar, you'll learn:

  • Best practices for securing sensitive information in the DevOps/GitOps pipeline using OpenShift
  • The process companies can take to strengthen their security posture
  • How to achieve centralized secrets management with enterprise self-service workflow for application developers
Jody Hunt
Strategic Solutions Engineer - CyberArk
Jody has held diverse technical roles in software development, sales and marketing. He has been an enthusiastic promoter of DevOps principles since 2010. In 2015 he became aware of the growing security gap represented by automation. That led him to Conjur, Inc. in January of 2017, just four months before the secrets management company’s acquisition by CyberArk. He graduated from the University of Texas at Austin with a BA in Computer Science.
Dave Meurer
Global Solution Architect, Security ISVs - Red Hat
Dave Meurer currently serves as a Principal Solution Architect on the Red Hat Global Partner Security ISV team, where he owns technical relationships and evangelism with security independent software vendor partners of Red Hat. Before joining Red Hat, he spent nine years in the Application Security industry with Synopsys and Black Duck, where he served in similar roles as the director of technical alliances and sales engineering.
Meurer also worked for Skyway Software, HSN.com, and Accenture in various management and application development roles. When he’s not thinking about Kubernetes, security, and partners, he enjoys being the VP Sales of North Central Tampa for his wife (the CEO) and 5 kids (Inside Sales).

On-Demand Viewing:

What You’ll Learn in This Webinar

You’ve probably written a hundred abstracts in your day, but have you come up with a template that really seems to resonate? Go back through your past webinar inventory and see what events produced the most registrants. Sure – this will vary by topic but what got their attention initially was the description you wrote.

Paint a mental image of the benefits of attending your webinar. Often times this can be summarized in the title of your event. Your prospects may not even make it to the body of the message, so get your point across immediately.  Capture their attention, pique their interest, and push them towards the desired action (i.e. signing up for your event). You have to make them focus and you have to do it fast. Using an active voice and bullet points is great way to do this.

Always add key takeaways. Something like this....In this session, you’ll learn about:

  • You know you’ve cringed at misspellings and improper grammar before, so don’t get caught making the same mistake.
  • Get a second or even third set of eyes to review your work.
  • It reflects on your professionalism even if it has nothing to do with your event.