<img src="https://certify.alexametrics.com/atrk.gif?account=Zpb+p1uhUo20dG" style="display:none" height="1" width="1" alt="">
A Blueprint to Cloud Native Security on Red Hat OpenShift


Think About Your Audience Before Choosing a Webinar Title

Sponsored by RED HAT Marketplace

Wednesday, February 24, 2021
11 a.m. ET

Leveraging security blueprints and certified vulnerability scanners
to secure
your Red Hat artifacts

As development and deployment methodologies push the boundaries of DevOps, adopting security designed specifically for cloud native applications is crucial. Standard software security testing practices fall short, leaving organizations exposed to exploitable vulnerabilities in open source components – which are common targets in complex attack killchains.  

To infuse security into cloud native operations, Red Hat has partnered with Aqua Security to establish a comprehensive blueprint to harden cloud environments, to embed security at each stage of CI/CD pipelines, and to secure cloud native applications in production – all without impeding agility.  

In this webinar, join Aqua and Red Hat to discuss:  

  • Best practices for securing application builds, hardening Red Hat OpenShift environments, and upholding security in production using a DevSecOps blueprint. 
  • Establish a reliable security gate in CI/CD pipelines to identify and mitigate vulnerabilities in open source artifacts. 
  • Enhance the accuracy and actionability of results with Aqua’s Red Hat-certified vulnerability scanner. 
  • Increasing DevSecOps efficiency when deploying Aqua on OpenShift with a dedicated operator 
Maor Kuriel
Senior Product Marketing Manager - Aqua
Maor has over ten years of information security experience. In previous positions at VMware and Microsoft, he has spent his career building experience in product management and security research. As a Senior Product Marketing Manager at Aqua, he supports organizations in their digital transformation and improves their security through DevSecOps. He is passionate about delivering easy to use cybersecurity products and defining the future of cloud-native security.
Dave Meurer
Global Solution Architect, Security ISVs - Red Hat
Dave Meurer currently serves as a Principal Solution Architect on the Red Hat Global Partner Security ISV team, where he owns technical relationships and evangelism with security independent software vendor partners of Red Hat. Before joining Red Hat, he spent nine years in the Application Security industry with Synopsys and Black Duck, where he served in similar roles as the director of technical alliances and sales engineering. Meurer also worked for Skyway Software, HSN.com, and Accenture in various management and application development roles. When he’s not thinking about Kubernetes, security, and partners, he enjoys being the VP Sales of North Central Tampa for his wife (the CEO) and 5 kids (Inside Sales).

On-Demand Viewing:

What You’ll Learn in This Webinar

You’ve probably written a hundred abstracts in your day, but have you come up with a template that really seems to resonate? Go back through your past webinar inventory and see what events produced the most registrants. Sure – this will vary by topic but what got their attention initially was the description you wrote.

Paint a mental image of the benefits of attending your webinar. Often times this can be summarized in the title of your event. Your prospects may not even make it to the body of the message, so get your point across immediately.  Capture their attention, pique their interest, and push them towards the desired action (i.e. signing up for your event). You have to make them focus and you have to do it fast. Using an active voice and bullet points is great way to do this.

Always add key takeaways. Something like this....In this session, you’ll learn about:

  • You know you’ve cringed at misspellings and improper grammar before, so don’t get caught making the same mistake.
  • Get a second or even third set of eyes to review your work.
  • It reflects on your professionalism even if it has nothing to do with your event.