Securing Your Move to Hybrid Cloud Infrastructure

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

Hybrid cloud environments will dominate IT infrastructure in the coming years, providing the flexibility and scalability that modern businesses need to stay competitive. Yet, as they transition to these environments, businesses face security challenges that outdated methods cannot address.

The shift from on-premises to hybrid cloud requires a fundamental rethink of security strategies. Traditional perimeter-based defences no longer suffice in this new landscape. Instead, modern approaches like zero trust architecture and defence-in-depth have become essential. Embedding security into DevSecOps workflows is key to achieving robust protection without compromising agility.

In this 30-minute session, Red Hat experts will explore how organizations can empower their DevSecOps teams to meet these challenges head-on. With the right strategies, securing a hybrid cloud environment can be a catalyst for business growth and innovation.

Join us to learn:

  • How to address the unique challenges of hybrid cloud security in a rapidly evolving landscape
  • Why traditional perimeter-based security falls short and the need for modern approaches like zero trust
  • Expert insights on the benefits of implementing defence-in-depth, including micro-segmentation and continuous user validation
  • How Red Hat empowers DevSecOps teams and developers to secure hybrid cloud environments effectively

Speakers

Photo of Chris Jenkins

Chris Jenkins

Principal Chief Architect, Red Hat

Photo of Mark Roberts

Mark Roberts

Principal Specialist Solution Architect, Red Hat

Brought to you by

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see the privacy policy for Red Hat here: https://www.redhat.com/en/about/privacy-policy. Please see Infosecurity Magazine’s privacy policy for more information.