KEYNOTE (CloudWorld): Linux Lifeline - Threat Awareness & Mitigation Strategies to Protect your Org


Aaron Ansari
Trend Micro, VP of Cloud Security

Aaron Ansari is Vice President of Cloud Security at Trend Micro, which he joined through the company’s acquisition of Cloud Conformity in 2019. He is a thought leader on cloud technologies and cybersecurity issues. Often quoted in the media, Aaron is a dynamic public speaker.

Earlier in his career, Aaron served as the Chief Security Architect at BMW financial services overseeing the development and application of security policy standards and guidelines. He also held roles at JPMC, Cardinal Health and Huntington Banks, focusing on application security management, intrusion detections and compliance. For more than a decade, Aaron taught in the CIS and MIS departments at Franklin University.

Aaron holds a BS in Computer Science from The Ohio State University and an MBA from Franklin University.


As of 2017, 90 percent of public clouds workloads ran on Linux. Linux allows organizations to make the most of their cloud-based environments and power their digital transformation strategies. Many of today’s most cutting-edge cloud-based applications and technology run on Linux, making it a critical area of modern technology to secure.

According to a recent Linux Threat Report, most threats arise from systems running end-of-life versions of Linux distributions. This includes 44 percent from CentOS versions 7.4 to 7.9. In addition, 200 different vulnerabilities were targeted in Linux environments in just six months. This means attacks on Linux are likely taking advantage of outdated software with un-patched vulnerabilities.

This session will reveal steps you can take to ensure the security across workloads and cloud presence powered by Linux and how to effectively respond to the possible threats.

Join Aaron as he walks through the data, speaks to the threat, and highlights the top three mitigation strategies for all enterprises.
Attendees will learn:
• How to utilize free Linux native tools including Iptables, seecomp, PaX, etc., for configuration assessment, vulnerability patching and activity monitoring.
• Simple steps you can take to secure containers effectively.
• Best practices in Appsec, including testing, scanning and Open Source (SCA).