Hi [[ session.user.profile.firstName ]]


  • Date
  • Rating
  • Views
  • Securing DevOps without Sinking Productivity
    Securing DevOps without Sinking Productivity Jason Sabin, Chief Security Officer, DigiCert & Davi Ottenheimer, Faculty, Institute of Applied Network Security (IANS) Recorded: Sep 14 2017 62 mins
    Continuous DevOps environments have revolutionized software development, allowing development teams to work both more quickly and efficiently. Going faster introduces security risks. But addressing security will slow development—or will it? Join Security Ledger and DigiCert for a valuable conversation with leading practitioners on how organizations can improve development agility without sacrificing security.

    We'll review examples of organizations that have managed to infuse security best practices into their DevOps program, while also talking about some pitfalls and danger areas companies should be aware of as they embrace DevOps and secure DevOps methodologies.

    Jason Sabin, Chief Security Officer, DigiCert
    Davi Ottenheimer, Faculty, Institute of Applied Network Security (IANS)

    Paul Roberts, Editor in Chief, The Security Ledger
  • What Can be Done to Secure a Connected Vehicle?
    What Can be Done to Secure a Connected Vehicle? Mike Nelson, VP, Critical Infrastructure at DigiCert, Mike Ahmadi, Global Director of Critical Systems Security at Synopsys Recorded: Jun 22 2017 60 mins
    As self-driving vehicles are coming off the production line, automakers are deploying technology to improve the driving experience, from the infotainment system to enhancing brake and fuel efficiency. Yet, adequate cyber security measures still need to catch up. Whether it’s the hacked Jeep or the Nissan Leaf app vulnerability, connected vehicles often fail to implement basic authentication and encryption measures to protect users.

    Mike Nelson and Mike Ahmadi will cover the following topics:

    - Insight into the state of connected vehicle security and the need for interoperable standards-based solutions.
    - How connected device manufacturers are using public key infrastructure (PKI) to provide scalable authentication, encryption and data integrity for the vehicle and its thousands of connected parts.
    - Specific steps security teams can take beginning today.
  • Automated Certificate Provisioning to IoT Devices
    Automated Certificate Provisioning to IoT Devices DigiCert Recorded: Feb 3 2017 5 mins
    Connected device manufacturers and owners need a secure automated method for registering certificates and delivering them to their devices at scale. Too many Internet of Things (IoT) devices support only proprietary device enrollment protocols that are not compatible with digital certificates. As these connected devices lack the compute power required for strong encryption, when credentials need to be revoked or rotated because of device authorization changes, the process is typically manual, time-consuming and vulnerable to human error. With DigiCert Auto-Provisioning powered by Device Authority, connected device manufacturers and owners can provision digital certificates at scale, whether their devices use open standards such as SCEP or EST, or only support propriety device enrollment protocols.

    In this demonstration, watch as certificates are generated and delivered to connected cameras and watch as a certificate is revoked and a new one issued. Learn how Auto-Provisioning combines scalable certificate issuance with automated provisioning to simplify large-volume device enrollment and credentialing, and how it also provides secure key generation and storage to prevent the use of stolen credentials and unauthorized devices. Auto-Provisioning allows companies to take a major step forward in securing their IoT investments, becoming less dependent on manufacturer security.
  • IoT Security: New Approaches to Authenticating Devices
    IoT Security: New Approaches to Authenticating Devices Dan Timpson, DigiCert Chief Technology Officer and Talbot Harty, Device Authority Chief Technology Officer Recorded: Sep 29 2016 57 mins
    Trusted identity and authentication of connected devices are critical to secure the IoT and prevent compromised enterprise networks. But now, even lightweight devices, such as operational sensors and other nodes, can be protected with scalable credential provisioning and management.

    Learn more from IoT security experts as they discuss the challenges most organizations face and what you can do to protect your company’s valuable IoT investments. You can also view a demo on a joint solution for credential provisioning and management.
  • Get Smart: Using PKI to Secure the IoT
    Get Smart: Using PKI to Secure the IoT Jason Sabin, DigiCert CSO and Brian Russell, Leidos Chief Engineer Recorded: May 24 2016 92 mins
    This webinar discusses how the Internet of Things is using PKI to address IoT authentication challenges. Discover innovative new methods for using PKI to tackle the unique scalability, privacy, and compute constraints of the IoT.

    Common use cases demonstrate how digital certificate deployment is used for secure key management as well as to enable trusted device enrollment, authenticated device updates, and more. PKI plays plays a ke in providing reliable identity assurance and encryption for billions of endpoints (e.g. devices and servers) for connected healthcare, automobiles, manufacturing, industrial operations, smart homes and cities, and so much more.

Embed in website or blog