Hi [[ session.user.profile.firstName ]]

DigiCert inc.

  • Date
  • Rating
  • Views
  • Securing DevOps without Sinking Productivity
    Securing DevOps without Sinking Productivity
    Jason Sabin, Chief Security Officer, DigiCert & Davi Ottenheimer, Faculty, Institute of Applied Network Security (IANS) Recorded: Sep 14 2017 62 mins
    Continuous DevOps environments have revolutionized software development, allowing development teams to work both more quickly and efficiently. Going faster introduces security risks. But addressing security will slow development—or will it? Join Security Ledger and DigiCert for a valuable conversation with leading practitioners on how organizations can improve development agility without sacrificing security.

    We'll review examples of organizations that have managed to infuse security best practices into their DevOps program, while also talking about some pitfalls and danger areas companies should be aware of as they embrace DevOps and secure DevOps methodologies.

    Jason Sabin, Chief Security Officer, DigiCert
    Davi Ottenheimer, Faculty, Institute of Applied Network Security (IANS)

    Paul Roberts, Editor in Chief, The Security Ledger
  • What Can be Done to Secure a Connected Vehicle?
    What Can be Done to Secure a Connected Vehicle?
    Mike Nelson, VP, Critical Infrastructure at DigiCert, Mike Ahmadi, Global Director of Critical Systems Security at Synopsys Recorded: Jun 22 2017 60 mins
    As self-driving vehicles are coming off the production line, automakers are deploying technology to improve the driving experience, from the infotainment system to enhancing brake and fuel efficiency. Yet, adequate cyber security measures still need to catch up. Whether it’s the hacked Jeep or the Nissan Leaf app vulnerability, connected vehicles often fail to implement basic authentication and encryption measures to protect users.

    Mike Nelson and Mike Ahmadi will cover the following topics:

    - Insight into the state of connected vehicle security and the need for interoperable standards-based solutions.
    - How connected device manufacturers are using public key infrastructure (PKI) to provide scalable authentication, encryption and data integrity for the vehicle and its thousands of connected parts.
    - Specific steps security teams can take beginning today.
  • Securing Connected Medical Devices: Steps Providers, Manufacturers Can Take Now
    Securing Connected Medical Devices: Steps Providers, Manufacturers Can Take Now
    Karl West, CISO and Assistant VP of Information Systems for Intermountain Healthcare; Mike Nelson, VP of Healthcare Solutions Recorded: Mar 9 2017 60 mins
    As the Internet of Things (IoT) and device connectivity within healthcare settings increases, the need for strong security rises, even as the potential exists to improve patient care through data sharing and real-time analysis. Threats to patient health and private healthcare data continue to grow in sophistication and volume, prompting the FDA to recently issue guidance for Post-Market Management of Cybersecurity in Medical Devices. Evolving risks include direct threats to patient safety that could occur because of manipulation of data in transit or device compromise. Similarly, healthcare organizations are at risk of connected devices providing backdoor access to their networks, potentially losing patient and other proprietary data that could undermine their long-term stability. A third risk to manufacturers is the loss of IP protections during manufacturing. The healthcare industry is responding by acknowledging the need for better security, but a major obstacle arises in how to effectively assess risk, prioritize and deploy security solutions at scale.

    This webinar provides an overview from both a healthcare provider organization and medical device manufacturer perspective.

    During this webinar, learn about:

    •The state of medical device cybersecurity - including an assessment of where progress is being made and areas in need of improvement
    •How to conduct a proper medical device risk assessment for large healthcare networks
    •The importance of manufacturers issuing timely medical device software patches and updates & FDA clarification of policies
    •Technologies being used to manage device identity, data encryption and user/device authentication at scale for connected medical devices
    •Why creating, classifying and managing medical device inventories are difficult, but necessary, steps for many healthcare organizations
  • Get Smart: Using PKI to Secure the IoT
    Get Smart: Using PKI to Secure the IoT
    Jason Sabin, DigiCert CSO and Brian Russell, Leidos Chief Engineer Recorded: May 24 2016 92 mins
    This webinar discusses how the Internet of Things is using PKI to address IoT authentication challenges. Discover innovative new methods for using PKI to tackle the unique scalability, privacy, and compute constraints of the IoT.

    Common use cases demonstrate how digital certificate deployment is used for secure key management as well as to enable trusted device enrollment, authenticated device updates, and more. PKI plays plays a ke in providing reliable identity assurance and encryption for billions of endpoints (e.g. devices and servers) for connected healthcare, automobiles, manufacturing, industrial operations, smart homes and cities, and so much more.

Embed in website or blog