Vulnerability or Compromise: How Long Would It Take You to Remediate?
Mark Sanders, Sr. Solution Architect, Venafi
In this session we will describe why certificate and key-based machine identity remediation can be such a challenge. We will discuss examples of when remediation is needed as well as current remediation efforts. We will also discuss what is needed for an effective remediation strategy with real world examples using Venafi’s platform. Finally, we'll wrap…