There are two kinds of actors on every network—people and machines. People employ usernames and passwords to identify and authenticate themselves, so they can get access to network data and services. Machines also need to identify and authenticate themselves, but they don’t rely on usernames and passwords. Instead, they use cryptographic keys and digital certificates to authenticate themselves to other machines. Every year, organizations spend billions of dollars protecting usernames and passwords, but almost nothing protecting keys and certificates, leaving our networks and data at risk. How do you keep machine identities secure? Attend sessions in this summit to learn about Machine Identity Protection.

Join Venafi and their technology partners for discussions on the increased need to protect machine identities in the modern enterprise.


To attend this FREE virtual summit, select one of the tracks below and register for all webinars of interest.

 

June 12, 2018

Why do organizations need to protect machine identities as much, or more, than usernames and passwords? Cybercriminals use unprotected keys...

June 13, 2018

The number of machines and the dependence on encryption is on the rise. But the issuance, installation and management of...

June 14, 2018

Audits are an opportunity to assess the effectiveness of Machine Identity Protection, but most organizations do not audit key and...

Featured Presenters

Jeff Hudson

CEO

Venafi

Paul Turner

CTO, Server Products

Venafi

Kevin Bocek

VP Security & Threat Intelligence

Venafi

Mike Dodson

VP WW Customer Security Strategy & Solutions

Venafi

Carl Bourne

Global Solutions Architect

Venafi

George Parsons

Senior Director of Security Architects

Venafi


Partners