Hi [[ session.user.profile.firstName ]]

OH SSH IT! Where Are My SSH Keys?

Unused or unmonitored SSH keys grant alarming levels of privileged access. If you are not hyper-vigilant, SSH keys can become vulnerable, and even walk out the door with prior employees—whether maliciously or innocently. When that happens, cyber criminals or malicious insiders can misuse your SSH keys to gain privileged access to your critical systems and data.

Join fellow information security and system admins, managers, directors, architects, and consultants on this webinar to learn:

• The biggest risks facing your SSH inventory
• Strategies for preventing the misuse of SSH keys
• Five actions that will immediately improve SSH security
Recorded Oct 11 2017 40 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Paul Turner, CTO, Server Products
Presentation preview: OH SSH IT! Where Are My SSH Keys?

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Rise of the Machines - 2018 Threatscape Nov 15 2017 5:00 pm UTC 60 mins
    Kevin Bocek, VP, Security Strategy and Threat Intelligence, Venafi
    here are two kinds of actors on every network—people and machines—and both need to be secured. People rely on user names and passwords to identify themselves and gain access to machines, applications and devices. But machines don’t. They use digital keys and certificates for machine-to-machine communication and authentication. And the number of machine identities that needs to be protected is growing exponentially—with fast IT services through DevOps, cloud services, apps, and IoT.

    But we’re not protecting these growing machine identities. We spend billions each year on user name and password security, but almost none on protecting keys and certificates. Cybercriminals take advantage of unprotected keys and certificates to eavesdrop on private communications, give the appearance of validity to phishing sites or malicious code, and hide their activity in encrypted traffic—getting malware in and sensitive data out.

    Learn about the different types of machines identities, where they are already proliferating in your network, new risks, and steps you can take immediately to get these risks under control and prepare your network architecture for the future.
  • OH SSH IT! Where Are My SSH Keys? Recorded: Oct 11 2017 40 mins
    Paul Turner, CTO, Server Products
    Unused or unmonitored SSH keys grant alarming levels of privileged access. If you are not hyper-vigilant, SSH keys can become vulnerable, and even walk out the door with prior employees—whether maliciously or innocently. When that happens, cyber criminals or malicious insiders can misuse your SSH keys to gain privileged access to your critical systems and data.

    Join fellow information security and system admins, managers, directors, architects, and consultants on this webinar to learn:

    • The biggest risks facing your SSH inventory
    • Strategies for preventing the misuse of SSH keys
    • Five actions that will immediately improve SSH security
  • Strengthening Machine Identity Protection to Automate SSL/TLS Certificates Recorded: Oct 6 2017 45 mins
    Brian Durkin, Venafi
    Strengthening Machine Identity Protection to Automate SSL/TLS Certificate Lifecycle - A Combined Venafi and CyberArk Application Identity Manager Solution.
Intelligent Protection for Machine Identities
There are two actors on a network: people and machines. People rely on usernames and passwords to identify themselves and gain access to machines, applications and devices. Machines use digital keys and certificates to authenticate for secure machine-to-machine communication. While organizations spend billions of dollars each year on identity and access management and protecting usernames and passwords, very little is spent on protecting machine identities, which is essential to securing critical systems and data. The Venafi Platform delivers the machine identity intelligence and automation necessary to automatically safeguard the flow of information to trusted machines and prevent communication with untrusted ones—all at machine speed and scale. Venafi protects the largest, most sensitive networks in the world, and our more than 280 customers include 4 of the Top 5 US Banks, 4 of the Top 5 UK Banks, 5 of the Top 5 US Health Insurers and 4 of the Top 5 US Retailers. Venafi solutions help organizations:
- Prevent breaches
- Eliminate outages
- Orchestrate PKI
- Protect SSH access
- Pass compliance audits
- Automate DevOps

Visit www.venafi.com

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: OH SSH IT! Where Are My SSH Keys?
  • Live at: Oct 11 2017 5:00 pm
  • Presented by: Paul Turner, CTO, Server Products
  • From:
Your email has been sent.
or close