Epic CA Fails: How Quickly Can You Restore Trust?

Logo
Presented by

Mike Dodson, VP WW Customer Security Strategy and Solutions, Venafi

About this talk

What happens when a certificate authority compromise or error leaves you scrambling to find and replace large numbers of certificates? Many organizations put their skills to the test when Google recently decided they would no longer trust certificates issued by Symantec. With the first set of Symantec distrust deadlines just around the corner, do you know if your organization will be impacted? But Symantec wasn't the first panic button and it won't be the last. Most security professionals think there will other events like this in the future, but they don't have the technology or information they need to respond quickly. Join our webinar to learn how you can prepare for large-scale certificate security events. You'll learn why certificates are poorly understood and weakly defended in many enterprise networks. And you'll see survey results that show why a surprising number of IT security professionals are relatively unconcerned about their ability to quickly find and replace groups of certificates. How does your organization stack up to industry peers? Are you agile enough to find and replace all certificates that chain up to a Symantec root? Attend this session to learn: - Which types of CA events can impact your certificates - Why it's difficult to locate and replace impacted certificates - Why most organizations aren't ready to react quickly - Four steps you can take now to build CA agility

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (111)
Subscribers (9905)
There are two actors on a network: people and machines. People rely on usernames and passwords to identify themselves and gain access to machines, applications and devices. Machines use digital keys and certificates to authenticate for secure machine-to-machine communication. While organizations spend billions of dollars each year on identity and access management and protecting usernames and passwords, very little is spent on protecting machine identities, which is essential to securing critical systems and data. The Venafi Platform delivers the machine identity intelligence and automation necessary to automatically safeguard the flow of information to trusted machines and prevent communication with untrusted ones—all at machine speed and scale. Venafi protects the largest, most sensitive networks in the world, and our more than 280 customers include 4 of the Top 5 US Banks, 4 of the Top 5 UK Banks, 5 of the Top 5 US Health Insurers and 4 of the Top 5 US Retailers. Venafi solutions help organizations: - Prevent breaches - Eliminate outages - Orchestrate PKI - Protect SSH access - Pass compliance audits - Automate DevOps Visit www.venafi.com