Hi [[ session.user.profile.firstName ]]

Epic CA Fails: How Quickly Can You Restore Trust?

What happens when a certificate authority compromise or error leaves you scrambling to find and replace large numbers of certificates? Many organizations put their skills to the test when Google recently decided they would no longer trust certificates issued by Symantec. With the first set of Symantec distrust deadlines just around the corner, do you know if your organization will be impacted?

But Symantec wasn't the first panic button and it won't be the last. Most security professionals think there will other events like this in the future, but they don't have the technology or information they need to respond quickly. Join our webinar to learn how you can prepare for large-scale certificate security events.

You'll learn why certificates are poorly understood and weakly defended in many enterprise networks. And you'll see survey results that show why a surprising number of IT security professionals are relatively unconcerned about their ability to quickly find and replace groups of certificates.

How does your organization stack up to industry peers? Are you agile enough to find and replace all certificates that chain up to a Symantec root?

Attend this session to learn:
- Which types of CA events can impact your certificates
- Why it's difficult to locate and replace impacted certificates
- Why most organizations aren't ready to react quickly
- Four steps you can take now to build CA agility
Recorded Mar 29 2018 58 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Mike Dodson, VP WW Customer Security Strategy and Solutions, Venafi
Presentation preview: Epic CA Fails: How Quickly Can You Restore Trust?

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • SSH Keys: Security Asset or Liability? Recorded: Jun 14 2018 64 mins
    Mike Dodson, VP WW Customer Security Strategy & Solutions, Venafi
    Weak practices around protecting SSH keys expose businesses to costly risk, impacting the most sensitive systems and data. Then incomplete auditing practices allow that risk to go unaddressed.

    SSH keys are often used for routine administrative tasks by system administrators, and privileged access management (PAM) systems ensure proper oversight. However, SSH keys are also used for secure machine-to-machine automation of critical business functions. PAM solutions don’t help secure these machine identities, and most audit programs overlook this important risk.

    This session discusses the common mistakes that almost all enterprises make around security, policy and auditing practices when managing SSH keys, including current survey results.
  • Adding Machine Identities to Your Auditing Capabilities Recorded: Jun 14 2018 32 mins
    Steve Armstrong, Venafi
    Conducting an audit of machine identity risk highlights the effectiveness of a Machine Identity Protection program as well as where to best focus risk mitigation. But what exactly should be audited to assess this risk? This session discusses a new Audit Work Program for Machine Identity Protection that assess risk and focuses remediation.

    The session will start with a discussion of risk influencers as well as the factors of machine identity risk that should be reviewed as part of the audit. The session then introduces the Audit Work Program and outlines a 30-60-90 day next steps plan for implementation.
  • Auditing Machine Identity Protection Recorded: Jun 14 2018 64 mins
    Kevin Bocek, Vice President, Security Strategy & Threat Intelligence, Venafi
    Just as we need to secure human identities, we also need to effectively manage and secure machine identities—whether those machines are servers, applications, appliances, IoT devices or other systems. Transport Layer Security (TLS) certificates and associated private keys serve as the primary method of establishing machine identities. However, organizations are not investing in machine identity protection, even though unmanaged and unsecured keys and certificates risk outages and breaches.

    This session shares a 5-stage approach to TLS security, including what is achieved and can be audited at each stage. This session will enable auditors to assess the overall maturity of an organization’s machine identity protection.
  • Building a Certificate as a Service Platform Recorded: Jun 14 2018 43 mins
    Carl Bourne, Global Solutions Architect, Venafi
    Today, agile software and IT services enable the modern enterprise to create new products, service customers, refine new processes and develop new business models. With this innovation, DevOps speed must coexist with security, but slow procurement processes lead many developers to simply ignore or sidestep corporate certificate requirements.

    This presentation shows how to achieve a balance between speed and security through building a Certificate-as-a-Service platform that automates the procurement and deployment of cryptographic keys and digital certificates as part of the build process—fully integrated with next-gen software development platforms and existing enterprise certificate authorities.
  • Venafied Private PKI Recorded: Jun 13 2018 48 mins
    Clint Wilson, DigiCert Product Manager
    Public Key Infrastructure is paradoxically often most valuable when narrowly trusted or private. A Private PKI allows for robust and pervasive cryptographic security, privacy, and encryption of all communication within your organization. Utilizing the Private PKI offerings of DigiCert allows you to seamlessly utilize this private trust environment without setting up your own infrastructure. Integrating your DigiCert Private PKI with Venafi’s tools and services allows for complete automation of all facets of your private certificates’ lifecycle management.
  • Delivering Intelligent L4-L7 Application Networking & Security Recorded: Jun 13 2018 40 mins
    Ashwin Manekar, Senior Product Manager, Avi Networks
    New software-defined load balancers are significantly improving the way application services are delivered and secured. In this webinar from Avi Networks, you will learn:

    - How to centrally manage the traffic flow to the applications and simplify policy management?

    - How to provide real-time visibility into DDoS attacks, SSL versions and ciphers used in transactions?

    - How to get the health score on application performance and automatically scale-out across data centers and clouds?
  • Get Control of SSL/TLS Certificate Security Recorded: Jun 13 2018 41 mins
    George Parsons, Senior Director of Security Architects, Venafi
    With more demands for encryption and stringent regulations, most enterprises need better SSL/TLS certificate security to support machine identity protection. But what’s a realistic roadmap and timeline? This session will show attendees how to design a 4-level, 18-month journey to enterprise-wide certificate security.

    Each level will include:
    - The timeline and requirements
    - The technical and business benefits
    - Anecdotes of real-life implementations

    Learn how to assess the maturity of your organization’s SSL/TLS certificate management and how to customize a roadmap to address your security and operational challenges.
  • Gemalto and Venafi: Securing Machine Identities at Machine Speed Recorded: Jun 12 2018 48 mins
    Gorav Arora, CTO, Gemalto & Ben Rogers, Solution Architect, Venafi
    Machines are increasingly taking over tasks traditionally conducted by humans. Moreover, they often work independently to improve business productivity. As more and more machines come into existence, we need to be able to reliably identity which machines should be trusted and which shouldn’t. But the security that protects machine identities can no longer be slowed down by traditional manual or homegrown methods. These methods are no longer sufficient to allow organizations to scale and thrive at the speed of business.

    Join us at this webinar to learn how Gemalto and Venafi help organizations address these challenges.
  • Protect Your Machine Identities Recorded: Jun 12 2018 41 mins
    Jeff Hudson, CEO, Venafi
    There are two kinds of actors on every network—people and machines—and both need to be secured. People rely on usernames and passwords, but machines use keys and certificates for machine-to-machine communication and authentication. Billions are spent each year securing identity and access management, but virtually all of it is spent securing usernames and passwords, almost none on protecting keys and certificates.

    Unprotected machine identities are lucrative targets for cyber criminals.They use unprotected keys and certificates to eavesdrop on private communications, make phishing sites or malicious code look valid, and hide their nefarious activity in encrypted traffic—getting malware in and sensitive data out.

    In this presentation, we’ll discuss the different types of machines identities and where they proliferate in your network. You’ll see the role and lifecycle of machine identities, and where we’re falling short in protecting them. We’ll then look at where there are current risks as well as where new risks are emerging. We’ll conclude with steps you can take immediately to get these risks under control.
  • Forrester Research on Machine Identities Recorded: Jun 12 2018 35 mins
    Andras Cser, Vice President and Principal Analyst, Forrester
    Machines are taking over. Are you ready to manage their identities? Machine identities are just as important as human identities and won't diminish anytime soon.

    Join Forrester VP and Principal Analyst Andras Cser for this timely and informative session on Machine Identities.
  • Epic CA Fails: How Quickly Can You Restore Trust? (EMEA Focus) Recorded: May 30 2018 60 mins
    Mike Dodson, VP WW Customer Security Strategy and Solutions, Venafi
    What happens when a certificate authority compromise or error leaves you scrambling to find and replace large numbers of certificates? Many organizations put their skills to the test when Google recently decided they would no longer trust certificates issued by Symantec. With the first set of Symantec distrust deadlines just around the corner, do you know if your organization will be impacted?

    But Symantec wasn't the first panic button and it won't be the last. Most security professionals think there will other events like this in the future, but they don't have the technology or information they need to respond quickly. Join our webinar to learn how you can prepare for large-scale certificate security events.

    You'll learn why certificates are poorly understood and weakly defended in many enterprise networks. And you'll see survey results that show why a surprising number of IT security professionals are relatively unconcerned about their ability to quickly find and replace groups of certificates.

    How does your organization stack up to industry peers? Are you agile enough to find and replace all certificates that chain up to a Symantec root?

    Attend this session to learn:
    - Which types of CA events can impact your certificates
    - Why it's difficult to locate and replace impacted certificates
    - Why most organizations aren't ready to react quickly
    - Four steps you can take now to build CA agility
  • Epic CA Fails: How Quickly Can You Restore Trust? Recorded: Mar 29 2018 58 mins
    Mike Dodson, VP WW Customer Security Strategy and Solutions, Venafi
    What happens when a certificate authority compromise or error leaves you scrambling to find and replace large numbers of certificates? Many organizations put their skills to the test when Google recently decided they would no longer trust certificates issued by Symantec. With the first set of Symantec distrust deadlines just around the corner, do you know if your organization will be impacted?

    But Symantec wasn't the first panic button and it won't be the last. Most security professionals think there will other events like this in the future, but they don't have the technology or information they need to respond quickly. Join our webinar to learn how you can prepare for large-scale certificate security events.

    You'll learn why certificates are poorly understood and weakly defended in many enterprise networks. And you'll see survey results that show why a surprising number of IT security professionals are relatively unconcerned about their ability to quickly find and replace groups of certificates.

    How does your organization stack up to industry peers? Are you agile enough to find and replace all certificates that chain up to a Symantec root?

    Attend this session to learn:
    - Which types of CA events can impact your certificates
    - Why it's difficult to locate and replace impacted certificates
    - Why most organizations aren't ready to react quickly
    - Four steps you can take now to build CA agility
  • Financial Services DevOps: Security Awareness Doesn't Equal Protection Recorded: Mar 12 2018 18 mins
    Carl Bourne - Global Solutions Architect, Venafi
    Some financial institutions are falling short in their Development Operations (DevOps) cryptographic security practices. In DevOps, cryptographic security risks are amplified—compromises in development or test environments can easily spread to production systems and applications. A study of the financial services DevOps teams shows they are more aware of security risks and tools than other industries. However, this awareness isn’t being translated into meaningful protection. Learn how your DevOps cryptographic security practices stack up and compare to other industries. Understand how automating and orchestrating certificate acquisition as part of your DevOps environment can help keep your business secure.

    Learn how DevOps cryptographic security practices in the financial industry compare to other industries and understand how automating certificate acquisition can improve security. Join Venafi as we discuss DevOps cryptographic security practices.
  • The Machine Identity Crisis: A Podcast Interview Recorded: Jan 24 2018 19 mins
    Jeff Hudson, CEO, Venafi, and Tom Field, Sr. VP of Editorial, ISMG
    We are amidst a new "machine identity crisis," says Jeff Hudson, CEO of Venafi. And unless we tackle this growing challenge of how to secure machine-to-machine communication, then enterprise IT and security departments are likely to be overwhelmed.

    The core issue is that computer devices and applications are growing faster than the earth's human population, Hudson says. And the challenge of automated communication among these devices is complicated by four factors: mobility, IoT, the cloud, as well as DevOps and fast IT adoption.

    "As an industry, we spend $8 billion a year protecting usernames and passwords - human IDs," Hudson says. "But we're just starting to realize that we need to protect machine IDs in the same way. That's the crisis."

    In this interview with ISMG, Hudson discusses:

    Why the crisis is overlooked;
    How the problem will continue to grow;
    How to assess and mitigate your own enterprise's susceptibility to machine identity compromise.
  • Rise of Machines: Über den Schutz dieser neuen Identitäten (Webcast in German!) Recorded: Jan 10 2018 48 mins
    Jens Sabitzer, CISSP; Georg Gann
    In einem Netzwerk gibt es zwei Aktoren - Menschen und Maschinen.
    Menschen nutzen Usernamen und Passwörter um sich zu identifizieren und
    Zugang zu Maschinen, Apps, Devices uvm. zu erhalten.
    Maschinen wie beispielsweise Services, Applikationen und Cloud-basierte
    Lösungen nutzen Schlüssel und Zertifikate, um sich gegenseitig zu
    identifizieren und authentifizieren. Jedoch schützen wir diese steigende
    Anzahl an Maschinenidentitäten nur unzureichend.
    Unternehmen geben jährlich Milliarden aus um die Sicherheit von Usernamen
    und Passwörter zu gewährleisten, investieren aber kaum etwas, um Schlüssel
    und Zertifikate zu schützen.
    Erfahren Sie mehr über diese neue Sicherheitsbedrohung und die Schritte, die
    Sie vornehmen können, um dieses Sicherheitsrisiko unter Kontrolle zu
    behalten.
  • Remove Security Roadblocks for your DevOps Teams Recorded: Jan 4 2018 53 mins
    Gavin Hil - Director of Threat Intelligence and Carl Bourne, Global Solution Architect
    This webinar will show you where DevOps is being commonly used, and what new risks it will introduce. From there a discussion about how IT security can keep up with the rapid changes that DevOps is bringing to their organization. Finally a wrap up demonstration showing you how you can use Automation to secure Keys and Certificates in a DevoOps environment using Chef and Docker.
  • Rise of the Machines - 2018 Threatscape Recorded: Nov 15 2017 64 mins
    Kevin Bocek, VP, Security Strategy and Threat Intelligence, Venafi
    The number of machines of all types – from containers, to cloud, to IoT – is on the rise. The identities of these machines – SSL/TLS, SSH, and code signing keys and certificates – control encryption, authentication, and code execution; powerful security controls too often left unprotected. Compromise, misuse, and fraud of machine identities are already prime attack vectors for hackers

    As attackers look for ways to evade network monitoring, behavioral analytics and tighter privileged account security controls, they are finding hijacking machine identities to be incredibly effective and lucrative. The stage is set for a dramatic escalation of these attacks in 2018. Are you prepared?

    Attend this session to learn:

    • The top four machine identity attacks targeting your organization in 2018
    • How SSL/TLS, SSH, and code signing keys and certificates are left unprotected
    • Why most organizations are not prepared to defend against them.
    • Three things your organization can do today to protect machine identities and prevent attacks
  • OH SSH IT! Where Are My SSH Keys? Recorded: Oct 11 2017 40 mins
    Paul Turner, CTO, Server Products
    Unused or unmonitored SSH keys grant alarming levels of privileged access. If you are not hyper-vigilant, SSH keys can become vulnerable, and even walk out the door with prior employees—whether maliciously or innocently. When that happens, cyber criminals or malicious insiders can misuse your SSH keys to gain privileged access to your critical systems and data.

    Join fellow information security and system admins, managers, directors, architects, and consultants on this webinar to learn:

    • The biggest risks facing your SSH inventory
    • Strategies for preventing the misuse of SSH keys
    • Five actions that will immediately improve SSH security
  • Strengthening Machine Identity Protection to Automate SSL/TLS Certificates Recorded: Oct 6 2017 45 mins
    Brian Durkin, Senior Systems Engineer, Venafi
    Strengthening Machine Identity Protection to Automate SSL/TLS Certificate Lifecycle - A Combined Venafi and CyberArk Application Identity Manager Solution.
  • IoT Security Over Tea: Steeping Out the Hype Recorded: Apr 11 2017 63 mins
    Gorav Arora, CTO Office Director of Technology at Gemalto
    A familiar buzz word over the past few years has been the Internet of Things (IoT). We have all heard the talk about it being the next big thing, its massive growth potential and the benefits to everyone. The IoT will generate more data, connect more devices and enable more users, and somehow these interactions will be safe and secure.

    We take a pragmatic view of IoT, cutting through the hype to uncover the core objective. Furthermore, we take a persona based approach to IoT security, and have identified four main ones: cloud service providers, consumers, device makers and third-party service providers. Each persona faces the obstacle of securing different parts of the ecosystem whether its access, the device, data and/or the user. However, it is necessary that security is provided holistically, as the weakest security link in the chain could compromise it all. In addition to security, the personas are used to demonstrate the ‘Stages of IoT’ from the digital identity of physical products to actualization of new business opportunities. No matter what persona in the IoT ecosystem you are (or are not), the webinar cuts through the hype to understand the real business opportunities and share with attendees the technology tool box (predictive analytics, security, connectivity, data collection and business intelligence) to create and improve services and leverage the generated data internally and externally.

    Join us for the webinar, “IoT Security Over Tea: Steeping out the Hype”, to learn more about:
    •A grounded perspective on IoT
    •Why IoT security matters for everyone
    •The persona analysis of IoT security
    •Key considerations as it begins to take off
    •How to protect what matters most to you
Intelligent Protection for Machine Identities
There are two actors on a network: people and machines. People rely on usernames and passwords to identify themselves and gain access to machines, applications and devices. Machines use digital keys and certificates to authenticate for secure machine-to-machine communication. While organizations spend billions of dollars each year on identity and access management and protecting usernames and passwords, very little is spent on protecting machine identities, which is essential to securing critical systems and data. The Venafi Platform delivers the machine identity intelligence and automation necessary to automatically safeguard the flow of information to trusted machines and prevent communication with untrusted ones—all at machine speed and scale. Venafi protects the largest, most sensitive networks in the world, and our more than 280 customers include 4 of the Top 5 US Banks, 4 of the Top 5 UK Banks, 5 of the Top 5 US Health Insurers and 4 of the Top 5 US Retailers. Venafi solutions help organizations:
- Prevent breaches
- Eliminate outages
- Orchestrate PKI
- Protect SSH access
- Pass compliance audits
- Automate DevOps

Visit www.venafi.com

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Epic CA Fails: How Quickly Can You Restore Trust?
  • Live at: Mar 29 2018 4:00 pm
  • Presented by: Mike Dodson, VP WW Customer Security Strategy and Solutions, Venafi
  • From:
Your email has been sent.
or close