Government Investigations of a Breach: When Machine Identity Protection Fails

Logo
Presented by

Kevin Bocek, VP, Security Strategy & Threat Intelligence, Venafi

About this talk

What was the biggest breach in 2017? How did it happen? Regulators in the U.S. and U.K. have released a detailed analysis, highlighting how a failure in Machine Identity Protection enabled this complex, lengthy, hidden attack. A single untracked, unmanaged digital certificate was left to expire and became the foundation of this attack. Certificates authenticate machine identities for trusted machine-to-machine connections and, when compromised, create a gaping hole in an otherwise well-layered defense. Join this webinar and learn how cybercriminals: • Use an expired certificate to hide in encrypted traffic • Exploit additional vulnerabilities and pivot deeper into the network • Continue their attack for months and pilfer millions of files Today, well over half of attacks hide in encrypted traffic—and analysts warn that this will only increase. Learn how to defend against these types of attacks and architect effective machine identity protection for your organization. Register now!

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (106)
Subscribers (9945)
There are two actors on a network: people and machines. People rely on usernames and passwords to identify themselves and gain access to machines, applications and devices. Machines use digital keys and certificates to authenticate for secure machine-to-machine communication. While organizations spend billions of dollars each year on identity and access management and protecting usernames and passwords, very little is spent on protecting machine identities, which is essential to securing critical systems and data. The Venafi Platform delivers the machine identity intelligence and automation necessary to automatically safeguard the flow of information to trusted machines and prevent communication with untrusted ones—all at machine speed and scale. Venafi protects the largest, most sensitive networks in the world, and our more than 280 customers include 4 of the Top 5 US Banks, 4 of the Top 5 UK Banks, 5 of the Top 5 US Health Insurers and 4 of the Top 5 US Retailers. Venafi solutions help organizations: - Prevent breaches - Eliminate outages - Orchestrate PKI - Protect SSH access - Pass compliance audits - Automate DevOps Visit www.venafi.com