Hi [[ session.user.profile.firstName ]]

Vision 2024: Will You Be Ready for the Future of Machine Identities?

How can you prepare for machines playing a greater role in the digital economy, machine-to-machine communications increasing in complexity and attackers becoming even more aggressive? The use of machine identities is exploding. Learn what the world may look like 5 years from now in the aftermath of 4 forces of change: digital transformation, threatscape, innovation, and the evolving role of machine identities. With a clearer view of the future you can already begin to make better planning decisions.

Attend this webinar to:
• Learn strategies for controlling the impeding complexity of machine identities
• Understand future machine identity attacks targeting your organization
• Identify how your keys and certificates may be left unprotected
• Predict whether you’re prepared to defend against future machine identity attacks

A not-to-be-missed session. Register now!

***Earn 1 CPE credit when you attend this session live***
Recorded Oct 24 2019 32 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Kevin Bocek, VP, Ecosystem & Threat Intelligence
Presentation preview: Vision  2024: Will You Be Ready for the Future of Machine Identities?

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Beware the dark side,use trusted machines & HSMs to support critical business Aug 18 2020 3:00 pm UTC 60 mins
    Paul Cleary,Senior Solutions Engineer-Venafi and Juan Asenjo,Director of Products,Solutions and Partner Marketing-nCipher
    As organizations deploy more automated systems to run critical business, the demand for device and application (machine) identities is rapidly increasing. Protecting machine identities is critical to ensure integrity of operations and the security of data processed by machines.

    This webcast will examine the growing challenges faced by organizations when managing increasing volumes of machine identities. Our speakers will discuss how to implement automated orchestration of keys and certificates, describe best practices, and explain why a root of trust is vital for security and regulatory compliance.

    Join the webcast and learn:
    • What are the main challenges managing machine identities
    • How to enable trust in machines supporting critical business
    • Why a root of trust is required for high assurance security

    This webinar is for you if you are responsible for:
    • Managing digital transformation and cloud migration
    • Overseeing security best practices in your organization
    • Auditing and ensuring your organizational compliance
  • Five Cloud Catastrophes (and How to Avoid Them) Recorded: Jul 28 2020 61 mins
    Michael Thelander, Director of Product Marketing and Dave Brancato, Sr. Tech. Mkt. Engineer, Venafi
    “Cloud migration” is no longer a question of IF or even WHEN. It’s a question of HOW FAST? Flexera’s annual State of the Cloud report shows us an ever-increasing migration velocity:

    • More than 50 percent of enterprise workloads are already in public clouds
    • 93 percent of enterprises have a multi-cloud strategy
    • Organizations use on average of 2.2 public and 2.2 private clouds

    Whether the reason is cost savings, flexibility, disaster response or to support a now fully perimeter-less world, we are all racing to the cloud. But what does this mean for the machine identities – especially TLS certificates and encryption keys – that are securing our digital transformation? What risks do we need to watch? How do we avoid some of the bad or unintended decisions that can cripple us?

    This webinar will help security architects, cloud architects and PKI teams secure and protect machine identities in even the fastest-moving environments. Join us to understand new risks and how to mitigate them and discover a “machine identities in the cloud” blueprint that helps you plan for a future that’s already here.
  • IoT Security Made Easy: How to implement secure code signing and update delivery Recorded: Jul 15 2020 29 mins
    Eddie Glenn, Venafi and Nirmal Misra, Device Authority
    As the number of IoT devices & apps continues to grow, so does the need for secure code signing & update delivery.

    Connected devices are only as valuable as the operating systems and applications that they execute. The firmware, operating system and application update processes are highly sensitive and can be a prime target for attack. Hackers have used these methods and systems to spread malware that is completely ‘trusted’ and can avoid Next-Generation Antivirus (NGAV).

    Until recently, there have been limited solutions available that can deliver a full secure end-to-end code signing and update delivery process for IoT use cases, forcing organizations to design and build their own home-grown solutions to fulfil their requirements.

    Join this webinar to:
    • Learn why code signing is important, in particular for IoT
    • Understand how CodeSign Protect helps organisations today
    • Explore a demo of a practical implementation of code-signing and secure update delivery for IoT
  • Protecting Advanced Cloud and Multicloud Environments with Venafi Recorded: Jul 7 2020 40 mins
    Dave Brancato, Sr. Tech Mkt.Engineer & Sitaram Iyer, Global Principal Architect, Venafi
    High-pace business demands and the resulting need for application modernization is changing how we think about security in multi cloud computing environments. Learn how to leverage Venafi cross functionally with native tooling to secure machine identities in AWS, Azure and GCP.
  • Automating Machine Identities with DevOps Workflows Recorded: Jun 23 2020 45 mins
    Jean-Yves Provost, Director, Solutions Architect & Carl Bourne, Sr. Solutions Architect, Venafi
    The changing market landscape is requiring developers to adopt to modern application development patterns lending to greater automation requirements specifically in a native way. Development teams tend to adopt tools and services that fit them very well in their quest for complete automation for their continuous delivery model. Empowering developers to use the tools and services that they are comfortable using is almost mandatory in today’s application development world. How can security teams gain observability in the highly distributed system where the definition of perimeter is not easy to define? Gain an understanding of what Machine Identity Protection means to an organization where there is an ever growing ecosystem of application development and deployment stacks. Whether the organization uses cloud provider managed environment for containerized applications, or use various tools for managing Infrastructure as code, a standard API driven way of managing the lifecycle of TLS/SSL certificates, SSH keys, code signing certificates is needed within the continuous integration and delivery model. This session will uncover how security teams can provide the required set of services that development teams can consume in a self-service fashion.
  • HashiCorp Vault and Venafi: Speed and Security for Cloud Operating Model Success Recorded: Jun 19 2020 61 mins
    Justin Weissig, Vault Technical Marketing, HashiCorp & Ben Rogers, Sr. Strategic Solution Architect, Venafi
    This webinar will explore how DevOps teams are using HashiCorp Vault and Venafi to make it fast and easy to use TLS/SSL certificates across clouds with enterprise security compliance.
  • Software Supply Chains and Code-to-Code Combat Recorded: Jun 18 2020 33 mins
    Eddie Glenn, Sr. Prod. Mkt. Mgr. and Slam Laqtib, Group Tech. Prod. Mgr., Venafi
    Protecting private code signing keys is no longer enough. Hackers are learning new ways to compromise and use them. In this session, we’ll address the risks of unsecured code signing, the challenges our customers encounter, the best practices for protecting code signing machine identities, and how Venafi Next-Gen Code Signing can help.
  • SSH: How Big Is Your Exposure? Recorded: Jun 16 2020 39 mins
    Michael Thelander, Director of Product Marketing, Venafi
    SSH … There’s a Sleeping Dragon. Ubiquitous SSH keys provide secure, automated connections, but can be hard to control. Learn how to institute a proactive SSH key management program, uniting day-to-day users of SSH with the teams responsible for securing these critical assets. Mitigate real-life threats risks before they surface while preparing for your next auditor visit.
  • Full-Scale Machine Identity Protection: A Virtual Case Study Recorded: Jun 11 2020 39 mins
    Paul Cleary, Ecosystem Architect, Venafi; Guy Pe'er, VP R&D and co-founder, Unbound Tech
    Machine to machine communication is growing exponentially in today’s organizations, and that communication must be secured. Organizations rely more and more on their systems to communicate with each other to process critical data. And in an age of increasing cybercrime and security vulnerabilities, protecting the entire network throughout the entire certificate lifecycle is critical. Existing hardware systems, however, are outdated in a largely cloud-based environment; what’s an organization to do?

    In this webinar, Unbound’s VP R&D and co-founder Guy Pe’er and Venafi Ecosystem Architect Paul Cleary will discuss:

    + Why machine identity protection is important, especially in terms of automation, visibility, and intelligence;
    + How Venafi’s Trust Protection Platform protects those identities via a combination of policy enforcement and automation;
    + How protecting the cryptographic keys & certificates which underpin machine identities using Unbound’s Virtual HSM affords greater flexibility over traditional hardware

    In addition, Guy and Paul will provide a live demo of a TPP-vHSM integration. If you’re a security architect or a cryptographic key management specialist, this is one webinar you won’t want to miss.
  • Protection des identités machines Recorded: Jun 9 2020 59 mins
    Stephane Dorchin, Directeur Europe du Sud
    Il existe deux acteurs sur chaque réseau – les personnes et les machines - et les deux doivent être sécurisés. Les personnes (utilisateurs) utilisent des identifiants et des mots de passe pour se connecter et s’authentifier sur un réseau. Les machines quant à elles utilisent des clés et des certificats pour la communication et l'authentification machine à machine. Des milliards d’Euros sont dépensés chaque année pour sécuriser la gestion des identités et des accès, mais la quasi-totalité des dépenses est consacrée à la sécurisation des identifiants et des mots de passe, et pratiquement rien pour la protection des clés et des certificats.

    Les identités machine non protégées sont des cibles faciles et lucratives pour les cybercriminels. Ils utilisent des clés et des certificats non protégés pour écouter des communications privées, rendre les sites de phishing plus efficaces, des codes malicieux valides, et masquer leurs activités néfastes dans le trafic crypté, notamment pour faciliter l’introduction de logiciels malveillants et l’extraction de données confidentielles.

    Dans cette présentation, nous aborderons les différents types d'identités machine et leurs proliférations sur votre réseau. Vous verrez le rôle et le cycle de vie des identités machine, ainsi que le niveau insuffisant de leur protection. Nous examinerons ensuite les risques actuels et les nouveaux risques qui y sont liés. Nous conclurons avec les mesures que vous pouvez prendre immédiatement pour maîtriser ces risques.

    Enregistrez-vous!

    Date: Mardi 9 Juin 2020
    Heure : 10H00 – 11H00
  • Prevent “Certificate Sudden Death”: VIA Venafi Stops Certificate-Related Outages Recorded: Jun 8 2020 45 mins
    Michael Thelander, Director of Product Marketing, Venafi
    Certificate-related outages, whether from expired or misconfigured or unknown TLS certificates, are the bane of digital transformation. Perfectly functioning applications and services can be rendered inoperable. Worse still the security controls you rely on, from traffic inspection devices to web application firewalls, can’t protect you when a certificate-related outage shuts them down.

    Venafi has helped over 360 global customers eliminate certificate-related site and service outages. The resulting approach, based on a deep understanding of people, processes and technology needed to achieve this outcome, is VIA Venafi, the Venafi Way. VIA Venafi gives our customers the Visibility, Intelligence and Automation they need to stop outages. It also provides the world’s only guarantee against certificate-related outages: the VIA Venafi No Outage Guarantee.

    In this session you will:
    • Learn about some of the most troublesome certificate-related outages that have led to site failures and breaches in recent years
    • Gain an understanding of what’s needed to ensure against outages
    • Understand Venafi’s eight-step process to stopping certificate-related outages
    • Learn about our VIA Venafi No Outage Guarantee
    • See how a platform that delivers Visibility, Intelligence and Automation can achieve this outcome in a way that is not only affordable and manageable....but achieves it in a way guarantees results

    Register today!
  • Manage Kubernetes Clusters Using GlobalSign and Venafi’s DevOpsACCELERATE Recorded: May 27 2020 24 mins
    Lila Kee, General Manager, GlobalSign; David Brancato, Technical Product Marketing Manager, Venafi
    DevOps is growing to be the most efficient way to deliver software. Your data, whether it be at rest, in motion or in use needs to be protected. Are you doing what is necessary to keep container and service mesh communications secure in zero-trust, multicloud environments? Are you using the certificates which allow for maximum security, management and automation?

    Join this webinar to learn how developers can use trusted certificates in their Kubernetes clusters. Learn the benefits of utilizing GlobalSign's PKI for DevOps and Venafi's fully managed Venafi Cloud DevOpsACCELERATE to simplify certificate life cycle needs and gain regain control and insight into certificates in use.

    Attend this webinar so you can:
    • Provide developers with access to trusted certificates from within the tools they love
    • Eliminate rate limits for certificate issuance with two-second turnaround time
    • Access Public and Private certificates that are backed by GlobalSign’s reliable infrastructure and industry-leading support for use in DevOps environments
    • Automate policy enforcement and connect trusted certificate issuers to your Kubernetes clusters with Venafi Cloud DevOpsACCELERATE
    • Automate certificate renewals for Kubernetes ingress and egress to prevent outages
  • Software Supply Chain: Code-to-Code Combat Recorded: Apr 8 2020 56 mins
    Eddie Glenn, Sr. Product Marketing Manager, Venafi
    Is your agency doing everything it can to protect its software from foreign interference? From third party software libraries to in-house developed applications to PowerShell scripts, code signing is a necessary component to securing your software infrastructure. Code signing is effective at ensuring that the code you execute comes from where it claims to come from and hasn’t been modified by a third party.

    However, hackers know this and they are stealing code-signing private keys to make their malware look legitimate. Signing code is no longer enough to protect against this threat. Agencies need to protect the code signing credentials that they utilize and ensure that they are only ever used for authorized circumstances.

    In this webcast we’ll discuss:

    - How to ensure that cybercriminals do not steal your code signing credentials
    - How code signing is an effective tool to protect against PowerShell modification
    - Homeland Security's CISA Alert AA220-006A and what precautions you should take to protect PowerShell scripts from 3rd party modification

    Register today!
  • IoT Security 101: Why a secure code signing process is critical for IoT Recorded: Mar 11 2020 50 mins
    Eddie Glenn, Venafi and James Penney, Device Authority
    As the number of Internet of Things devices and applications continues to grow in 2020, so does the need for secure code signing and update delivery.

    Connected devices are only as valuable as the operating systems and applications that they execute. The firmware, operating system and application update processes are highly sensitive and can be a prime target for attack. Hackers have used these methods and systems from Microsoft, ASUS, and others to spread malware that is completely ‘trusted’ and can avoid Next-Generation Antivirus (NGAV).

    Until recently, there have been limited solutions available that can deliver a full secure end-to-end code signing and update delivery process for IoT use cases, forcing organizations to design and build their own home-grown solutions to fulfil their requirements.

    Join this webinar to learn about:
    • Current attack surfaces / risks being exploited within IoT
    • Why code signing is exceedingly valuable for IoT
    • Methods for Next-Gen Code Signing
    • How secure update delivery can benefit your IoT use case
    • Real world examples
  • The Cost of Machine Identity Risk Recorded: Feb 13 2020 61 mins
    Dr. Eric Dallal, Sr. Scientist–Cyber, AIR, Kevin Bocek, VP of Threat Intelligence, Venafi
    The cyber risk landscape is changing rapidly, and many organizations haven’t extended basic identity and access management security controls to machine-to-machine communications, leaving gaps in their cybersecurity defenses.

    In this webinar, Eric Dallal, Senior Scientist–Cyber at AIR, and Kevin Bocek, Vice President of Threat Intelligence at Venafi, examine empirical evidence about the ways in which a weak machine identity protection plan can cost your organization.

    Join us February 13 to learn:
    - Why the security risks connected to machine identities are rising so quickly
    - Which companies are most at risk for machine identity protection losses
    - The three actions every organization can take now to protect their most sensitive data
    - Key conclusions
    - How we can quantify the cost of inaction

    Why is a strong machine identity protection program critical in today’s threat landscape? Register to learn more.

    ***ISC2 members earn 1 CPE credit by attending this webinar live***
  • Vulnerability or Compromise: How Long Would It Take You to Remediate? Recorded: Oct 24 2019 38 mins
    Mark Sanders, Sr. Solution Architect, Venafi
    In this session we will describe why certificate and key-based machine identity remediation can be such a challenge. We will discuss examples of when remediation is needed as well as current remediation efforts. We will also discuss what is needed for an effective remediation strategy with real world examples using Venafi’s platform. Finally, we'll wrap up the session with open Questions and Answers.

    Attend this webinar to:
    • Discover new ways to master fast incident response that identifies keys and certificates by machine identity attribute
    • See how automation enables you to create, install, validate, renew, rotate, revoke, replace and validate keys and certificates across your organization
    • Learn strategies for quickly replacing growing numbers of keys and certificates that may be impacted by security events

    Register today to elevate your remediation strategy!

    ***Earn 1 CPE credit when you attend this session live***
  • Do You Know How to Evaluate Machine Identity Risks and Controls? Recorded: Oct 24 2019 49 mins
    Steven Armstrong, CISSP, Consultant
    If you are not intimately aware of your machine identity universe, then you’ll never know how exposed you may be. Mitigating machine identity risk should be a key aspect of Identity and Access Management, especially for machines that communicate on a privileged level. Research demonstrates that implementing secure privileged access for machines does not receive as much budget or attention as its counterpart privileged access management for humans. In addition, the depth and breadth of control evaluation for machine identity risk tends to be lower than that for human identities.

    The session will include key risks in the machine identity space and follow with a discussion of a new audit work program for machine identity risk. The audit work program is a free tool for a comprehensive evaluation of key controls in the machine identity space.

    Attend this webinar to:
    • Identify the influences of machine identity risk
    • Understand the 3 lines of defense in effective risk management and control
    • Learn the details of the Audit Work Program

    Learn more about the new audit work program. Register now!

    ***Earn 1 CPE credit when you attend this session live***
  • Minimize Human Error: Automate Machine Identities with F5 BIG-IQ and Venafi Recorded: Oct 24 2019 27 mins
    Kyle Oliver, F5 Networks | Paul Cleary, Venafi | Bridget Hildebrand, Venafi
    Connected machines on enterprise networks are becoming more complex and growing in number. And inefficient manual approaches of securing all these devices with keys and certificates can lead to failures, outages and breaches—introducing more risk and a higher chance of costly disruptions that stem from administrative bottlenecks and human error.

    In this webinar, we’ll look at how enterprises can protect themselves against costly certificate-related outages while streamlining their F5 operations with F5 BIG-IQ Centralized Management and Venafi. We’ll cover:

    • How F5 BIG-IQ simplifies oversight of complex BIG-IP environments by injecting automation into discovery, tracking, management, and monitoring of physical and virtual BIG-IP devices
    • How integrating the Venafi Platform into BIG-IQ enables you to simplify, streamline, and improve life cycle management of certificates and keys across BIG-IP devices
    • How the VIA Venafi No Outage Guarantee is a fundamentally different approach that can completely prevent certificate-related outages

    If you have the Venafi Platform and an F5 BIG-IP estate today, or if you’re considering investing in these solutions, this webinar will help you understand how to optimize your investment and make it easier to protect machine identities enterprise-wide.

    Register today.

    ***Earn 1 CPE credit when you attend this session live***
  • Vision 2024: Will You Be Ready for the Future of Machine Identities? Recorded: Oct 24 2019 32 mins
    Kevin Bocek, VP, Ecosystem & Threat Intelligence
    How can you prepare for machines playing a greater role in the digital economy, machine-to-machine communications increasing in complexity and attackers becoming even more aggressive? The use of machine identities is exploding. Learn what the world may look like 5 years from now in the aftermath of 4 forces of change: digital transformation, threatscape, innovation, and the evolving role of machine identities. With a clearer view of the future you can already begin to make better planning decisions.

    Attend this webinar to:
    • Learn strategies for controlling the impeding complexity of machine identities
    • Understand future machine identity attacks targeting your organization
    • Identify how your keys and certificates may be left unprotected
    • Predict whether you’re prepared to defend against future machine identity attacks

    A not-to-be-missed session. Register now!

    ***Earn 1 CPE credit when you attend this session live***
  • Understanding and Leveraging NIST Standards for Certificates Recorded: Oct 23 2019 58 mins
    Paul Turner, Managing Director, Epuio
    NIST 800-57, 800-53, 1800-16… huh? If you've wondered how to leverage NIST's recommendations to improve security and compliance for certificates across your enterprise, this is the session for you.

    You’ll get a brief overview of NIST recommendations for keys and certificates and then a deep dive into the new NIST 1800-16B: Guidance for Enterprise TLS Server Certificate Management.

    Attend this webinar to:
    • Understand certificate risks and challenges
    • Map risks to recommended requirements
    • Learn how to define your own policy requirements
    • See how to effectively establish roles and responsibilities

    In this webinar, you’ll discover how to bring this all together for effective certificate management and security for your organization. Register today!

    ***Earn 1 CPE credit when you attend this session live***
Intelligent Protection for Machine Identities
There are two actors on a network: people and machines. People rely on usernames and passwords to identify themselves and gain access to machines, applications and devices. Machines use digital keys and certificates to authenticate for secure machine-to-machine communication. While organizations spend billions of dollars each year on identity and access management and protecting usernames and passwords, very little is spent on protecting machine identities, which is essential to securing critical systems and data. The Venafi Platform delivers the machine identity intelligence and automation necessary to automatically safeguard the flow of information to trusted machines and prevent communication with untrusted ones—all at machine speed and scale. Venafi protects the largest, most sensitive networks in the world, and our more than 280 customers include 4 of the Top 5 US Banks, 4 of the Top 5 UK Banks, 5 of the Top 5 US Health Insurers and 4 of the Top 5 US Retailers. Venafi solutions help organizations:
- Prevent breaches
- Eliminate outages
- Orchestrate PKI
- Protect SSH access
- Pass compliance audits
- Automate DevOps

Visit www.venafi.com

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Vision 2024: Will You Be Ready for the Future of Machine Identities?
  • Live at: Oct 24 2019 4:00 pm
  • Presented by: Kevin Bocek, VP, Ecosystem & Threat Intelligence
  • From:
Your email has been sent.
or close