Do You Know How to Evaluate Machine Identity Risks and Controls?

Logo
Presented by

Steven Armstrong, CISSP, Consultant

About this talk

If you are not intimately aware of your machine identity universe, then you’ll never know how exposed you may be. Mitigating machine identity risk should be a key aspect of Identity and Access Management, especially for machines that communicate on a privileged level. Research demonstrates that implementing secure privileged access for machines does not receive as much budget or attention as its counterpart privileged access management for humans. In addition, the depth and breadth of control evaluation for machine identity risk tends to be lower than that for human identities. The session will include key risks in the machine identity space and follow with a discussion of a new audit work program for machine identity risk. The audit work program is a free tool for a comprehensive evaluation of key controls in the machine identity space. Attend this webinar to: • Identify the influences of machine identity risk • Understand the 3 lines of defense in effective risk management and control • Learn the details of the Audit Work Program Learn more about the new audit work program. Register now! ***Earn 1 CPE credit when you attend this session live***

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (111)
Subscribers (9908)
There are two actors on a network: people and machines. People rely on usernames and passwords to identify themselves and gain access to machines, applications and devices. Machines use digital keys and certificates to authenticate for secure machine-to-machine communication. While organizations spend billions of dollars each year on identity and access management and protecting usernames and passwords, very little is spent on protecting machine identities, which is essential to securing critical systems and data. The Venafi Platform delivers the machine identity intelligence and automation necessary to automatically safeguard the flow of information to trusted machines and prevent communication with untrusted ones—all at machine speed and scale. Venafi protects the largest, most sensitive networks in the world, and our more than 280 customers include 4 of the Top 5 US Banks, 4 of the Top 5 UK Banks, 5 of the Top 5 US Health Insurers and 4 of the Top 5 US Retailers. Venafi solutions help organizations: - Prevent breaches - Eliminate outages - Orchestrate PKI - Protect SSH access - Pass compliance audits - Automate DevOps Visit www.venafi.com