Cheetahs, Covid-19, and Crypto Agility

Presented by

Michael Thelander, Director of Product Marketing, Venafi

About this talk

Cheetahs have hovered on the brink of extinction for centuries. Covid-19 has recently decimated populations and economies alike. Intriguingly, both of these situations give us insight into the critical importance of “crypto agility” in modern network architectures. Crypto agility is the ability to quickly replace encryption certificates and keys in response to security events, such as certificate authority (CA) compromises, vulnerable algorithms, or cryptographic library bugs, without impacting the applications and services these systems support. Today, organisations rely heavily on TLS and it’s underlying cryptographic protocols to protect data, inside and outside their networks. Digital transformation is instantaneously multiplying the number of these connections. To ensure the security of encryption is maintained, businesses must know where their encryption certificates and keys are located and be able to quickly and securely replace them. Yet, most don’t even have a central inventory of these critical security assets. This session starts with an overview of the threats and risks that make crypto agility a requirement for all organisations, with real-world examples of exploits. The session will then provide a vendor-neutral actionable plan for achieving crypto-agility, with specific criteria that can be used to evaluate the cryptographic maturity of an organisation. Join this webinar to learn: 1. Understand the threats facing machine identities of all types, but particularly TLS Certificates, and how “cryptographic agility” is foundational in creating a defense strategy 2. See examples of where cryptographic or CA-related failures have led to machine identity compromise and then to breaches 3. Learn the three fundamental foundations of crypto agility -- visibility, intelligence, and automation – and how these can be delivered and sustained through free tools, online services, and enterprise platforms Register Today!

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (110)
Subscribers (9732)
There are two actors on a network: people and machines. People rely on usernames and passwords to identify themselves and gain access to machines, applications and devices. Machines use digital keys and certificates to authenticate for secure machine-to-machine communication. While organizations spend billions of dollars each year on identity and access management and protecting usernames and passwords, very little is spent on protecting machine identities, which is essential to securing critical systems and data. The Venafi Platform delivers the machine identity intelligence and automation necessary to automatically safeguard the flow of information to trusted machines and prevent communication with untrusted ones—all at machine speed and scale. Venafi protects the largest, most sensitive networks in the world, and our more than 280 customers include 4 of the Top 5 US Banks, 4 of the Top 5 UK Banks, 5 of the Top 5 US Health Insurers and 4 of the Top 5 US Retailers. Venafi solutions help organizations: - Prevent breaches - Eliminate outages - Orchestrate PKI - Protect SSH access - Pass compliance audits - Automate DevOps Visit www.venafi.com