Are your company’s code signing processes secure?

Presented by

Eddie Glenn, Sr. Product Marketing Manager & Tony Hadfield, Solution Architect, Venafi

About this talk

Could your organisation be at risk for code signing compromise? Recently, there’s been a lot of media coverage focused on the cyber attacks that exploit unprotected code signing credentials. Although code signing technology does a good job of ensuring code is trustworthy for end users to install and run, many companies don’t secure the processes that surround code signing. This lack of oversight can leave your company, and your customers, at risk. How much do you really know about your organizations’ code signing practices and policies? Many InfoSec professionals aren’t sure which practices and policies are actually being used, so there’s no way to measure or mitigate all of the risks connected with code signing. Or, maybe you and your organization understands code signing risks all too well but your processes are so cumbersome that your development teams either miss their release dates or bypass key parts of the processes to get their work done. No matter which kind of organization you work for, this webinar can help you: • Understand the specific risks associated with insecure code signing processes and how they affect your security posture and leave your customers at risk. • Know why scaling secure code signing processes can be challenging and understand what you need to deliver processes that are flexible and secure enough to meet the unique needs of your organisation. • Learn 5 best practices so you can deliver frictionless code signing processes your development teams will be happy to adopt. Register today and find out how Venafi Next-Gen Code Signing can help you move your code signing processes to the next level without slowing down your development teams.

Related topics:

About this channel

Venafi - Machine Identity Management
Upcoming talks (2)
On-demand talks (101)
Subscribers (8761)
There are two actors on a network: people and machines. People rely on usernames and passwords to identify themselves and gain access to machines, applications and devices. Machines use digital keys and certificates to authenticate for secure machine-to-machine communication. While organizations spend billions of dollars each year on identity and access management and protecting usernames and passwords, very little is spent on protecting machine identities, which is essential to securing critical systems and data. The Venafi Platform delivers the machine identity intelligence and automation necessary to automatically safeguard the flow of information to trusted machines and prevent communication with untrusted ones—all at machine speed and scale. Venafi protects the largest, most sensitive networks in the world, and our more than 280 customers include 4 of the Top 5 US Banks, 4 of the Top 5 UK Banks, 5 of the Top 5 US Health Insurers and 4 of the Top 5 US Retailers. Venafi solutions help organizations: - Prevent breaches - Eliminate outages - Orchestrate PKI - Protect SSH access - Pass compliance audits - Automate DevOps Visit www.venafi.com