Hi [[ session.user.profile.firstName ]]

Build to Survive

A new era of automation, innovation, and speed has dawned. You now have the power to make developers and operations teams more successful than ever. Find out how the machines and machine types developers are using are forming an ecosystem that you can shape and use to protect your organization.
Recorded Jul 8 2021 39 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Kevin Bocek, VP, Security Strategy & Threat Intelligence, Venafi
Presentation preview: Build to Survive

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Exploring Machine Identities with Venafi and SSS – IT Security Specialists Nov 29 2021 9:00 pm UTC 60 mins
    Paul Platen, SSS IT Security Specialists & Jean-Yves Provost, Venafi
    Today, the number of machines far exceeds the number of humans, these machines are highly capable, which automate many of the same tasks humans do. As machines are radically improving the quality of our lives, our vision is a world in which machines are trusted and secured against attacks, and our data is protected.

    Join SSS – IT Security Specialists and Venafi as we explore machine identities, crypto agility and how to adapt our practices to align security and convenience.
  • Eliminating outages with Venafi & Citrix ADM service (SaaS) Oct 20 2021 3:00 pm UTC 45 mins
    Paul Cleary, Ecosystem Architect, Venafi Sanyukta Nadkarni, Citrix ADM Product Management, Citrix
    Manage the complete certificate lifecycle

    SSL certificates – also known as machine identities -- are an integral part of application security. Many enterprises still struggle with the overwhelming & time-consuming task of managing them across all of their ADC instances. Expired certificates can make content inaccessible, damaging brand reputation leading to revenue loss. Citrix Application Delivery Management (ADM) service and Venafi have come together to offer an integrated solution to solve this challenge.

    Join us and learn how:

    - Citrix ADM service streamlines the typically arduous process of installing and managing SSL certificates
    - The new Citrix and Venafi integration enables auto renewal and auto deployment of SSL, which admins can manage for their applications independently, without having dependency on network admins
    - You can try the Citrix ADM service with Venafi out for yourself in your lab today
  • What's New in the Venafi Platform 21.3 Release Oct 19 2021 3:00 pm UTC 60 mins
    Diane Garey, Product Marketing Manager, Venafi
    Protecting against next-gen attacks to machine identities requires solutions that are robust and hardened. In this webinar, we'll highlight several new capabilities in the Venafi Platform 21.3 release that will help you prevent misuse and compromise, including:

    - New ability in SSH Protect to issue SSH certificates
    - A new Master Auditor role that has universal read-only permission to the Venafi Platform
    - Updated private key defaults in TLS Protect to ensure strong encryption and security of private key material

    We'll also take a tour of Cool Solutions, Venafi's GitLab repository for source code that’s available to current customers and ecosystem partners. Learn how to find and start using solutions that will help you and your organization more effectively manage machine identities. Join the Q&A too.

    Venafi Presenters:
    Angela Morris, Sr. Product Manager
    Aaron Hixson, Sr. Product Manager
    Justin Hansen, Director of Customer Experience
    Kevin Jacque, Global Architect
    Diane Garey, PMM
  • Rise of Machines: Protecting your Machine Identities Recorded: Oct 6 2021 64 mins
    Kevin Bocek, Vice President, Security Strategy & Threat Intelligence, Venafi
    The number of machines of all types – from Kubernetes, to cloud, to IoT – is on the rise. Every machine requires an identity – SSL/TLS, SSH, and code signing keys and certificates – that control encryption, authentication, and code execution. Too often these powerful security controls are left unprotected. Compromise, misuse, and fraud of machine identities are already prime attack vectors for hackers targeting supply chain weaknesses. And errors create debilitating outages and millions in lost business. For all these reasons and more, Gartner has named Machine Identity Management a top trend for 2021.

    Attend this session to learn:

    · The top machine identity attacks targeting your organisation and software supply chain
    · How SSL/TLS, SSH, and code signing keys and certificates are left unprotected
    · How machine identities fail and cost millions in outages
    · Why most organisations are not prepared to use machine identities at speed
    · Three things your organisation can do today to stay #fastsecure with Machine Identity Management

    Presenter: Kevin Bocek, Vice President, Security Strategy & Threat Intelligence, Venafi
    Moderator: Paolo Miranda, CISSP, Volunteer Outreach Director, (ISC)² Singapore Chapter
  • Enabling the Secure Digital Cloud Native Enterprise Recorded: Sep 15 2021 31 mins
    Matt Bates, CTO, Jetstack
    In the five short years since Google made it open source and the cloud native ecosystem Kubernetes has reshaped modern application development and as a result, is thriving. Containers, declarative infrastructure and programmable networks, once the secret sauce of FAANG, are now becoming the norm. But how do enterprises tame this fast-moving technology? How can we empower developers with consistent, reliable, highly automated platforms and guardrails so they can move fast and be efficient while ensuring enterprise security? Join us to learn about the key tenets of Kubernetes and cloud native that are enabling enterprises to build modern platforms fit for the future and provide examples of solutions that help enterprises leverage automation with built-in security controls.
  • Unbeatable Automated SSH Security Recorded: Sep 9 2021 26 mins
    Brian Carpenter, Director of Business Development, CyberArk, Atanas Chuchev, Technical Product Manager, SSH Protect, Venafi
    Improve governance and reduce risk with easy, robust SSH key management. The integration of Venafi SSH Protect and CyberArk PAM gives system administrators higher levels of automation, provides InfoSec teams with better visibility and results in fast, successful audits for GRC teams. Watch this webinar to learn how the combined power of Venafi and CyberArk can completely change the way you secure the entire lifecycle of SSH keys.
  • Eliminate Outages Forever Recorded: Aug 23 2021 15 mins
    Joseph Patrick, Professional Services Engagement Manager, Venafi
    Based on the experiences of hundreds of organizations, Venafi has developed a proven approach to completely eliminate outages caused by expired, misconfigured or unknown TLS certificates, and this approach can work for your organization (no, really!). View this webinar to uncover the steps you should take today to reduce the pain of certificate outages and understand what you need to do to eliminate them completely in your organization. We’ll also discuss the most common challenges organizations face and how to overcome them.
  • Rise of Machines: Protecting your Machine Identities Recorded: Aug 17 2021 61 mins
    Kevin Bocek, VP, Security Strategy & Threat Intelligence, Venafi; Brandon Dunlap, Moderator
    The number of machines of all types – from Kubernetes, to cloud, to IoT – is on the rise. Every machine requires an identity – SSL/TLS, SSH, and code signing keys and certificates – that control encryption, authentication, and code execution. Too often these powerful security controls are left unprotected. Compromise, misuse, and fraud of machine identities are already prime attack vectors for hackers targeting supply chain weaknesses. And errors create debilitating outages and millions in lost business. For all these reasons and more, Gartner has named Machine Identity Management a top trend for 2021. Join Venafi and (ISC)2 on August 17, 2021 at 1:00 p.m. BST for an examination of how machine identities are the new perimeter.

    Attend this session to learn:

    · The top machine identity attacks targeting your organisation and software supply chain

    · How SSL/TLS, SSH, and code signing keys and certificates are left unprotected

    · How machine identities fail and cost millions in outages

    · Why most organisations are not prepared to use machine identities at speed

    · Three things your organisation can do today to stay #fastsecure with Machine Identity Management
  • Kuba-What? Conversational Approaches for Working with DevOps Teams Recorded: Aug 10 2021 21 mins
    Sitaram Iyer, Global Principal Architect, Venafi
    Do you feel lost when talking to your DevOps and AppDev teams? Or do they leave you out of the security conversation altogether because they view you as the stodgy, old-school InfoSec guy? In this webinar, we’ll explain how DevOps and open source technologies like Kubernetes, Ansible and HashiCorp Terraform relate to machine identities. Then we’ll show you novel ways of providing machine identity management-as-a-service to DevOps and AppDev teams without giving up control of the definition, implementation and measurement of security and policy controls.
  • InfoSec Empowering Developers Through the Five Ideals Recorded: Aug 6 2021 45 mins
    Gene Kim, Author, Researcher, Speaker, Director, DevOps Enthusiast
    How do machine identities fit into the changing world of DevOps? Watch this webinar with Gene Kim, best-selling author of The Phoenix Project and The Unicorn Project, to learn why the business value of DevOps is bigger than you think, why successful DevOps projects are more secure and the five key principles that make developers happy and successful.
  • Becoming a Machine Identity Threats Pro Recorded: Aug 6 2021 22 mins
    Yana Blachman, Threat Intelligence Researcher, Venafi
    Everyone knows that machine identity threats are on the rise and that machine identities are frequently part of adversaries’ arsenals in today’s attacks. But just knowing this doesn’t help you learn about the specifics of how APT41 or FIN7 use machine identities. If you had information about machine identity attacks, would your team know how to leverage this knowledge in your security operation? Watch this webinar to get a deep dive into Venafi’s new Machine Identity Threat Model and learn how you can put that information into action to keep your organization safer. Built on the MITRE ATT&CK framework, the Machine Identity Threat Model documents and maps attackers’ tactics, techniques and procedures (TTPs). Find out how to use this fantastic public machine identity threat resource to build a threat-informed defense based on actionable intelligence.
  • What's New with Venafi TLS Protect – 21.1 and 21.2 Releases Recorded: Jul 14 2021 58 mins
    Aaron Hixson, Sr Prod. Mgr., Hristo Todorov, Prod. Mgr, Jason Brothers, Core Architect, Diane Garey, Prod. Mkt. Mgr, Venafi
    In this webinar, we’ll highlight new capabilities in the Venafi Platform and TLS Protect 21.1 and 21.2 releases, starting with new Adaptable Credentials for the Venafi Platform that let you easily use Venafi with any enterprise solution to store and manage all the passwords/secrets you maintain for the many systems and devices that need privileged access.

    We’ll also cover other new capabilities, including:

    Amazon Private CA and Google CA Service integrations

    Inline placement of keys and certificates during discovery

    ACME v2 support

    Finally, we’ll spend time looking at some changes in the Venafi Platform UI. In the 21.2 release, instead of navigating between Aperture and Web Admin consoles to access capabilities, you’ll navigate between TLS Protect and the other products in the platform. We’ll highlight what’s different, so you’ll have a seamless experience when you upgrade to 21.2.

    As usual, we’ll leave time at the end for Questions & Answers. Register now!
  • Build to Survive Recorded: Jul 8 2021 39 mins
    Kevin Bocek, VP, Security Strategy & Threat Intelligence, Venafi
    A new era of automation, innovation, and speed has dawned. You now have the power to make developers and operations teams more successful than ever. Find out how the machines and machine types developers are using are forming an ecosystem that you can shape and use to protect your organization.
  • 5 Cloud Catastrophes Recorded: Mar 18 2021 48 mins
    Michael Thelander, Director of Product Marketing, Venafi and Dave Brancato, Sr. Tech Mkt.Engineer, Venafi
    “Cloud migration” is no longer a question of IF or even WHEN. It’s a question of HOW FAST? Flexera’s annual State of the Cloud report shows us an ever-increasing migration velocity:
    • More than 50 percent of enterprise workloads are already in public clouds
    • 93 percent of enterprises have a multi-cloud strategy
    • Organizations use on average of 2.2 public and 2.2 private clouds
    Whether the reason is cost savings, flexibility, disaster response or to support a now fully perimeter-less world, we are all racing to the cloud. But what does this mean for the machine identities – especially TLS certificates and encryption keys – that are securing our digital transformation? What risks do we need to watch? How do we avoid some of the bad or unintended decisions that can cripple us?
    This webinar will help security architects, cloud architects and PKI teams secure and protect machine identities in even the fastest-moving environments. Join us to understand new risks and how to mitigate them and discover a “machine identities in the cloud” blueprint that helps you plan for a future that’s already here.
  • Secured Code Signing at the Speed of DevOps Recorded: Mar 11 2021 23 mins
    Eddie Glenn, Sr. Product Marketing Manager, Venafi, Cojan van Ballegooijen, Senior Solutions Architect, CloudBees
    Join CloudBees and Venafi as we explain how to integrate and automate a secure code signing process into your DevOps pipelines using Jenkins and Venafi CodeSign Protect. Even though your teams may code sign your applications today, are you doing enough to protect your code signing certificates and private keys? In many cases, development teams may store code signing credentials on unsecured build servers or allow access by anyone on the development team.

    Recent cybercriminal events, such as those at SolarWinds, Asus, Avast, and Garmin demonstrate that hackers are after code signing credentials to use to make their malware look like legitimate software. We’ll discuss best practices for securing your code signing process without slowing down your build pipelines and will also demonstrate how Venafi CodeSign Protect can be easily integrated into Jenkins.
  • Protecting your IoT software delivery against malware insertion Recorded: Feb 23 2021 28 mins
    Eddie Glenn, Venafi
    In December 2020, it was reported that a software supply chain cyber-attack occurred against SolarWinds which caused infections in numerous businesses and government agencies. While complex in nature, this involved vulnerabilities in the build cycle at SolarWinds.

    For an IoT manufacturer, securing your software supply chain and your build process is as critical as is securely delivering updates to your IoT devices. In this session, we’ll cover:

    • A review of how SUNBURST was introduced into the software supply chain
    • Steps that can be taken by software developers to minimize this from happening to you
    • How digitally signing source code and other intermediate artifacts during your software build process can minimize these risks
    • The benefits of securing a code signing process for your company
  • Digital Identities: Protected or Imperiled? Recorded: Feb 22 2021 40 mins
    Diane Garey, Prod. Mkt. Mgr, Venafi
    The digital identities used by machines – particularly the TLS certificates in use throughout your organization – are meant to authenticate machine-to-machine communications and then protect them through consistent, trusted encryption. When they fail, customers experience outages and security controls, like traffic inspection devices, stop protecting you.
    But do you know enough about those certificates to know the protection is real? 95% of Global 5000 organizations lack visibility and intelligence about their certificates: How many are in use, and what types are they?
    Which CAs issued them and who owns them internally? Without this visibility and intelligence, it’s impossible to then automate the certificate lifecycle tasks that prevent outages, stop breaches, and lose revenue.

    In this session, we’ll look at:
    • Why machine identity protection is needed – and it’s for much more than encryption alone
    • The most common – and the most overlooked – reasons why getting visibility into certificates is so difficult
    • How to assess the machine identity landscape in your own organization: are you protected or imperiled?
  • Round Table: Lessons Learned from SolarWinds & SUNBURST Recorded: Feb 17 2021 48 mins
    Ken Westin, Dir. Technical Mkt, ReliaQuest, Yana Blachman, Threat Int. Analyst & Tony Hadfield, Dir. Soln. Architects, Venafi
    Every company is now a “software” company, so the attack on SolarWinds not only marks a new generation of software supply chain attacks but demonstrates an industry-wide vulnerability. This attack was different in the level of sophistication, stealth and patience from earlier similar attacks. As a result, over 18,000 SolarWinds customers were infected with SUNBURST malware, including multiple US federal agencies. Shortly after, Mimecast was found to have been breached by the same attack.Digitally signing software (code signing) is the critical component in building and delivering software that can be trusted by end users. Yes, SolarWinds was signing their software.

    But what went so wrong?

    Our panel of experts will explore what happened, the approach the attackers took, and how you need to change your thinking (and your tactics) to avoid the same fate. Register today!
Intelligent Protection for Machine Identities
There are two actors on a network: people and machines. People rely on usernames and passwords to identify themselves and gain access to machines, applications and devices. Machines use digital keys and certificates to authenticate for secure machine-to-machine communication. While organizations spend billions of dollars each year on identity and access management and protecting usernames and passwords, very little is spent on protecting machine identities, which is essential to securing critical systems and data. The Venafi Platform delivers the machine identity intelligence and automation necessary to automatically safeguard the flow of information to trusted machines and prevent communication with untrusted ones—all at machine speed and scale. Venafi protects the largest, most sensitive networks in the world, and our more than 280 customers include 4 of the Top 5 US Banks, 4 of the Top 5 UK Banks, 5 of the Top 5 US Health Insurers and 4 of the Top 5 US Retailers. Venafi solutions help organizations:
- Prevent breaches
- Eliminate outages
- Orchestrate PKI
- Protect SSH access
- Pass compliance audits
- Automate DevOps

Visit www.venafi.com

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Build to Survive
  • Live at: Jul 8 2021 7:58 pm
  • Presented by: Kevin Bocek, VP, Security Strategy & Threat Intelligence, Venafi
  • From:
Your email has been sent.
or close