Managing secrets sprawl – 3 reasons why you need a root of trust

Logo
Presented by

John Boero, Sr. Solutions Engineer, HashiCorp and Juan C. Asenjo, Ph.D., CISSP, nCipher Security

About this talk

As organizations migrate to the cloud to manage workloads in a more flexible and cost-effective manner, the number of passwords, PINs, keys, tokens, and other secrets used to access application platforms and data is increasing exponentially. Maintaining centralized repositories of secrets enables organizations to apply consistent protection policies that strengthen security and facilitate auditing and compliance. This webcast will look at the growing challenge faced when deploying centralized secrets management tools and how to mitigate risks associated with aggregation of sensitive assets. Our speakers will examine how cloud migration, DevOps, and regulatory compliance require a root of trust, and will describe best practices for deploying these solutions. Join the webcast and learn: • What challenges secrets sprawl represents for organizations • How centralized key management ensures consistent policy • Why cloud, DevOps, and regulations require a focus approach • Where is a root of trust required for high assurance security This webinar is for you if you are responsible for: 1. Managing digital transformation and cloud migration 2. Overseeing security best practices in your organization 3. Auditing and ensuring your organizational compliance
Related topics:

More from this channel

Upcoming talks (3)
On-demand talks (426)
Subscribers (38241)
Entrust keeps the world moving safely by enabling trusted identities, payments and data protection around the globe. Today more than ever, people demand seamless, secure experiences, whether they’re crossing borders, making a purchase, or accessing corporate networks. With our unmatched breadth of digital security and credential issuance solutions, it’s no wonder the world’s most entrusted organizations trust us.