As quantum computing continues to progress, the world's widespread cryptographic schemes are in danger. To prepare for the cryptographic "Quantum Apocalypse" we will need to replace our RSA- and ECC-based schemes with a new set of ciphers.
RecordedJul 16 202020 mins
Your place is confirmed, we'll send you email reminders
Tim Callan, Chief Compliance Officer at Sectigo & Jason Soroko, CTO of PKI at Sectigo
As 2020 has clearly shown, identity is the new perimeter. But how can you best protect the identities of your people, devices and data, beyond your firewall? The time has come for security professionals to rethink how they determine access to data and network infrastructure. Digital identities need to be strong so that they cannot be stolen, and they need to be future-proof so that the enterprise can stay ahead of threats. In this webinar, we will explain why the best remedy is to replace passwords with authentication based on Public Key Infrastructure (PKI).
Tim Callan, Chief Compliance Officer at Sectigo & Jason Soroko, CTO of PKI at Sectigo
When you're implementing or modifying PKI across your infrastructure, there are many ways it can go wrong. We've outlined 21 of the most common PKI mistakes and how to avoid them. But don't freak out; we've categorized them into five themes, all of which we will cover in this 45-minute webinar.
Join Sectigo Chief Compliance Officer Tim Callan and CTO of PKI Jason Soroko as they discuss in detail these common PKI pitfalls to avoid:
• Certificate problems
• Deployment problems
• Systemic security problems
• Governance problems
• Visibility problems
Tim Callan, Senior Fellow at Sectigo & Jason Soroko, CTO of PKI at Sectigo
S/MIME certificates indicate the authentic identity of the sender and enable encryption for message content and attachments - providing strong defenses against a variety of email-based attacks. Nonetheless, adoption today is extremely small.
In this session, find out:
- What the challenges to past adoption have been for this underutilized security
technology
- What the industry is doing to help enterprises secure their email today
Tim Callan, Senior Fellow at Sectigo & Jason Soroko, CTO of PKI at Sectigo
The promise of a "free" Microsoft CA was alluring to enterprises in the 2000s, but today's increasingly open computing architectures and agile development methodology have outgrown your old fashioned Microsoft CA.
Learn about the seven common use cases where your traditional CA no longer does the job.
Tim Callan, Senior Fellow at Sectigo & Jason Soroko, CTO of PKI at Sectigo
The pending cryptographic Quantum Apocalypse requires that we replace the hashing and encryption algorithms used through the internet, enterprise networks, mobile service, and popular devices.
Join our experts to learn more about the requirements for quantum-resistant algorithms to survive the Quantum Apocalypse.
Tim Callan, Senior Fellow at Sectigo & Jason Soroko, CTO of PKI at Sectigo
As quantum computing continues to progress, the world's widespread cryptographic schemes are in danger. To prepare for the cryptographic "Quantum Apocalypse" we will need to replace our RSA- and ECC-based schemes with a new set of ciphers.
Tim Callan, Senior Fellow at Sectigo & Jason Soroko, CTO of PKI at Sectigo
Earlier this year enterprises sent employees to work from home as a sudden, urgent need. This move to near-universal working from home introduced challenges to security and continued employee productivity, and it also introduced opportunities to improve efficiency, security, and control. To understand these impacts, Sectigo recently commissioned a third-party survey of more than 500 IT security professionals. Join Sectigo Senior Fellow Tim Callan and CTO of PKI Jason Soroko as they detail the findings of this groundbreaking research.
Tim Callan, Senior Fellow at Sectigo & Jason Soroko, CTO of PKI at Sectigo
Today more than ever, IT departments need to understand how digital identities fit into their secure, geographically dispersed architecture. With the workforce moving to remote positions, businesses must concentrate on maximizing productivity through VPN, Wi-Fi, and Desktop-as-a-Service access while maintaining a high level of security for remote access. Join our hosts CTO of PKI Jason Soroko and Senior Fellow Tim Callan as they discuss the effects of the current pandemic on IT operations and the key role PKI plays in securing this new environment.
Tim Callan, Senior Fellow at Sectigo & Jason Soroko, CTO of PKI at Sectigo
In the modern Enterprise, there is a constant need for employees to access networks, applications and data. Usernames and passwords are commonplace for a wide range of use cases, from Wi-Fi & VPN access to OS & App authentication, but they are difficult to manage and can easily be compromised. Employees bringing their own devices to work further increases the burden on IT teams. Identities have truly become the new security perimeter for Enterprises, and IT departments must find new ways to efficiently secure a plethora of networks and applications. As PKI becomes more and more ubiquitous in the Enterprise today, client certificates can go a long way to secure identities and access. Listen to this webinar to learn more about PKI in the context of IAM, and how a single-pane-of-glass approach can help you be more secure and more efficient.
Tim Callan, Senior Fellow & Jason Soroko, CTO of IoT at Sectigo
DevOps as a software development and deployment methodology has radically transformed enterprise computing. This approach brings with it new architectures and tools such as containerization, Kubernetes, and multi-cloud.
In this webinar, you will learn how PKI plays a critical role in DevOps environments and how enterprises can best use certificates to keep their platforms safe.
Tim Callan, Senior Fellow & Jason Soroko, CTO of IoT at Sectigo
Quantum computers are coming, and they will render the digital world’s cryptographic underpinnings insecure. It is not a matter of if but only when.
Though the exact timing of the Quantum Apocalypse cannot be known, new cryptographic alternatives must be found and deployed as soon as possible. In this context, no one knows what to expect, but there’s at least one certainty, crypto-agility will be a key requirement for organisations willing to safeguard private and public trust when new cryptographic models become available.
One of the best ways to achieve crypto-agility is through automation, and Sectigo offers plenty of options. Join this webinar to learn how to automate all aspects of digital certificate lifecycles, from discovery to deployment and management.
Chris Morales (Vectra) | Jason Soroko (Sectigo) | Todd Weber (Optiv) | Rudolph Araujo (Awake Security)
As the Internet of Things continues to grow, so do the security and privacy risks and vulnerabilities associated with IoT devices on enterprise networks. Organizations worldwide are looking to assess and manage their risk, implement basic cyber hygiene, and improve their security posture. Discover the best strategies for achieving security at every level, including IoT.
Join this interactive panel with industry experts to learn more about:
- Impact of IoT on enterprise security
- How to assess the IoT risk
- Most common IoT vulnerabilities and how to address them
- Recommendations for improving IoT security
Speakers:
- Chris Morales, Head of Security Analytics, Vectra (Moderator)
- Jason Soroko, CTO of IoT, Sectigo
- Todd Weber, Chief Technology Officer, Optiv
- Rudolph Araujo, VP Marketing, Awake Security
Jason Soroko, CTO of IoT, Sectigo & Diana Kelley, Cybersecurity CTO, Microsoft
Today's digitally connected businesses require multi-layer defense against rising and more sophisticated web-based threats across websites, devices, infrastructure, and cloud.
Join this interactive 1-2-1 discussion where IoT security expert, Jason Soroko, will share how to deal with IoT security challenges.
Join us, live from Las Vegas as we learn about:
- How identity plays a role in IoT security
- The role of trust models to enable third party device interoperability
- If three is a way to secure a digital identity for devices that do not have a hardware
secure element such as a TPM
- The latest IoT device security legislations
- Determining if IoT connected devices in your operations infrastructure are secure
Wallace Sann, Forescout | Nigel Stanley, TÜV Rheinland Group | Andrew Hollister, LogRhythm | Jason Soroko, Sectigo
The ever-growing Internet of Things continues to pose security and privacy threats. How are businesses managing the risks associated with IoT devices on their networks? What are the best strategies for achieving basic security and cyber hygiene?
Join this interactive panel with IoT and security experts to learn more about:
- Impact of IoT on enterprise security
- How to assess the IoT risk
- Most common IoT vulnerabilities and how to address them
- Recommendations for improving IoT security
Panellists
Jason Soroko, CTO of IoT, Sectigo
Andrew Hollister, Chief Architect & Product Manager, LogRhythm
Wallace Sann, VP Global Systems Engineering, Forescout Technologies
Nigel Stanley, CTO - Global OT & Industrial Cyber Security CoE, TÜV Rheinland Group
Moderated by Yotam Gutman, Founder & Community Manager, Cybersecurity Marketing Community
Jason Soroko, Sectigo | Yotam Gutman, Cybersecurity Marketing Community
Today's digitally connected businesses require multi-layer defence against rising and more sophisticated web-based threats across websites, devices, infrastructure, and cloud.
Join this interactive 1-2-1 discussion where IoT security expert, Jason Soroko, will share how to deal with IoT security challenges.
- How to determine if IoT connected devices in your operations infrastructure are secure
- What is the difference between symmetric tokens, PKI based certificates and device identities?
- What is the role of trust models to enable third-party device interoperability?
- What are some methods to provision a device with a x509 certificate?
- How to secure a digital identity for devices that do not have a hardware secure element such as a TPM?
Moderated by Yotam Gutman, Founder & Community Manager, Cybersecurity Marketing Community
Tim Callan, Senior Fellow & Jason Soroko, CTO of IoT at Sectigo
When you hear “Private PKI,” you probably immediately think about securing intranet sites and outsourcing Microsoft CA. These are indeed very common use cases.
But with enterprises facing increasingly complex IT environments, and an ever-growing number of interconnected devices, the need for encryption has become greater than ever before.
Did you know that Private PKI allows you to secure and manage devices and applications as diverse as:
• Web servers
• Mobile devices
• IoT devices
• DevOps
• Cloud/Multi-Cloud applications
Join our industry experts Tim Callan and Jason Soroko and discover how Sectigo Private CA allows you to secure and automate the management of your internal devices and applications (regardless of which internal protocols you have in place), and save you costs, time and resources in the long run.
We are the world's largest commercial SSL Certificate Authority. Our webinars are specially designed to help you protect your online business, connected devices, applications, and digital identities.
Root Causes Episode 05: Cryptographic Quantum ApocalypseTim Callan, Senior Fellow at Sectigo & Jason Soroko, CTO of PKI at Sectigo[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]19 mins