Hi [[ session.user.profile.firstName ]]

How to Secure Code Signing at the Speed of DevOps

When you sign a piece of code, you make a statement that it comes from your trusted brand and that you stand behind it. But what happens when that trust is broken? Recent attacks, such as the ASUS Live Update hack, underscore the importance of managing reputational risk.

As attackers become increasingly skilled in the art of signing and spreading malware, all business leaders must invest in the trust associated with their digital brand – and expect the same of their vendors. The challenge is how to secure code signing keys and certificates in today’s distributed and fast-paced DevOps environments.

Join our experts as they discuss:
- Code Signing: What is it? Why does it matter?
- Recent Attacks: The Risks and Challenges of Code Signing
- How to Secure Code Signing at the Speed of DevOps
- How Thales and Keyfactor Make It Possible
Recorded Jul 9 2019 46 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Gary Marsden, Senior Director of Data Protection Services at Thales and Mark Thompson, VP of Product Management at Keyfactor
Presentation preview: How to Secure Code Signing at the Speed of DevOps

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • How to Secure Code Signing at the Speed of DevOps Recorded: Jul 9 2019 46 mins
    Gary Marsden, Senior Director of Data Protection Services at Thales and Mark Thompson, VP of Product Management at Keyfactor
    When you sign a piece of code, you make a statement that it comes from your trusted brand and that you stand behind it. But what happens when that trust is broken? Recent attacks, such as the ASUS Live Update hack, underscore the importance of managing reputational risk.

    As attackers become increasingly skilled in the art of signing and spreading malware, all business leaders must invest in the trust associated with their digital brand – and expect the same of their vendors. The challenge is how to secure code signing keys and certificates in today’s distributed and fast-paced DevOps environments.

    Join our experts as they discuss:
    - Code Signing: What is it? Why does it matter?
    - Recent Attacks: The Risks and Challenges of Code Signing
    - How to Secure Code Signing at the Speed of DevOps
    - How Thales and Keyfactor Make It Possible
  • The Principles of IoT Security Recorded: Jun 10 2019 59 mins
    Gorav Arora, Director, Office of CTO, at Thales and Tom Klein, VP of IoT Solutions at Keyfactor
    The proliferation of IoT and cloud computing are transforming our lives daily – from watches alerting on severe heart conditions to voice-enabled assistants automating daily tasks. Builders and operators of such systems must tackle the myriad of challenges across the complex IT stack – including security. Securing every digital touchpoint is crucial to delivering safe and connected services between devices, networks, machines, and users.

    Join us to hear about:
    • The unique challenges of IoT Security
    • Current and proposed cybersecurity regulations across various industries
    • Blueprint of IoT Security that can be used in any IoT system
    • A real-life use case on how leading healthcare provider successfully secured devices within the IoT and Cloud
  • Medical Device Manufacturers - Leading the Way in Cybersecurity Recorded: Apr 25 2019 54 mins
    Tom Klein
    Today’s proliferation of connected medical devices, both currently in-use and under design, is unprecedented.

    Join Tom Klein, VP of IoT at Keyfactor, the end-to-end secure identity platform for connected devices, for insights on how MDMs are meeting these challenges head-on.

    Learn more about how to:
    - Future-proof your product lines with cryptographic agility
    - Comply with FDA cybersecurity guidance and regulatory requirements
    - Optimize device roll-outs & lifecycle management
  • How the Cloud and IoT Are Changing the Way Healthcare is Delivered Recorded: Mar 28 2019 59 mins
    Gorav Arora, Director, Office of CTO, at Gemalto and Ted Shorter, CTO at Keyfactor
    Increased cloud adoption plus the growth of IoT-enabled devices are accelerating the transformation of how healthcare is delivered. While improving patient services these new technologies add potential vulnerabilities from the increasingly porous perimeter that IT must secure. Securing every digital touchpoint is crucial to delivering safe and connected healthcare services from medical device OEMs, HDOs, EHRs and patients across the networks, data and devices they rely on.

    In this webinar, you will learn more about:
    • A real-life use case on how a leading provider partnered to successfully secure devices with IoT and the Cloud
    • Current and proposed cyber security regulations for healthcare
    • How effective key management is a vital component to ensure device security throughout their lifecycle
    • Code signing with Cloud or on-premise HSMs prevents software update tampering
    • Protecting data in use, at rest and in motion from the device to the cloud and back with advanced encryption
    • How MFA ensures the right people have access to sensitive data stored on-premises or in the cloud
  • The Impact of Unsecured Digital Identities Recorded: Mar 21 2019 59 mins
    Chris Hickman and Dr. Larry Ponemon
    Between tracking devices and certificates, getting ahead of cert expirations, and preventing outages – all with limited resources and funding – it’s not easy to feel confident that you’re doing all you can to reduce the risk of a breach or downtime.

    Keyfactor’s 2019 study with the Ponemon Institute, The Impact of Unsecured Digital Identities, is the first report of its kind to provide data on the risks that unmanaged certificates pose. And it shows the business impact – to your brand, customer retention and productivity – that will earn the attention of senior executives.

    Join industry expert Larry Ponemon and Keyfactor’s CSO Chris Hickman to learn more about what they’ve uncovered, the real costs of unsecured identities, and how building a case using compelling data can help you better protect your organization.

    Fascinating findings include:

    Respondents experienced an average of four unplanned outages due to certificate expiration in the past two years at an average cost of $11.1M
    65% of respondents are adding additional layers of encryption technologies to comply with regulations & policies
    61% of companies are not confident they’re able to secure keys and certificates from generation to revocation
Secure Every Digital Identity
Keyfactor, formerly Certified Security Solutions (CSS), is a leading provider of secure digital identity management solutions that enables organizations to confirm authenticity, and ensure the right things are interacting in the right ways in our connected world.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: How to Secure Code Signing at the Speed of DevOps
  • Live at: Jul 9 2019 6:00 pm
  • Presented by: Gary Marsden, Senior Director of Data Protection Services at Thales and Mark Thompson, VP of Product Management at Keyfactor
  • From:
Your email has been sent.
or close