Hi [[ session.user.profile.firstName ]]

Securing Your New Remote Workforce: Your Questions Answered from PKI Experts

The Coronavirus (Covid-19) has changed the way we work, seemingly overnight. The pandemic has not only forced IT and security professionals to work remotely, but also deploy remote access for their now at-home employees, without compromising security.

In this new reality, without appropriate measures in place to scale remote-working capabilities, businesses face an unparalleled challenge to secure critical systems and digital identities.

Join us for a LIVE Q&A with Keyfactor’s CSO Chris Hickman, CTO Ted Shorter, and PKI Solutions' Mark Cooper (aka "The PKI Guy") as we take your questions and give practical advice for managing your PKI during this uncertain, and highly remote environment.
Recorded Mar 27 2020 32 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Chris Hickman, CSO, Keyfactor | Ted Shorter, CTO, Keyfactor | Mark Cooper, PKI Solutions
Presentation preview: Securing Your New Remote Workforce: Your Questions Answered from PKI Experts

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Navigating Vehicle and IoT Security: Your Questions Answered by Crypto Experts Feb 10 2021 6:00 pm UTC 30 mins
    Ellen Boehm, VP of IoT Strategy and Chris Conlon, Engineering Manager
    Securing vehicles is hard – perhaps harder than just about any other device.

    Don’t take our word for it. A simple internet search reveals that all major automobile manufacturers have experienced a vehicle security exposure.

    Join Keyfactor and wolfSSL for a Live Q&A with VP of IoT Strategy, Ellen Boehm, and Engineering Manager, Chris Conlon, as they take your questions live and discuss on embedding strong cryptography into vehicle and IoT devices:

    -Unique security challenges that engineers face when securing connected vehicles
    -Address the role that cryptography plays in securing vehicles
    -Practical advice on how these same principles can improve security for other connected IoT devices where high assurance and scalability are a must
  • Self-Service Certificate Automation using Keyfactor and ServiceNow Recorded: Jan 19 2021 31 mins
    Wael Altaqi, Sr. Solutions Engineer and Ryan Sanders, Sr. Product
    Everyone from network engineers to developers need fast, easy access to trusted SSL/TLS certificates. If not, you can bet they’ll find alternative, non-compliant ways to get them.

    If you’re already using ServiceNow ITSM, it often makes sense to use the same familiar interface to give your users self-service access to certificates. In this webinar, we’ll dive into how Keyfactor integrates with ServiceNow to simplify and automate certificate requests, renewals, and alerting.

    Join Wael Altaqi, Sr. Solutions Engineer and Ryan Sanders, Sr. Product Marketing Manager, for a 30-minute discussion and live demo of the Keyfactor + ServiceNow integration.
  • Reign in Your Rogue Admins: Best Practices for Managing SSL/TLS Certificates Recorded: Dec 16 2020 34 mins
    Sami Van Vliet, Principal Product Manager at Keyfactor and Mrugesh Chandarana, Senior Product Manager at HID
    It’s not the SSL/TLS certificates you track that cause outages, it’s the unknown and untracked certificates hiding in your network – beyond your visibility. The problem is that most organizations don’t know where all of their certificates live, who uses them, and most importantly, when they expire.

    All it takes is one unexpected expiration to create a costly network or application outage. How do you keep track of every certificate in your inventory?

    In this webinar, Sami Van Vliet, Principal Product Manager at Keyfactor (and former Rogue Web Admin herself) and Mrugesh Chandarana, Senior Product Manager at HID, will walk through five best practices to monitor and control your SSL/TLS certificate inventory – and mitigate the risk of unknown and rogue certificates.

    Originally presented at the 2020 Keyfactor Critical Trust Virtual Summit.
  • Critical Trust Health Check: Insights from Keyfactor Customers Recorded: Dec 4 2020 29 mins
    Joe Elbers, Customer Success Manager and Brandon Tubandt, SVO of Operation & Customer Success
    Ever wanted to know how your PKI operations and key management practices stack up against the broader Keyfactor community?

    Join members of Keyfactor’s Customer Success Team, Joe Elbers (Customer Success Manager) and Brandon Tubandt (SVP, Operations & Customer Success), as they share some of our customer health scores and outline how you can score as high as they did with future product feature adoption.


    Originally presented at the 2020 Keyfactor Critical Trust Virtual Summit.
  • Developing a Unified Cryptography Strategy, Why Now? Recorded: Dec 4 2020 47 mins
    Kevin von Keyserling, Co-Founder and Chief Strategy Officer & Ted Shorter, Co-Founder and Chief Technology Officer
    Are you ready to manage any certificate, any key, at any time with ease? How about orchestrating crypto across your business?

    With the acceleration of enterprise infrastructure toward software-defined systems, the ubiquity of DevOps with its rapid CI/CD pipeline, instantaneous deployment of cloud-based services, and IoT devices, enterprises often end up with tens of thousands — even millions — of keys and certificates. And they're typically unaware of the total number of these entities.

    Keyfactor Co-Founders, Ted Shorter (Chief Technology Officer) and Kevin von Keyserling (Chief Strategy Officer) discuss how to get started with a unified crypto strategy, and preview what's to come from Keyfactor R&D.


    Originally presented at the 2020 Keyfactor Critical Trust Virtual Summit.
  • Top 3 Ways to Extend Certificate Management with Keyfactor Command Recorded: Dec 4 2020 35 mins
    Anthony Ricci, VP of Solutions Engineering and Rex Wheeler, Director of Product Readiness
    Keyfactor Command's flexible architecture allows our customers to extend key and certificate management throughout their connected ecosystems. But what are the top use cases our customers solve using our API?

    Find out more as the Keyfactor team walks through the top 3 use cases we see our customers employ to extend the Keyfactor platform.


    Originally presented at the 2020 Keyfactor Critical Trust Virtual Summit.
  • Assess Your Certificate Management Maturity: A Workshop with PKI Experts Recorded: Dec 2 2020 54 mins
    Sami Van Vliet, Principal Product Manager and Ryan Yackel, VP Product Marketing
    As SSL/TLS certificate usage continues to reach extreme levels, other factors like the shorter certificate lifespans, expanding use cases, and the rise of quantum have put pressure on certificate management practices.

    However, the broad scope of certificate management makes it hard to know how mature your current practices are today and where they need to be for the future. The transition from manual spreadsheet-based tracking to full certificate lifecycle automation often comes with significant bumps in the road, but in our experience, it is well worth the effort.

    That’s where this model comes in to help.

    Join Sami Van Vliet, Principal Product Manager, and Ryan Yackel, VP Product Marketing as they walk through each level of a practical guide on how to scale and automate certificate management.

    In this webinar, you will learn:
    -How to self-assess your team’s progress against five maturity levels
    -Common scenarios experienced at each level
    -Tips for implementing required process changes that will get you to your next level in certificate management maturity
  • What to Watch Out for in 2021: Top Trends in Crypto Recorded: Nov 11 2020 35 mins
    John Ray (Director of HSM Product Management, Thales), Mike Brown (CTO, ISARA), Chris Hickman (CSO, Keyfactor)
    We can agree 2020 was anything but ordinary – but what can we expect in the year ahead? From sleeping dragons to expected crypto-compromises, this panel discussion will cover some of the ways that cryptographic keys and digital certificates will be used (and misused) in 2021 and beyond.

    In this webinar, you’ll hear directly from those at the forefront of cryptography as they share insights on:

    -How IoT & DevOps are testing the limits of PKI
    -The impact of shorter SSL/TLS certificate lifecycles
    -Emerging code-signing and SSH-based attacks
    -The threat of Impending root CA expirations

    Originally presented at the 2020 Keyfactor Critical Trust Virtual Summit.
  • Real-World Results for IoT Device Design Manufacturers Recorded: Nov 2 2020 30 mins
    Brandon Hensley, Manager, Product Technology Infrastructure & Security and Ken Peirce, Senior Encryption Strategist at GM
    Join us for an intimate panel featuring security experts from the automotive and medical manufacturing industry discussing challenges and solutions for IoT device design.


    We'll walk through some real-world use cases on how Keyfactor customers solve their IoT device identity challenges and ways you might be able to do the same.

    Originally presented at the 2020 Keyfactor Critical Trust Virtual Summit.
  • Building the Business Case for a Cloud-First PKI Strategy Recorded: Oct 29 2020 22 mins
    Kevin von Keyserling, Chief Strategy Officer and Toby Gaff, Director of Solutions Engineering
    PKI is complex, and it’s only getting harder. Whether you’re ready to deploy, or you’ve taken on the responsibility to run an existing PKI, it takes more than just CA software to get it right.

    Hear directly from PKI practitioners in this webinar as they share the importance and complexity of PKI and why enterprises are making the move to cloud-hosted PKI.

    In this webinar, you’ll learn:

    -How PKI has evolved and the challenges that arise
    -If a move to the cloud is right for your organization
    -How to evaluate Managed PKI solutions

    Originally presented at the 2020 Keyfactor Critical Trust Virtual Summit.
  • Securing the CI/CD Pipeline Without Disrupting Developers Recorded: Oct 29 2020 25 mins
    Shian Sung, Senior DevSecOps Engineer at Keyfactor, and Chris Paul, Cybersecurity SME at Infinite Ranges
    During this webinar, we’ll explore how TLS and code-signing certificates fit in the CI/CD pipeline and why an integrated and automated approach is key to success. You’ll learn how to give developers fast access to certificates they need for day-to-day operations while ensuring better visibility, control, and governance for security.

    Join Shian Sung, Senior DevSecOps Engineer at Keyfactor and Chris Paul, Cybersecurity SME at Infinite Ranges as they take a technical deep-dive into common use cases and toolsets like HashiCorp Vault, Kubernetes, and Jenkins.


    Originally presented at the 2020 Keyfactor Critical Trust Virtual Summit.
  • Approaches to Deploying Post-Quantum Cryptography Recorded: Oct 28 2020 28 mins
    Russ Housley, Founder & Owner of Vigil Security & Max Pala, Principal Architect | Security Services at Cable
    Quantum is coming, so you should start freaking out now!

    Well maybe don't freak yet until you hear from two experts, with their two opposing views of how to handle post-quantum algorithms (PQC).

    Join Russ Housley, Founder & Owner of Vigil Security explains while people gain confidence in the PQC algorithms and their implementations, security protocols should mix traditional and PQC algorithms.

    Then hear from Massimiliano (Max) Pala, Principal Architect | Security Services at CableLabs, brings as he brings his expertise from the broadband industry to propose a way to augment the PKI to support quantum-safe algorithms without the need to establish separate infrastructures.

    You learn:
    - How modern (or classic) cryptography rely on problems that are hard to reverse
    - How to start planning for the day with only PQC algorithms are used​
    - When to use separate certificates for traditional and PQC algorithms​


    Originally presented at the 2020 Keyfactor Critical Trust Virtual Summit.
  • Protecting SSH Keys in Multi-Cloud Operations Recorded: Oct 28 2020 33 mins
    Mark Thompson, SVP of Product Management and Ryan Sanders, Product Marketing Manager
    You can’t survive without them, but without the right controls, SSH keys can quickly change from passwordless bliss to security black hole. People come and go, workloads are spun up and torn down, and before you know it, you have a mess of unmanaged and untracked SSH keys across your network. If even a single private key is compromised, you’re left vulnerable to attack.

    In this webinar, we will address the emerging risks of SSH key sprawl, best practices to take back control of your SSH landscape, and how the Keyfactor SSH Key Manager can help.

    Originally presented at the 2020 Keyfactor Critical Trust Virtual Summit.
  • Leadership in Cybersecurity: Insights from FinServ Experts Recorded: Oct 28 2020 37 mins
    Uri Lichtenfeld, Exec. Dir. of Tech Business Dev, Simon Hunt, EVP of Cybersecurity Product Innovation, & Ted Shorter, CTO
    Today’s ever evolving digital landscape requires cybersecurity leaders to be more agile, responsive and empathetic than ever. Join Simon Hunt, EVP of Cybersecurity Product Innovation at Mastercard, Uri Lichtenfeld, Executive Director of Technology Business Development at Morgan Stanley, and Ted Shorter, CTO at Keyfactor, for an intimate panel discussion on cybersecurity leadership insights and trends from the financial sector.  

    In this panel, you’ll hear:  
      
    -Lessons learned from the panelists combined 50+ years of experience in cybersecurity leadership 
    -How major events, like COVID-19, shift roles and priorities of senior leaders 
    -Practical strategies to protect transactions and prevent attacks in a remote-first world 


    Originally presented at the 2020 Keyfactor Critical Trust Virtual Summit.
  • Lessons Learned from PKI Experts Recorded: Oct 28 2020 29 mins
    Chris Hickman, CSO at Keyfactor, Rich Popson, CISO at Sensata Technologies, & David Falgiano, VP of Security Eng. at M&T Bank
    If Public Key Infrastructure (PKI) is so critical to enterprise security, then why do so many PKI deployments fail? Like most organizations, your lean security team is struggling to keep up with PKI maintenance compounded by growing security demands.

    But don't hear from us, hear from the experts!

    In this panel discussion, you’ll hear from PKI industry experts and current Keyfactor customers on the lessons they've learned over the years managing and deploying PKI.

    They'll as they address best practices, new opportunities for expansion, and common mistakes to avoid when planning and deploying your PKI.

    Join a panel discussion with David Falgiano, CISSP, VP of Security Engineering at M&T Bank and Rich Popson, Senior Information Security & Risk Manager (CISO) at Sensata Technologies for an engaging discussion with Keyfactor's CSO, Chris Hickman, as they answer questions like:

    -What are the key red flags or challenges you should be looking out for in your current PKI?
    -Do you or should you have a dedicated team for PKI and cryptography?
    -At what point does PKI move from a technology challenge to a business imperative?
    -What types of things do you look for in next-gen software for managing and orchestrating crypto? (e.g. keys, certs)


    Originally presented at the 2020 Keyfactor Critical Trust Virtual Summit.
  • Replacing Legacy Machine Identity Management Solutions Recorded: Oct 19 2020 33 mins
    Niko Ruhe, Senior Solutions Architect at Keyfactor and Ryan Yackel, VP of Product & Content Marketing at Keyfactor
    Thinking about making the switch from your legacy machine identity management solution? Ryan Yackel, VP of Product & Content Marketing at Keyfactor, will discuss with Niko Ruhe, Senior Solutions Architect, how his team has migrated hundreds of customers from their current certificate management solution to the Keyfactor Platform. He'll showcase how Keyfactor can be deployed quickly and efficiently while your old system is migrated at the same time.

    In this webinar, we’ll cover:

    -Machine Identity – What is it?
    -Capabilities required for machine identity management
    -Migration process from legacy solutions
    -A migration customer-success story


    Originally presented at the 2020 Keyfactor Critical Trust Virtual Summit.
  • Ghost Hunt: How to Find and Secure SSH Keys in Your Network Recorded: Sep 30 2020 56 mins
    Ted Shorter, CTO, Ryan Sanders, Product Marketing Manager, & Sami Van Vliet, Principal Product Manager
    IT and DevOps teams routinely use SSH keys to automate secure access to servers, yet there’s little to no control over how they’re generated or used. Unlike SSL certificates, SSH keys don’t expire. So what happens? Ghost (or inactive) SSH keys lay dormant and unmanaged on the network, creating potential backdoors for hackers to infiltrate critical servers.

    Do you know where your SSH keys are hiding? Who you gonna call?

    Join Ted Shorter, CTO, Ryan Sanders, Product Marketing Manager, and Sami Van Vliet, Principal Product Manager, as they discuss all you need to know about SSH keys, and how to find and manage them effectively, including:

    - How unprotected SSH keys create risks and audit challenges
    - Why now? Emerging risks of SSH key sprawl and attacks
    - 5 best practices for SSH key protection and management
  • Cryptography Management: Your Questions Answered by Crypto Experts Recorded: Sep 16 2020 41 mins
    Ted Shorter, CTO & Co-Founder, Chris Hickman, CSO, & Ryan Yackel, VP of Product Marketing
    Cryptography – the most familiar method ever used to protect sensitive data for personal, business, government and infrastructure application. With the expanding use of digital keys, certificates, identities, and secrets to secure enterprise use cases, one could argue that cryptography has moved from a technical to a business issue.

    Is the threat of quantum or evolving audit and standards urging you to develop an end-to-end strategy? If so, bring your questions and join Ted Shorter, CTO & Co-Founder, Chris Hickman, CSO, and Ryan Yackel, VP of Product Marketing, as they take questions live and offer practical advice on how teams can approach end-to-end lifecycle management of their cryptography keys and certificates for SSH, SSL/TLS, and PKI-related systems and operations.
  • Zero Trust Manufacturing: How to Embed IoT Device Security in Your Supply Chain Recorded: Sep 9 2020 59 mins
    Ellen Boehm, Senior Director IoT Product Management and Keao Caindec, Principal Analyst
    With so many supply chain partners, the reality is that you cannot trust the security of the manufacturing process to ensure that the hardware, firmware or credentials of the device have not been altered.

    Manufacturers must take a “zero trust manufacturing” approach and design security into the device while maintaining effective security controls throughout the manufacturing process and product lifecycle to ensure the security, trustworthiness and safety of a device.

    Join Keao Caindec, Principal Analyst at Farallon Technology Group, and Ellen Boehm, Senior Director IoT Product Management at Keyfactor, as they walk through how IoT manufacturers can navigate complex supply chains to build trusted IoT devices.

    In this webinar, you will learn:

    -Common IoT device security challenges that require a zero trust manufacturing approach
    -Where supply chain security breakdowns occur
    -Best Practices to Achieve Zero Trust Manufacturing
  • How to Approach Your End-to-End Cryptography Strategy Recorded: Sep 2 2020 59 mins
    Dr. Edward Amoroso, CEO at TAG Cyber and Ted Shorter, CTO at Keyfactor
    By far the most familiar method ever used to protect sensitive data for personal, business, government, and infrastructure applications is cryptography. Despite this maturity, cryptography is generally viewed by most business leaders in somewhat superficial terms.

    With the expanding use of digital keys, certificates, identities, and secrets to secure enterprise use cases, one could argue that cryptography has moved from a technical to a business issue.

    Join Dr. Edward Amoroso, CEO and Lead Analyst at TAG Cyber, and Ted Shorter, CTO at Keyfactor as they offer practical guidance on how teams can approach end-to-end lifecycle management of their cryptographic keys and certificates for SSH, SSL/TLS, and PKI-related systems and operations.

    In this webinar, you will learn:
    - Challenges associated with each enterprise key management function
    - How threats of quantum, evolving audit and standards necessitate an end-to-end strategy
    - A proposed lifecycle methodology for enterprise key management
Leader in Cloud-First PKI as-a-Service & Crypto-Agility Solutions
Keyfactor is the leader in cloud-first PKI as-a-Service and crypto-agility solutions. Our Crypto-Agility Platform empowers security teams to seamlessly orchestrate any key, any certificate, anywhere across the enterprise.

We help our customers apply cryptography in the right way from modern, multi-cloud enterprises to complex IoT supply chains.

With decades of cybersecurity experience, Keyfactor is trusted by more than 500 enterprises across the globe.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Securing Your New Remote Workforce: Your Questions Answered from PKI Experts
  • Live at: Mar 27 2020 5:00 pm
  • Presented by: Chris Hickman, CSO, Keyfactor | Ted Shorter, CTO, Keyfactor | Mark Cooper, PKI Solutions
  • From:
Your email has been sent.
or close