Hi [[ session.user.profile.firstName ]]

Re-Think Your PKI: Build, Buy or Bring in Reinforcements

Public key infrastructure (PKI) is a fundamental security tool used by most organizations today. Whether it’s securing your network, sensitive data, or connected devices, IT and security leaders turn to PKI as a proven solution to establish trust in their business.

But PKI isn’t like any other technology in your IT stack – it’s a complex ecosystem of roles, policies and procedures, hardware and software. Just keeping it up and running can be challenging enough, not to mention enabling new use cases such as DevOps, multi-cloud, and remote workforce access.

The good news is, you have options. Join “The PKI Guy” Mark Cooper and Ted Shorter, CTO and Co-founder at Keyfactor for a live talk, as they discuss how PKI has evolved and why it may be time to re-think the way it’s deployed and managed in your enterprise.
In this live talk, we’ll discuss:

- New use cases and standards for Enterprise PKI
- Common PKI deployment and maintenance challenges
- Finding the right fit: In-House, Managed, or Hosted PKI
- Practical recommendations and PKI best practices
Recorded May 12 2020 61 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Ted Shorter, Co-Founder & CTO, Keyfactor and Mark Cooper, President, PKI Solutions
Presentation preview: Re-Think Your PKI: Build, Buy or Bring in Reinforcements

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Reign in Your Rogue Admins: Best Practices for Managing SSL/TLS Certificates Dec 16 2020 6:00 pm UTC 34 mins
    Sami Van Vliet, Principal Product Manager at Keyfactor and Mrugesh Chandarana, Senior Product Manager at HID
    It’s not the SSL/TLS certificates you track that cause outages, it’s the unknown and untracked certificates hiding in your network – beyond your visibility. The problem is that most organizations don’t know where all of their certificates live, who uses them, and most importantly, when they expire.

    All it takes is one unexpected expiration to create a costly network or application outage. How do you keep track of every certificate in your inventory?

    In this webinar, Sami Van Vliet, Principal Product Manager at Keyfactor (and former Rogue Web Admin herself) and Mrugesh Chandarana, Senior Product Manager at HID, will walk through five best practices to monitor and control your SSL/TLS certificate inventory – and mitigate the risk of unknown and rogue certificates.

    Originally presented at the 2020 Keyfactor Critical Trust Virtual Summit.
  • Assess Your Certificate Management Maturity: A Workshop with PKI Experts Recorded: Dec 2 2020 54 mins
    Sami Van Vliet, Principal Product Manager and Ryan Yackel, VP Product Marketing
    As SSL/TLS certificate usage continues to reach extreme levels, other factors like the shorter certificate lifespans, expanding use cases, and the rise of quantum have put pressure on certificate management practices.

    However, the broad scope of certificate management makes it hard to know how mature your current practices are today and where they need to be for the future. The transition from manual spreadsheet-based tracking to full certificate lifecycle automation often comes with significant bumps in the road, but in our experience, it is well worth the effort.

    That’s where this model comes in to help.

    Join Sami Van Vliet, Principal Product Manager, and Ryan Yackel, VP Product Marketing as they walk through each level of a practical guide on how to scale and automate certificate management.

    In this webinar, you will learn:
    -How to self-assess your team’s progress against five maturity levels
    -Common scenarios experienced at each level
    -Tips for implementing required process changes that will get you to your next level in certificate management maturity
  • What to Watch Out for in 2021: Top Trends in Crypto Recorded: Nov 11 2020 35 mins
    John Ray (Director of HSM Product Management, Thales), Mike Brown (CTO, ISARA), Chris Hickman (CSO, Keyfactor)
    We can agree 2020 was anything but ordinary – but what can we expect in the year ahead? From sleeping dragons to expected crypto-compromises, this panel discussion will cover some of the ways that cryptographic keys and digital certificates will be used (and misused) in 2021 and beyond.

    In this webinar, you’ll hear directly from those at the forefront of cryptography as they share insights on:

    -How IoT & DevOps are testing the limits of PKI
    -The impact of shorter SSL/TLS certificate lifecycles
    -Emerging code-signing and SSH-based attacks
    -The threat of Impending root CA expirations

    Originally presented at the 2020 Keyfactor Critical Trust Virtual Summit.
  • The What, Why and How of Zero Trust Manufacturing Recorded: Nov 4 2020 31 mins
    Ellen Boehm, Sr. Director of IoT Product Management & Tomas Gustavsson, CTO at PrimeKey
    The complexity of multiple points in the supply chain created a trust gap between product design/firmware development and hardware. Manufacturing finds it difficult to embed identity into the process and maintain identities throughout the device lifecycle once it’s deployed into the field. These factors have led to the emergence of adopting a Zero Trust Manufacturing approach to IoT device identity.

    In this webinar, we will show why the Zero Trust model is critical to the IoT lifecycle and how to put this theory into practice.

    Originally presented at the 2020 Keyfactor Critical Trust Virtual Summit.
  • Real-World Results for IoT Device Design Manufacturers Recorded: Nov 2 2020 30 mins
    Brandon Hensley, Manager, Product Technology Infrastructure & Security and Ken Peirce, Senior Encryption Strategist at GM
    Join us for an intimate panel featuring security experts from the automotive and medical manufacturing industry discussing challenges and solutions for IoT device design.


    We'll walk through some real-world use cases on how Keyfactor customers solve their IoT device identity challenges and ways you might be able to do the same.

    Originally presented at the 2020 Keyfactor Critical Trust Virtual Summit.
  • Building the Business Case for a Cloud-First PKI Strategy Recorded: Oct 29 2020 22 mins
    Kevin von Keyserling, Chief Strategy Officer and Toby Gaff, Director of Solutions Engineering
    PKI is complex, and it’s only getting harder. Whether you’re ready to deploy, or you’ve taken on the responsibility to run an existing PKI, it takes more than just CA software to get it right.

    Hear directly from PKI practitioners in this webinar as they share the importance and complexity of PKI and why enterprises are making the move to cloud-hosted PKI.

    In this webinar, you’ll learn:

    -How PKI has evolved and the challenges that arise
    -If a move to the cloud is right for your organization
    -How to evaluate Managed PKI solutions

    Originally presented at the 2020 Keyfactor Critical Trust Virtual Summit.
  • Securing the CI/CD Pipeline Without Disrupting Developers Recorded: Oct 29 2020 25 mins
    Shian Sung, Senior DevSecOps Engineer at Keyfactor, and Chris Paul, Cybersecurity SME at Infinite Ranges
    During this webinar, we’ll explore how TLS and code-signing certificates fit in the CI/CD pipeline and why an integrated and automated approach is key to success. You’ll learn how to give developers fast access to certificates they need for day-to-day operations while ensuring better visibility, control, and governance for security.

    Join Shian Sung, Senior DevSecOps Engineer at Keyfactor and Chris Paul, Cybersecurity SME at Infinite Ranges as they take a technical deep-dive into common use cases and toolsets like HashiCorp Vault, Kubernetes, and Jenkins.


    Originally presented at the 2020 Keyfactor Critical Trust Virtual Summit.
  • Approaches to Deploying Post-Quantum Cryptography Recorded: Oct 28 2020 28 mins
    Russ Housley, Founder & Owner of Vigil Security & Max Pala, Principal Architect | Security Services at Cable
    Quantum is coming, so you should start freaking out now!

    Well maybe don't freak yet until you hear from two experts, with their two opposing views of how to handle post-quantum algorithms (PQC).

    Join Russ Housley, Founder & Owner of Vigil Security explains while people gain confidence in the PQC algorithms and their implementations, security protocols should mix traditional and PQC algorithms.

    Then hear from Massimiliano (Max) Pala, Principal Architect | Security Services at CableLabs, brings as he brings his expertise from the broadband industry to propose a way to augment the PKI to support quantum-safe algorithms without the need to establish separate infrastructures.

    You learn:
    - How modern (or classic) cryptography rely on problems that are hard to reverse
    - How to start planning for the day with only PQC algorithms are used​
    - When to use separate certificates for traditional and PQC algorithms​


    Originally presented at the 2020 Keyfactor Critical Trust Virtual Summit.
  • Protecting SSH Keys in Multi-Cloud Operations Recorded: Oct 28 2020 33 mins
    Mark Thompson, SVP of Product Management and Ryan Sanders, Product Marketing Manager
    You can’t survive without them, but without the right controls, SSH keys can quickly change from passwordless bliss to security black hole. People come and go, workloads are spun up and torn down, and before you know it, you have a mess of unmanaged and untracked SSH keys across your network. If even a single private key is compromised, you’re left vulnerable to attack.

    In this webinar, we will address the emerging risks of SSH key sprawl, best practices to take back control of your SSH landscape, and how the Keyfactor SSH Key Manager can help.

    Originally presented at the 2020 Keyfactor Critical Trust Virtual Summit.
  • Leadership in Cybersecurity: Insights from FinServ Experts Recorded: Oct 28 2020 37 mins
    Uri Lichtenfeld, Exec. Dir. of Tech Business Dev, Simon Hunt, EVP of Cybersecurity Product Innovation, & Ted Shorter, CTO
    Today’s ever evolving digital landscape requires cybersecurity leaders to be more agile, responsive and empathetic than ever. Join Simon Hunt, EVP of Cybersecurity Product Innovation at Mastercard, Uri Lichtenfeld, Executive Director of Technology Business Development at Morgan Stanley, and Ted Shorter, CTO at Keyfactor, for an intimate panel discussion on cybersecurity leadership insights and trends from the financial sector.  

    In this panel, you’ll hear:  
      
    -Lessons learned from the panelists combined 50+ years of experience in cybersecurity leadership 
    -How major events, like COVID-19, shift roles and priorities of senior leaders 
    -Practical strategies to protect transactions and prevent attacks in a remote-first world 


    Originally presented at the 2020 Keyfactor Critical Trust Virtual Summit.
  • Lessons Learned from PKI Experts Recorded: Oct 28 2020 29 mins
    Chris Hickman, CSO at Keyfactor, Rich Popson, CISO at Sensata Technologies, & David Falgiano, VP of Security Eng. at M&T Bank
    If Public Key Infrastructure (PKI) is so critical to enterprise security, then why do so many PKI deployments fail? Like most organizations, your lean security team is struggling to keep up with PKI maintenance compounded by growing security demands.

    But don't hear from us, hear from the experts!

    In this panel discussion, you’ll hear from PKI industry experts and current Keyfactor customers on the lessons they've learned over the years managing and deploying PKI.

    They'll as they address best practices, new opportunities for expansion, and common mistakes to avoid when planning and deploying your PKI.

    Join a panel discussion with David Falgiano, CISSP, VP of Security Engineering at M&T Bank and Rich Popson, Senior Information Security & Risk Manager (CISO) at Sensata Technologies for an engaging discussion with Keyfactor's CSO, Chris Hickman, as they answer questions like:

    -What are the key red flags or challenges you should be looking out for in your current PKI?
    -Do you or should you have a dedicated team for PKI and cryptography?
    -At what point does PKI move from a technology challenge to a business imperative?
    -What types of things do you look for in next-gen software for managing and orchestrating crypto? (e.g. keys, certs)


    Originally presented at the 2020 Keyfactor Critical Trust Virtual Summit.
  • Replacing Legacy Machine Identity Management Solutions Recorded: Oct 19 2020 33 mins
    Niko Ruhe, Senior Solutions Architect at Keyfactor and Ryan Yackel, VP of Product & Content Marketing at Keyfactor
    Thinking about making the switch from your legacy machine identity management solution? Ryan Yackel, VP of Product & Content Marketing at Keyfactor, will discuss with Niko Ruhe, Senior Solutions Architect, how his team has migrated hundreds of customers from their current certificate management solution to the Keyfactor Platform. He'll showcase how Keyfactor can be deployed quickly and efficiently while your old system is migrated at the same time.

    In this webinar, we’ll cover:

    -Machine Identity – What is it?
    -Capabilities required for machine identity management
    -Migration process from legacy solutions
    -A migration customer-success story


    Originally presented at the 2020 Keyfactor Critical Trust Virtual Summit.
  • Ghost Hunt: How to Find and Secure SSH Keys in Your Network Recorded: Sep 30 2020 56 mins
    Ted Shorter, CTO, Ryan Sanders, Product Marketing Manager, & Sami Van Vliet, Principal Product Manager
    IT and DevOps teams routinely use SSH keys to automate secure access to servers, yet there’s little to no control over how they’re generated or used. Unlike SSL certificates, SSH keys don’t expire. So what happens? Ghost (or inactive) SSH keys lay dormant and unmanaged on the network, creating potential backdoors for hackers to infiltrate critical servers.

    Do you know where your SSH keys are hiding? Who you gonna call?

    Join Ted Shorter, CTO, Ryan Sanders, Product Marketing Manager, and Sami Van Vliet, Principal Product Manager, as they discuss all you need to know about SSH keys, and how to find and manage them effectively, including:

    - How unprotected SSH keys create risks and audit challenges
    - Why now? Emerging risks of SSH key sprawl and attacks
    - 5 best practices for SSH key protection and management
  • Cryptography Management: Your Questions Answered by Crypto Experts Recorded: Sep 16 2020 41 mins
    Ted Shorter, CTO & Co-Founder, Chris Hickman, CSO, & Ryan Yackel, VP of Product Marketing
    Cryptography – the most familiar method ever used to protect sensitive data for personal, business, government and infrastructure application. With the expanding use of digital keys, certificates, identities, and secrets to secure enterprise use cases, one could argue that cryptography has moved from a technical to a business issue.

    Is the threat of quantum or evolving audit and standards urging you to develop an end-to-end strategy? If so, bring your questions and join Ted Shorter, CTO & Co-Founder, Chris Hickman, CSO, and Ryan Yackel, VP of Product Marketing, as they take questions live and offer practical advice on how teams can approach end-to-end lifecycle management of their cryptography keys and certificates for SSH, SSL/TLS, and PKI-related systems and operations.
  • Zero Trust Manufacturing: How to Embed IoT Device Security in Your Supply Chain Recorded: Sep 9 2020 59 mins
    Ellen Boehm, Senior Director IoT Product Management and Keao Caindec, Principal Analyst
    With so many supply chain partners, the reality is that you cannot trust the security of the manufacturing process to ensure that the hardware, firmware or credentials of the device have not been altered.

    Manufacturers must take a “zero trust manufacturing” approach and design security into the device while maintaining effective security controls throughout the manufacturing process and product lifecycle to ensure the security, trustworthiness and safety of a device.

    Join Keao Caindec, Principal Analyst at Farallon Technology Group, and Ellen Boehm, Senior Director IoT Product Management at Keyfactor, as they walk through how IoT manufacturers can navigate complex supply chains to build trusted IoT devices.

    In this webinar, you will learn:

    -Common IoT device security challenges that require a zero trust manufacturing approach
    -Where supply chain security breakdowns occur
    -Best Practices to Achieve Zero Trust Manufacturing
  • How to Approach Your End-to-End Cryptography Strategy Recorded: Sep 2 2020 59 mins
    Dr. Edward Amoroso, CEO at TAG Cyber and Ted Shorter, CTO at Keyfactor
    By far the most familiar method ever used to protect sensitive data for personal, business, government, and infrastructure applications is cryptography. Despite this maturity, cryptography is generally viewed by most business leaders in somewhat superficial terms.

    With the expanding use of digital keys, certificates, identities, and secrets to secure enterprise use cases, one could argue that cryptography has moved from a technical to a business issue.

    Join Dr. Edward Amoroso, CEO and Lead Analyst at TAG Cyber, and Ted Shorter, CTO at Keyfactor as they offer practical guidance on how teams can approach end-to-end lifecycle management of their cryptographic keys and certificates for SSH, SSL/TLS, and PKI-related systems and operations.

    In this webinar, you will learn:
    - Challenges associated with each enterprise key management function
    - How threats of quantum, evolving audit and standards necessitate an end-to-end strategy
    - A proposed lifecycle methodology for enterprise key management
  • Certificate Management and Automation with Istio Service Mesh Recorded: Aug 20 2020 31 mins
    Shian Sung, DevSecOps Solutions Engineer and Ryan Yackel, VP of Product Marketing
    Making the move to Istio service mesh? There's a lot to consider, security being number one. Istio leverages certificate-based authentication to secure connections across multiple services. But how do you ensure that all of those certificates are trusted, compliant, and up-to-date?

    Keyfactor’s integration to Istio allows issuance of mutual TLS (mTLS) certificates so that microservices can communicate securely within a zero-trust environment (e.g. Kubernetes cluster).

    Join Shian Sung, DevSecOps Solutions Engineer, and Ryan Yackel, VP of Product Marketing, for a quick 30-minute discussion and live demo of the Keyfactor certificate automation for Istio service mesh.

    In this webinar, you’ll learn how to:

    - Secure the Istio service mesh with a powerful & trusted PKI backend
    - Connect Istio mTLS certificates with your internal and publicly trusted CAs
    - Enable high-volume mTLS certificate issuance at massive scale
    - Get full visibility of mTLS certificates across Istio deployments
  • How to Take Control of Your SSL/TLS Certificate Inventory Recorded: Jul 16 2020 32 mins
    Sami Van Vliet, Principal Product Manager and Ryan Sanders, Product Marketing Manager
    It’s not the SSL/TLS certificates you track that cause issues – it’s the certificates hiding in your network, beyond your visibility. The problem is that most organizations don’t know where all of their certificates live, who uses them, and most importantly, when they expire.

    All it takes is one unexpected expiration to create a costly network or application outage. So how do you keep track of every certificate in your inventory? The path to success starts with discovery.

    Join Sami Van Vliet, Principal Product Manager, and Ryan Sanders, Product Marketing Manager for a 30-minute discussion and live demo of the 3 simple ways that Keyfactor gives you complete visibility of all certificates in your inventory, regardless of where they were issued from or where they live.
  • Securing PKI Operations Through Mergers, Acquisitions & Divestitures Recorded: Jul 14 2020 71 mins
    Chris Hickman, Chief Security Officer at Keyfactor and Andrew Riddell, Client Solutions Architect at Optiv
    Public key infrastructure (PKI) plays a critical role in digital security for modern enterprises. But what happens when your business experiences significant changes? Corporate mergers and acquisitions can be a stressful time for security and identity teams. In most cases, merging organizations have different approaches to digital security, particularly when it comes to PKI and the processes around it.

    Join Keyfactor and Optiv as we discuss best practices for PKI during mergers and acquisitions and the considerations around security, from strategy to technology, as your business evolves. We'll also dive into a real-world scenario of how Keyfactor and Optiv helped a large convenience store and gas station chain shift their PKI strategy as they experienced changes to their business.

    In this webinar, you’ll learn about:

    -The importance of PKI and digital identities during M&As
    -Using disruption as an opportunity to update and standardize digital security
    -Best practices and steps to successful PKI migration
    -How automated PKI and certificate management accelerates migration

    After the presentation, we’ll play a round of "Battle of the Brains" trivia via the Kahoot app on your smartphone or tablet. Our top 3 participants will receive a prize:

    -1st Place: Yeti Cooler
    -2nd Place: Go Pro 7 with Adventure Bundle
    -3rd Place: $50 Starbucks Gift card
  • Protecting IoT Deployments with a Secure Root of Trust Recorded: Jul 9 2020 60 mins
    Ellen Boehm, Senior Director IoT Product Management, Mark B. Cooper, President, & Sander Temme, Senior Product Manager
    For IoT products to be successful, product leaders and engineers must establish a chain of trust between development, manufacturing and operating environments. Today, that means anything from embedded sensors in mining trucks and commercial aircraft to connected insulin pumps and smartlocks.

    How do you establish trust in these complex, untrusted and often high-risk environments? Embedding security at design is one thing, but ensuring your team can update device security and maintain trust throughout its lifecycle is mission-critical.

    Join PKI & IoT experts from Keyfactor, PKI Solution and NCipher for an interactive session on how to effectively build unique identity into connected devices at scale, and securely update firmware and cryptography throughout the product lifecycle using a secure root of trust.
Secure Every Digital Identity
Keyfactor, formerly Certified Security Solutions (CSS), is a leading provider of secure digital identity management solutions that enables organizations to confirm authenticity, and ensure the right things are interacting in the right ways in our connected world.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Re-Think Your PKI: Build, Buy or Bring in Reinforcements
  • Live at: May 12 2020 6:00 pm
  • Presented by: Ted Shorter, Co-Founder & CTO, Keyfactor and Mark Cooper, President, PKI Solutions
  • From:
Your email has been sent.
or close