Hi [[ session.user.profile.firstName ]]

The State of PKI & IoT Security: Your Questions Answered by PKI Experts

As product innovators bring connected devices to market, the risk of device hacks and data theft continues to rise. Faster product development and feature delivery often take priority, leading to increased security risks. Modern public key infrastructure (PKI) has emerged as an efficient and cost-effective way to secure embedded devices at scale, but only when it’s done right.

Join Keyfactor, Thales, and Farallon Technology Group for a LIVE Q&A with CTO, Ted Shorter, Director of Technology, Gorav Arora, and Keao Caindec, Principal Analyst, as we take your questions and provide practical advice on the state of IoT security today and best practices for securing the entire IoT ecosystem and product lifecycle using modern PKI.
Recorded May 28 2020 33 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Ted Shorter, CTO, Gorav Arora, Office of CTO, and Keao Caindec, Principal Analyst
Presentation preview: The State of PKI & IoT Security: Your Questions Answered by PKI Experts

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Reign in Your Rogue Admins: Best Practices for Managing SSL/TLS Certificates Dec 16 2020 6:00 pm UTC 34 mins
    Sami Van Vliet, Principal Product Manager at Keyfactor and Mrugesh Chandarana, Senior Product Manager at HID
    It’s not the SSL/TLS certificates you track that cause outages, it’s the unknown and untracked certificates hiding in your network – beyond your visibility. The problem is that most organizations don’t know where all of their certificates live, who uses them, and most importantly, when they expire.

    All it takes is one unexpected expiration to create a costly network or application outage. How do you keep track of every certificate in your inventory?

    In this webinar, Sami Van Vliet, Principal Product Manager at Keyfactor (and former Rogue Web Admin herself) and Mrugesh Chandarana, Senior Product Manager at HID, will walk through five best practices to monitor and control your SSL/TLS certificate inventory – and mitigate the risk of unknown and rogue certificates.

    Originally presented at the 2020 Keyfactor Critical Trust Virtual Summit.
  • Assess Your Certificate Management Maturity: A Workshop with PKI Experts Dec 2 2020 6:00 pm UTC 54 mins
    Sami Van Vliet, Principal Product Manager and Ryan Yackel, VP Product Marketing
    As SSL/TLS certificate usage continues to reach extreme levels, other factors like the shorter certificate lifespans, expanding use cases, and the rise of quantum have put pressure on certificate management practices.

    However, the broad scope of certificate management makes it hard to know how mature your current practices are today and where they need to be for the future. The transition from manual spreadsheet-based tracking to full certificate lifecycle automation often comes with significant bumps in the road, but in our experience, it is well worth the effort.

    That’s where this model comes in to help.

    Join Sami Van Vliet, Principal Product Manager, and Ryan Yackel, VP Product Marketing as they walk through each level of a practical guide on how to scale and automate certificate management.

    In this webinar, you will learn:
    -How to self-assess your team’s progress against five maturity levels
    -Common scenarios experienced at each level
    -Tips for implementing required process changes that will get you to your next level in certificate management maturity
  • What to Watch Out for in 2021: Top Trends in Crypto Nov 11 2020 6:00 pm UTC 35 mins
    John Ray (Director of HSM Product Management, Thales), Mike Brown (CTO, ISARA), Chris Hickman (CSO, Keyfactor)
    We can agree 2020 was anything but ordinary – but what can we expect in the year ahead? From sleeping dragons to expected crypto-compromises, this panel discussion will cover some of the ways that cryptographic keys and digital certificates will be used (and misused) in 2021 and beyond.

    In this webinar, you’ll hear directly from those at the forefront of cryptography as they share insights on:

    -How IoT & DevOps are testing the limits of PKI
    -The impact of shorter SSL/TLS certificate lifecycles
    -Emerging code-signing and SSH-based attacks
    -The threat of Impending root CA expirations

    Originally presented at the 2020 Keyfactor Critical Trust Virtual Summit.
  • Ghost Hunt: How to Find and Secure SSH Keys in Your Network Recorded: Sep 30 2020 56 mins
    Ted Shorter, CTO, Ryan Sanders, Product Marketing Manager, & Sami Van Vliet, Principal Product Manager
    IT and DevOps teams routinely use SSH keys to automate secure access to servers, yet there’s little to no control over how they’re generated or used. Unlike SSL certificates, SSH keys don’t expire. So what happens? Ghost (or inactive) SSH keys lay dormant and unmanaged on the network, creating potential backdoors for hackers to infiltrate critical servers.

    Do you know where your SSH keys are hiding? Who you gonna call?

    Join Ted Shorter, CTO, Ryan Sanders, Product Marketing Manager, and Sami Van Vliet, Principal Product Manager, as they discuss all you need to know about SSH keys, and how to find and manage them effectively, including:

    - How unprotected SSH keys create risks and audit challenges
    - Why now? Emerging risks of SSH key sprawl and attacks
    - 5 best practices for SSH key protection and management
  • Cryptography Management: Your Questions Answered by Crypto Experts Recorded: Sep 16 2020 41 mins
    Ted Shorter, CTO & Co-Founder, Chris Hickman, CSO, & Ryan Yackel, VP of Product Marketing
    Cryptography – the most familiar method ever used to protect sensitive data for personal, business, government and infrastructure application. With the expanding use of digital keys, certificates, identities, and secrets to secure enterprise use cases, one could argue that cryptography has moved from a technical to a business issue.

    Is the threat of quantum or evolving audit and standards urging you to develop an end-to-end strategy? If so, bring your questions and join Ted Shorter, CTO & Co-Founder, Chris Hickman, CSO, and Ryan Yackel, VP of Product Marketing, as they take questions live and offer practical advice on how teams can approach end-to-end lifecycle management of their cryptography keys and certificates for SSH, SSL/TLS, and PKI-related systems and operations.
  • Zero Trust Manufacturing: How to Embed IoT Device Security in Your Supply Chain Recorded: Sep 9 2020 59 mins
    Ellen Boehm, Senior Director IoT Product Management and Keao Caindec, Principal Analyst
    With so many supply chain partners, the reality is that you cannot trust the security of the manufacturing process to ensure that the hardware, firmware or credentials of the device have not been altered.

    Manufacturers must take a “zero trust manufacturing” approach and design security into the device while maintaining effective security controls throughout the manufacturing process and product lifecycle to ensure the security, trustworthiness and safety of a device.

    Join Keao Caindec, Principal Analyst at Farallon Technology Group, and Ellen Boehm, Senior Director IoT Product Management at Keyfactor, as they walk through how IoT manufacturers can navigate complex supply chains to build trusted IoT devices.

    In this webinar, you will learn:

    -Common IoT device security challenges that require a zero trust manufacturing approach
    -Where supply chain security breakdowns occur
    -Best Practices to Achieve Zero Trust Manufacturing
  • How to Approach Your End-to-End Cryptography Strategy Recorded: Sep 2 2020 59 mins
    Dr. Edward Amoroso, CEO at TAG Cyber and Ted Shorter, CTO at Keyfactor
    By far the most familiar method ever used to protect sensitive data for personal, business, government, and infrastructure applications is cryptography. Despite this maturity, cryptography is generally viewed by most business leaders in somewhat superficial terms.

    With the expanding use of digital keys, certificates, identities, and secrets to secure enterprise use cases, one could argue that cryptography has moved from a technical to a business issue.

    Join Dr. Edward Amoroso, CEO and Lead Analyst at TAG Cyber, and Ted Shorter, CTO at Keyfactor as they offer practical guidance on how teams can approach end-to-end lifecycle management of their cryptographic keys and certificates for SSH, SSL/TLS, and PKI-related systems and operations.

    In this webinar, you will learn:
    - Challenges associated with each enterprise key management function
    - How threats of quantum, evolving audit and standards necessitate an end-to-end strategy
    - A proposed lifecycle methodology for enterprise key management
  • Certificate Management and Automation with Istio Service Mesh Recorded: Aug 20 2020 31 mins
    Shian Sung, DevSecOps Solutions Engineer and Ryan Yackel, VP of Product Marketing
    Making the move to Istio service mesh? There's a lot to consider, security being number one. Istio leverages certificate-based authentication to secure connections across multiple services. But how do you ensure that all of those certificates are trusted, compliant, and up-to-date?

    Keyfactor’s integration to Istio allows issuance of mutual TLS (mTLS) certificates so that microservices can communicate securely within a zero-trust environment (e.g. Kubernetes cluster).

    Join Shian Sung, DevSecOps Solutions Engineer, and Ryan Yackel, VP of Product Marketing, for a quick 30-minute discussion and live demo of the Keyfactor certificate automation for Istio service mesh.

    In this webinar, you’ll learn how to:

    - Secure the Istio service mesh with a powerful & trusted PKI backend
    - Connect Istio mTLS certificates with your internal and publicly trusted CAs
    - Enable high-volume mTLS certificate issuance at massive scale
    - Get full visibility of mTLS certificates across Istio deployments
  • How to Take Control of Your SSL/TLS Certificate Inventory Recorded: Jul 16 2020 32 mins
    Sami Van Vliet, Principal Product Manager and Ryan Sanders, Product Marketing Manager
    It’s not the SSL/TLS certificates you track that cause issues – it’s the certificates hiding in your network, beyond your visibility. The problem is that most organizations don’t know where all of their certificates live, who uses them, and most importantly, when they expire.

    All it takes is one unexpected expiration to create a costly network or application outage. So how do you keep track of every certificate in your inventory? The path to success starts with discovery.

    Join Sami Van Vliet, Principal Product Manager, and Ryan Sanders, Product Marketing Manager for a 30-minute discussion and live demo of the 3 simple ways that Keyfactor gives you complete visibility of all certificates in your inventory, regardless of where they were issued from or where they live.
  • Securing PKI Operations Through Mergers, Acquisitions & Divestitures Recorded: Jul 14 2020 71 mins
    Chris Hickman, Chief Security Officer at Keyfactor and Andrew Riddell, Client Solutions Architect at Optiv
    Public key infrastructure (PKI) plays a critical role in digital security for modern enterprises. But what happens when your business experiences significant changes? Corporate mergers and acquisitions can be a stressful time for security and identity teams. In most cases, merging organizations have different approaches to digital security, particularly when it comes to PKI and the processes around it.

    Join Keyfactor and Optiv as we discuss best practices for PKI during mergers and acquisitions and the considerations around security, from strategy to technology, as your business evolves. We'll also dive into a real-world scenario of how Keyfactor and Optiv helped a large convenience store and gas station chain shift their PKI strategy as they experienced changes to their business.

    In this webinar, you’ll learn about:

    -The importance of PKI and digital identities during M&As
    -Using disruption as an opportunity to update and standardize digital security
    -Best practices and steps to successful PKI migration
    -How automated PKI and certificate management accelerates migration

    After the presentation, we’ll play a round of "Battle of the Brains" trivia via the Kahoot app on your smartphone or tablet. Our top 3 participants will receive a prize:

    -1st Place: Yeti Cooler
    -2nd Place: Go Pro 7 with Adventure Bundle
    -3rd Place: $50 Starbucks Gift card
  • Protecting IoT Deployments with a Secure Root of Trust Recorded: Jul 9 2020 60 mins
    Ellen Boehm, Senior Director IoT Product Management, Mark B. Cooper, President, & Sander Temme, Senior Product Manager
    For IoT products to be successful, product leaders and engineers must establish a chain of trust between development, manufacturing and operating environments. Today, that means anything from embedded sensors in mining trucks and commercial aircraft to connected insulin pumps and smartlocks.

    How do you establish trust in these complex, untrusted and often high-risk environments? Embedding security at design is one thing, but ensuring your team can update device security and maintain trust throughout its lifecycle is mission-critical.

    Join PKI & IoT experts from Keyfactor, PKI Solution and NCipher for an interactive session on how to effectively build unique identity into connected devices at scale, and securely update firmware and cryptography throughout the product lifecycle using a secure root of trust.
  • Shifting to a Next-Generation PKI: Your Questions Answered by PKI Experts Recorded: Jul 8 2020 46 mins
    Chris Hickman, CSO and Ellen Boehm, Senior Director of IoT Product Management
    IT and security leaders recognize public key infrastructure (PKI) as a proven and time-tested security tool in the enterprise. At the same time the digital landscape has changed, and along with it the need for PKI to adapt.

    PKI deployments have evolved and expanded to protect more business-critical infrastructure and applications than ever before, emerging as a secure and cost-effective technology to enable new initiatives like cloud, service mesh, and IoT.

    Join us for a live Q&A with Keyfactor’s CSO Chris Hickman, and Senior Director of IoT Product Management, Ellen Boehm, as we take your questions and provide practical advice for evaluating in-house PKI vs. PKI as-a-Service.
  • Modernizing Your PKI Infrastructure and Security Recorded: Jun 18 2020 50 mins
    Gary Marsden, Senior Director for Data Protection and Chris Hickman, CSO at Keyfactor
    In this Tech Talk, you will hear about the importance of building a modern PKI infrastructure and how to scale the security to support the growing uses of PKI in healthcare, retail and automotive industries.
  • Maximizing F5 BIG-IP Uptime & Security with Keyfactor Certificate Automation Recorded: Jun 4 2020 30 mins
    Jack Palivoda, Senior Solutions Engineer and Ryan Sanders, Product Marketing Manager
    If you’ve deployed multiple F5 BIG-IP appliances to run your business applications, you know how important – yet complex – it is to manage keys and digital certificates. Keyfactor enables enterprises to automate requests, provisioning, and renewal of certificates across F5 appliances to avoid certificate-related outages and improve security.

    Join Jack Palivoda, Sr. Solutions Engineer, and Ryan Sanders, Product Marketing Manager, for a 30-minute discussion and live demo of the Keyfactor + F5 BIG-IP integration.

    In this webinar, you’ll learn:
    -The importance of keys and certificates in F5 deployments
    -How to avoid costly downtime and automate distribution of certificates
    -How Keyfactor integrates with F5 appliances at scale
  • Live Q&A: Scaling Public Key Infrastructure Remotely Recorded: Jun 2 2020 31 mins
    Shian Sung, Sr. Solutions Engineer, Tina Parmer, Director of Sales - TOLA, & John Grimm, Sr. Director of Strategy & Bus. Dev.
    Order some pizza (or dinner from your favorite local restaurant) for the family on Keyfactor and join us and our partner, nCipher, in an insightful discussion about the change in security needs organizations have been facing for the past few months, and how to best address those needs within their enterprises and IoT devices.

    Every organization has responded differently, but the need to secure their remote workforce is a top priority. When it comes to public key infrastructure (PKI), InfoSec teams must have visibility and control over their digital certificates to prevent outages and ensure business continuity.

    Keyfactor and nCipher are pleased to host a relaxed discussion and Q&A about the changes we've seen in the world of security, upcoming trends and how to properly utilize cryptography/digital identities.

    Topics to be covered include:

    - A before and after look at how security has changed with a predominantly remote work environment
    - How and why enterprises are effectively utilizing PKI to secure their business landscape
    - Expected trends in the cryptography and PKI landscape
    - What toppings you got on your Pizza/what local restaurant you supported!
  • The State of PKI & IoT Security: Your Questions Answered by PKI Experts Recorded: May 28 2020 33 mins
    Ted Shorter, CTO, Gorav Arora, Office of CTO, and Keao Caindec, Principal Analyst
    As product innovators bring connected devices to market, the risk of device hacks and data theft continues to rise. Faster product development and feature delivery often take priority, leading to increased security risks. Modern public key infrastructure (PKI) has emerged as an efficient and cost-effective way to secure embedded devices at scale, but only when it’s done right.

    Join Keyfactor, Thales, and Farallon Technology Group for a LIVE Q&A with CTO, Ted Shorter, Director of Technology, Gorav Arora, and Keao Caindec, Principal Analyst, as we take your questions and provide practical advice on the state of IoT security today and best practices for securing the entire IoT ecosystem and product lifecycle using modern PKI.
  • Evolving Security for an IoT World Recorded: May 21 2020 48 mins
    Gorav Arora, Office of CTO at Thales and Ted Shorter, CTO, Keyfactor
    The Internet of Things (IoT) has transformed our lives, providing convenience, enabling personalization, and changing our expectations of how devices behave. Products have become smarter with an extended usable life, allowing companies to deepen customer engagement through bi-directional touchpoints and enhanced usage analytics.

    With Internet connectivity opening these formerly isolated devices, they are digitally transformed into data hubs – sending and receiving critical information to the end-user and the enterprise. While this flow of data offers enhanced product features and new revenue opportunities, it can introduce security risks to the user and enterprise.

    Join Thales and Keyfactor to learn:
    • The state of IoT security today;
    • Best practices for securing the entire IoT ecosystem and product lifecycle – from development, manufacturing, updates, decommissioning; and
    • How a robust, secure PKI process can protect device identities, sign application artifacts in all environments, secure communication channels to and from the device, and ensure authorized access to the device, software and data.
  • Re-Think Your PKI: Build, Buy or Bring in Reinforcements Recorded: May 12 2020 61 mins
    Ted Shorter, Co-Founder & CTO, Keyfactor and Mark Cooper, President, PKI Solutions
    Public key infrastructure (PKI) is a fundamental security tool used by most organizations today. Whether it’s securing your network, sensitive data, or connected devices, IT and security leaders turn to PKI as a proven solution to establish trust in their business.

    But PKI isn’t like any other technology in your IT stack – it’s a complex ecosystem of roles, policies and procedures, hardware and software. Just keeping it up and running can be challenging enough, not to mention enabling new use cases such as DevOps, multi-cloud, and remote workforce access.

    The good news is, you have options. Join “The PKI Guy” Mark Cooper and Ted Shorter, CTO and Co-founder at Keyfactor for a live talk, as they discuss how PKI has evolved and why it may be time to re-think the way it’s deployed and managed in your enterprise.
    In this live talk, we’ll discuss:

    - New use cases and standards for Enterprise PKI
    - Common PKI deployment and maintenance challenges
    - Finding the right fit: In-House, Managed, or Hosted PKI
    - Practical recommendations and PKI best practices
  • How Cryptography Revolutionizes Secure IoT Design and Zero-Trust Manufacturing Recorded: May 7 2020 60 mins
    Senior Director of IoT Product Management, Ellen Boehm and Senior Vice President of Product Management, Mark Thompson
    Tight budgets and product development lifecycles make it nearly impossible to consider all the necessary factors for embedding strong security throughout a device’s lifecycle. But when customer privacy and safety are at stake, it has to happen.

    Cryptography has emerged as a flexible and highly scalable solution to enable critical authentication, encryption and signing capabilities for lightweight IoT devices. However, most product developers and manufacturers don’t know where to start.

    Join Keyfactor’s Senior Director of IoT Product Management, Ellen Boehm, and Senior Vice President of Product Management, Mark Thompson, to discuss effective strategies to cryptographically bind identity to devices at scale and establish integrity throughout the device lifecycle.

    In this webinar, you’ll learn about:

    -The risks of poor IoT security implementation
    -The advantages of symmetric and asymmetric cryptography for IoT
    -How to embed and manage cryptography throughout the device lifecycle
    -Real-world use cases for secure design and remote manufacturing
    -How Solutions like Thales, wolfSSL & Keyfactor Can Help
  • Using the Keyfactor Secrets Engine for HashiCorp Vault Recorded: May 6 2020 30 mins
    JD Kilgallin, Senior Integration Engineer, and Ryan Sanders, Product Marketing Manager, Keyfactor
    Using HashiCorp Vault? Instead of using the Vault-native PKI, Keyfactor allows you to plug Vault into your existing enterprise PKI. That means DevOps can deploy fast, while security teams retain complete visibility and control over backend PKI operations.

    Join JD Kilgallin, Senior Integration Engineer, and Ryan Sanders, Product Marketing Manager, for a quick 30-minute discussion and live demo of the Keyfactor Secrets Engine for Vault.

    In this webinar, you’ll learn how to:

    -Connect Vault with your internal and publicly-trusted CAs
    -Enable high-volume certificate issuance at massive scale
    -Get full visibility of certificates across all Vault instances and more
    -Enforce tight policy controls and auditability to ensure compliance
Secure Every Digital Identity
Keyfactor, formerly Certified Security Solutions (CSS), is a leading provider of secure digital identity management solutions that enables organizations to confirm authenticity, and ensure the right things are interacting in the right ways in our connected world.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: The State of PKI & IoT Security: Your Questions Answered by PKI Experts
  • Live at: May 28 2020 5:00 pm
  • Presented by: Ted Shorter, CTO, Gorav Arora, Office of CTO, and Keao Caindec, Principal Analyst
  • From:
Your email has been sent.
or close