Securing PKI Operations Through Mergers, Acquisitions & Divestitures

Logo
Presented by

Chris Hickman, Chief Security Officer at Keyfactor and Andrew Riddell, Client Solutions Architect at Optiv

About this talk

Public key infrastructure (PKI) plays a critical role in digital security for modern enterprises. But what happens when your business experiences significant changes? Corporate mergers and acquisitions can be a stressful time for security and identity teams. In most cases, merging organizations have different approaches to digital security, particularly when it comes to PKI and the processes around it. Join Keyfactor and Optiv as we discuss best practices for PKI during mergers and acquisitions and the considerations around security, from strategy to technology, as your business evolves. We'll also dive into a real-world scenario of how Keyfactor and Optiv helped a large convenience store and gas station chain shift their PKI strategy as they experienced changes to their business. In this webinar, you’ll learn about: -The importance of PKI and digital identities during M&As -Using disruption as an opportunity to update and standardize digital security -Best practices and steps to successful PKI migration -How automated PKI and certificate management accelerates migration After the presentation, we’ll play a round of "Battle of the Brains" trivia via the Kahoot app on your smartphone or tablet. Our top 3 participants will receive a prize: -1st Place: Yeti Cooler -2nd Place: Go Pro 7 with Adventure Bundle -3rd Place: $50 Starbucks Gift card
Related topics:

More from this channel

Upcoming talks (4)
On-demand talks (163)
Subscribers (10111)
Keyfactor is the machine and IoT identity platform for modern enterprises. The company helps security teams manage cryptography as critical infrastructure by simplifying PKI, automating certificate lifecycle management, and enabling crypto-agility at scale. Companies trust Keyfactor to secure every digital key and certificate for multi-cloud enterprises, DevOps, and embedded IoT security.