Ghost Hunt: How to Find and Secure SSH Keys in Your Network

Presented by

Ted Shorter, CTO, Ryan Sanders, Product Marketing Manager, & Sami Van Vliet, Principal Product Manager

About this talk

IT and DevOps teams routinely use SSH keys to automate secure access to servers, yet there’s little to no control over how they’re generated or used. Unlike SSL certificates, SSH keys don’t expire. So what happens? Ghost (or inactive) SSH keys lay dormant and unmanaged on the network, creating potential backdoors for hackers to infiltrate critical servers. Do you know where your SSH keys are hiding? Who you gonna call? Join Ted Shorter, CTO, Ryan Sanders, Product Marketing Manager, and Sami Van Vliet, Principal Product Manager, as they discuss all you need to know about SSH keys, and how to find and manage them effectively, including: - How unprotected SSH keys create risks and audit challenges - Why now? Emerging risks of SSH key sprawl and attacks - 5 best practices for SSH key protection and management

Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (76)
Subscribers (4193)
Keyfactor is the leader in cloud-first PKI as-a-Service and crypto-agility solutions. Our Crypto-Agility Platform empowers security teams to find, control, and automate every machine identity with Keyfactor. We help our customers apply cryptography in the right way from modern, multi-cloud enterprises to complex IoT supply chains. With decades of cybersecurity experience, Keyfactor is trusted by more than 500 enterprises across the globe.