Hi [[ session.user.profile.firstName ]]

The State of Machine Identity Management 2021: Expert Insights and Key Takeaways

Machine identities are everywhere. From cloud services, containers, and applications, to the code running on them, every machine needs a trusted identity.

But with the rapid increase in machine identities, many CIOs and CISOs are left with an uneasy feeling of not being in control. The stakes are high – keeping ahead of certificate outages, key theft or misuse, and audits is a constant challenge.

The result? 88% of organizations still experience serious outages due to expired certificates. Another 89% of organizations experienced at least three failed audits due to insufficient key management.

Join Chris Hickman, Chief Security Officer, and Ryan Sanders, Senior Product Marketing Manager, to hear key takeaways from the Ponemon Institute 2021 State of Machine Identity Management Report, including:

-Why crypto-agility emerged as a top priority for organizations
-Key risks and challenges in managing machine identities
-The importance of machine identity management in Enterprise IAM strategy
Recorded May 19 2021 60 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Chris Hickman, Chief Security Officer and Ryan Sanders, Senior Product Marketing Manager
Presentation preview: The State of Machine Identity Management 2021: Expert Insights and Key Takeaways

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Real-World Machine Identity Management in Action Jun 23 2021 3:00 pm UTC 31 mins
    Toby Gaff, Director of Solutions Engineering & Ryan Yackel, VP of Product Marketing
    From IoT and mobile devices to software-defined applications, cloud instances, containers, and even the code running within them, machines already outnumber humans. The criticality of machine identity management propelled Gartner to recognize it as a new category in their 2020 Hype Cycle for Identity and Access Management Technologies report:

    “This is a new profile that reflects an increased need to manage cryptographic keys, X.509 certificates that are used to establish trust in the identities of machines, such as IoT devices, virtual machines, containers, and RPA bots”, said Ant Allen, Gartner Analyst.

    With the emergence of machine identity management as an industry-recognized term, it is more crucial than ever for organizations to manage and protect these identities.

    To see real-world Machine Identity Management in action, join Ryan Yackel, VP of Product Marketing, and Toby Gaff, Director of Solutions Engineering, for a demo and discussion of how Keyfactor Command enables full visibility, control, automation and orchestration.

    In this 30-minute webinar, you’ll learn:

    -How to get a continuous inventory of your machine identities
    -How to automate identity lifecycle
    -How to extend machine identity management with other tools (e.g. HashiCorp Vault, Istio)
  • Zero-Trust Architecture for Multi-Cloud Service Mesh Jun 17 2021 5:00 pm UTC 45 mins
    Eric Mizell, VP of Field Engineering (Keyfactor) and Adam Zwickey, Director of Global Solutions Engineering (Tetrate)
    Trust nothing, verify everything. As enterprises shift from traditional on-premise infrastructure to highly dynamic, distributed workloads, “zero-trust” has become the new norm. Now every machine, application, and service must be authenticated with a unique and trusted identity.

    Machine identities (aka TLS certificates) are essential to zero-trust security in a service mesh, like Istio. But getting it right requires more than just standing up a certificate authority (CA) and issuing certificates. Security must be enforced in real-time to ensure that every certificate is trusted, meets policy, and protected against misuse or theft.

    In this session, we’ll discuss the importance of TLS certificates in zero-trust security, and how, with Keyfactor and Tetrate, teams can address the challenges of certificate management across their Istio service mesh deployment.
  • PKI for IoT: How to Secure Connected Devices from Design to End-of-Life Jun 16 2021 10:00 pm UTC 45 mins
    Ellen Boehm, VP of IoT Strategy & Operations, Keyfactor; Ryan Sanders, Sr. Product Marketing Manager, Keyfactor
    Companies are now deploying billions of network-connected devices into mission-critical environments, such as medical devices, industrial, and manufacturing control systems.

    However, as more stringent customer requirements and regulations emerge, manufacturers must address security concerns, such as authentication, data encryption, and integrity of software and firmware on their devices.

    With the emergence of IoT, PKI has become an instrumental tool in securing the next generation of industrial and consumer-connected devices. In this session, Keyfactor’s VP of IoT Strategy and Operations, Ellen Boehm, and Senior Product Marketing Manager, Ryan Sanders, will discuss:

    Security challenges that IoT developers and device manufacturers face
    How PKI can address challenges with complex supply chains and product lifecycles
    Considerations for design, deployment and management of PKI for IoT devices
  • Achieve IAM Agility for Machine Identities Jun 16 2021 5:00 pm UTC 60 mins
    Ted Shorter, CTO & Co-Founder, Keyfactor and Sean Ryan, Senior Analyst - Security & Risk, Forrester
    The IAM practices of long-standing organizations were built for rigid structure and slow, predictable changes. The seismic shift to dynamic workloads, rapid change, agile business, and the like puts tremendous strain on these systems. This is especially true for the massive scale and high velocity of machine identities, which are growing exponentially across organizations. We will reveal the underlying problems with managing machine identities and propose strategies and tactics to overcome operational challenges and security risks.
  • Navigating Vehicle and IoT Security: Your Questions Answered by Crypto Experts Recorded: Jun 9 2021 30 mins
    Ellen Boehm, VP of IoT Strategy and Chris Conlon, Engineering Manager
    Securing vehicles is hard – perhaps harder than just about any other device. Don’t take our word for it. A simple internet search reveals that all major automobile manufacturers have experienced a vehicle security exposure.

    Join Keyfactor and wolfSSL for a Live Q&A with VP of IoT Strategy, Ellen Boehm, and Engineering Manager, Chris Conlon, as they discuss embedding strong cryptography into vehicle and IoT devices:

    -Unique security challenges that engineers face when securing connected vehicles
    -Address the role that cryptography plays in securing vehicles
    -Practical advice on how these same principles can improve security for other connected IoT devices where high assurance and scalability are a must
  • Biden's Cybersecurity Executive Order: Your Questions Answered by Crypto Experts Recorded: May 26 2021 30 mins
    Ellen Boehm (VP of IoT Strategy & Operations), Ted Shorter (CTO & Co-Founder), Tomas Gustavsson (CTO & Founder of EJBCA)
    There has been an awakening for the importance of modernizing cyber security infrastructure --- and it’s about time.

    On May 12th, President Biden signed an Executive Order (EO) to “improve the nation’s cyber security and protect federal government networks.” This EO comes shortly after the recent Colonial Pipeline ransomware attack and previously cyber security incidents that affected both SolarWinds and Microsoft Exchange.

    The EO touts modernizing critical infrastructure with Zero Trust Architecture and improving supply chain security. But what does this mean for both the public and private sector? Where does the role of securing machine identities play in building stronger standards?

    Join Keyfactor's Ellen Boehm (VP of IoT Strategy & Operations), Ted Shorter (CTO & Co-Founder), and PrimeKey's Tomas Gustavsson (CTO & Founder of EJBCA) as they break down the most important sections of the EO and answer your questions on where cryptography plays a role in securing our nation for the future.
  • The State of Machine Identity Management 2021: Expert Insights and Key Takeaways Recorded: May 19 2021 60 mins
    Chris Hickman, Chief Security Officer and Ryan Sanders, Senior Product Marketing Manager
    Machine identities are everywhere. From cloud services, containers, and applications, to the code running on them, every machine needs a trusted identity.

    But with the rapid increase in machine identities, many CIOs and CISOs are left with an uneasy feeling of not being in control. The stakes are high – keeping ahead of certificate outages, key theft or misuse, and audits is a constant challenge.

    The result? 88% of organizations still experience serious outages due to expired certificates. Another 89% of organizations experienced at least three failed audits due to insufficient key management.

    Join Chris Hickman, Chief Security Officer, and Ryan Sanders, Senior Product Marketing Manager, to hear key takeaways from the Ponemon Institute 2021 State of Machine Identity Management Report, including:

    -Why crypto-agility emerged as a top priority for organizations
    -Key risks and challenges in managing machine identities
    -The importance of machine identity management in Enterprise IAM strategy
  • Secure Code Signing in the Software Supply Chain Recorded: Apr 21 2021 28 mins
    Eric Mizell, VP of Field Engineering and Ryan Sanders, Sr. Product Marketing Manager
    If you’re developing software, deploying over the air (OTA) firmware updates, or spinning up containers, you know the importance of code signing as a security best practice.

    Code signing is more important and more complex than ever. Faster releases, entirely remote teams, and complex supply chains make manual, hardware-based solutions ineffective. So how do you protect signing keys and simplify the signing process?

    Join Eric Mizell, VP of Solution Engineering, and Ryan Sanders, Sr. Product Marketing Manager, for a live demo and discussion of how Keyfactor Code Assure enables fast and secure signing.

    In this 30-minute session, we’ll cover:

    -Known risks and complexities in code signing
    -Use cases: Traditional, DevOps and CI/CD, and IoT manufacturing
    -A live demo of the Keyfactor Code Assure platform
  • How to Build End-to-End IoT Device Security at Scale Recorded: Apr 21 2021 44 mins
    Ted Shorter (CTO), Ellen Boehm (VP, IoT Strategy), Kim Bybjerg (VP at Tata Communications), Paul Hampton (Sr. Product Mgr.)
    Connected things include a variety of IoT endpoint devices across several critical infrastructure segments, including utilities, automotive, healthcare, retail, and building automation. Complex manufacturing supply chains make it difficult to build electronic devices that can be trusted – forcing security to be bolted on as a feature rather than being a critical element designed at the start of a product’s lifecycle.

    By adopting a Zero Trust approach, IoT manufacturers can ensure device trustworthiness and security at scale through their product's end-to-end lifecycle.

    In this panel with device security experts, discussion topics will include:

    -How businesses can gain a competitive advantage by embedding security in the devices they manufacture
    -Regulations relating to IoT security that manufacturers should be aware of
    -Where secure crypto fits into the product design and lifecycle process
    -Common IoT device security challenges that require a zero trust manufacturing approach

    Device security experts in this panel include:

    -Ted Shorter, Co-Founder & CTO at Keyfactor
    -Ellen Boehm, VP of IoT Strategy and Operations at Keyfactor
    -Kim Bybjerg, VP/Head of Continental Europe at Tata Communications & Chairman of IMC (IoT M2M Coucil)
    -Paul Hampton, Senior Product Manager, Thales
  • Zero Trust Manufacturing: How to Embed IoT Device Security in Your Supply Chain Recorded: Mar 31 2021 45 mins
    Ellen Boehm, VP of IoT Strategy & Operations and Ryan Yackel, VP of Product Marketing
    With so many supply chain partners, the reality is that you cannot trust the security of the manufacturing process to ensure that the hardware, firmware or credentials of the device have not been altered. 

    Manufacturers must take a “zero trust manufacturing” approach and design security into the device while maintaining effective security controls throughout the manufacturing process and product lifecycle to ensure the security, trustworthiness and safety of a device.

    Join Ellen Boehm, VP of IoT Strategy & Operations and Ryan Yackel, VP of Product Marketing, as they walk through how IoT manufacturers can navigate complex supply chains to build trusted IoT devices.

     In this webinar, you will learn:

    -Common IoT device security challenges that require a zero trust manufacturing approach
    -Where supply chain security breakdowns occur
    -Best Practices to Achieve Zero Trust Manufacturing
  • Keyfactor + Avi Vantage (VMware): Stop Outages & Start Certificate Automation Recorded: Mar 15 2021 31 mins
    Brian Taricska | Solutions Engineer & Ryan Sanders | Sr. Product Marketing Manager
    If you’re a Network Engineer, downtime is enemy number one. Keeping up with change requests, troubleshooting issues, and implementing new hardware is hard work – but all of that gets derailed when an application outage strikes.

    In this webinar, we’ll look at how network engineers can eliminate certificate-related outages and reduce manual, repetitive tasks with certificate discovery and lifecycle automation for Avi Vantage (VMware).

    Join Brian Tariscka, Solutions Engineer and Ryan Sanders, Sr. Product Marketing Manager for a 30-minute overview and live demo of the Keyfactor + Avi Vantage (VMware) integration.

    See how you can leverage Keyfactor to:

    -Discover SSL and client certificates across your load balancers
    -Simplify certificate requests with fast, easy self-service
    -Automate certificate provisioning, installation and renewal
  • The Business Case for a Cloud-First PKI Strategy Recorded: Mar 10 2021 58 mins
    Chris Hickman - Chief Security Officer, Ryan Yackel - VP of Product Management, Blake Wood - Director of Business Development
    The explosion of machine identities, keys, and certificates across multi-cloud and DevOps environments have stretched your on-premise PKI to its limits.

    And with over 62% of organizations currently or planning on outsourcing their PKI, now might be time to evaluate a new approach to PKI for the future.

    In this webinar, we explore the evolving complexity and costs of PKI, how to balance potential risks against those costs, and ways your organization can build the business case for a cloud-first PKI strategy.

    Join Chris Hickman, Chief Security Officer at Keyfactor, and Blake Wood, Director of Business Development at Thales, as they talk:

    - How PKI has evolved and continues to grow in complexity
    - Options for PKI deployment
    - The costs of on-premise PKI
    - The Future of PKI in the cloud
  • Zero Trust Manufacturing: An Approach to IoT Device Security Recorded: Mar 3 2021 30 mins
    Ellen Boehm, VP of IoT Strategy & Tomas Gustavsson, CTO
    The complexity of multiple points in the supply chain created a trust gap between product design/firmware development and hardware. Manufacturing finds it difficult to embed identity into the process and maintain identities throughout the device lifecycle once it’s deployed into the field. These factors have led to the emergence of adopting a Zero Trust Manufacturing approach to IoT device identity.

    In this webinar, Ellen Boehm, VP of IoT Strategy at Keyfactor, and Tomas Gustavsson, CTO at Primekey, we will show why the Zero Trust model is critical to the IoT lifecycle and how to put this theory into practice.
  • Securing the Next Generation of Connected Vehicles Recorded: Feb 18 2021 62 mins
    Ted Shorter, CTO & Co-Founder and Ryan Sanders, Senior Product Manager
    From a security standpoint, early editions of connected vehicles had a rough start. Securing automobiles is hard – perhaps harder than just about any other device. 

    In this webinar, Ted Shorter, CTO + Co-Founder, and Ryan Sanders, Senior Product Manager, will outline the unique security challenges that engineers face when securing connected vehicles, address the role that PKI and cryptography play in securing them – and how the same principles can improve security for other connected products where high assurance and scalability are a must.
  • Keyfactor Certificate Automation with AWS and Azure Key Vault Recorded: Feb 17 2021 30 mins
    Brian Taricska, Solutions Engineer and Ryan Yackel, VP of Product Marketing
    As your business takes on new multi-cloud initiatives, securing machine identities can get out of hand quickly. While it may be easy to issue certificates from these platforms, keeping track of where they are and when they will expire can be difficult.

    Without continuous visibility into all certificates used in AWS and Azure, you are at risk of an unexpected outage that can cost seriously downtime to your business.

    In this webinar, we will dive into how Keyfactor integrates with both AWS Certificate Manager and Azure Key Vault to continuously monitor your certificate statuses and orchestrate their distribution with ease.

    Join Brian Taricska, Solutions Engineer, and Ryan Yackel, VP of Product Marketing, for a 30-minute discussion and live demo of Keyfactor + AWS Cert Management and Azure Key Vault integrations.

    See how you can use Keyfactor to:

    -Discover all keys and certificates from AWS and Azure
    -Automation of certificate deployments
    -Orchestrate workflows and alerts
  • TalkingTrust with Thales and Keyfactor - IoT Security Recorded: Jan 27 2021 21 mins
    Ellen Boehm, VP of IoT Strategy at Keyfactor, and Dave Madden, Director of Business Development at Thales
    In this brief video, you’ll hear from Ellen Boehm, VP of IoT Strategy at Keyfactor, and Dave Madden, Sr. Director of Business Development at Thales, as they discuss the current state of IoT security and share their joint solution for securing the entire IoT ecosystem using Keyfactor Control and Thales Luna HSMs.
  • Self-Service Certificate Automation using Keyfactor and ServiceNow Recorded: Jan 19 2021 31 mins
    Wael Altaqi, Sr. Solutions Engineer and Ryan Sanders, Sr. Product
    Everyone from network engineers to developers need fast, easy access to trusted SSL/TLS certificates. If not, you can bet they’ll find alternative, non-compliant ways to get them.

    If you’re already using ServiceNow ITSM, it often makes sense to use the same familiar interface to give your users self-service access to certificates. In this webinar, we’ll dive into how Keyfactor integrates with ServiceNow to simplify and automate certificate requests, renewals, and alerting.

    Join Wael Altaqi, Sr. Solutions Engineer and Ryan Sanders, Sr. Product Marketing Manager, for a 30-minute discussion and live demo of the Keyfactor + ServiceNow integration.
  • Reign in Your Rogue Admins: Best Practices for Managing SSL/TLS Certificates Recorded: Dec 16 2020 34 mins
    Sami Van Vliet, Principal Product Manager at Keyfactor and Mrugesh Chandarana, Senior Product Manager at HID
    It’s not the SSL/TLS certificates you track that cause outages, it’s the unknown and untracked certificates hiding in your network – beyond your visibility. The problem is that most organizations don’t know where all of their certificates live, who uses them, and most importantly, when they expire.

    All it takes is one unexpected expiration to create a costly network or application outage. How do you keep track of every certificate in your inventory?

    In this webinar, Sami Van Vliet, Principal Product Manager at Keyfactor (and former Rogue Web Admin herself) and Mrugesh Chandarana, Senior Product Manager at HID, will walk through five best practices to monitor and control your SSL/TLS certificate inventory – and mitigate the risk of unknown and rogue certificates.

    Originally presented at the 2020 Keyfactor Critical Trust Virtual Summit.
  • Critical Trust Health Check: Insights from Keyfactor Customers Recorded: Dec 4 2020 29 mins
    Joe Elbers, Customer Success Manager and Brandon Tubandt, SVO of Operation & Customer Success
    Ever wanted to know how your PKI operations and key management practices stack up against the broader Keyfactor community?

    Join members of Keyfactor’s Customer Success Team, Joe Elbers (Customer Success Manager) and Brandon Tubandt (SVP, Operations & Customer Success), as they share some of our customer health scores and outline how you can score as high as they did with future product feature adoption.


    Originally presented at the 2020 Keyfactor Critical Trust Virtual Summit.
  • Developing a Unified Cryptography Strategy, Why Now? Recorded: Dec 4 2020 47 mins
    Kevin von Keyserling, Co-Founder and Chief Strategy Officer & Ted Shorter, Co-Founder and Chief Technology Officer
    Are you ready to manage any certificate, any key, at any time with ease? How about orchestrating crypto across your business?

    With the acceleration of enterprise infrastructure toward software-defined systems, the ubiquity of DevOps with its rapid CI/CD pipeline, instantaneous deployment of cloud-based services, and IoT devices, enterprises often end up with tens of thousands — even millions — of keys and certificates. And they're typically unaware of the total number of these entities.

    Keyfactor Co-Founders, Ted Shorter (Chief Technology Officer) and Kevin von Keyserling (Chief Strategy Officer) discuss how to get started with a unified crypto strategy, and preview what's to come from Keyfactor R&D.


    Originally presented at the 2020 Keyfactor Critical Trust Virtual Summit.
Leader in Cloud-First PKI as-a-Service & Crypto-Agility Solutions
Keyfactor is the leader in cloud-first PKI as-a-Service and crypto-agility solutions. Our Crypto-Agility Platform empowers security teams to seamlessly orchestrate any key, any certificate, anywhere across the enterprise.

We help our customers apply cryptography in the right way from modern, multi-cloud enterprises to complex IoT supply chains.

With decades of cybersecurity experience, Keyfactor is trusted by more than 500 enterprises across the globe.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: The State of Machine Identity Management 2021: Expert Insights and Key Takeaways
  • Live at: May 19 2021 12:00 pm
  • Presented by: Chris Hickman, Chief Security Officer and Ryan Sanders, Senior Product Marketing Manager
  • From:
Your email has been sent.
or close