InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

From Chaos to Control: Automating Machine Identity Security Before the 47-Day Certificate Deadline

Presented by

Florin Lazurca, Director, Product Marketing | CyberArk

About this talk

By March 2026, public TLS certificate lifespans will halve—and eventually shrink to just 47 days by 2029—driving urgent change in how organizations manage certificate renewals, and ultimately, digital trust. TLS certificates are the machine identities that underpin secure communication on the internet. Manual certificate tracking at the scale demanded by 47-day renewals simply won’t be feasible. And without automation, shortened lifecycles increase the risk of outages and compliance failures. Now is the time to implement a modern, automated certificate management strategy to safeguard trust, ensure compliance, and keep pace with the internet’s accelerating demands. You'll leave the session with practical guidance on how to: - Modernize your certificate lifecycle management with scalable automation - Align risk communication across technical teams, leadership, and the board - Budget for the transition and articulate the cost of inaction - Prepare your infrastructure for continuous 47-day renewal cycles, essential for public PKI and increasingly valuable for internal systems
Identity Defined Security Alliance

Identity Defined Security Alliance

9349 subscribers159 talks
Vendor-neutral talks on reducing the risk of identity-related breaches
This channel brings together the leading identity and security vendors and industry experts to regularly educate security leaders on how to reduce risk through identity-centric strategies. For more resources and education on identity-centric security strategies, visit www.idsalliance.org.
Related topics