InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Federal ICAM 101: Modernize and Simplify PKI with Cloud--Practical Steps to Operational Efficiency and Lower Costs

Presented by

Deena Thomchick, ICAM Security Strategist

About this talk

How federal agencies (and contractors) can reduce operational complexity and costs inherent in existing Federal Public Key Infrastructure (PKI) operations by adopting FedRAMP-authorized cloud services. What You’ll Learn: — How PKI-as-a-Service (PKIaaS) can reduce costs, accelerate deployment, and simplify certificate lifecycle management. — How to get from legacy, fragmented, complicated-to-manage on-prem Certificate Authorities (CAs) to a unified, dedicated, easy-to-manage cloud-based system. — Best practices for integrating with Identity, Credential, and Access Management (ICAM) frameworks—ensuring alignment with OMB, FIPS, and NIST standards. — Real-world use cases on achieving operational efficiency, continuous compliance, and improved security resilience through cloud-native solutions. If you need to modernize your legacy PKI systems, this session will equip you with actionable tactics to drive operational efficiency and security resilience across your agency.
Axiad

Axiad

2200 subscribers31 talks
Trusted Identity. At the speed of now.
Identity teams are drowning in complexity with fragmented tools, siloed data, blind spots, and manual processes. This chaos exposes organizations to breaches, ransomware, data theft, compliance failures, and budget overruns. Axiad tames the human and NHI chaos by automating visibility, intelligence, risk remediation, and lifecycle management. The result is a drastic acceleration of operational efficiency. —Eliminate thousands of work hours from manual processes, —Prioritize resources to make the most impact, —Reduce the risk of breach and the financial implications that come with it
Related topics