InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Mastering a Machine Identity Security (MIS) Strategy: Certificates and PKI 101

Presented by

Justin Hansen, Field CTO, Venafi, a CyberArk Company Florin Lazurca, Product Marketing Manager, Venafi, a CyberArk Company

About this talk

In an era where identity is the cornerstone of security, understanding and effectively managing certificates and Public Key Infrastructure (PKI) is essential. Welcome to ""Mastering a Machine Identity Security (MIS) Strategy: Certificates and PKI 101,” an interactive session for understanding and managing digital certificates and PKI. This educational webinar is designed to provide an overview of machine identity security essentials, furnishing you with a solid grounding in the technologies that enable crypto-agility. In this session, our cybersecurity instructors will cover: - What is Machine Identity Security and why is it a Gartner 2025 top cybersecurity trend - A detailed explanation of certificates: what they are, how to obtain them, and their various uses. - An overview of Certificate Authorities and PKI. - The key components required for a comprehensive Machine Identity Security program. Join us for this foundational course and discover how automated machine identity solutions can enhance your security posture, streamline certificate management, and ensure compliance. This webinar is your opportunity to build a strong understanding of certificates and PKI, empowering you to protect your organization against evolving threats.
CyberArk

CyberArk

44223 subscribers208 talks
Don’t just manage identities. Secure them.
Centered on intelligent privilege controls, CyberArk provides the most comprehensive security offering for any identity - seamlessly securing human and machine identities accessing workloads from hybrid to multi-cloud, and flexibly automates the identity lifecycle all with continuous threat detection and prevention – protecting organization’s identities and most critical assets by enabling Zero Trust and enforcing least privilege.
Related topics