InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

What You Don't Protect In Code-Signing Will Impact You

Presented by

Riley Dickens, Senior Consultant at Encryption Consulting

About this talk

Code-signing is a critical pillar of software trust and security, yet it's often overlooked until a breach occurs. In this webinar, we’ll explore why securing your code-signing process is essential to maintaining software integrity, preventing unauthorized modifications, and protecting your reputation. Learn about the most common vulnerabilities in code-signing workflows, the role of strong key management and HSMs, and how real-world breaches could have been prevented. Through actionable insights and practical examples, you'll discover how to implement a secure and scalable code-signing strategy. Key Takeaways: - Understand the critical role of code-signing in software authenticity and integrity. - Identify common pitfalls and vulnerabilities in code-signing workflows. - Learn how to implement secure key storage using HSMs and best-in-class key management practices. - Analyze real-world incidents to uncover how weak code-signing led to breaches. - Gain actionable steps to build a scalable, secure, and automated code-signing strategy.
Encryption Consulting LLC

Encryption Consulting LLC

1631 subscribers63 talks
Global Leaders in Applied Cryptography!
We are the world's leading provider of applied cryptography. Over 100 Fortune 500 corporations have sought our help in protecting their most sensitive data and solving the most complex problems. Through our products and professional services, you can strengthen your ability to protect cryptographic keys, digital certificates, software code signing, Certificate Lifecycle management, and more. We are committed to staying up-to-date with the latest technology trends, compliances, and best practices in data security, and we leverage this expertise to help our clients achieve their security goals.
Related topics