Hi [[ session.user.profile.firstName ]]

New Strategies for Managing Machine Identities

Machine identities are everywhere. From cloud services, containers, and applications, to the code running on them, every machine needs a trusted identity.

But with the rapid increase in machine identities, many security and infrastructure teams are left with an uneasy feeling of not being in control. The stakes are high – keeping ahead of certificate outages, key theft or misuse, and audits is a constant challenge.

The result? 88% of organizations still experience serious outages due to expired certificates. Another 89% of organizations experienced at least three failed audits due to insufficient key management.
In this webinar, you’ll learn:
• Why crypto-agility emerged as a top priority for organizations
• Key risks and challenges in managing machine identities
• How to build a case for prioritizing machine identity and reduce risk of unmanaged machine identities
• Steps for building a Crypto Center of Excellence (CCoE)
Recorded Sep 16 2021 60 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Danny Bradbury
Presentation preview: New Strategies for Managing Machine Identities
  • Channel
  • Channel profile
  • Machine ID Management vs. Digital Transformation: Building a Secure Future Oct 21 2021 2:00 pm UTC 75 mins
    Benjamin David
    Machines already outnumber the humans on your network, which means every machine needs a trusted identity. Consider IoT devices, mobile devices and software-defined workloads and applications – trusted identity for each and every machine is critical.

    As zero-trust and multi-cloud architecture become the norm, the role of machine identities in enterprise IAM (identity and access management) has reached critical importance – each needing to be managed and protected. The stakes are high, and keeping ahead of outages, key theft or misuse and internal and regulatory audits is a serious challenge.

    In this webinar, our panel will discuss:
    · The use (and misuse) of machine identities in organizations today
    · Implications of machine IDs on data privacy and protection
    · Strategies and recommendations to manage machine identities
    · How to operationalize your strategy with a Crypto Center of Excellence (CCoE)
  • How MDR Can Shelter Organizations From the Cyber Storm Oct 14 2021 3:00 pm UTC 75 mins
    Eleanor Dallaway
    Three forces are creating a perfect cyber storm: an escalated threat level, a cyber-talent shortage and the growing complexity of managing a multitude of security solutions, all exacerbated by the digital shift during COVID-19. This storm is driving change, forcing us to break down silos between endpoint, workload, network and identity. It's driving the need to leverage existing tooling rather than bolting on more. It’s also reshaping managed security services to be less focused on "busy work," and more focused on "expert work."

    Managed detection and response (MDR) services could provide the shelter from this storm for organizations if leveraged correctly and with the right technologies and skills in place. In this webinar, a panel of security experts will break down the current threat landscape and how MDR can protect your organization in this environment.

    Key takeaways:
    · The trends increasing the risk of cyber-attacks to organizations
    · The development of MDR services and their growing relevance
    · How to select an MDR solution that works for your organization
  • Third-Party Vulnerabilities: Demystifying the Unknown Oct 7 2021 5:00 pm UTC 75 mins
    Danny Bradbury
    What parts of your cyber supply chain are you unknowingly neglecting? The SolarWinds hack was a wake-up call for companies to check their suppliers and partners for risk. There are still plenty of other dangers lurking in third party systems ranging from software applications and APIs through to embedded devices, chipsets, firmware, and IoT solutions.

    These risks lie in other organizations' assets and are seemingly out of your control, but there are protective measures that you can take. Attending this webinar will give you a new perspective on this complex challenge and some actionable insights on where to begin.

    Talking points will include:
    - The kinds of vulnerabilities that exist in third-party resources
    - How to audit for supply chain vulnerabilities
    - Strategies for mitigating supply chain availabilities early
  • Removing the Blindfold to Better Network Security Oct 7 2021 2:00 pm UTC 75 mins
    James Coker
    The COVID-19 pandemic drove many companies to rapidly deploy cloud solutions to support the overnight shift to remote working. However, the speed of this adoption meant this process was often rushed, leaving many organizations exposed to new security risks. With the pandemic easing and the world entering a ‘new normal’, businesses can no longer be complacent about this issue. The risk is too great – to your brand, your share price and your customers.

    Amid this environment, and following a surge high-profile cyber-attacks this year, now is the time to pause and re-examine your cloud security to gain a true understanding of your complete attack surface. Better visibility of your network is critical to ensure the most efficient and effective use of your current and future security investment. This panel of cloud security experts will examine:

    • What are the real consequences of an attack to a business?
    • How gaps in your security can so easily be missed, particularly following the adoption of new technologies
    • How do you maintain the required vigilance to keep up with the growing risk of cyber-attacks?
  • The Challenges of Multi-Cloud and Hybrid Security Sep 30 2021 5:00 pm UTC 75 mins
    Moderator: Danny Bradbury
    Over the last few years, the cybersecurity industry has rapidly adopted cloud computing and containerization. These trends have broken many traditional security paradigms, forcing security teams to rethink, retrain and adopt new approaches.

    The transition to cloud computing and containerization is proving difficult and leading to an increase in misconfigurations and breaches. According to Gartner, by 2030, at least 99% of cloud security failures will be the customer’s fault. This panel will discuss the challenges facing security teams and how the cybersecurity industry is addressing them.

    In this webinar, you will learn about the following challenges:
    · Lack of visibility into and across cloud service providers
    · Changes to the process where application developers implement security
    · Learning and implementing native CSP and Kubernetes security controls
    · Implementing security in a hybrid, multi-cloud environment
  • MDR/EDR/XDR: Wading Through Acronyms For the Right Detection & Response Solution Sep 30 2021 2:00 pm UTC 75 mins
    Benjamin David
    The threat landscape is continuously evolving. As organizations adapt to new ways of working and look to harness the potential of emerging technologies, threat actors lay in wait — anticipating the next exploit, technique or open door that will grant access to networks and information.

    To keep up, detection and response technologies have evolved at an equal pace. This rapid acceleration of threats and solutions can make it difficult to choose the right solution for your organization — especially as not all security solutions are created equal.

    In this webinar, a panel of experts will explore threat detection and response programs, EDR, MDR, XDR solutions and how they can work effectively together to strengthen your overall cybersecurity program.

    Attendees will learn:
    • The differences and evolution of XDR, EDR, and MDR
    • Insights into the challenges of managing these platforms — making the managed vs. non-managed decision
    • Key considerations of finding the best solution for you and your organization
  • How to Rethink End-User Protection and Eliminate Phishing and Ransomware Sep 23 2021 2:00 pm UTC 75 mins
    Moderator: James Coker
    Ransomware attacks have surged in the past year–and with the rise of ransomware-as-a-service, it’s become an increasingly profitable tactic for cyber criminals.

    According to Cybersecurity Ventures, in 2021 global losses from ransomware attacks are expected to exceed $20bn, and by 2031 that figure may be as high as $265bn. This follows recent high-profile attacks that led to Colonial Pipeline in the US paying over $4m in Bitcoin to the attackers and Travelex paying $2.3m to regain control after hackers shut down its financial transaction networks.

    Such is the severity of the situation that 60% of respondents to a recent Menlo poll think ransomware attacks should be treated the same as terrorist attacks. But it is quite possible to make malware, even ransomware attacks, a distant memory. To do so, organizations should discard outdated detect-and-remediate approaches and rethink how they protect users, applications, data and the business from these attacks from the outset.

    Join this 1-hour webinar to learn:
    • How phishing and ransomware attack trends have changed as a result of COVID-19
    • Ways you can eliminate ransomware and protect your digital and remote workforce
    • How a leading logistics and insurance business achieves 100% malware protection without impacting end-user experience or convenience
  • #IMOS21 How Cryptocurrency is Shaping the Cybercrime Landscape Sep 22 2021 9:00 pm UTC 60 mins
    Moderator: James Coker, Speakers: Diana Kelley, James McQuiggan
    Cyber-criminals often favor cryptocurrencies because they are easy to monetize and provide some level of anonymity. From cyber-criminals using cryptocurrency as a method of payment for tools and criminal services, to attacks on cryptocurrency, to cryptojacking…this session will look at the ways in which cryptocurrency is shaping the cybercrime landscape.
  • #IMOS21 Ransomware: To Pay or Not to Pay? And…How Not to Pay! Sep 22 2021 7:45 pm UTC 60 mins
    Moderator: James Coker, Larry Whiteside Jr, Andrew Hay, Niel Harper
    Ransomware attacks, demands, payments and counter-attacks have dominated cybersecurity headlines in 2021. In this session, a panel of experts debate whether there is ever a good argument for paying the ransom when struck by ransomware, or whether funding crime is never the answer. Panelists will also explore ways in which organizations can rebuild and move forward if they choose not to pay the ransom.
  • #IMOS21 #HowTo Establish a Positive Cybersecurity Culture in Your Organization Sep 22 2021 7:00 pm UTC 30 mins
    Moderator: Eleanor Dallaway, Dr Jessica Barker
    In this ‘how to’ session, you will be given a practical guide on how to build and implement a positive cybersecurity culture. Considerations will include: winning over the C-suite, language and methods for communication and messaging, training and education best practice, reporting, incentives and internal campaigns.
  • #IMOS21 Keynote - Transforming the SOC with Google Scale Analytics Sep 22 2021 6:00 pm UTC 30 mins
    Moderator: Benjamin David, Anton Chuvakin (Head of Solutions Strategy, Google Cloud - Chronicle)
    Many organizations promise to transform your security operations center (SOC) with technology, advice or their personnel.

    However, what does it take to really transform your SOC to be ready for future threats? What tools are needed? What new processes? What are the dependencies?

    Let's explore these and other questions in this talk.
  • #IMOS21 Global Threat Brief: The Most Dangerous Attack Techniques in 2021 Sep 22 2021 4:45 pm UTC 60 mins
    Moderator: Eleanor Dallaway, Brad LaPorte, Martin McKeay, Miranda Ritchie, Alissa Knight, Michael F D Anaya
    The last two years have certainly seen a huge amount of change and evolution, and cyber-attack vectors and attack techniques have been no exception. In this session, a panel of experts will analyze the most dangerous attack techniques being used today, complimented with advice on how to build a defense against these methods.
  • #IMOS21 Cybersecurity Automation: The Good, The Bad & The Ugly Sep 22 2021 3:30 pm UTC 60 mins
    Moderator: Benjamin David, Corey Nachreiner, Dominic Vogel, Massimo Ferrari
    Automating tasks allows businesses to concentrate on more productive problem-solving activities, which can lead to a more resilient organization from a cybersecurity standpoint.

    However, automation increases the complexity of an organization’s systems, and as cyber-criminals expand their scope, cybersecurity programs must be ready to implement automated cybersecurity in defense.

    But where can automation be lacking, or worse, problematic? This session will explore the pros and cons of cybersecurity automation.
  • #IMOS21 Shooting Your Shot! Don't Let Acrophobia Keep You from Aiming for Stars Sep 22 2021 2:45 pm UTC 30 mins
    Moderator: Eleanor Dallaway, Alyssa Miller
    It's an all too familiar story, especially in cybersecurity. A driven professional sets lofty goals for herself and someone comes along to tell her why she’s not being realistic, why she’s pushing too far too fast, why she’s simply not qualified. For many, it’s the internal voices that are our biggest opponents to success. Acrophobia, more commonly known as a fear of heights, is something that holds many of us back in our career journeys. We're told not to aim too high for fear we may fall. Yet those voices that tell us to be afraid, to be conservative in our goals, do us more harm than good.

    In her keynote address, Alyssa Miller talks about the mistakes that professionals often fall into when we believe the voices that tell us if we’re too ambitious we will get hurt. She’ll discuss where these voices come from, how they threaten to limit not only our careers but our ability to contribute to the cybersecurity community. She’ll draw from examples in her own career progression to illustrate both the mistakes she made and successes she achieved along the way. Listen as she gives you tangible tools to silence those voices, discover your value, and aim for heights that allow you to play among the stars. Remember, you'll never make it to the moon if you insist on keeping one foot on the ground.
  • #IMOS21 How To: Use AI to Strengthen Cybersecurity Posture Without Compromise Sep 21 2021 3:00 pm UTC 30 mins
    Moderator: Benjamin David, Speaker: Bruce Schneier
    This technical how-to session, delivered by an artificial intelligence expert, will offer a step-by-step guide to using AI to strengthen your cybersecurity posture.
  • #IMOS21 Cyber Threat Landscape: Trends, Evolving Techniques & Attacks Sep 21 2021 1:45 pm UTC 60 mins
    Moderator: Eleanor Dallaway, Speakers: Stu Peck, Jan Carroll, Rob Dartnall, Staurt Davey
    In this session, a panel of experts will consider the current global cyber-threat landscape. What are the changing tactics being explored and deployed in countries around the world? What are the notable trends in the more notable regions in the cybercrime / cyberwarfare world, and how do they differ from each other? Are there any new emerging attack vectors and techniques? This session will look to answer these questions and more.
  • #IMOS21 Safer Online: Strengthening the Resiliency of the Internet Sep 21 2021 12:30 pm UTC 60 mins
    Moderator: James Coker, Speakers: Jake Moore, Holly Grace Williams, Brian Honan
    In June 2021, the world watched as a single software bug in Fastly brought down large parts of the internet. It was fleeting, but it shone a light on just how vulnerable the internet can be. What needs to be done in order to strengthen the resilience of the internet? What can major companies and governments do to reduce reliance on the companies forming the building blocks of the internet? This session takes a look at the risks if cyber-criminals were to target these companies.
  • #IMOS21 Keynote Presentation - Should We Be Getting Rid of Our AppSec Teams? Sep 21 2021 11:30 am UTC 30 mins
    Moderator: Eleanor Dallaway, Tash Norris (Head of Cyber Security for Moonpig Group)
    Over the last few years, we've seen a real shift in the way software engineers work. Many companies no longer have tightly defined roles (DBA, linux engineer, network engineer, front | back end developer). Engineers are no longer just deploying software onto existing boxes but are full stack, managing the infrastructure layer as well as the software layer, often as part of the same deployment.

    So is having an AppSec team focused on just one portion of those builds the right approach? Are our security teams evolving at the same pace as our engineering functions? In this talk Tash Norris will cover why Moonpig chose to have a product security team, how they differ to application security teams and the role they can play in supporting the growth and security of your business.
  • #IMOS21 SOC .vs. MSSP: Which Is Right For Your Organization? Sep 21 2021 10:15 am UTC 60 mins
    Moderator: James Coker, Speakers: Matt Lorentzen, Manoj Bhatt, Giovanni Cozzolino
    For organizations looking to strengthen their security posture, and let’s face it, who isn’t, the decision about whether to build an internal Security Operations Center(SOC) versus choosing to delegate and select an external Managed Security Service Provider (MSSP) is often a challenging one. Considerations need to include resource and skills, budget, time demands, security posture, technology, ROI…the list goes on. In this session, experts will weigh up the pros and cons of SOCs and MSSPs and give you the knowledge you need to make your own decision on which is the right solution for your organization.
  • #IMOS21 From Hero to Zero: Strategies for Zero Trust Live 60 mins
    Moderator: Benjamin David, Speakers: Tony Pepper, John Checco, Jonas Gyllenhammar, Joseph Carson
    Zero trust has emerged as an important part of an enterprise security strategy. With organizations facing increasingly complex environments with ever-more remote and mobile workforces, organizations need a new security model. Is the “never trust, always verify” model the right one? And what considerations and strategies for zero trust do CISOs need to think about before deploying a zero trust model? Join this session to find out.
Strategy - Insight - Technology
Dedicated to serving the information security community, in person, in print and online.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: New Strategies for Managing Machine Identities
  • Live at: Sep 16 2021 5:00 pm
  • Presented by: Danny Bradbury
  • From:
Your email has been sent.
or close