
AVAILABLE ON-DEMAND
Warriors Unite—Online!
Join the world’s most influential gathering of machine identity protection experts and practitioners at this free virtual event. You can expect access to thought leaders, industry insights and actionable strategies—in a new virtual format.
Learn how the world’s most progressive companies are pushing the boundaries of machine identity protection. Join us for two days of high-profile keynotes, compelling content, direct access to partners and developers, CPE credits and lots of opportunities for peer-to-peer networking—all from the comfort of your home or office.
KEYNOTE speakers
Jeff Hudson
speakers
Anoosh Saboori
Brant Peery
Brian Durkin
Carl Bourne
Chris Lyttle
Cris Madrigal
Dave Brancato
David Smith
Eddie Glenn
Greg Delaney
Hari Nair
Jean-Yves Provost
Justin Hansen
Kevin Bocek
Mark Miller
Mark Sanders
Marty Milbert
Michael Thelander
Mike Dodson
Paul Turner
Ryan Treat
Sitaram Iyer
Slam Laqtib
Steve Slinger
Tony Hadfield
Tyson McMurtrey
Yana Blachman
schedule
details
GARTNER KEYNOTE - Digital Trust and Machine Identity Protection are Essential Services
From VPNs, to cloud access, organizations are becoming more remote, and digital than ever. Many organizations often don’t realize the critical nature of their cryptographic dependencies until it’s too late. That’s machine identities, and cryptography. Simply put, organizations can’t establish trust in the digital realm without cryptography. From Quantum, to PKI, and Encryption, join us for this informative session on machine identity protection. It’s not a nice to have, it is now and forever an essential service!
SESSION BREAK: VISIT OUR SPONSOR & VENAFI EXPERTS IN THE EXPO HALLS
Visit Our Sponsors and Venafi Experts in the Virtual Expo Halls.
Code-to-Code Combat
Protecting private code signing keys is no longer enough. Hackers are learning new ways to compromise and use them. In this session, we’ll address the risks of unsecured code signing, the challenges our customers encounter, the best practices for protecting code signing machine identities, and how Venafi Next-Gen Code Signing can help.
Accelerating Certificate Management Adoption with NIST
Does Certificate Management = Chaos for you today? NIST provides clear guidance for accelerating certificate management across your enterprise. This session provides an overview of relevant NIST guidance (FIPS, 800-x, 1800-x, etc.), then distills NIST strategies for rapid enterprise-wide adoption of certificate management and making certificates assets instead of liabilities.
Protecting Advanced MultiCloud and Hybrid Cloud Environments with Venafi
High-pace business demands and the resulting need for application modernization is changing how we think about security in multi cloud computing environments. Learn how to leverage Venafi cross functionally with native tooling to secure machine identities in AWS, Azure and GCP.
SSH: How Big is Your Exposure?
SSH … There’s a Sleeping Dragon. Ubiquitous SSH keys provide secure, automated connections, but can be hard to control. Learn how to institute a proactive SSH key management program, uniting day-to-day users of SSH with the teams responsible for securing these critical assets. Mitigate real-life threats risks before they surface while preparing for your next auditor visit.
Demystifying the Unknown: Strategies for Creating a Complete Inventory
Learn the steps to completing an accurate inventory using the same strategies our consultants use. You’ll get best practices around the collection of inventories and we’ll explore advanced methods using PowerShell with the Venafi WebSDK in this advanced technical session.
Become a TPP Troubleshooting Expert: What to know before you go!
Increase your confidence in approaching key and certificate challenges with the tools or utilities that will help you understand what is happening. This session will better help fill your tool belt with skills needed to make sure your machine identities are protected and to understand some of the challenges you may face along the way.
Automating Enterprise and Public Machine Identities for Developers
The changing market landscape is requiring developers to adopt to modern application development patterns lending to greater automation requirements specifically in a native way. Development teams tend to adopt tools and services that fit them very well in their quest for complete automation for their continuous delivery model. Empowering developers to use the tools and services that they are comfortable using is almost mandatory in today’s application development world. How can security teams gain observability in the highly distributed system where the definition of perimeter is not easy to define? Gain an understanding of what Machine Identity Protection means to an organization where there is an ever growing ecosystem of application development and deployment stacks. Whether the organization uses cloud provider managed environment for containerized applications, or use various tools for managing Infrastructure as code, a standard API driven way of managing the lifecycle of TLS/SSL certificates, SSH keys, codesigning certificates is needed within the continuous integration and delivery model. This session will uncover how security teams can provide the required set of services that development teams can consume in a self-service fashion.
Code Signing-as-a-Service: Balance Ease of Use for Developers with Governance
Learn how Next Generation Code Signing can enable self-service for development and operations teams with better control, security and visibility. Learn technical aspects of the solution and common use cases for securing code signing in the enterprise. This will be a technical deep dive into code signing capabilities and issues surrounding securing private keys used during the code signing process.
SESSION BREAK: VISIT OUR SPONSOR & VENAFI EXPERTS IN THE EXPO HALLS
Visit Our Sponsors and Venafi Experts in the Virtual Expo Halls
The New Normal: Securing and Protecting Machine Identities in an Increasingly Remote World
Venafi customers know that we protect critical machine identities like TLS server certificates. But, in the “new normal” of remote workforces, the Trust Protection Platform can do much more:
Machine Identity Threat Model
Cyber Threat Intelligence (CTI) is a common practice used in security operations for gaining knowledge into the threat landscape and the Tactics, Techniques and Procedures (TTPs) of adversaries known to operate today. This knowledge is used to raise awareness and prepare to real world attacks, as well as help in decision making and proactive defense. MITRE’s ATT&CK is a standard threat model used as a framework to describe, document and share TTPs around the security community. Venafi’s Machine Identity Protection threat model is an extension of this framework that maps real-life attacks around machine identities and their operators. The detailed map into adversaries’ activity reflects the extensiveness and criticality of machine identities and their capabilities in a successful attack and it’s use across the lifecycle. Having that knowledge equips defenders with a way to measure security controls and the importance of Machine Identity Protection. Now security professionals have a model to better protect their organization.
Workshop: Accelerating Certificate Management with NIST
Want a head start creating a sound plan for eliminating the certificate management chaos in your company? This session provides you 60 minutes of dedicated time to plan and start implementing NIST certificate management guidance specifically for your company. The session includes a workbook and direct assistance/coaching from experienced practitioners.
Sneak Peek: Protecting Machine Identities On-Premise and In-cloud Using the New Google Cloud CA Service
Preview a new highly scalable Certificate Authority hosted by Google and managed by customers. This new service will have built-in Venafi integration allowing mutual customers to take advantage of this innovative new service. This session includes demos that showcase automated provisioning of machine identities to cloud-native applications and end-user compute devices.
Rapid Deployment Portal: Self-Help for Cert Owners
Struggling to respond to tickets and emails from certificate owners? Trying to keep a wiki up-to-date to offload support requests you get every day? Venafi has a new, customizable information portal to answer routine certificate questions for you. In this session, you’ll spin up a portal customized to your company.
Automating and Customizing Your Venafi Deployment with the API
In this session, we will discuss the top 3 use cases we have seen customers solve using our API. Our walkthrough will cover requesting and downloading a certificate, creating objects and having TPP provision certificates, and automating administrative tasks such as creating folder structures or assigning values to custom fields.
SESSION BREAK: VISIT OUR SPONSOR & VENAFI EXPERTS IN THE EXPO HALLS
Visit Our Sponsors and Venafi Experts in the Virtual Expo Halls
SSH Best Practices from NIST [Lessons Learned]
In today’s digital economy, machine Identities need access other machine identities in an interactive or automated fashion—often with very high privileges such as those enabled by the Secure Shell (SSH) protocol. Governance of this access requires proper provisioning, termination, and monitoring processes. However, the security of SSH key-based access has been largely ignored to date.
Adaptable Framework: Optimizing Onboarding, Workflows, Logs and More
Create your own extensions to Venafi using the Adaptable Framework for custom integrations and processes. See use cases and learn to set up a development environment suitable for the Adaptable Framework development and testing. Explore code to show the anatomy of the framework, along with tips, tricks, and tools you can use to enhance the development experience.
register
Thank you for your interest in the Machine Identity Protection Virtual Global Summit 2020 On Demand. As this event is by invitation-only for Venafi customers and partners, please allow us 24 – 48 hours to confirm your identity before granting access. Thanks for your patience.