AVAILABLE ON-DEMAND

Warriors Unite—Online!

Join the world’s most influential gathering of machine identity protection experts and practitioners at this free virtual event. You can expect access to thought leaders, industry insights and actionable strategies—in a new virtual format.

Learn how the world’s most progressive companies are pushing the boundaries of machine identity protection. Join us for two days of high-profile keynotes, compelling content, direct access to partners and developers, CPE credits and lots of opportunities for peer-to-peer networking—all from the comfort of your home or office.

KEYNOTE speakers

David Mahdi

Research Director in IT Leaders Systems, Security and Risk, Gartner

speakers

Anoosh Saboori

Product Manager, Google Cloud Security and Private Team

Brant Peery

Senior Software Developer, Professional Services, Venafi

Carl Bourne

Enterprise DevOps Strategy and Solutions Architect, Venafi

Chris Lyttle

Senior Information Security Architect, Venafi

Cris Madrigal

Global Solutions Architect, Developer Enablement, Venafi

Justin Hansen

Delivery Manager of Professional Services team, Venafi

Kevin Bocek

Vice President, Security Strategy and Threat Intelligence, Venafi

Mark Miller

Senior Director, Enterprise Security Support, Venafi

Mike Dodson

VP of Worldwide Customer Security Strategy, Venafi

Steve Slinger

Head of Cryptographic Services and Infrastructure, Barclays Bank

schedule
details

Day 1
10am – 6pm EDT
May 14, 2020
Day 2
10am – 2pm EDT
May 15, 2020
10:00 am - 11:00 am
Auditorium

Jeff Hudson Keynote - The Other side of the COVID Crisis: How to be Prepared to Survive and Thrive

Jeff Hudson
CEO, Venafi

THE OTHER SIDE OF THE COVID CRISIS: HOW TO BE PREPARED TO SURVIVE AND THRIVE The Other side of the COVID Crisis: How to be Prepared to Survive and Thrive

11:00 am - 12:00 pm
Auditorium

GARTNER KEYNOTE - Digital Trust and Machine Identity Protection are Essential Services

David Mahdi
Research Director in IT Leaders Systems, Security and Risk, Gartner

From VPNs, to cloud access, organizations are becoming more remote, and digital than ever. Many organizations often don’t realize the critical nature of their cryptographic dependencies until it’s too late. That’s machine identities, and cryptography. Simply put, organizations can’t establish trust in the digital realm without cryptography. From Quantum, to PKI, and Encryption, join us for this informative session on machine identity protection. It’s not a nice to have, it is now and forever an essential service!

12:00 pm - 1:00 pm
Expo Hall

SESSION BREAK: VISIT OUR SPONSOR & VENAFI EXPERTS IN THE EXPO HALLS

Visit Our Sponsors and Venafi Experts in the Virtual Expo Halls.

1:00 pm - 2:00 pm
Auditorium

Code-to-Code Combat

Slam Laqtib
Group Technical Product Manager, Venafi
Eddie Glenn
Senior Product Marketing Manager, Venafi

Protecting private code signing keys is no longer enough. Hackers are learning new ways to compromise and use them. In this session, we’ll address the risks of unsecured code signing, the challenges our customers encounter, the best practices for protecting code signing machine identities, and how Venafi Next-Gen Code Signing can help.

1:00 pm - 2:00 pm
Auditorium

Accelerating Certificate Management Adoption with NIST

Paul Turner
President, Epuio & NIST Advisor

Does Certificate Management = Chaos for you today? NIST provides clear guidance for accelerating certificate management across your enterprise. This session provides an overview of relevant NIST guidance (FIPS, 800-x, 1800-x, etc.), then distills NIST strategies for rapid enterprise-wide adoption of certificate management and making certificates assets instead of liabilities.

1:00 pm - 2:00 pm
Auditorium

Protecting Advanced MultiCloud and Hybrid Cloud Environments with Venafi

Sitaram Iyer
Global Principal Architect, Venafi
Dave Brancato
Senior Technical Marketing Engineer, Venafi

High-pace business demands and the resulting need for application modernization is changing how we think about security in multi cloud computing environments. Learn how to leverage Venafi cross functionally with native tooling to secure machine identities in AWS, Azure and GCP.

2:00 pm - 3:00 pm
Auditorium

SSH: How Big is Your Exposure?

Michael Thelander
Director of Product Marketing, Venafi

SSH … There’s a Sleeping Dragon. Ubiquitous SSH keys provide secure, automated connections, but can be hard to control. Learn how to institute a proactive SSH key management program, uniting day-to-day users of SSH with the teams responsible for securing these critical assets. Mitigate real-life threats risks before they surface while preparing for your next auditor visit.

2:00 pm - 3:00 pm
Auditorium

Demystifying the Unknown: Strategies for Creating a Complete Inventory

Tyson McMurtrey
Professional Services Consultant, Venafi
Brian Durkin
Senior Systems Engineer, Venafi

Learn the steps to completing an accurate inventory using the same strategies our consultants use. You’ll get best practices around the collection of inventories and we’ll explore advanced methods using PowerShell with the Venafi WebSDK in this advanced technical session.

2:00 pm - 3:00 pm
Auditorium

Become a TPP Troubleshooting Expert: What to know before you go!

David Smith
Principal Software Engineer, Venafi
Mark Miller
Senior Director, Enterprise Security Support, Venafi

Increase your confidence in approaching key and certificate challenges with the tools or utilities that will help you understand what is happening. This session will better help fill your tool belt with skills needed to make sure your machine identities are protected and to understand some of the challenges you may face along the way.

3:00 pm - 4:00 pm
Auditorium

Automating Enterprise and Public Machine Identities for Developers

Jean-Yves Provost
Director of Solutions Architects, APAC, Venafi
Carl Bourne
Enterprise DevOps Strategy and Solutions Architect, Venafi

The changing market landscape is requiring developers to adopt to modern application development patterns lending to greater automation requirements specifically in a native way. Development teams tend to adopt tools and services that fit them very well in their quest for complete automation for their continuous delivery model. Empowering developers to use the tools and services that they are comfortable using is almost mandatory in today’s application development world. How can security teams gain observability in the highly distributed system where the definition of perimeter is not easy to define? Gain an understanding of what Machine Identity Protection means to an organization where there is an ever growing ecosystem of application development and deployment stacks. Whether the organization uses cloud provider managed environment for containerized applications, or use various tools for managing Infrastructure as code, a standard API driven way of managing the lifecycle of TLS/SSL certificates, SSH keys, codesigning certificates is needed within the continuous integration and delivery model. This session will uncover how security teams can provide the required set of services that development teams can consume in a self-service fashion.

3:00 pm - 4:00 pm
Auditorium

Code Signing-as-a-Service: Balance Ease of Use for Developers with Governance

Chris Lyttle
Senior Information Security Architect, Venafi
Tony Hadfield
Director, Solution Architects, Venafi

Learn how Next Generation Code Signing can enable self-service for development and operations teams with better control, security and visibility. Learn technical aspects of the solution and common use cases for securing code signing in the enterprise. This will be a technical deep dive into code signing capabilities and issues surrounding securing private keys used during the code signing process.

4:00 pm - 6:00 pm
Expo Hall

SESSION BREAK: VISIT OUR SPONSOR & VENAFI EXPERTS IN THE EXPO HALLS

Visit Our Sponsors and Venafi Experts in the Virtual Expo Halls

10:00 am - 11:00 am
Auditorium

The New Normal: Securing and Protecting Machine Identities in an Increasingly Remote World

Greg Delaney
Product Marketing Manager, Venafi
Michael Thelander
Director of Product Marketing, Venafi
Eddie Glenn
Senior Product Marketing Manager, Venafi

Venafi customers know that we protect critical machine identities like TLS server certificates. But, in the “new normal” of remote workforces, the Trust Protection Platform can do much more:

  • Secure user and device certificates with Endpoint Protect
  • Allow remote developers to leverage secure but fast code signing processes
  • Protect the SSH connections remote system administrators are now creating
  • 10:00 am - 11:00 am
    Auditorium

    Machine Identity Threat Model

    Yana Blachman
    Threat Intelligence Researcher, Venafi
    Kevin Bocek
    Vice President, Security Strategy and Threat Intelligence, Venafi

    Cyber Threat Intelligence (CTI) is a common practice used in security operations for gaining knowledge into the threat landscape and the Tactics, Techniques and Procedures (TTPs) of adversaries known to operate today. This knowledge is used to raise awareness and prepare to real world attacks, as well as help in decision making and proactive defense. MITRE’s ATT&CK is a standard threat model used as a framework to describe, document and share TTPs around the security community. Venafi’s Machine Identity Protection threat model is an extension of this framework that maps real-life attacks around machine identities and their operators. The detailed map into adversaries’ activity reflects the extensiveness and criticality of machine identities and their capabilities in a successful attack and it’s use across the lifecycle. Having that knowledge equips defenders with a way to measure security controls and the importance of Machine Identity Protection. Now security professionals have a model to better protect their organization.

    10:00 am - 11:00 am
    Auditorium

    Workshop: Accelerating Certificate Management with NIST

    Paul Turner
    President, Epuio & NIST Advisor

    Want a head start creating a sound plan for eliminating the certificate management chaos in your company? This session provides you 60 minutes of dedicated time to plan and start implementing NIST certificate management guidance specifically for your company. The session includes a workbook and direct assistance/coaching from experienced practitioners.

    11:00 am - 12:00 pm
    Auditorium

    Sneak Peek: Protecting Machine Identities On-Premise and In-cloud Using the New Google Cloud CA Service

    Anoosh Saboori
    Product Manager, Google Cloud Security and Private Team
    Hari Nair
    Product Management, Venafi

    Preview a new highly scalable Certificate Authority hosted by Google and managed by customers. This new service will have built-in Venafi integration allowing mutual customers to take advantage of this innovative new service. This session includes demos that showcase automated provisioning of machine identities to cloud-native applications and end-user compute devices.

    11:00 am - 12:00 pm
    Auditorium

    Rapid Deployment Portal: Self-Help for Cert Owners

    Mark Sanders
    Sr. Sales Engineer, Venafi
    Mike Dodson
    VP of Worldwide Customer Security Strategy, Venafi

    Struggling to respond to tickets and emails from certificate owners? Trying to keep a wiki up-to-date to offload support requests you get every day? Venafi has a new, customizable information portal to answer routine certificate questions for you. In this session, you’ll spin up a portal customized to your company.

    11:00 am - 12:00 pm
    Auditorium

    Automating and Customizing Your Venafi Deployment with the API

    Cris Madrigal
    Global Solutions Architect, Developer Enablement, Venafi
    Ryan Treat
    Senior Product Manager, Venafi

    In this session, we will discuss the top 3 use cases we have seen customers solve using our API. Our walkthrough will cover requesting and downloading a certificate, creating objects and having TPP provision certificates, and automating administrative tasks such as creating folder structures or assigning values to custom fields.

    12:00 pm - 1:00 pm
    Expo Hall

    SESSION BREAK: VISIT OUR SPONSOR & VENAFI EXPERTS IN THE EXPO HALLS

    Visit Our Sponsors and Venafi Experts in the Virtual Expo Halls

    1:00 pm - 2:00 pm
    Auditorium

    SSH Best Practices from NIST [Lessons Learned]

    Steve Slinger
    Head of Cryptographic Services and Infrastructure, Barclays Bank
    Marty Milbert
    Global Principal Architect, Venafi

    In today’s digital economy, machine Identities need access other machine identities in an interactive or automated fashion—often with very high privileges such as those enabled by the Secure Shell (SSH) protocol. Governance of this access requires proper provisioning, termination, and monitoring processes. However, the security of SSH key-based access has been largely ignored to date.

    1:00 pm - 2:00 pm
    Auditorium

    Adaptable Framework: Optimizing Onboarding, Workflows, Logs and More

    Chris Lyttle
    Senior Information Security Architect, Venafi
    Brant Peery
    Senior Software Developer, Professional Services, Venafi

    Create your own extensions to Venafi using the Adaptable Framework for custom integrations and processes. See use cases and learn to set up a development environment suitable for the Adaptable Framework development and testing. Explore code to show the anatomy of the framework, along with tips, tricks, and tools you can use to enhance the development experience.

    register

    Thank you for your interest in the Machine Identity Protection Virtual Global Summit 2020 On Demand. As this event is by invitation-only for Venafi customers and partners, please allow us 24 – 48 hours to confirm your identity before granting access. Thanks for your patience.


    • By registering I have acknowledged that I agree to the Venafi Privacy Policy. I also agree to receive information from Venafi and the partner sponsors related to Venafi products, services, events and any special offers by email, post, or other forms of communication. I may unsubscribe at any time by following the instructions in the communications received.
    • This field is for validation purposes and should be left unchanged.

    If you have any questions,
    feel free to email us


    MediaOps, the company behind leading technical communities such as DevOps.com, Container Journal, Security Boulevard, DevOps TV and Digital Anarchist, along with its premier sponsor, Venafi, is proud to present the Machine Identity Protection Virtual Global Summit. Machine Identity Protection is the industry’s first truly immersive conference focused on world’s most progressive companies that are pushing the boundaries of machine identity protection.

    MediaOps virtual events take place in the unique virtual reality conference environment. Not your typical series of strung together Google Hangouts, every one of our virtual summits is a true live conference, replete with an actual theater to view the keynotes and presentations, a conference lobby to chat and socialize, a real virtual expo floor with exhibitor stands and booths, equipped with videos, downloadable assets, and even prizes for you to win.

    Best part of the virtual summit — you can attend it from the comfort of your work desk, laptop or even your smartphone. No hotels, no airplanes, no travel, hence no traffic or parking garages. Simply log in and listen, learn, network and enjoy! Oh, and did we mention — it is all absolutely free.