CloudBees Automotive Virtual Event

April 22, 2020, 10am-5pm ET
Days
Hours
Minutes
Seconds

about cloudbees automotive

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum. Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.”

speakers

Anoosh Saboori

Product Manager, Google Cloud Security and Private Team

Steve Slinger

Head of Cryptographic Services and Infrastructure, Barclays Bank

Mike Dodson

VP of Worldwide Customer Security Strategy, Venafi

David Mahdi

Research Director in IT Leaders Systems, Security and Risk, Gartner

schedule
details

Day 1
10am – 6pm EDT
May 14, 2020
10:00 am - 11:00 am
Auditorium

Jeff Hudson Keynote - The Other side of the COVID Crisis: How to be Prepared to Survive and Thrive

Jeff Hudson
CEO, Venafi

THE OTHER SIDE OF THE COVID CRISIS: HOW TO BE PREPARED TO SURVIVE AND THRIVE The Other side of the COVID Crisis: How to be Prepared to Survive and Thrive

11:00 am - 12:00 pm
Auditorium

GARTNER KEYNOTE - Digital Trust and Machine Identity Protection are Essential Services

David Mahdi
Research Director in IT Leaders Systems, Security and Risk, Gartner

From VPNs, to cloud access, organizations are becoming more remote, and digital than ever. Many organizations often don’t realize the critical nature of their cryptographic dependencies until it’s too late. That’s machine identities, and cryptography. Simply put, organizations can’t establish trust in the digital realm without cryptography. From Quantum, to PKI, and Encryption, join us for this informative session on machine identity protection. It’s not a nice to have, it is now and forever an essential service!

12:00 pm - 1:00 pm
Expo Hall

SESSION BREAK: VISIT OUR SPONSOR & VENAFI EXPERTS IN THE EXPO HALLS

Visit Our Sponsors and Venafi Experts in the Virtual Expo Halls.

1:00 pm - 2:00 pm
Auditorium

Code-to-Code Combat

Slam Laqtib
Group Technical Product Manager, Venafi
Eddie Glenn
Senior Product Marketing Manager, Venafi

Protecting private code signing keys is no longer enough. Hackers are learning new ways to compromise and use them. In this session, we’ll address the risks of unsecured code signing, the challenges our customers encounter, the best practices for protecting code signing machine identities, and how Venafi Next-Gen Code Signing can help.

1:00 pm - 2:00 pm
Auditorium

Accelerating Certificate Management Adoption with NIST

Paul Turner
President, Epuio & NIST Advisor

Does Certificate Management = Chaos for you today? NIST provides clear guidance for accelerating certificate management across your enterprise. This session provides an overview of relevant NIST guidance (FIPS, 800-x, 1800-x, etc.), then distills NIST strategies for rapid enterprise-wide adoption of certificate management and making certificates assets instead of liabilities.

1:00 pm - 2:00 pm
Auditorium

Protecting Advanced MultiCloud and Hybrid Cloud Environments with Venafi

Sitaram Iyer
Global Principal Architect, Venafi
Dave Brancato
Senior Technical Marketing Engineer, Venafi

High-pace business demands and the resulting need for application modernization is changing how we think about security in multi cloud computing environments. Learn how to leverage Venafi cross functionally with native tooling to secure machine identities in AWS, Azure and GCP.

2:00 pm - 3:00 pm
Auditorium

SSH: How Big is Your Exposure?

Michael Thelander
Director of Product Marketing, Venafi

SSH … There’s a Sleeping Dragon. Ubiquitous SSH keys provide secure, automated connections, but can be hard to control. Learn how to institute a proactive SSH key management program, uniting day-to-day users of SSH with the teams responsible for securing these critical assets. Mitigate real-life threats risks before they surface while preparing for your next auditor visit.

2:00 pm - 3:00 pm
Auditorium

Demystifying the Unknown: Strategies for Creating a Complete Inventory

Tyson McMurtrey
Professional Services Consultant, Venafi
Brian Durkin
Senior Systems Engineer, Venafi

Learn the steps to completing an accurate inventory using the same strategies our consultants use. You’ll get best practices around the collection of inventories and we’ll explore advanced methods using PowerShell with the Venafi WebSDK in this advanced technical session.

2:00 pm - 3:00 pm
Auditorium

Become a TPP Troubleshooting Expert: What to know before you go!

David Smith
Principal Software Engineer, Venafi
Mark Miller
Senior Director, Enterprise Security Support, Venafi

Increase your confidence in approaching key and certificate challenges with the tools or utilities that will help you understand what is happening. This session will better help fill your tool belt with skills needed to make sure your machine identities are protected and to understand some of the challenges you may face along the way.

3:00 pm - 4:00 pm
Auditorium

Automating Enterprise and Public Machine Identities for Developers

Jean-Yves Provost
Director of Solutions Architects, APAC, Venafi
Carl Bourne
Enterprise DevOps Strategy and Solutions Architect, Venafi

The changing market landscape is requiring developers to adopt to modern application development patterns lending to greater automation requirements specifically in a native way. Development teams tend to adopt tools and services that fit them very well in their quest for complete automation for their continuous delivery model. Empowering developers to use the tools and services that they are comfortable using is almost mandatory in today’s application development world. How can security teams gain observability in the highly distributed system where the definition of perimeter is not easy to define? Gain an understanding of what Machine Identity Protection means to an organization where there is an ever growing ecosystem of application development and deployment stacks. Whether the organization uses cloud provider managed environment for containerized applications, or use various tools for managing Infrastructure as code, a standard API driven way of managing the lifecycle of TLS/SSL certificates, SSH keys, codesigning certificates is needed within the continuous integration and delivery model. This session will uncover how security teams can provide the required set of services that development teams can consume in a self-service fashion.

3:00 pm - 4:00 pm
Auditorium

Code Signing-as-a-Service: Balance Ease of Use for Developers with Governance

Chris Lyttle
Senior Information Security Architect, Venafi
Tony Hadfield
Director, Solution Architects, Venafi

Learn how Next Generation Code Signing can enable self-service for development and operations teams with better control, security and visibility. Learn technical aspects of the solution and common use cases for securing code signing in the enterprise. This will be a technical deep dive into code signing capabilities and issues surrounding securing private keys used during the code signing process.

4:00 pm - 6:00 pm
Expo Hall

SESSION BREAK: VISIT OUR SPONSOR & VENAFI EXPERTS IN THE EXPO HALLS

Visit Our Sponsors and Venafi Experts in the Virtual Expo Halls

register

Reserve your spot now! Can’t make the live date? No worries!  Register now, and we’ll send you the replay link after the event. Please complete your registration below. Already registered? Log in here. 


  • By registering I have acknowledged that I agree to the Venafi Privacy Policy. I also agree to receive information from Venafi and the partner sponsors related to Venafi products, services, events and any special offers by email, post, or other forms of communication. I may unsubscribe at any time by following the instructions in the communications received.
  • This field is for validation purposes and should be left unchanged.

sponsors

Premier sponsor

Partners

If you have any questions,
feel free to email us


MediaOps, the company behind leading technical communities such as DevOps.com, Container Journal, Security Boulevard, DevOps TV and Digital Anarchist, along with its premier sponsor, Venafi, is proud to present the Machine Identity Protection Virtual Global Summit. Machine Identity Protection is the industry’s first truly immersive conference focused on world’s most progressive companies that are pushing the boundaries of machine identity protection.

MediaOps virtual events take place in the unique virtual reality conference environment. Not your typical series of strung together Google Hangouts, every one of our virtual summits is a true live conference, replete with an actual theater to view the keynotes and presentations, a conference lobby to chat and socialize, a real virtual expo floor with exhibitor stands and booths, equipped with videos, downloadable assets, and even prizes for you to win.

Best part of the virtual summit — you can attend it from the comfort of your work desk, laptop or even your smartphone. No hotels, no airplanes, no travel, hence no traffic or parking garages. Simply log in and listen, learn, network and enjoy! Oh, and did we mention — it is all absolutely free.