
about cloudbees automotive
speakers
Anoosh Saboori
Steve Slinger
Mark Sanders
Mike Dodson
Greg Delaney
Michael Thelander
Tyson McMurtrey
Hari Nair
David Smith
David Mahdi
Brian Durkin
Yana Blachman
Slam Laqtib
Sitaram Iyer
Jean-Yves Provost
Dave Brancato
schedule
details
GARTNER KEYNOTE - Digital Trust and Machine Identity Protection are Essential Services
From VPNs, to cloud access, organizations are becoming more remote, and digital than ever. Many organizations often don’t realize the critical nature of their cryptographic dependencies until it’s too late. That’s machine identities, and cryptography. Simply put, organizations can’t establish trust in the digital realm without cryptography. From Quantum, to PKI, and Encryption, join us for this informative session on machine identity protection. It’s not a nice to have, it is now and forever an essential service!
SESSION BREAK: VISIT OUR SPONSOR & VENAFI EXPERTS IN THE EXPO HALLS
Visit Our Sponsors and Venafi Experts in the Virtual Expo Halls.
Code-to-Code Combat
Protecting private code signing keys is no longer enough. Hackers are learning new ways to compromise and use them. In this session, we’ll address the risks of unsecured code signing, the challenges our customers encounter, the best practices for protecting code signing machine identities, and how Venafi Next-Gen Code Signing can help.
Accelerating Certificate Management Adoption with NIST
Does Certificate Management = Chaos for you today? NIST provides clear guidance for accelerating certificate management across your enterprise. This session provides an overview of relevant NIST guidance (FIPS, 800-x, 1800-x, etc.), then distills NIST strategies for rapid enterprise-wide adoption of certificate management and making certificates assets instead of liabilities.
Protecting Advanced MultiCloud and Hybrid Cloud Environments with Venafi
High-pace business demands and the resulting need for application modernization is changing how we think about security in multi cloud computing environments. Learn how to leverage Venafi cross functionally with native tooling to secure machine identities in AWS, Azure and GCP.
SSH: How Big is Your Exposure?
SSH … There’s a Sleeping Dragon. Ubiquitous SSH keys provide secure, automated connections, but can be hard to control. Learn how to institute a proactive SSH key management program, uniting day-to-day users of SSH with the teams responsible for securing these critical assets. Mitigate real-life threats risks before they surface while preparing for your next auditor visit.
Demystifying the Unknown: Strategies for Creating a Complete Inventory
Learn the steps to completing an accurate inventory using the same strategies our consultants use. You’ll get best practices around the collection of inventories and we’ll explore advanced methods using PowerShell with the Venafi WebSDK in this advanced technical session.
Become a TPP Troubleshooting Expert: What to know before you go!
Increase your confidence in approaching key and certificate challenges with the tools or utilities that will help you understand what is happening. This session will better help fill your tool belt with skills needed to make sure your machine identities are protected and to understand some of the challenges you may face along the way.
Automating Enterprise and Public Machine Identities for Developers
The changing market landscape is requiring developers to adopt to modern application development patterns lending to greater automation requirements specifically in a native way. Development teams tend to adopt tools and services that fit them very well in their quest for complete automation for their continuous delivery model. Empowering developers to use the tools and services that they are comfortable using is almost mandatory in today’s application development world. How can security teams gain observability in the highly distributed system where the definition of perimeter is not easy to define? Gain an understanding of what Machine Identity Protection means to an organization where there is an ever growing ecosystem of application development and deployment stacks. Whether the organization uses cloud provider managed environment for containerized applications, or use various tools for managing Infrastructure as code, a standard API driven way of managing the lifecycle of TLS/SSL certificates, SSH keys, codesigning certificates is needed within the continuous integration and delivery model. This session will uncover how security teams can provide the required set of services that development teams can consume in a self-service fashion.
Code Signing-as-a-Service: Balance Ease of Use for Developers with Governance
Learn how Next Generation Code Signing can enable self-service for development and operations teams with better control, security and visibility. Learn technical aspects of the solution and common use cases for securing code signing in the enterprise. This will be a technical deep dive into code signing capabilities and issues surrounding securing private keys used during the code signing process.
SESSION BREAK: VISIT OUR SPONSOR & VENAFI EXPERTS IN THE EXPO HALLS
Visit Our Sponsors and Venafi Experts in the Virtual Expo Halls
register
Reserve your spot now! Can’t make the live date? No worries! Register now, and we’ll send you the replay link after the event. Please complete your registration below. Already registered? Log in here.