Skip to content

Conference Presentation Archives

Here you will find an archive of our past conference presentations (when permitted) for your use. Please respect the copyright for the content and use this for your own educational or research purposes only.

To view upcoming speaking engagements click here.

sipnoc-2019-logo-300x92
December 2019

SIPNOC - The SIP Network Operators Conference

Everything You Didn’t Want to Hear about PKI and STIR/SHAKEN

nCipher-Logo
October 2019 - Amsterdam & New Orleans

nCipher EMEA and US Channel Partners

PKI and Hardware Security Modules

defcon
August 2019 - Las Vegas, Nevada

DEFCON 27

How PKI and SHAKEN/STIR Will Fix the Global Robocall Problem

bsidesPDX_logo_100
October 2018 - Portland, Oregon

BSides PDX

The Secret to Secrets Management

logo_rsac
April 2015 - San Francisco, California

RSA USA 2015

Cloud Based Security and Identities: Brilliance or Madness?

thales
October 2014 - Marrakesh, Morocco

Thales eSecurity EMEA Channel Partners

HSMs and the Evolving PKI Ecosystem

logo
June 2014 - Portland, Oregon

ISACA WIllamette Valley

Managing and Assessing Risks in a PKI

NITS
November 2019

Nordic IT Security Conference

How to Future-Proof IoT Security

NewsLogo800x400-MISTIlogo
September 2019 - eSummit

Cyber Risk Alliance eSummit

KEYNOTE - The Secret to Secrets Management

cacs2019
May 2019 - Anaheim, Californa

ISACA CACS

Cloud Insecurity: The Need for Stronger Identity Management

verisec_logo_left_CMYK
May 2015 - Stockholm, Sweden

Get ahead of the Cyberthreats

Protecting Networks and Data with Public Key Infrastructure (PKI)

TechMentor
November 2014 - Orlando, Florida

TechMentor

Top 20 PKI Deployment Mistakes

thales
October 2014 - Marrakesh, Morocco

Thales eSecurity EMEA Channel Partners

Upgrading and Improving 2003 ADCS Security

NewsLogo800x400-MISTIlogo
October 2019 - eSummit

CLOUD SECURITY 2.0

KEYNOTE - Cloud Insecurity: The Need for Stronger Identity Management

Primekey-Solutions-AB-1024x271
September 2019 - Stockholm, Sweden

PrimeKey Tech Days

SHAKEN/STIR (Signature-based Handling of Asserted Information using ToKENs and Secure Telephony Identity Revisited)

futurexlogo
April 2019 - San Antonio, Texas

FutureX & VirtuCrypt Summit

Managing the Root of Trust at Scale

verisec_logo_left_CMYK
May 2015 - Stockholm, Sweden

Get ahead of the Cyberthreats

The Information Threat Checklist: Five Things That Reveal if Your Systems are at Risk

TechMentor
November 2014 - Orlando, Florida

TechMentor

Managing and Deploying BYOD Identity Solutions with a Microsoft PKI

microsoft-teched-barcelona-2014-golden_ratio-970x599
October 2014 - Barcelona, Spain

Microsoft TechEd Barcelona

Top 10 PKI Deployment Mistakes

Video Content

TechEd Europe 2014

Top 10 Mistakes in Microsoft PKI
Deployments

How well designed and implemented is your Public Key Infrastructure? Enterprises around the world use Microsoft Windows based Public Key Infrastructure for digital certificates. However, most environments make the same mistakes. Learn what the most common mistakes are and how you can mitigate them. This session is based on new/exclusive content created for this conference. Borrowing from over 10 years of designing, assessing, and remediating Public Key Infrastructures around the world, a common theme emerges. As the creator of the Microsoft PKI Health Check, it was the presenters job to access and analyze PKI environments around the world. This content is based on the most common mistakes seen in customer after customer. The common threads are amazingly clear and often easy to remediate.

BSides PDX 2018

The Secret to Secrets Management

The modern IT landscape is filled with secrets: certificates, cryptocurrency wallets, SQL connection strings, storage account keys, passwords, and encryption keys. Getting a handle on secrets management is a top challenge. A centralized approach to secrets management is vital to protect their data and assets, whereby poorly-managed security could lead to breach, non-compliance, or outage.

FutureX & VirtuCrypt Partner Summit 2019

Managing the Root of Trust at Scale

This presentation covers the basics of a PKI, how organizations are using PKI today and tomorrow. It then explores the challenges in environments where a large number of offline, air-gaped Root and Policy CAs are needed. Leveraging the FutureX platform, a unique option to consolidate these CAs onto a smaller infrastructure are possible.

DEF CON 27 Crypto and Privacy Village 2019

How PKI and SHAKEN/STIR Will Fix the Global Robocall Problem

The global robocall and illegal callerID spoofing problem is affecting nearly everyone. Currently almost 50% of all calls placed in the US are robocalls or scammers. The new industry standard SHAKEN/STIR is designed to combat the problem and at it's core is PKI.

Scroll To Top