Presentations

Here you will find an archive of our past conference presentations (when permitted) for your use. Please respect the copyright for the content and use this for your own educational or research purposes only.

cacs2019
May 2019 - Anaheim, Californa

ISACA CACS

Cloud Insecurity: The Need for Stronger Identity Management

verisec_logo_left_CMYK
May 2015 - Stockholm, Sweden

Get ahead of the Cyberthreats

The Information Threat Checklist: Five Things That Reveal if Your Systems are at Risk

TechMentor
November 2014 - Orlando, Florida

TechMentor

Top 20 PKI Deployment Mistakes

thales
October 2014 - Marrakesh, Morocco

Thales eSecurity EMEA Channel Partners

HSMs and the Evolving PKI Ecosystem

futurexlogo
April 2019 - San Antonio, Texas

FutureX & VirtuCrypt Summit

Managing the Root of Trust at Scale

verisec_logo_left_CMYK
May 2015 - Stockholm, Sweden

Get ahead of the Cyberthreats

Protecting Networks and Data with Public Key Infrastructure (PKI)

TechMentor
November 2014 - Orlando, Florida

TechMentor

Managing and Deploying BYOD Identity Solutions with a Microsoft PKI

thales
October 2014 - Marrakesh, Morocco

Thales eSecurity EMEA Channel Partners

Upgrading and Improving 2003 ADCS Security

bsidesPDX_logo_100
October 2018 - Portland, Oregon

BSides PDX

The Secret to Secrets Management

logo_rsac
April 2015 - San Francisco, California

RSA USA 2015

Cloud Based Security and Identities: Brilliance or Madness?

microsoft-teched-barcelona-2014-golden_ratio-970x599
October 2014 - Barcelona, Spain

Microsoft TechEd Barcelona

Top 10 PKI Deployment Mistakes

logo
June 2014 - Portland, Oregon

ISACA WIllamette Valley

Managing and Assessing Risks in a PKI

Video Content

TechEd Europe 2014

Top 10 Mistakes in Microsoft PKI
Deployments

How well designed and implemented is your Public Key Infrastructure? Enterprises around the world use Microsoft Windows based Public Key Infrastructure for digital certificates. However, most environments make the same mistakes. Learn what the most common mistakes are and how you can mitigate them. This session is based on new/exclusive content created for this conference. Borrowing from over 10 years of designing, assessing, and remediating Public Key Infrastructures around the world, a common theme emerges. As the creator of the Microsoft PKI Health Check, it was the presenters job to access and analyze PKI environments around the world. This content is based on the most common mistakes seen in customer after customer. The common threads are amazingly clear and often easy to remediate.

BSides PDX 2018

The Secret to Secrets Management

The modern IT landscape is filled with secrets: certificates, cryptocurrency wallets, SQL connection strings, storage account keys, passwords, and encryption keys. Getting a handle on secrets management is a top challenge. A centralized approach to secrets management is vital to protect their data and assets, whereby poorly-managed security could lead to breach, non-compliance, or outage.

FutureX & VirtuCrypt Partner Summit 2019

Managing the Root of Trust at Scale

This presentation covers the basics of a PKI, how organizations are using PKI today and tomorrow. It then explores the challenges in environments where a large number of offline, air-gaped Root and Policy CAs are needed. Leveraging the FutureX platform, a unique option to consolidate these CAs onto a smaller infrastructure are possible.

ISACA CACS 2019

Cloud Insecurity: The Need for Stronger Identity Management

With cloud usage growing exponentially, are we asking enough questions about cloud security for organizations to make informed risk management decisions?

More than 80% of organizations store their information in the public cloud, according to Rightscale’s 2018 State of the Cloud Report, begging the question of cloud security. The cloud promises availability, simplified management and cost savings—yet the cloud is not threat proof and opens new attack vectors. What is compelling about the cloud is also its weakness: Its openness makes it vulnerable. For example, if the host hardware or operating system are compromised, all data hosted can also be exploited via a process called hyperjacking. The latest findings from McAfee indicate that 26% of organizations have suffered cloud data theft.

Coming Soon!