Here you will find an archive of our past conference presentations (when permitted) for your use. Please respect the copyright for the content and use this for your own educational or research purposes only.
Top 10 Mistakes in Microsoft PKI
How well designed and implemented is your Public Key Infrastructure? Enterprises around the world use Microsoft Windows based Public Key Infrastructure for digital certificates. However, most environments make the same mistakes. Learn what the most common mistakes are and how you can mitigate them. This session is based on new/exclusive content created for this conference. Borrowing from over 10 years of designing, assessing, and remediating Public Key Infrastructures around the world, a common theme emerges. As the creator of the Microsoft PKI Health Check, it was the presenters job to access and analyze PKI environments around the world. This content is based on the most common mistakes seen in customer after customer. The common threads are amazingly clear and often easy to remediate.
The Secret to Secrets Management
The modern IT landscape is filled with secrets: certificates, cryptocurrency wallets, SQL connection strings, storage account keys, passwords, and encryption keys. Getting a handle on secrets management is a top challenge. A centralized approach to secrets management is vital to protect their data and assets, whereby poorly-managed security could lead to breach, non-compliance, or outage.
Managing the Root of Trust at Scale
This presentation covers the basics of a PKI, how organizations are using PKI today and tomorrow. It then explores the challenges in environments where a large number of offline, air-gaped Root and Policy CAs are needed. Leveraging the FutureX platform, a unique option to consolidate these CAs onto a smaller infrastructure are possible.
Cloud Insecurity: The Need for Stronger Identity Management
With cloud usage growing exponentially, are we asking enough questions about cloud security for organizations to make informed risk management decisions?
More than 80% of organizations store their information in the public cloud, according to Rightscale’s 2018 State of the Cloud Report, begging the question of cloud security. The cloud promises availability, simplified management and cost savings—yet the cloud is not threat proof and opens new attack vectors. What is compelling about the cloud is also its weakness: Its openness makes it vulnerable. For example, if the host hardware or operating system are compromised, all data hosted can also be exploited via a process called hyperjacking. The latest findings from McAfee indicate that 26% of organizations have suffered cloud data theft.