Webinar: PKI Insights - Energy Utility PKI Cybersecurity in Critical Infrastructure (CIP) Environments by PKI Solutions

Conference Presentations

Here are our past conference presentations (when permitted) for your use. Please respect the copyright for the content and use this for your own educational or research purposes only.

View Newsroom
Schedule a Demo
  • Applied Crypto Symposium
    Applied Crypto Symposium

    January 2020 // Post-Quantum Cryptography

    View Presentation
  • SIPNOC - The SIP Network Operators Conference
    SIPNOC - The SIP Network Operators Conference

    December 2019 // Everything You Didn't Want to Hear about PKI and STIR/SHAKEN

    View Presentation
  • Nordic IT Security Conference
    Nordic IT Security Conference

    November 2019 // How to Future-Proof IoT Security

    View Presentation
  • nCipher EMEA And US Channel Partners
    nCipher EMEA And US Channel Partners

    Oct 2019 - Amsterdam // PKI and Hardware Security Modules

  • CLOUD SECURITY 2.0
    CLOUD SECURITY 2.0

    October 2019 - eSummit // KEYNOTE - Cloud Insecurity: The Need for Stronger Identity Management

    View Presentation
  • Cyber Risk Alliance eSummit
    Cyber Risk Alliance eSummit

    September 2019 - eSummit // KEYNOTE - The Secret to Secrets Management

    View Presentation
  • PrimeKey Tech Days
    PrimeKey Tech Days

    September 2019 - Stockholm // SHAKEN/STIR (Signature-based Handling of Asserted Information using ToKENs and Secure Telephony Identity Revisited)

  • DEFCON 27
    DEFCON 27

    August 2019 - Las Vegas, Nevada // How PKI and SHAKEN/STIR Will Fix the Global Robocall Problem

  • ISACA CACS
    ISACA CACS

    May 2019 - Anaheim, California // Cloud Insecurity: The Need for Stronger Identity Management

    View Presentation
  • FutureX & VirtuCrypt Summit
    FutureX & VirtuCrypt Summit

    April 2019 - San Antonio, Texas // Managing the Root of Trust at Scale

    Watch Video
  • BSides PDX
    BSides PDX

    October 2018 - Portland, Oregon

    Watch Video
  • Get Ahead of the Cyberthreats Pt. 1
    Get Ahead of the Cyberthreats Pt. 1

    May 2015 - Stockholm, Sweden // The Information Threats Checklist: Five Things That Reveal if Your Systems are at Risk

    View Presentation
  • Get Ahead of the Cyberthreats Pt. 2
    Get Ahead of the Cyberthreats Pt. 2

    May 2015 - Stockholm, Sweden // Protecting Networks and Data with Public Key Infrastructure (PKI)

    View Presentation
  • RSA USA 2015
    RSA USA 2015

    April 2015 - San Francisco, California // Cloud Based Security and Identities: Brilliance or Madness?

    View Presentation
  • TechMentor Pt. 1
    TechMentor Pt. 1

    November 2014 - Orlando, Florida // Top 20 PKI Deployment Mistakes

    View Presentation
  • TechMentor Pt. 2
    TechMentor Pt. 2

    November 2014 - Orlando, Florida // Managing and Deploying BYOD Identity Solutions with a Microsoft PKI

    View Presentation
  • Thales eSecurity EMEA Channel Partners Pt. 1
    Thales eSecurity EMEA Channel Partners Pt. 1

    October 2014 - Marrakesh, Morocco // HSMs and Evolving PKI Ecosystem

    View Presentation
  • Thales eSecurity EMEA Channel Partners Pt. 2
    Thales eSecurity EMEA Channel Partners Pt. 2

    October 2014 - Marrakesh, Morocco // Upgrading and Improving 2003 ADCS Security

    View Presentation
  • Microsoft TechEd Barcelona
    Microsoft TechEd Barcelona

    October 2014 - Barcelona, Spain // Top 10 PKI Deployment Mistakes

    Watch Video
  • ISACA Willamette Valley
    ISACA Willamette Valley

    June 2014 - Portland, Oregon // Managing and Assessing Risks in a PKI

    View Presentation

Video Content

  • Top 10 Mistakes in Microsoft PKI Deployments

    How well designed and implemented is your Public Key Infrastructure? Enterprises around the world use Microsoft Windows based Public Key Infrastructure for digital certificates. However, most environments make the same mistakes. Learn what the most common mistakes are and how you can mitigate them. This session is based on new/exclusive content created for this conference. Borrowing from over 10 years of designing, assessing, and remediating Public Key Infrastructures around the world, a common theme emerges. As the creator of the Microsoft PKI Health Check, it was the presenters job to access and analyze PKI environments around the world. This content is based on the most common mistakes seen in customer after customer. The common threads are amazingly clear and often easy to remediate.

     

  • The Secret to Secrets Management

    The modern IT landscape is filled with secrets: certificates, cryptocurrency wallets, SQL connection strings, storage account keys, passwords, and encryption keys. Getting a handle on secrets management is a top challenge. A centralized approach to secrets management is vital to protect their data and assets, whereby poorly-managed security could lead to breach, non-compliance, or outage.

  • Managing the Root of Trust at Scale

    This presentation covers the basics of a PKI, how organizations are using PKI today and tomorrow. It then explores the challenges in environments where a large number of offline, air-gaped Root and Policy CAs are needed. Leveraging the FutureX platform, a unique option to consolidate these CAs onto a smaller infrastructure are possible.

  • How PKI and SHAKEN/STIR Will Fix the Global Robocall Problem

    The global robocall and illegal callerID spoofing problem is affecting nearly everyone. Currently almost 50% of all calls placed in the US are robocalls or scammers. The new industry standard SHAKEN/STIR is designed to combat the problem and at its core is PKI.

Connect With Us for Certainty in Security

If you’re ready to learn more about our essential solutions for your essential PKI, reach out today. Book time with one of our specialists to discuss your needs and how we can meet and exceed your business requirements.

CONTACT US

Email: hello@pkisolutions.com
Phone: +1 (971) 231-5523

Corporate Headquarters

5331 S. Macadam Ave, Suite 330
Portland, Oregon 97239