Event Date: February 20, 2018 at 2:00 PM ET
Hosted By: Venafi & Carahsoft
It's surprising how easily your SSH keys can become vulnerable, and even walk out the door with prior employees and contractors—whether maliciously or innocently. When that happens, cyber criminals or malicious insiders can misuse your SSH keys to gain privileged access to your critical systems and data.
Join us for the live webcast, Where Are My SSH Keys?, to learn:
The impacts of SSH security on compliance with NIST 800-53, 800-171, FISMA, and CDM
The biggest risks facing your SSH inventory
Strategies for preventing the misuse of SSH keys
Five actions that will immediately improve SSH security