Event Date: June 08, 2017 at 2:00 PM EDT
Hosted By: Venafi & Carahsoft
Today's cyber security landscape is more complex and dynamic than ever, competing with resources to modernize federal IT infrastructure while keeping federal networks protected from the most advanced nation, state, and insider threats.
Security teams are inundated trying to protect the multitude of both human and machine identities on their networks with extensive resources spent on protecting the credentials that authenticate and authorize human access to sensitive information. However, much in the same way humans use CAC and PIV to authenticate themselves, we use keys and certificates to ensure the identities of the machines exchanging information around the clock, yet the resources dedicated to protecting machine credentials pale in comparison. Our adversaries know this and exploit bad key and certificate management practices to use trusted machine identities encryption against us.