About Banner Image

About the Event

About
Shape

Machine identities vastly outnumber human identities - so what?

Machine identities vastly outnumber human identities - so what?

For attackers, unprotected machine identities are another entry point to your organization. For security teams the centralised management of machine identities is an opportunity leverage zero trust frameworks, based on the principle that no entity inside or outside the network perimeter is trusted by default. Machine identities use certificates, secrets, API keys, Cloud Access Keys, and other credentials to authenticate and authorize machines to access resources and services. As such they are unique identifiers distinguishing software code, applications, virtual machines or even physical IoT devices from others on a network. Their proper management is therefore increasingly necessary to prevent attacks, and offers opportunities for security teams to take effective steps in protecting their organizations.

For attackers, unprotected machine identities are another entry point to your organization. For security teams the centralised management of machine identities is an opportunity leverage zero trust frameworks, based on the principle that no entity inside or outside the network perimeter is trusted by default. Machine identities use certificates, secrets, API keys, Cloud Access Keys, and other credentials to authenticate and authorize machines to access resources and services. As such they are unique identifiers distinguishing software code, applications, virtual machines or even physical IoT devices from others on a network. Their proper management is therefore increasingly necessary to prevent attacks, and offers opportunities for security teams to take effective steps in protecting their organizations.

45:1

Ratio of machine identities to human identities

45:1

Ratio of machine identities to human identities

45:1

Ratio of machine identities to human identities

90

Days certificate validity will affect your company soon!

90

Days certificate validity will affect your company soon!

90

Days certificate validity will affect your company soon!

Content Image
Content Image
Content Image
Contetnt Image

Why attend

Why attend

Our speakers cover three perspectives to give you a holistic understanding of the challenges and opportunities the management of machine identities presents:

1) CISO perspective: Why should you care and where does this fit in your security stack and your organization's security strategy?

2) Vendor product development perspective: How are product teams of market leading vendors like Venafi advancing product functionalities?

3) Customer implementation perspective: What is the implementation experience of customers and what lessons can you learn from them?

Learn with experts
Open discussions
Open discussions
Open discussions
Realworld insights
Realworld insights
Realworld insights
Build your network
Build your network
Build your network

What are the rules?

What are the rules?

We use the Chatham House Rule to allow everyone to speak freely in a confidential setting and to encourage inclusive and open dialogue:

Participants are free to use the information received, but neither the identity nor the affiliation of the speaker(s), nor that of any other participant, may be revealed.

Open dialogue
Confidential setting
Confidential setting
Confidential setting
Useful insights
Useful insights
Useful insights
Private conversations
Private conversations
Private conversations
Contetnt Image
Contetnt Image
Contetnt Image

Join us in Zurich!

Meet likeminded professionals, learn about how others are meeting security challenges, and exchange ideas and lessons learned.

Cta Image

Join us in Zurich!

Meet likeminded professionals, learn about how others are meeting security challenges, and exchange ideas and lessons learned.

Cta Image

Join us in Zurich!

Meet likeminded professionals, learn about how others are meeting security challenges, and exchange ideas and lessons learned.

Cta Image