
Schedule
Schedule
Browse speakers
and topics
Explore the event schedule to find sessions and speakers
28 March
2025
2025
Zero Trust & Certificate Management
Welcome Coffee & Networking
08:00 AM - 10:00 AM

New Environments, New Identities, New Threats
10:00 AM - 10:20 AM
We’ve spent years locking down human authentication—MFA, conditional access, risk-based policies. We’ve made it so hard for attackers to steal a human identity that they’ve moved on… to something much easier. Machines. APIs, service accounts, cloud workloads, containers, IoT devices—all of them have identities. And most are unprotected. Attackers don’t need phishing anymore. They steal API keys, exploit hardcoded credentials, and move laterally through unmanaged machine identities—completely unnoticed. We built a Zero Trust model for people. Now we need one for machines.

New Environments, New Identities, New Threats
10:00 AM - 10:20 AM
We’ve spent years locking down human authentication—MFA, conditional access, risk-based policies. We’ve made it so hard for attackers to steal a human identity that they’ve moved on… to something much easier. Machines. APIs, service accounts, cloud workloads, containers, IoT devices—all of them have identities. And most are unprotected. Attackers don’t need phishing anymore. They steal API keys, exploit hardcoded credentials, and move laterally through unmanaged machine identities—completely unnoticed. We built a Zero Trust model for people. Now we need one for machines.

New Environments, New Identities, New Threats
10:00 AM - 10:20 AM
We’ve spent years locking down human authentication—MFA, conditional access, risk-based policies. We’ve made it so hard for attackers to steal a human identity that they’ve moved on… to something much easier. Machines. APIs, service accounts, cloud workloads, containers, IoT devices—all of them have identities. And most are unprotected. Attackers don’t need phishing anymore. They steal API keys, exploit hardcoded credentials, and move laterally through unmanaged machine identities—completely unnoticed. We built a Zero Trust model for people. Now we need one for machines.

1st Roundtable Discussion
10:20 AM - 10:40 AM
Questions from the floor, open discussion, and exchange of ideas led by Venafi's Stefan Bartels

1st Roundtable Discussion
10:20 AM - 10:40 AM
Questions from the floor, open discussion, and exchange of ideas led by Venafi's Stefan Bartels

1st Roundtable Discussion
10:20 AM - 10:40 AM
Questions from the floor, open discussion, and exchange of ideas led by Venafi's Stefan Bartels

A path to extend the Digital Identity Security Platform
10:40 AM - 11:00 AM
Matt will review some of the key use cases Venafi has already solved for customers together with Stefan, before giving an outlook on the product development roadmap and key technology trends for companies looking to manage their machine identities in a central management plain. After CyberArk’s recent acquisition of Venafi Matt is part of the team tasked to rethink digital identity security and will share some of the synergies he sees between the two platforms and how customers can leverage them together for zero trust approaches.

A path to extend the Digital Identity Security Platform
10:40 AM - 11:00 AM
Matt will review some of the key use cases Venafi has already solved for customers together with Stefan, before giving an outlook on the product development roadmap and key technology trends for companies looking to manage their machine identities in a central management plain. After CyberArk’s recent acquisition of Venafi Matt is part of the team tasked to rethink digital identity security and will share some of the synergies he sees between the two platforms and how customers can leverage them together for zero trust approaches.

A path to extend the Digital Identity Security Platform
10:40 AM - 11:00 AM
Matt will review some of the key use cases Venafi has already solved for customers together with Stefan, before giving an outlook on the product development roadmap and key technology trends for companies looking to manage their machine identities in a central management plain. After CyberArk’s recent acquisition of Venafi Matt is part of the team tasked to rethink digital identity security and will share some of the synergies he sees between the two platforms and how customers can leverage them together for zero trust approaches.

2nd Roundtable Discussion
11:00 AM - 11:20 AM
Questions from the floor, open discussion, and exchange of ideas led by Venafi's Stefan Bartels

2nd Roundtable Discussion
11:00 AM - 11:20 AM
Questions from the floor, open discussion, and exchange of ideas led by Venafi's Stefan Bartels

2nd Roundtable Discussion
11:00 AM - 11:20 AM
Questions from the floor, open discussion, and exchange of ideas led by Venafi's Stefan Bartels

Implementing Certificate Management - Lessons Learned
11:20 AM - 11:40 AM
As the manager of Bedag Informatik AG's Operations Management team Michael has experience implementing Venafis certificate management solution and will address the practical aspects and challenges you will encounter when implementing a new certificate management solution and how to overcome them. Michael will address key factors for successful implementation projects and lessons learned that apply to all companies.

Implementing Certificate Management - Lessons Learned
11:20 AM - 11:40 AM
As the manager of Bedag Informatik AG's Operations Management team Michael has experience implementing Venafis certificate management solution and will address the practical aspects and challenges you will encounter when implementing a new certificate management solution and how to overcome them. Michael will address key factors for successful implementation projects and lessons learned that apply to all companies.

Implementing Certificate Management - Lessons Learned
11:20 AM - 11:40 AM
As the manager of Bedag Informatik AG's Operations Management team Michael has experience implementing Venafis certificate management solution and will address the practical aspects and challenges you will encounter when implementing a new certificate management solution and how to overcome them. Michael will address key factors for successful implementation projects and lessons learned that apply to all companies.

3rd Roundtable Discussion
11:40 AM - 12:00 AM
Questions from the floor, open discussion, and exchange of ideas led by Venafi's Stefan Bartels

3rd Roundtable Discussion
11:40 AM - 12:00 AM
Questions from the floor, open discussion, and exchange of ideas led by Venafi's Stefan Bartels

3rd Roundtable Discussion
11:40 AM - 12:00 AM
Questions from the floor, open discussion, and exchange of ideas led by Venafi's Stefan Bartels
Lunch & Networking
12:00 PM - 2:00PM
Join us in Zurich!
Meet likeminded professionals, learn about how others are meeting security challenges, and exchange ideas and lessons learned.

Join us in Zurich!
Meet likeminded professionals, learn about how others are meeting security challenges, and exchange ideas and lessons learned.

Join us in Zurich!
Meet likeminded professionals, learn about how others are meeting security challenges, and exchange ideas and lessons learned.
