Schedule

Schedule

Star
Star
Shape

Browse speakers
and topics

Explore the event schedule to find sessions and speakers

28 March

2025

2025

Zero Trust & Certificate Management

Welcome Coffee & Networking

08:00 AM - 10:00 AM

Speaker's Image

New Environments, New Identities, New Threats

10:00 AM - 10:20 AM

By
Tomislav Ljubas

We’ve spent years locking down human authentication—MFA, conditional access, risk-based policies. We’ve made it so hard for attackers to steal a human identity that they’ve moved on… to something much easier. Machines. APIs, service accounts, cloud workloads, containers, IoT devices—all of them have identities. And most are unprotected. Attackers don’t need phishing anymore. They steal API keys, exploit hardcoded credentials, and move laterally through unmanaged machine identities—completely unnoticed. We built a Zero Trust model for people. Now we need one for machines.

Speaker's Image

New Environments, New Identities, New Threats

10:00 AM - 10:20 AM

By
Tomislav Ljubas

We’ve spent years locking down human authentication—MFA, conditional access, risk-based policies. We’ve made it so hard for attackers to steal a human identity that they’ve moved on… to something much easier. Machines. APIs, service accounts, cloud workloads, containers, IoT devices—all of them have identities. And most are unprotected. Attackers don’t need phishing anymore. They steal API keys, exploit hardcoded credentials, and move laterally through unmanaged machine identities—completely unnoticed. We built a Zero Trust model for people. Now we need one for machines.

Speaker's Image

New Environments, New Identities, New Threats

10:00 AM - 10:20 AM

By
Tomislav Ljubas

We’ve spent years locking down human authentication—MFA, conditional access, risk-based policies. We’ve made it so hard for attackers to steal a human identity that they’ve moved on… to something much easier. Machines. APIs, service accounts, cloud workloads, containers, IoT devices—all of them have identities. And most are unprotected. Attackers don’t need phishing anymore. They steal API keys, exploit hardcoded credentials, and move laterally through unmanaged machine identities—completely unnoticed. We built a Zero Trust model for people. Now we need one for machines.

Speaker's Image

1st Roundtable Discussion

10:20 AM - 10:40 AM

By
Participants

Questions from the floor, open discussion, and exchange of ideas led by Venafi's Stefan Bartels

Speaker's Image

1st Roundtable Discussion

10:20 AM - 10:40 AM

By
Participants

Questions from the floor, open discussion, and exchange of ideas led by Venafi's Stefan Bartels

Speaker's Image

1st Roundtable Discussion

10:20 AM - 10:40 AM

By
Participants

Questions from the floor, open discussion, and exchange of ideas led by Venafi's Stefan Bartels

Speaker's Image

A path to extend the Digital Identity Security Platform

10:40 AM - 11:00 AM

By
Matt Barker

Matt will review some of the key use cases Venafi has already solved for customers together with Stefan, before giving an outlook on the product development roadmap and key technology trends for companies looking to manage their machine identities in a central management plain. After CyberArk’s recent acquisition of Venafi Matt is part of the team tasked to rethink digital identity security and will share some of the synergies he sees between the two platforms and how customers can leverage them together for zero trust approaches.

Speaker's Image

A path to extend the Digital Identity Security Platform

10:40 AM - 11:00 AM

By
Matt Barker

Matt will review some of the key use cases Venafi has already solved for customers together with Stefan, before giving an outlook on the product development roadmap and key technology trends for companies looking to manage their machine identities in a central management plain. After CyberArk’s recent acquisition of Venafi Matt is part of the team tasked to rethink digital identity security and will share some of the synergies he sees between the two platforms and how customers can leverage them together for zero trust approaches.

Speaker's Image

A path to extend the Digital Identity Security Platform

10:40 AM - 11:00 AM

By
Matt Barker

Matt will review some of the key use cases Venafi has already solved for customers together with Stefan, before giving an outlook on the product development roadmap and key technology trends for companies looking to manage their machine identities in a central management plain. After CyberArk’s recent acquisition of Venafi Matt is part of the team tasked to rethink digital identity security and will share some of the synergies he sees between the two platforms and how customers can leverage them together for zero trust approaches.

Speaker's Image

2nd Roundtable Discussion

11:00 AM - 11:20 AM

By
Participants

Questions from the floor, open discussion, and exchange of ideas led by Venafi's Stefan Bartels

Speaker's Image

2nd Roundtable Discussion

11:00 AM - 11:20 AM

By
Participants

Questions from the floor, open discussion, and exchange of ideas led by Venafi's Stefan Bartels

Speaker's Image

2nd Roundtable Discussion

11:00 AM - 11:20 AM

By
Participants

Questions from the floor, open discussion, and exchange of ideas led by Venafi's Stefan Bartels

Speaker's Image

Implementing Certificate Management - Lessons Learned

11:20 AM - 11:40 AM

By
Michael Haueter

As the manager of Bedag Informatik AG's Operations Management team Michael has experience implementing Venafis certificate management solution and will address the practical aspects and challenges you will encounter when implementing a new certificate management solution and how to overcome them. Michael will address key factors for successful implementation projects and lessons learned that apply to all companies.

Speaker's Image

Implementing Certificate Management - Lessons Learned

11:20 AM - 11:40 AM

By
Michael Haueter

As the manager of Bedag Informatik AG's Operations Management team Michael has experience implementing Venafis certificate management solution and will address the practical aspects and challenges you will encounter when implementing a new certificate management solution and how to overcome them. Michael will address key factors for successful implementation projects and lessons learned that apply to all companies.

Speaker's Image

Implementing Certificate Management - Lessons Learned

11:20 AM - 11:40 AM

By
Michael Haueter

As the manager of Bedag Informatik AG's Operations Management team Michael has experience implementing Venafis certificate management solution and will address the practical aspects and challenges you will encounter when implementing a new certificate management solution and how to overcome them. Michael will address key factors for successful implementation projects and lessons learned that apply to all companies.

Speaker's Image

3rd Roundtable Discussion

11:40 AM - 12:00 AM

By
Participants

Questions from the floor, open discussion, and exchange of ideas led by Venafi's Stefan Bartels

Speaker's Image

3rd Roundtable Discussion

11:40 AM - 12:00 AM

By
Participants

Questions from the floor, open discussion, and exchange of ideas led by Venafi's Stefan Bartels

Speaker's Image

3rd Roundtable Discussion

11:40 AM - 12:00 AM

By
Participants

Questions from the floor, open discussion, and exchange of ideas led by Venafi's Stefan Bartels

Lunch & Networking

12:00 PM - 2:00PM

Join us in Zurich!

Meet likeminded professionals, learn about how others are meeting security challenges, and exchange ideas and lessons learned.

Cta Image

Join us in Zurich!

Meet likeminded professionals, learn about how others are meeting security challenges, and exchange ideas and lessons learned.

Cta Image

Join us in Zurich!

Meet likeminded professionals, learn about how others are meeting security challenges, and exchange ideas and lessons learned.

Cta Image