Machine Identity Management Global Summit 2021
to
Proudly Supported By
Agenda
–
· Stage
STAGE # 1 | Venafi Keynote: Survival of the Fastest

–
· Stage
STAGE # 6 | Venafi Keynote: Survival of the Fastest [Market View Exclusive]

–
· Stage
STAGE # 6 | Fireside Chat: Software Assurance [Market View Exclusive]
–
· Stage
STAGE # 1 | Shifting Machine Identities Left, Part 1: First-Class Machine Identities for Applications and Infrastructure in a Single Line of Code
Are you including machine identities in zero trust and digital transformation initiatives? Learn why you need to treat them as first class citizens.
–
· Stage
STAGE # 2 | EV SSL Certificates Sales on Darknet Markets
Yearlong research reveals a steady supply of EV certificates on darknet markets. Learn the modus operandi of EV certificate fraudsters around the world.

–
· Stage
STAGE # 3 | Kuba-what? Conversational Approaches for Working with DevOps Teams
Joining the security conversation with "DevOps"? Give them machine identity management-as-a-service without scrimping on security and policy controls.
–
· Stage
STAGE # 4 | Deploying SSH Key Management at Scale: Policies and Best Practices [Venafi Warrior Exclusive]
Discover proven strategies for finding and managing SSH keys. Learn how to use findings to create a successful program for policy enforcement and remediation.
–
· Stage
STAGE # 5 | Automating Your TLS Certificate Management Lifecycle [Venafi Warrior Exclusive]
Extend automation benefits throughout your TPP deployments with techniques in TrustForce Provisioning that enable end-to-end automation in your enterprise.
–
· Stage
STAGE # 1 | CISO Roundtable: Cloud First, Cloud Native
Panelists: Scott Barronton, CISO at Diebold Nixdorf; Raj Badhwar, CISO at Voya | Moderated by Matt Barker, Jetstack CEO



–
· Stage
STAGE # 2 | CISO Roundtable: Automating Machine Identity Management at Scale
Panelists: Susan Koski, CISO at PNC; Kevin McKenzie, CISO at Dollar Tree | Moderated by Mike Dodson, VP of Worldwide Customer Security Strategy, Venafi



–
· Stage
STAGE # 6 | CISO Roundtable: Cloud First, Cloud Native [Market View Exclusive]
Panelists: Scott Barronton, CISO at Diebold Nixdorf; Raj Badhwar, CISO at Voya | Moderated by Matt Barker, Jetstack CEO



–
· Stage
STAGE # 1 | Shifting Machine Identities Left, Part 2: Reference Architectures for Machine Identity Management
See demos of reference architectures that couple machine identities with the lifecycle of your new applications all with a single line of code.
–
· Stage
STAGE # 2 | The Economic Advantages of TLS Certificate-as-a-Service
Reduce the cost of troubleshooting and remediating certificate expirations. Enable certificate owners to request and work with TLS certificates on their own.
–
· Stage
STAGE # 3 | Hybrid Hegemony: Integrating TPP Across Multiple Physical & Cloud Platforms
How do you form judgments, make decisions, and rapidly develop solutions for complex cloud problems? Learn how to map and execute your hybrid cloud journey.


–
· Stage
STAGE # 4 | Machine Identity End-User Training: How, Why and Best Practices [Venafi Warrior Exclusive]
Get tips on how to use Venafi Maestro to help your end users understand the importance of certificates and how to easily consume them.
–
· Stage
STAGE # 5 | TPP High-Availability Upgrade Architectures [Venafi Warrior Exclusive]
Learn to architect TPP for high availability and use rolling upgrades to help deploy, manage and upgrade different components without compromising availability.
–
· Stage
STAGE # 1 | Guest Keynote: Machine Identity Management
Presented by David Mahdi, VP, Analyst, Security & Privacy, Gartner

–
· Stage
STAGE # 6 | Guest Keynote: Machine Identity Management [Market View Exclusive]
Presented by David Mahdi, VP, Analyst, Security & Privacy, Gartner

–
· Stage
STAGE # 1 | Entertainment by Wayne Hoffman, Award-Winning Mentalist and Illusionist
This is a fun show that combines mind-reading and visual magic in a way that will allow you to experience seemingly supernatural phenomena virtually.
–
· Stage
STAGE # 1 | How to Become a Machine Identity Threat Pro
Learn how to track adversarial behavior using Venafi's new Machine Identity Threat Model to build a threat-informed defense.
–
· Stage
STAGE # 3 | Venafi Certificate Management and Automation Case Study
See how automation cut our cost per certificate from $450 to $20, lowered FTE costs from $100 to $1 per certificate, all while reducing human error and outages.

–
· Stage
STAGE # 4 | Machine Identity Discovery and Placement Best Practices [Venafi Warrior Exclusive]
Learn how to extend your machine identity management program with best practices for discovery and placement.
–
· Stage
STAGE # 1 | Fireside Chat: Secrets Machine Identity Hackers Don't Want to Share
Presented by Paula Januszkiewicz, Founder & CEO, CQURE Inc, with Kevin Bocek, VP of Security Strategy & Threat Intelligence at Venafi


–
· Stage
STAGE # 2 | Fireside Chat: The Future of Cloud Security
Presented by Anton Chuvakin, Security Solution Strategy Cloud, Google & Kevin Bocek, VP of Security Strategy & Threat Intelligence at Venafi


–
· Stage
STAGE # 6 | Fireside Chat: The Future of Cloud Security [Market View Exclusive]
Presented by Anton Chuvakin, Security Solution Strategy Cloud, Google & Kevin Bocek, VP of Security Strategy & Threat Intelligence at Venafi


–
· Stage
STAGE # 1 | Eliminate Outages Forever
Want no outages guaranteed? Learn all about the VIA Venafi methodology, where it might challenge your organization and how to overcome those obstacles.
–
· Stage
STAGE # 2 | Accelerating Machine Identity Management with NIST
Getting Machine Identity Management rapidly deployed across your entire enterprise is critical. NIST's guidance can help you do that. Learn how in this session.

–
· Stage
STAGE # 3 | Unbeatable SSH Security Automation: Unlock the Full Potential of CyberArk PAM
See how Venafi + CyberArk changes the way you secure the lifecycle of SSH keys with higher levels of automation, better visibility and more successful audits.


–
· Stage
STAGE # 4 | Streamline Your Certificate Lifecycle with TPP Teams [Venafi Warrior Exclusive]
Get tips and tricks for deploying TPP Teams capabilities to streamline your organization's certificate life cycle operations at enterprise scale.
–
· Stage
STAGE # 5 | TPP Reporting with Tableau, Kafka and Data Dog [Venafi Warrior Exclusive]
Take a deep dive into how you can implement reporting best practices and integrations with TPP to improve your machine identity management program.
–
· Stage
STAGE # 1 | Lightning Talk: Eliminating NetOps Friction with F5 BIG-IQ
Protect your connected machines against costly certificate-related outages while streamlining F5 operations with F5 BIG-IQ Centralized Management and Venafi
–
· Stage
STAGE # 2 | Lightning Talk: Single Pane of Glass for Machine Identities
Presented by Rob Wiseman, Refinitiv

–
· Stage
STAGE # 3 | Lightning Talk: Communicating Success to CISOs and Executive Teams using Tableau
Can you show the progress and success of your machine identity management program? See how to use Tableau to deliver easy, automated reporting for executives.
–
· Stage
STAGE # 4 | Lightning Talk: CA Agility [Venafi Warrior Exclusive]
Presented by Stephanie Benoit-Kurtz

–
· Stage
STAGE # 5 | Lightning Talk: Establishing Accountability for Certificate Renewal [Venafi Warrior Exclusive]
Presented by Greg Crabb, CISO/VP at USPS

–
· Stage
STAGE # 1 | TLS 1.3 Visibility and NIST
More than 90% of cyber attacks occur through network connections. Learn what NIST is doing to enable the visibility needed to detect network-based attacks.

–
· Stage
STAGE # 2 | Code Signing 101 for InfoSec Professionals
Learn what code signing is and why it's so critical to your business. Understand the risks of not having a secure code signing process and how to improve yours.
–
· Stage
STAGE # 3 | Top 5 Best Practices for Managing Your SSH Machine Identities
See the top 5 SSH risks from years of risk assessments and get best practices for managing to prevent breaches that exploit SSH key risks.

–
· Stage
STAGE # 5 | Advanced Key Protection: Hardware Security and TPP [Venafi Warrior Exclusive]
Leverage Advanced Key Protect with HSMs. Get use cases that help you understand all capabilities and how to apply them in a high security environment.
–
· Stage
STAGE # 1 | Keynote Session: Build to Survive
Presented by Kevin Bocek, VP Security Strategy & Threat Intelligence, Venafi

–
· Stage
STAGE # 6 | Keynote Session: Build to Survive [Market View Exclusive]
Presented by Kevin Bocek, VP Security Strategy & Threat Intelligence, Venafi

–
· Stage
STAGE # 1 | Fireside Chat: Armon Dagdar, Co-Founder and CTO, HashiCorp and Kevin Bocek, Vice President, Security Strategy and Threat Intelligence, Venafi


–
· Stage
STAGE # 6 | Fireside Chat: Armon Dagdar, Co-Founder and CTO, HashiCorp and Kevin Bocek, Vice President, Security Strategy and Threat Intelligence, Venafi [Market View Exclusive]


–
· Stage
STAGE # 1 | Anatomy of Machine Identity Threats in SUNBURST Attacks
What went wrong with the SolarWinds' approach to code signing? Learn specific steps you can take to prevent this type of attack from hitting your business.
–
· Stage
STAGE # 2 | Zero Touch by the Millions
Learn how to protect the millions of machine identities on the non-human side of Zero Trust in cloud-native designs, microservices, and service meshes.

–
· Stage
STAGE # 3 | Bridging the Gap Between InfoSec and IT Operations with Venafi
See how the CISO of Renown Health used a certificate outage to his advantage, building a partnership with the CIO to improve reliability and uptime.

–
· Stage
STAGE # 4 | Leveraging the Venafi API [Venafi Warrior Exclusive]
Understand how leveraging our API capabilities extends the capabilities of your machine identity management program and how to use APIs in practical scenarios.
–
· Stage
STAGE # 5 | Workflow Best Practices [Venafi Warrior Exclusive]
Streamline and simplify machine identity management across multiple parties with practical implementations of workflows for common and complex use cases.
–
· Stage
STAGE # 1 | CISO Roundtable: Machine Identity Threats
Panelists: Adrian Mayers, CISO, Premera; Shawn Irving, CISO, Ferguson; Tim Callahan, CISO, Aflac | Moderated by Kevin Bocek, VP Threat Intelligence at Venafi




–
· Stage
STAGE # 2 | Quantum Safety: What You Need to Know Today for Immediate Action
Speakers: John O'Connor, VP Product Management, Crypto4A; Mike Brown, CTO & Cofounder at ISARA | Moderated by Juan-Carlos Torres, Solutions Architect at Venafi
–
· Stage
STAGE # 6 | CISO Roundtable: Machine Identity Threats [Market View Exclusive]
Panelists: Adrian Mayers, CISO, Premera; Shawn Irving, CISO, Ferguson; Tim Callahan,CISO at Aflac | Moderated by Kevin Bocek, VP Threat Intelligence at Venafi



–
· Stage
STAGE # 1 | Why Vulnerable Software Supply Chains Are Bad for Business (and what to do about it)
Get security policies to protect your software supply chain—code signing, application whitelisting, ephemeral build servers, signing scripts and macros.
–
· Stage
STAGE # 2 | Certificate Lifecycle Management
Learn the benefits of Station Casino’s groundbreaking program for clear machine identity ownership, and why training and immediate impact is key to success.

–
· Stage
STAGE # 3 | Level Up Your End-to-End Machine Identity Lifecycle Management with Intel SGX
See how the Intel SGX integration protects private keys used in memory, reducing cost and overhead while improving security for on premises, cloud and edge.
–
· Stage
STAGE # 5 | Remediating SSH Key Risk: Policies and Best Practices [Venafi Warrior Exclusive]
Learn best practices for remediating SSH risks with tips and tricks to continually monitor your SSH keys and minimize your exposure to risk.

–
· Stage
STAGE # 1 | Guest Keynote: Machine Identities & Digital Darwinism
Presented by Brian Solis, Futurist, Digital Analyst

–
· Stage
STAGE # 6 | Guest Keynote: Machine Identities & Digital Darwinism [Market View Exclusive]
Presented by Brian Solis, Futurist, Digital Analyst

–
· Stage
STAGE # 1 | Entertainment Break with Comedian Joe Zimmerman
Take a break with a clean, smart comedy show.
–
· Stage
STAGE # 1 | Fireside Chat: Modernizing Security One Developer at a Time
Every business is a software developer, and everyone is responsible for securing engineering. What needs to change to make software development more secure?


–
· Stage
STAGE # 2 | Fireside Chat: The Evolution of IAM
Presented by Julie Talbot-Hubbard, Optiv/IDSA boardmember, Jen Dewar, Channel Director, Venafi

–
· Stage
STAGE # 6 | Fireside Chat: Modernizing Security One Developer at a Time [Market View Exclusive]
Every business is a software developer, and everyone is responsible for securing engineering. What needs to change to make software development more secure?


–
· Stage
STAGE # 1 | Creating Viral Adoption with Easy, Self-Service Access and Your ITSM
Experienced ServiceNow and Jira integration developers share insights on how user experience, policy and education strategies make your team more successful.
–
· Stage
STAGE # 2 | Assuring the Software Supply Chain for IoT
Attacks on supply chains are at an all-time high. Learn how to architect more secure software development and a supply chain that’s ready for the future.
–
· Stage
STAGE # 3 | Bon Voyage: Your Old PKI Won't Be Coming on Your Cloud Journey
Say hello to the Google Certificate Authority Service, which delivers a fast, dynamic, fully SaaS-based solution for on-demand, cloud-ready private PKI.


–
· Stage
STAGE # 1 | Lightning Talk: The Economics of Orchestration and Automation
Presented by Stephanie Benoit-Kurtz, Station Casinos

–
· Stage
STAGE # 2 | Lightning Talk: Eliminating NetOps Friction with Citrix Application Delivery Manager (ADM)
Tired of failures, outages and breaches caused by manual management? Protect against costly certificate outages while streamlining your Citrix operations.
–
· Stage
STAGE # 3 | Lightning Talk: Managing Third-Party Application Certificates with Venafi Automation
Presented by Rob Wiseman, Refinitiv

–
· Stage
STAGE # 1 | Eliminating Outages on IBM Mainframes (Case Study)
Learn from BMC and a large financial firm the best ways to automate machine identities in mainframes to stop outages everywhere in your critical infrastructure.
–
· Stage
STAGE # 2 | Automating the Machine Identity Management Lifecycle for TLS Certificates
Extend automation benefits throughout your TPP deployments with techniques in TrustForce Provisioning that enable end-to-end automation in your enterprise.
–
· Stage
STAGE # 3 | Maximize TLS Threat Inspection Through Automation
Avoid security risks by combining Venafi automation with Check Point and Gigamon to make machine identities available to threat detection and NGFW systems.
–
· Stage
STAGE # 1 | Venafi Keynote: Shift Left for the Win in the Cloud-Native World

–
· Stage
STAGE # 6 | Venafi Keynote: Shift Left for the Win in the Cloud-Native World [Market View Exclusive]

–
· Stage
STAGE # 1 | Fireside Chat: The Power of the Cloud
Presented by Mark Shuttleworth, CEO, Canonical, and Matt Barker, CEO, Jetstack


–
· Stage
STAGE # 6 | Fireside Chat: The Power of the Cloud [Market View Exclusive]
Presented by Mark Shuttleworth, CEO, Canonical, and Matt Barker, CEO, Jetstack


–
· Stage
STAGE # 1 | Securing Multiple Clouds with Terraform
See how Venafi and HashiCorp Terraform make it easy for security teams to apply consistent policies so dev teams can follow them within infrastructure-as-code.
–
· Stage
STAGE # 2 | Enabling the Secure Digital Cloud Native Enterprise
Discover how Kubernetes and Cloud Native are used to build modern platforms and explore solutions that leverage automation with built-in security controls.

–
· Stage
STAGE # 3 | Secure the Middle - SSH for CI/CD and Build Pipeline
Learn new ways to streamline, optimize and secure SSH key lifecycles for dev environments so systems run smoothly without the risks of weak SSH key management.
–
· Stage
STAGE # 4 | WebSDK PowerShell Module: A Deep Dive for Developers [Venafi Warrior Exclusive]
Learn how to leverage the TPP WebSDK via PowerShell to simplify authentication and speed up custom script development in TPP.
–
· Stage
STAGE # 5 | Introduction to TPP DevOps Integrations [Venafi Warrior Exclusive]
Learn about Venafi DevOps capabilities and how you can use the most common integrations to keep your security and development teams happy and productive.
–
· Stage
STAGE # 1 | Career Roundtable: Women in Cybersecurity
Panelists: Karen Jordan, CISO at Barclays; Barbara Guerin, Former CISO; Caidi Morehead, IT Product Owner at Fidelity | Moderated by Melissa Keohane, Venafi



–
· Stage
STAGE # 1 | Securing Software Supply Chains: a Practical Introduction
Why secure software supply chains? Learn why you should trust the data not the process using the high level architecture of a financial services client.
–
· Stage
STAGE # 2 | Building a Zero-Trust Service Mesh with Istio
Learn about service mesh and how mTLS allows Kubernetes workload certificates to be signed, delivered and renewed by out-of-cluster certificate authorities.
–
· Stage
STAGE # 4 | Jenkins and Automated Code Signing [Venafi Warrior Exclusive]
Discover how using CodeSign Protect in your Jenkins build automations helps preserve policy, maintain control and ensure the security of your software products.
–
· Stage
STAGE # 5 | Three-Tiered Method for Managing Machine Identities in DevOps Environments [Venafi Warrior Exclusive]
Learn how you can use code signing to secure your software supply chain, including signing source code, IT shell scripts and macros.
–
· Stage
STAGE # 1 | Guest Keynote: Infosec Empowering Developers Through the Five Ideals
Presented by Gene Kim, Author, Researcher, Speaker, Director, DevOps Enthusiast

–
· Stage
STAGE # 6 | Guest Keynote: Infosec Empowering Developers Through the Five Ideals [Market View Exclusive]
Presented by Gene Kim, Author, Researcher, Speaker, Director, DevOps Enthusiast

–
· Stage
STAGE # 1 | Venafi Gives Back Special
Join our emcee, Geoff Rhodes for a video presentation on Venafis give-back programs.
–
· Stage
STAGE # 1 | Right Shifting Your Kubernetes Maturity
Creating a cloud native production environment? Get guidance, proof points and best practices to validate your progress and identify gaps you need to address.
–
· Stage
STAGE # 2 | Security Controls for Cloud Native
Learn to validate and deliver security for cloud-native environments with best practices for security management from Jetstack Financial Services customers.
–
· Stage
STAGE # 4 | Developing Adaptable Solutions with the Venafi Platform [Venafi Warrior Exclusive]
Get an overview of the adaptable framework with best practices and use cases for extending the value of your machine identity protection.
–
· Stage
STAGE # 5 | Contributing to the Opensource TPP WebSDK PowerShell Module [Venafi Warrior Exclusive]
Learn how you can contribute to the Venafi-developed WebSDK PowerShell module for TPP. Get step-by-step instructions, best practices and key processes.
–
· Stage
STAGE # 1 | Venafi Summit 2021: Concluding Remarks

Speakers

Paul Cleary
Ecosystem Architect, Venafi

Nikita Reznik
Global Solution Architect, Venafi

Antanas Chuchev
Technical Product Manager, Venafi

Expo

Intel
How wonderful gets done

APIIDA
We power the secure, connected real-time digital value chain

Reveal Group
Your Intelligent Automation Services Company

Sidechain
The Data Security Experts for the Enterprise

Difenda
Cybersecurity Simplified.