Meeting New CSC Guidelines for SSL Certificate Management

  • Webcast Aired Thursday, 04 Jun 2015 1:00PM EDT (04 Jun 2015 17:00 UTC)
  • Speakers: Barbara Filkins, Kevin Bocek

The revelation of Heartbleed, POODLE, BEAST and other critical technical vulnerabilities has undermined confidence in the technology behind SSL/TLS certificates. But the sloppy way that certificates are handled by corporate security have made it far more difficult to trust \secure" certificates. Hundreds of thousands of bogus certificates make attackers or Man in the Middle attack points look legitimate - not to mention the Certificate Authorities suspected of issuing bogus certificates due to their own mismanagement.

It is possible, with strict discipline and adherence to the right security procedures, to filter out the worst of the bogus credentials and still take advantage of the web's most common authentication mechanism.

Attend this webcast to learn:

  • Risks to corporate security from sloppy certificate sourcing and handling and how to identify them
  • Type of vulnerabilities plaguing token-based security - even from legitimate Certificate Authorities
  • How to put evaluate your SSL/TLS exposure
  • How to put processes and policies in place to address them and integrate those controls into day-to-day operations with purposeful, automated certificate management
  • How to measure progress and ultimate improvement in efficient and secure control of certificate use and authentication

Register for this webcast and be among the first to receive the associated whitepaper developed by Barb Filkins

View the associated whitepaper here.

Sponsored By: Venafi
https://www.venafi.com/