As machine identities continue to radically outnumber human identities, machine identity management has become even more mission-critical—and Venafi has led the charge in solving that problem for countless customers. But now it’s time to rethink our security models to go beyond just managing machine identities: we need to secure them. Join this keynote address to share our vision of new paradigms in identity security that bring together developers and security teams in the common goal of protecting your organization’s most valuable digital assets: identities.
Jeff is a visionary leader with over 25 years of leadership and management experience in information technology and cybersecurity. As former CEO of Venafi, he led the creation of the machine identity management category, which has become the next big area of cybersecurity investment... Read More →
Matt Cohen is Chief Executive Officer of CyberArk. Cohen joined CyberArk in 2019 as Chief Revenue Officer and was promoted to Chief Operating Officer in November 2020. Cohen has a proven track record as a results-driven leader, playing an instrumental role in driving the execution... Read More →
Chief Information Security Officer (CISO), Kraft Heinz
Ricardo Lafosse is chief information security officer for Kraft Heinz. Lafosse is responsible for IT risk governance, OT security, incident management, technical disaster recovery, and determining enterprise-wide security policies and procedures. Lafosse regularly presents on security... Read More →
Wednesday October 2, 2024 9:00am - 9:30am EDT
Great Room
We are reaching a tipping point in machine identity security. If you are not ready to future-proof your organization now, you risk losing your competitive edge. Join this product keynote to see how new innovations in the Venafi Control Plane will give you the advantage in addressing current and future challenges around post-quantum cryptography, cloud-to-cloud connectivity and workload identities. Learn why thinking about machine identity security as an all-encompassing strategy now will prepare you to dominate the future of machine identity security.
Setu Kulkarni is our VP of Product and leads the Product Strategy, Product Management and User Experience teams that are responsible for the entire Venafi Control Plane.
As the chief product officer at Venafi, Shivajee leads R&D efforts for all of Venafi's products. He has over 25 years of experience in developing mission-critical software that is currently being used by some of the world’s leading companies in finance, transportation, healthcare... Read More →
Wednesday October 2, 2024 9:30am - 10:15am EDT
Great Room
As organizations increasingly rely on interconnected systems and automated processes, the security of machine identities has become a critical component of a robust cybersecurity strategy. This presentation will delve into the latest trends shaping machine identity security, drawing on industry research and data to explore the emerging challenges and opportunities in securing, automating and managing machine identities. Attendees will gain a comprehensive understanding of how a holistic approach to machine identity security can mitigate risks, enhance operational efficiency and support business continuity.
Research Manager, DevSecOps and Software Supply Chain Security, IDC
Katie Norton is a Research Manager for IDC’s DevSecOps and Software Supply Chain Security research practice. In this role, she is responsible for researching, writing, and advising clients on the fast-evolving DevSecOps and software supply chain security markets. With her background... Read More →
Wednesday October 2, 2024 10:45am - 11:15am EDT
Great Room
We’re on the cusp of something big! Get CISO perspectives on the game-changing impact that GenAI, cloud-first and post-quantum cryptography (PQC) will have on the future of identity security. Join this session for a candid exploration of the latest, most visionary trends shaping machine identity security. You’ll gain insights into the specific business impacts of emerging, disruptive technologies—as well as the critical role you play in protecting our identity-driven future.
Jeff is a visionary leader with over 25 years of leadership and management experience in information technology and cybersecurity. As former CEO of Venafi, he led the creation of the machine identity management category, which has become the next big area of cybersecurity investment... Read More →
Chief Information Security Officer (CISO), OneMain Financial
Jane Domboski currently serves as the Chief Information Security Officer (CISO) for OneMain Financial. Ms. Domboski is both an attorney and cybersecurity practitioner. She has served in both the public and private sectors. In the public sector, Ms. Domboski investigated cybercrime... Read More →
VP & Chief Information Security Officer, Jack Henry
Dennis McDonald is the VP & Chief Information Security Officer at Jack Henry, where Dennis oversees the alignment of business and information security strategies. Dennis promotes innovative risk management through collaboration between business, IT, and partners to protect data and... Read More →
Post-quantum cryptography (PQC) threatens conventional cryptographic methods. And your post-quantum success is dependent on your pre-quantum readiness. Join a lively discussion on how businesses can prepare to mitigate emerging quantum computing threats of the near future and thrive in a world transformed by quantum computing. Our industry-leading panel will explore trends influencing the post-quantum readiness of today’s enterprises and how adopting automated, crypto-agile machine identity security plays a pivotal role in achieving a seamless transition to the post-quantum era – before quantum computers are mature enough to threaten your organization’s cryptography.
Leading Venafi’s growth in new innovations, Kevin is at the forefront of Venafi’s cutting edge machine identity management for workload identity, Kubernetes and AI. He also drives Venafi’s award-winning technology ecosystem and developer community to futureproof customer success... Read More →
I serve as a Technical Security Architect at Air France-KLM, specializing in machine identities (Machine-IAM). In this role, I ensure that IT and business projects align with the stringent security requirements set forth by the Air France-KLM CISO team.As the technical lead on security... Read More →
Carl Mehner is an information security professional who has worked for the past 15 years working with public key infrastructure, certificates, and building standards for secure protocols, such as TLS 1.3.
Dr. Colin Soutar is a Managing Director within Deloitte Risk & Financial Advisory. Colin serves as the Cyber lead for Government & Public Services innovation investments, and is also the Deloitte US and Global Quantum Cyber Readiness leader. After finishing his studies in Dundee... Read More →
Wednesday October 2, 2024 1:30pm - 2:00pm EDT
Great Room
If you’re just looking at key strength, algorithms, and lifetimes, you’re only seeing part of the picture. Beyond weak cryptography, insecure key stores and certificate mismanagement, certificate can create a lucrative attack surface through their identity and the trust of that identity. This session will introduce the elements of a certificate's attack surface and how to gauge risk to better prioritize management and alerting around high value certificate targets.
Karen Reinhardt brings over 25 years of experience in cybersecurity into her role as Principal Engineer of PKI at The Home Depot. She started her Infosec careers in 1999 as a founding member of the Qwest Communications (CenturyLink) Information security team and since then, has served... Read More →
Wednesday October 2, 2024 1:30pm - 2:00pm EDT
Cityside
Securing machine identities is more critical than ever, and traditional PKI systems can be cumbersome and resource-intensive, leaving organizations vulnerable to inefficiencies and security gaps. Join this session to explore the transformative potential of Zero Touch PKI—especially when combined with TLS Protect. Learn strategies for automating the entire lifecycle of user, device and TLS certificates—from issuance to renewal and revocation. Discover how this cutting-edge approach minimizes human intervention, reduces errors and accelerates deployment, all while enhancing security and compliance. Get best practices for modernizing your PKI to safeguard your digital transformation journey and fortify your organization's security posture in an increasingly complex machine identity landscape.
Florin Lazurca drives technical marketing direction for machine identity management at Venafi. He has broad knowledge of enterprise software and IT, SaaS services, and rapidly evolving cloud native and security technologies solutions. His background includes being an architect in... Read More →
George Parsons, Venafi's Head of PKI Strategy, has 30 years in PKI, crafting strategies tailored to the Global 5000's security landscape. With a BSc in Computer Science and an MBA, he melds academic insight with practical prowess. George made significant strides at VeriSign, reshaping... Read More →
We all know securing certificates and preventing outages is critical. But as organizations increasingly leverage digital technology to accelerate the business, does leadership recognize securing certificates is not enough? More than ever before, attackers are exploiting exposed secrets and machine identities to find weak points in compute environments. Don’t let it happen to you! In this session you'll learn why you need to secure your applications, secrets and cloud workloads.
Join us to learn how CyberArk’s battle-tested solution for secrets management reduces cyber risk for machine identities. Now security can “meet developers where they are” with flexible options, which help accelerate securing your organization’s digital technologies across cloud and hybrid environments.
Chris leads CyberArk’s product marketing initiatives focused on helping customers secure their machine identities and DevOps environments. He joined CyberArk in 2017. Prior roles include 9 years as a senior director at Gartner working with large enterprises, and earlier in his career... Read More →
Wednesday October 2, 2024 2:15pm - 2:45pm EDT
Cityside
How are you planning for your future? We’ll help you stay ahead in the ever-evolving security landscape with a comprehensive machine identity security roadmap that takes you from solving current problems through to solving for workload identity and post-quantum readiness. You'll learn how to effectively communicate your security strategy to board members, justify staffing and budgets, and establish yourself as a forward-thinking leader. Plus, you’ll gain insights from future-forward companies and see how they are preparing for the future of machine identity security. Get the knowledge and tools needed to navigate the complexities of machine identity security and ensure your organization's security posture is robust and future-proof.
Setu Kulkarni is our VP of Product and leads the Product Strategy, Product Management and User Experience teams that are responsible for the entire Venafi Control Plane.
Nick is a dedicated, passionate executive on a mission to protect the organization’s revenue streams and brand reputation. He works with Venafi customers to prevent misuse and compromise and stop costly outages while modernizing their platforms, balancing fast development with... Read More →
Carl Mehner is an information security professional who has worked for the past 15 years working with public key infrastructure, certificates, and building standards for secure protocols, such as TLS 1.3.
Wednesday October 2, 2024 3:00pm - 3:30pm EDT
Great Room
Are you considering adopting SSH certificates as a way to avoid some of the risks that come with standard SSH key pairs? For many organizations, that may be easier said than done. Join this session to explore the steps you need to take to migrate away from SSH keys and truly focus on implementing an effective SSH certificate solution. You’ll gain insights into real world applications and use cases with a focus on where you should prioritize. And you’ll walk away with an in-depth understanding of how you can manage and control your SSH environment with the right process.
Information Security Senior Advisor, ElevanceHealth
Nearly a decade in experience with Information Security, specializing in various facets of the SSH environment (system administration, middleware administration and encryption).Graduated from Indiana University with a Bachelor’s degree in Informatics focusing on Cybersecurity.Truly... Read More →
Wednesday October 2, 2024 3:00pm - 3:30pm EDT
Cityside
Unmanaged certificates and weak encryption in Kubernetes can lead to shadow IT, rogue developer activity, governance challenges and non-compliant PKI usage. Learn about the different types of workload identity threats in Kubernetes, along with effective strategies for mitigating them with a cloud native certificate management solution. We’ll explore how compliant PKI, using Firefly with SPIFFE and Zero Touch PKI, secures authentication across environments—reducing cyber-attack risks, ensuring data integrity and streamlining operations by eliminating manual certificate management. We’ll share real-world use cases highlighting the benefits of decentralized issuance and workload identity solutions. And you’ll come away with a crypto agile architecture blueprint for scalable identity security to secure sensitive data, maintaining regulatory compliance for modern workloads.
VP, Emerging Technologies, Global Architects, Venafi
Sitaram is primarily focused on bringing security teams and developers closer. He works closely with customers worldwide to help drive the adoption of cloud native security strategy leading with cert-manager in Kubernetes and various other CNCF projects to bridge the gap between security... Read More →
Akbar Ghaswala is a Service Manager at Navy Federal Credit Union. He leads a team of dedicated, talented and passionate PKI professionalswho automate certificate installations, mitigate certificate related outages and manage certificate inventory.He has worked in IT for 25+ years... Read More →
Wednesday October 2, 2024 4:00pm - 4:30pm EDT
Great Room
Will 90-day certificates break your business? Automation is the only way forward. Staying on top of shorter, 90-day certificate lifespans just isn’t possible with manual management. Join this session to learn about the machine identity security challenges that are driving the need for automation today and how those efforts will smooth your transition to impending shorter certificate standards. You’ll hear real-life examples of what can go wrong without the right levels of automation and get advice on how to sidestep the consequences of manual certificate management now and into the future.
Head of Technology Operations and Engineering, OneMain Financial
Tunde Oni-Daniel is the Head of Technology Operations & Engineering and in that role, he is responsible for cybersecurity technology. He brings over 23 years of global security experience having run security architecture, privacy programs, enterprise risk management, technology integration... Read More →
Wednesday October 2, 2024 4:00pm - 4:30pm EDT
Cityside
See the many ways the Machine Identity Management Development Fund fuels industry innovation and future-proofs customer success! But with more than 50 trailblazing innovations at your fingertips, it can be hard to choose the most beneficial solution. Fortunately, we’ve gathered five of our customers’ most popular picks to deliver five-minute rapid-fire pitches. At the end of this white-hot, future-focused inferno, you’ll vote for the most compelling solution—and be one of the first to peer into the next era of machine identity security.
Learn more about the Machine Identity Management Development Fund at https://venafi.com/development-fund/.
Leading Venafi’s growth in new innovations, Kevin is at the forefront of Venafi’s cutting edge machine identity management for workload identity, Kubernetes and AI. He also drives Venafi’s award-winning technology ecosystem and developer community to futureproof customer success... Read More →
Anusha Iyer, Founder and CEO of Corsha, is an engineer in heart and spirit with over 20 years of experience in computer and network security and machine identity. Passionate about demystifying cybersecurity, she focuses on making security accessible, automated, even self-assuring... Read More →
After Chrysalis-ITS, Mr. Couillard spent a decade working on advanced quantum-ready PKI and key management systems for the Government of Canada. Recognizing the urgent need for quantum-readiness in the commercial sector, he founded Crypto4A.
Originally a founding-member of Device Authority Ltd, (formerly known as Cryptosoft), James has over 17 years’ experience in both internal and external facing technical roles. James leads the technology strategy and is the technical leader of the business, working closely with the... Read More →
Ritesh Patel is Co-founder and VP of Products at Nirmata, the creators of Kyverno - the Kubernetes-native policy engine. At Nirmata, he is responsible for commercial products for Kubernetes security, governance, and automation. He also leads key technology partnerships. Ritesh has... Read More →
Angel Menendez is a Staff Developer Advocate at n8n.io with a passion for leveraging low-code tools to enhance cybersecurity workflows. Originally from Puerto Rico, Angel moved to Oklahoma at a young age and was introduced to computing early on by helping his father translate technical... Read More →
Wednesday October 2, 2024 4:45pm - 5:15pm EDT
Great Room
You don’t have to read the tea leaves to understand the multi-faceted value and contributions of women in cybersecurity. Join us for an afternoon Boston Tea Party -- complete with tea and sweets -- where we’ll explore how revolutionizing your organization’s gender diversity can enrich your security strategies, while countering the growing shortage of skilled cybersecurity experts. Our panel of outspoken advocates will share their personal successes in cybersecurity as well as advice on how to expand your team with women who are passionate about cybersecurity. You’ll also gain insights on how you can support the women already on your team and why the addition of women will make your team more successful.
As chief legal and people officer, Melissa is responsible for all legal affairs for the company as well as the global people strategy that propels Venafi’s team performance and vibrant company culture. Melissa is deeply committed to sustaining Venafi’s special culture and building... Read More →
Chief Information Security Officer (CISO), OneMain Financial
Jane Domboski currently serves as the Chief Information Security Officer (CISO) for OneMain Financial. Ms. Domboski is both an attorney and cybersecurity practitioner. She has served in both the public and private sectors. In the public sector, Ms. Domboski investigated cybercrime... Read More →
Tanya Gill has a career in Information Technology and Information Security that spans 24 years, with the last 19 focused in Information and Cybersecurity. Tanya has been on the forefront of building several security programs, including people, processes and technology. She has worked... Read More →
Karen Reinhardt brings over 25 years of experience in cybersecurity into her role as Principal Engineer of PKI at The Home Depot. She started her Infosec careers in 1999 as a founding member of the Qwest Communications (CenturyLink) Information security team and since then, has served... Read More →
After a full day of exploring the future of machine identity security, it's time to shift gears and let loose at our networking reception. This is your chance to become a networking machine and interact with other talented minds, swap stories, exchange ideas and form lasting new partnerships. It’s the most exciting way to compare notes and share your experiences with fellow attendees while relaxing over a cocktail and hors d’oeuvres.