Loading…
Attending this event?
Consider this year’s agenda your roadmap to the identity-first future
Tuesday, October 1
 

9:00am EDT

Registration
Tuesday October 1, 2024 9:00am - 10:00am EDT
Tuesday October 1, 2024 9:00am - 10:00am EDT
Great Room Foyer

10:00am EDT

Workshop #2: Get SaaSy: Accelerate Your Transition to the Cloud
Tuesday October 1, 2024 10:00am - 2:00pm EDT
*Separate ticket required*

Learn the steps you need to take to speed your transition to machine identity management in the cloud. We’ll show you step-by-step processes that will help you unleash the firepower of the fully armed and operational Venafi Control Plane for your cloud migration. This highly interactive workshop will give you the practical strategies you need to streamline your move from Trust Protection Platform (TPP) to TLS Protect Cloud. Get hands-on experience by integrating your own TLS Protect Cloud instance with TPP. Take center stage from your desk by commanding control of the four stages proven to make your journey to SaaS one for the ages.  
Speakers
avatar for Justin Hansen

Justin Hansen

Field CTO, Venafi
Justin Hansen, Field CTO at Venafi, is responsible for providing strategic technical direction on Machine Identity Management to customers as well as internal field and product teams. Justin joined Venafi in 2013 and has been providing innovative solutions for the world’s largest... Read More →
avatar for Dave Brancato

Dave Brancato

Director of Product Management, Venafi
Dave Brancato is a Director of Product Management - SaaS solutions at Venafi where he helps the Global 5000 enterprises secure cryptographic keys and digital certificates. Dave has over 20 years of experience in cyber security as innovator, leader, and hands on practioner.
Tuesday October 1, 2024 10:00am - 2:00pm EDT
Harborside 2

10:00am EDT

Workshop #3: Don't Be a Broken Record: How to Conquer Automation Once and For All
Tuesday October 1, 2024 10:00am - 2:00pm EDT
*Separate ticket required*

Are you a broken record when it comes to certificate lifecycle automation? You’ve set goals, key results, and even offered bonuses tied to “fully automate all lifecycle management for certificates.” You are not alone. It’s time to toss out that dusty old record and embrace modernization! We’re going to break down the most common challenges to achieving full automation and show you exactly how to conquer them. If you’ve ever been told “The PKI team has no access,” “We can’t automate that because it’s too important,” or “We can’t do anything without a change ticket,” then this is the workshop you don’t want to miss! We’ll be jamming to a playlist of specific strategies, practical tips and technology you’ll be able to use to build your own roadmap to automation. Once you’re back at your desk, you’ll be ready to dance to the beat of full lifecycle automation with a plan of action you can start using immediately.
Speakers
avatar for Tyson McMurtrey

Tyson McMurtrey

Professional Services Technical Delivery Manager, Venafi
Tyson McMurtrey is part of the Venafi Professional Services team, where he provides expert, consultative guidance on all aspects of managing machine identities. In addition, Tyson leads Venafi's consultant team and provides technical direction for deployment and configuration best... Read More →
avatar for Grayson Miller

Grayson Miller

Technical Account Manager, Venafi
Technical Account Manager at Venafi  
Tuesday October 1, 2024 10:00am - 2:00pm EDT
Harborside 1

10:00am EDT

Workshop #1: From Certificate Chaos to Control: Istio, Kubernetes and Venafi Unite
Tuesday October 1, 2024 10:00am - 4:00pm EDT
*Separate ticket required*

Dive into the dynamic world of Kubernetes service mesh with this interactive workshop. Designed for InfoSec aficionados, we're steering the PKI ship into uncharted waters with Istio. Does your service mesh feel like a cryptic puzzle? Is the complexity of certificate management in your Kubernetes service mesh slowing you down? No longer! Prepare to set sail across the Kubernetes service mesh, steering through the currents of TLS certificate management with Venafi’s trident of tools: cert-manager, istio-csr and Venafi Firefly. Navigate hands-on exercises and real-world scenarios for unparalleled control and security in your service mesh. Join us and become the captain of your Kubernetes expedition – because certificates shouldn’t be a headache. #KubernetesCaptains #VenafiVoyage  
Speakers
avatar for Rafael Tanaka

Rafael Tanaka

Curriculum Engineer, Venafi
Rafael started his career in the tech industry later in life, after 5 years as a Linux Engineer at Venafi Jetstack Consult he was able to marry his passion for teaching and innovative technologies such as Kubernetes. He is always coming with different ideas on how to explain the wonders... Read More →
Tuesday October 1, 2024 10:00am - 4:00pm EDT
Cityside

11:45am EDT

Lunch
Tuesday October 1, 2024 11:45am - 12:45pm EDT
Tuesday October 1, 2024 11:45am - 12:45pm EDT
Working Lunch in Workshop Spaces
 
Wednesday, October 2
 

8:00am EDT

Breakfast
Wednesday October 2, 2024 8:00am - 9:00am EDT
Wednesday October 2, 2024 8:00am - 9:00am EDT
Harborside 1

8:00am EDT

Registration
Wednesday October 2, 2024 8:00am - 9:00am EDT
Wednesday October 2, 2024 8:00am - 9:00am EDT
Great Room Foyer

9:00am EDT

The Future of Machine Identity Security
Wednesday October 2, 2024 9:00am - 9:30am EDT
As machine identities continue to exponentially outnumber human identities, relying on manual or siloed tools to manage and secure them is a losing proposition, increasing inefficiencies and security risks. We will explain why we must rethink our security models to defend against identity-based cyberattacks, especially when it comes to machine-to-machine connections and communications. A new paradigm is required – one that leverages automation and is inherently scalable to help organizations protect against misuse and compromise of machine identities and secrets, vastly improve security, and stop costly outages.
Speakers
avatar for Jeff Hudson

Jeff Hudson

CEO Emeritus, Venafi
Jeff is a visionary leader with over 25 years of leadership and management experience in information technology and cybersecurity. As former CEO of Venafi, he led the creation of the machine identity management category, which has become the next big area of cybersecurity investment... Read More →
Wednesday October 2, 2024 9:00am - 9:30am EDT
Great Room

9:30am EDT

Innovation in Machine Identity Security
Wednesday October 2, 2024 9:30am - 10:15am EDT
Ongoing AI transformation and pervasive cloud computing have led to an explosion in the number of machines – such as workloads, code, applications and containers – that need to be identified and communicate across organizations. Strategies and advancements must be made to shape how we scale to protect and manage them. Join Venafi's Chief Product Officer, Shivajee Samdarshi, and VP of Product Management, Setu Kulkarni, to understand the innovation needed to drive Machine Identity Security for today and beyond.  
Speakers
avatar for Shivajee Samdarshi

Shivajee Samdarshi

Chief Product Officer, Venafi
As the chief product officer at Venafi, Shivajee leads R&D efforts for all of Venafi's products. He has over 25 years of experience in developing mission-critical software that is currently being used by some of the world’s leading companies in finance, transportation, healthcare... Read More →
avatar for Setu Kulkarni

Setu Kulkarni

VP of Product Management, Venafi
Setu Kulkarni is our VP of Product and leads the Product Strategy, Product Management and User Experience teams that are responsible for the entire Venafi Control Plane.
Wednesday October 2, 2024 9:30am - 10:15am EDT
Great Room

10:15am EDT

Networking Break & Sponsor Expo
Wednesday October 2, 2024 10:15am - 10:45am EDT
Wednesday October 2, 2024 10:15am - 10:45am EDT
Mezzanine

10:45am EDT

Industry Insights on Machine Identity Security Trends and Best Practices
Wednesday October 2, 2024 10:45am - 11:15am EDT
As organizations increasingly rely on interconnected systems and automated processes, the security of machine identities has become a critical component of a robust cybersecurity strategy. This presentation will delve into the latest trends shaping machine identity security, drawing on industry research and data to explore the emerging challenges and opportunities in securing, automating and managing machine identities. Attendees will gain a comprehensive understanding of how a holistic approach to machine identity security can mitigate risks, enhance operational efficiency and support business continuity.
Speakers
avatar for Katie Norton

Katie Norton

Research Manager, DevSecOps and Software Supply Chain Security, IDC
Katie Norton is a Research Manager for IDC’s DevSecOps and Software Supply Chain Security research practice. In this role, she is responsible for researching, writing, and advising clients on the fast-evolving DevSecOps and software supply chain security markets. With her background... Read More →
Wednesday October 2, 2024 10:45am - 11:15am EDT
Great Room

11:15am EDT

CISO Panel: Forging the New Era of Cybersecurity and Machine Identity Security
Wednesday October 2, 2024 11:15am - 12:00pm EDT
We’re on the cusp of something big! Get CISO perspectives on the game-changing impact that GenAI, cloud-first and post-quantum cryptography (PQC) will have on the future of identity security. Join this session for a candid exploration of the latest, most visionary trends shaping machine identity security. You’ll gain insights into the specific business impacts of emerging, disruptive technologies—as well as the critical role you play in protecting our identity-driven future.
Speakers
avatar for Jeff Hudson

Jeff Hudson

CEO Emeritus, Venafi
Jeff is a visionary leader with over 25 years of leadership and management experience in information technology and cybersecurity. As former CEO of Venafi, he led the creation of the machine identity management category, which has become the next big area of cybersecurity investment... Read More →
avatar for Jane Domboski

Jane Domboski

Chief Information Security Officer (CISO), OneMain Financial
Jane Domboski currently serves as the Chief Information Security Officer (CISO) for OneMain Financial. Ms. Domboski is both an attorney and cybersecurity practitioner. She has served in both the public and private sectors. In the public sector, Ms. Domboski investigated cybercrime... Read More →
avatar for Dennis McDonald

Dennis McDonald

VP & Chief Information Security Officer, Jack Henry
Dennis McDonald is the VP & Chief Information Security Officer at Jack Henry, where Dennis oversees the alignment of business and information security strategies. Dennis promotes innovative risk management through collaboration between business, IT, and partners to protect data and... Read More →
Wednesday October 2, 2024 11:15am - 12:00pm EDT
Great Room

12:00pm EDT

Lunch
Wednesday October 2, 2024 12:00pm - 1:30pm EDT
Wednesday October 2, 2024 12:00pm - 1:30pm EDT
Harborside 1

12:00pm EDT

Sponsor Expo
Wednesday October 2, 2024 12:00pm - 1:30pm EDT
Wednesday October 2, 2024 12:00pm - 1:30pm EDT
Mezzanine

1:30pm EDT

PQC Timelines Are Accelerating: Are You Ready for Post-Quantum Threats?
Wednesday October 2, 2024 1:30pm - 2:00pm EDT
Post-quantum cryptography (PQC) threatens conventional cryptographic methods. And your post-quantum success is dependent on your pre-quantum readiness. Join a lively discussion on how businesses can prepare to mitigate emerging quantum computing threats of the near future and thrive in a world transformed by quantum computing. Our industry-leading panel will explore trends influencing the post-quantum readiness of today’s enterprises and how adopting automated, crypto-agile machine identity security plays a pivotal role in achieving a seamless transition to the post-quantum era – before quantum computers are mature enough to threaten your organization’s cryptography.
Moderators
avatar for Kevin Bocek

Kevin Bocek

Chief Innovation Officer, Venafi
Leading Venafi’s growth in new innovations, Kevin is at the forefront of Venafi’s cutting edge machine identity management for workload identity, Kubernetes and AI. He also drives Venafi’s award-winning technology ecosystem and developer community to futureproof customer success... Read More →
Speakers
avatar for Valentin Chatelard

Valentin Chatelard

Machine IAM Security Architect, Air France - KLM
I serve as a Technical Security Architect at Air France-KLM, specializing in machine identities (Machine-IAM). In this role, I ensure that IT and business projects align with the stringent security requirements set forth by the Air France-KLM CISO team.As the technical lead on security... Read More →
avatar for Carl Mehner

Carl Mehner

Security Business Architect, USAA
Carl Mehner is an information security professional who has worked for the past 15 years working with public key infrastructure, certificates, and building standards for secure protocols, such as TLS 1.3.  
avatar for Colin Soutar

Colin Soutar

Managing Director, Deloitte
Dr. Colin Soutar is a Managing Director within Deloitte Risk & Financial Advisory. Colin serves as the Cyber lead for Government & Public Services innovation investments, and is also the Deloitte US and Global Quantum Cyber Readiness leader. After finishing his studies in Dundee... Read More →
Wednesday October 2, 2024 1:30pm - 2:00pm EDT
Great Room

1:30pm EDT

Seeing the Forest for the Trees: Understanding Certificate Attack Surfaces and Risk
Wednesday October 2, 2024 1:30pm - 2:00pm EDT
If you’re just looking at key strength, algorithms, and lifetimes, you’re only seeing part of the picture. Beyond weak cryptography, insecure key stores and certificate mismanagement, certificate can create a lucrative attack surface through their identity and the trust of that identity. This session will introduce the elements of a certificate's attack surface and how to gauge risk to better prioritize management and alerting around high value certificate targets.
Speakers
avatar for Karen Reinhardt

Karen Reinhardt

Principal Engineer, PKI, The Home Depot
Karen Reinhardt brings over 25 years of experience in cybersecurity into her role as Principal Engineer of PKI at The Home Depot. She started her Infosec careers in 1999 as a founding member of the Qwest Communications (CenturyLink) Information security team and since then, has served... Read More →
Wednesday October 2, 2024 1:30pm - 2:00pm EDT
Cityside

2:15pm EDT

Revolutionizing Security: Modernize Your PKI with Zero Touch PKI
Wednesday October 2, 2024 2:15pm - 2:45pm EDT
Securing machine identities is more critical than ever, and traditional PKI systems can be cumbersome and resource-intensive, leaving organizations vulnerable to inefficiencies and security gaps. Join this session to explore the transformative potential of Zero Touch PKI—especially when combined with TLS Protect. Learn strategies for automating the entire lifecycle of user, device and TLS certificates—from issuance to renewal and revocation. Discover how this cutting-edge approach minimizes human intervention, reduces errors and accelerates deployment, all while enhancing security and compliance. Get best practices for modernizing your PKI to safeguard your digital transformation journey and fortify your organization's security posture in an increasingly complex machine identity landscape.
Speakers
avatar for Florin Lazurca

Florin Lazurca

Head of Technical Marketing, Venafi
Florin Lazurca drives technical marketing direction for machine identity management at Venafi. He has broad knowledge of enterprise software and IT, SaaS services, and rapidly evolving cloud native and security technologies solutions. His background includes being an architect in... Read More →
avatar for George Parsons

George Parsons

Head of PKI Strategy, Venafi
George Parsons, Venafi's Head of PKI Strategy, has 30 years in PKI, crafting strategies tailored to the Global 5000's security landscape. With a BSc in Computer Science and an MBA, he melds academic insight with practical prowess. George made significant strides at VeriSign, reshaping... Read More →
Wednesday October 2, 2024 2:15pm - 2:45pm EDT
Great Room

2:15pm EDT

Securing Certificates Is Not Enough!! We Need To Secure All Machine Identities, including Secrets.
Wednesday October 2, 2024 2:15pm - 2:45pm EDT
We all know securing certificates and preventing outages is critical. But, as organizations increasingly leverage digital technology to accelerate the business, does leadership recognize securing certificates is not enough? More than ever before, attackers are exploiting exposed secrets and machine identities to find weak points in compute environments. Don’t let it happen to you! In this session, you'll learn why you need to secure your applications, secrets and cloud workloads.
 
Join us to learn how CyberArk’s battle-tested solution for secrets management reduces cyber-risk for machine identities. Now, security can “meet developers where they are” with flexible options which help accelerate securing your organization’s digital technologies across cloud and hybrid environments.
Wednesday October 2, 2024 2:15pm - 2:45pm EDT
Cityside

3:00pm EDT

Future-Proofing Your Machine Identity Security: A Step-by-Step Roadmap
Wednesday October 2, 2024 3:00pm - 3:30pm EDT
How are you planning for your future? We’ll help you stay ahead in the ever-evolving security landscape with a comprehensive machine identity security roadmap that takes you from solving current problems through to solving for workload identity and post-quantum readiness. You'll learn how to effectively communicate your security strategy to board members, justify staffing and budgets, and establish yourself as a forward-thinking leader. Plus, you’ll gain insights from future-forward companies and see how they are preparing for the future of machine identity security. Get the knowledge and tools needed to navigate the complexities of machine identity security and ensure your organization's security posture is robust and future-proof.
Speakers
avatar for Setu Kulkarni

Setu Kulkarni

VP of Product Management, Venafi
Setu Kulkarni is our VP of Product and leads the Product Strategy, Product Management and User Experience teams that are responsible for the entire Venafi Control Plane.
avatar for Nick Curcuru

Nick Curcuru

Head of Solutions Marketing, Venafi
Nick is a dedicated, passionate executive on a mission to protect the organization’s revenue streams and brand reputation.  He works with Venafi customers to prevent misuse and compromise and stop costly outages while modernizing their platforms, balancing fast development with... Read More →
avatar for Carl Mehner

Carl Mehner

Security Business Architect, USAA
Carl Mehner is an information security professional who has worked for the past 15 years working with public key infrastructure, certificates, and building standards for secure protocols, such as TLS 1.3.  
Wednesday October 2, 2024 3:00pm - 3:30pm EDT
Great Room

3:00pm EDT

Revolutionizing SSH Authentication With SSH Certificates
Wednesday October 2, 2024 3:00pm - 3:30pm EDT
Are you considering adopting SSH certificates as a way to avoid some of the risks that come with standard SSH key pairs? For many organizations, that may be easier said than done. Join this session to explore the steps you need to take to migrate away from SSH keys and truly focus on implementing an effective SSH certificate solution. You’ll gain insights into real world applications and use cases with a focus on where you should prioritize. And you’ll walk away with an in-depth understanding of how you can manage and control your SSH environment with the right process.
Speakers
avatar for Gunnar Ernst

Gunnar Ernst

Information Security Senior Advisor, ElevanceHealth
Nearly a decade in experience with Information Security, specializing in various facets of the SSH environment (system administration, middleware administration and encryption).Graduated from Indiana University with a Bachelor’s degree in Informatics focusing on Cybersecurity.Truly... Read More →
Wednesday October 2, 2024 3:00pm - 3:30pm EDT
Cityside

3:30pm EDT

Networking Break & Sponsor Expo
Wednesday October 2, 2024 3:30pm - 4:00pm EDT
Wednesday October 2, 2024 3:30pm - 4:00pm EDT
Mezzanine

4:00pm EDT

Securing Kubernetes Workload Identities with Compliant PKI and Governance
Wednesday October 2, 2024 4:00pm - 4:30pm EDT
Unmanaged certificates and weak encryption in Kubernetes can lead to shadow IT, rogue developer activity, governance challenges and non-compliant PKI usage. Learn about the different types of workload identity threats in Kubernetes, along with effective strategies for mitigating them with a cloud native certificate management solution. We’ll explore how compliant PKI, using Firefly with SPIFFE and Zero Touch PKI, secures authentication across environments—reducing cyber-attack risks, ensuring data integrity and streamlining operations by eliminating manual certificate management. We’ll share real-world use cases highlighting the benefits of decentralized issuance and workload identity solutions. And you’ll come away with a crypto agile architecture blueprint for scalable identity security to secure sensitive data, maintaining regulatory compliance for modern workloads.
Speakers
avatar for Sitaram Iyer

Sitaram Iyer

VP, Emerging Technologies, Global Architects, Venafi
Sitaram is primarily focused on bringing security teams and developers closer. He works closely with customers worldwide to help drive the adoption of cloud native security strategy leading with cert-manager in Kubernetes and various other CNCF projects to bridge the gap between security... Read More →
avatar for Akbar Ghaswala

Akbar Ghaswala

Service Manager, Navy Federal Credit Union
Akbar Ghaswala is a Service Manager at Navy Federal Credit Union.  He leads a team of dedicated, talented and passionate PKI professionalswho automate certificate installations, mitigate certificate related outages and manage certificate inventory.He has worked in IT for 25+ years... Read More →
Wednesday October 2, 2024 4:00pm - 4:30pm EDT
Great Room

4:00pm EDT

Why Automation is Critical for Managing 90-day Certificates
Wednesday October 2, 2024 4:00pm - 4:30pm EDT
Will 90-day certificates break your business? Automation is the only way forward. Staying on top of shorter, 90-day certificate lifespans just isn’t possible with manual management. Join this session to learn about the machine identity security challenges that are driving the need for automation today and how those efforts will smooth your transition to impending shorter certificate standards. You’ll hear real-life examples of what can go wrong without the right levels of automation and get advice on how to sidestep the consequences of manual certificate management now and into the future.
Speakers
avatar for Tunde Oni-Daniel

Tunde Oni-Daniel

Head of Technology Operations and Engineering, OneMain Financial
Tunde Oni-Daniel is the Head of Technology Operations & Engineering and in that role, he is responsible for cybersecurity technology. He brings over 23 years of global security experience having run security architecture, privacy programs, enterprise risk management, technology integration... Read More →
Wednesday October 2, 2024 4:00pm - 4:30pm EDT
Cityside

4:45pm EDT

Forge of Innovation Challenge
Wednesday October 2, 2024 4:45pm - 5:15pm EDT
See the many ways the Machine Identity Management Development Fund fuels industry innovation and future-proofs customer success! But with more than 50 trailblazing innovations at your fingertips, it can be hard to choose the most beneficial solution. Fortunately, we’ve gathered five of our customers’ most popular picks to deliver five-minute rapid-fire pitches. At the end of this white-hot, future-focused inferno, you’ll vote for the most compelling solution—and be one of the first to peer into the next era of machine identity security.

Learn more about the Machine Identity Management Development Fund at https://venafi.com/development-fund/.
Moderators
avatar for Kevin Bocek

Kevin Bocek

Chief Innovation Officer, Venafi
Leading Venafi’s growth in new innovations, Kevin is at the forefront of Venafi’s cutting edge machine identity management for workload identity, Kubernetes and AI. He also drives Venafi’s award-winning technology ecosystem and developer community to futureproof customer success... Read More →
Speakers
avatar for Anusha Iyer

Anusha Iyer

CEO, Corsha
Anusha Iyer, Founder and CEO of Corsha, is an engineer in heart and spirit with over 20 years of experience in computer and network security and machine identity. Passionate about demystifying cybersecurity, she focuses on making security accessible, automated, even self-assuring... Read More →
avatar for Bruno Couillard

Bruno Couillard

CEO, Crypto4A
After Chrysalis-ITS, Mr. Couillard spent a decade working on advanced quantum-ready PKI and key management systems for the Government of Canada. Recognizing the urgent need for quantum-readiness in the commercial sector, he founded Crypto4A.
avatar for James Penney

James Penney

CTO, Device Authority Ltd
Originally a founding-member of Device Authority Ltd, (formerly known as Cryptosoft), James has over 17 years’ experience in both internal and external facing technical roles. James leads the technology strategy and is the technical leader of the business, working closely with the... Read More →
avatar for Ritesh Patel

Ritesh Patel

Co-Founder & VP Product, Nirmata
Ritesh Patel is Co-founder and VP of Products at Nirmata, the creators of Kyverno - the Kubernetes-native policy engine. At Nirmata, he is responsible for commercial products for Kubernetes security, governance, and automation. He also leads key technology partnerships. Ritesh has... Read More →
avatar for Angel Menendez

Angel Menendez

Staff Developer Advocate, n8n.io
Angel Menendez is a Staff Developer Advocate at n8n.io with a passion for leveraging low-code tools to enhance cybersecurity workflows. Originally from Puerto Rico, Angel moved to Oklahoma at a young age and was introduced to computing early on by helping his father translate technical... Read More →
Wednesday October 2, 2024 4:45pm - 5:15pm EDT
Great Room

4:45pm EDT

Panel: Afternoon Tea With Women in Cybersecurity
Wednesday October 2, 2024 4:45pm - 5:15pm EDT
You don’t have to read the tea leaves to understand the multi-faceted value and contributions of women in cybersecurity. Join us for an afternoon Boston Tea Party where we’ll explore how revolutionizing your organization’s gender diversity can enrich your security strategies, while countering the growing shortage of skilled cybersecurity experts. Join our panel of outspoken advocates who will share their personal successes in cybersecurity as well as advice on how to expand your team with women who are passionate about cybersecurity. You’ll also gain insights on how you can support the women already on your team and why the addition of women will make your team more successful.
Moderators
avatar for Melissa Keohane

Melissa Keohane

Chief Legal & People Officer, Venafi
As chief legal and people officer, Melissa is responsible for all legal affairs for the company as well as the global people strategy that propels Venafi’s team performance and vibrant company culture. Melissa is deeply committed to sustaining Venafi’s special culture and building... Read More →
Speakers
avatar for Jane Domboski

Jane Domboski

Chief Information Security Officer (CISO), OneMain Financial
Jane Domboski currently serves as the Chief Information Security Officer (CISO) for OneMain Financial. Ms. Domboski is both an attorney and cybersecurity practitioner. She has served in both the public and private sectors. In the public sector, Ms. Domboski investigated cybercrime... Read More →
avatar for Tanya Gill

Tanya Gill

Director of Information Security, Diebold Nixdorf
Tanya Gill has a career in Information Technology and Information Security that spans 24 years, with the last 19 focused in Information and Cybersecurity. Tanya has been on the forefront of building several security programs, including people, processes and technology. She has worked... Read More →
avatar for Karen Reinhardt

Karen Reinhardt

Principal Engineer, PKI, The Home Depot
Karen Reinhardt brings over 25 years of experience in cybersecurity into her role as Principal Engineer of PKI at The Home Depot. She started her Infosec careers in 1999 as a founding member of the Qwest Communications (CenturyLink) Information security team and since then, has served... Read More →
avatar for Holly Worley

Holly Worley

Customer Success Manager, Venafi
Customer Success Manager at Venafi for Strategic Accounts
Wednesday October 2, 2024 4:45pm - 5:15pm EDT
Cityside

5:15pm EDT

Machine Identity Mixer
Wednesday October 2, 2024 5:15pm - 7:15pm EDT
After a full day of exploring the future of machine identity security, it's time to shift gears and let loose at our networking reception. This is your chance to become a networking machine and interact with other talented minds, swap stories, exchange ideas and form lasting new partnerships. It’s the most exciting way to compare notes and share your experiences with fellow attendees while relaxing over a cocktail and hors d’oeuvres.
Wednesday October 2, 2024 5:15pm - 7:15pm EDT
Great Room + Mezzanine
 
Thursday, October 3
 

8:00am EDT

Breakfast
Thursday October 3, 2024 8:00am - 9:00am EDT
Thursday October 3, 2024 8:00am - 9:00am EDT
Harborside 1

8:00am EDT

Registration
Thursday October 3, 2024 8:00am - 9:00am EDT
Thursday October 3, 2024 8:00am - 9:00am EDT
Great Room Foyer

9:00am EDT

Modernizing PKI to Prepare for Post-Quantum Cryptography
Thursday October 3, 2024 9:00am - 9:30am EDT
To prepare for the era of post-quantum cryptography (PQC), Air France-KLM has faced the challenge of modernizing a legacy-laden and intricate Public Key Infrastructure (PKI) environment. This was not an easy task for two companies each with over 90 years of history with legacy systems. Join this presentation to learn the comprehensive efforts the airlines undertook to rationalize and update the PKI ecosystem. Explore where we focused enhancements in security, operational efficiency, and cost-effectiveness perspectives to prepare for PQC. And see how Air France-KLM has strategically improved its cryptographic infrastructure to meet future demands.
Speakers
avatar for Valentin Chatelard

Valentin Chatelard

Machine IAM Security Architect, Air France - KLM
I serve as a Technical Security Architect at Air France-KLM, specializing in machine identities (Machine-IAM). In this role, I ensure that IT and business projects align with the stringent security requirements set forth by the Air France-KLM CISO team.As the technical lead on security... Read More →
Thursday October 3, 2024 9:00am - 9:30am EDT
Cityside

9:00am EDT

Surviving the Brave New World of Multi-Cloud, Multi-Mesh, Multi-Identity
Thursday October 3, 2024 9:00am - 9:30am EDT
Whether you’re ready or not, multi-cloud environments are the new norm in business landscapes. Granted, they can enhance innovation, drive agility and satisfy sovereignty requirements, but adopting multi-cloud brings significant challenges. Join our panel of industry leaders and cloud experts to explore the intricacies of surviving this world. Our candid discussion will focus on areas specific to identity management and the interoperability challenges you will need to overcome, both with and without service mesh. Panelists will share best practices and provide you with actionable insights into how to navigate these multi-faceted challenges.
Speakers
avatar for Matt Barker

Matt Barker

VP & Global Head, Workload Identity Architecture, Venafi
Matt started his career helping Asian computer manufacturers pre-install Ubuntu Linux before moving to NoSQL Database company MongoDB. There, he saw the company grow from a few million dollars in revenue before going on to a successful IPO.After becoming interested in the business... Read More →
avatar for Danny Ganzon

Danny Ganzon

Sr. Business Development Manager, Red Hat
Danny Ganzon is a Sr. Business Development Manager focused on developing joint solutions with Red Hat ecosystem partners. Based in Raleigh, North Carolina his experience in both hardware and open-source software sales and partnerships spans the last 13 years.
avatar for Jody Hunt

Jody Hunt

Global Solution Architect - DevSecOps, CyberArk
Jody has held many diverse roles in software development, sales, and marketing. An enthusiastic promoter of DevOps principles since 2010, he became aware of the growing security gap introduced by automation which led him to join Conjur in 2017. Four months later, CyberArk acquired... Read More →
Sponsors
Thursday October 3, 2024 9:00am - 9:30am EDT
Great Room

9:45am EDT

Identity Is the Key to Supply Chain Security
Thursday October 3, 2024 9:45am - 10:15am EDT
Software supply chain attacks continue to be front page news. The software supply chain comprises everything that touches an application or plays a role in its assembly, development or deployment. Weaknesses anywhere can introduce risk everywhere, and the only way to mitigate this risk is to understand everything that's in the supply chain. This is where identity-based software and workloads are crucial to reduce risks in software supply chains. Focus will be around the latest industry approaches to signing and verifying artifacts, with a specific focus around Kubernetes workloads by taking advantage of container signing tools such as notation and providing real-time policy enforcement via Kyverno.
Speakers
avatar for Ivan Wallis

Ivan Wallis

Global Architect, Venafi
Ivan Wallis is primarily responsible for working closely with customers worldwide as they adopt code signing as part of their cloud-native security strategy.For more than 20+ years, Ivan has been a trusted advisor to some of the largest enterprise customers with PKI, code signing... Read More →
avatar for Akbar Ghaswala

Akbar Ghaswala

Service Manager, Navy Federal Credit Union
Akbar Ghaswala is a Service Manager at Navy Federal Credit Union.  He leads a team of dedicated, talented and passionate PKI professionalswho automate certificate installations, mitigate certificate related outages and manage certificate inventory.He has worked in IT for 25+ years... Read More →
Thursday October 3, 2024 9:45am - 10:15am EDT
Great Room

9:45am EDT

U.S. Customs and Border Protection's Approach to Self-Service and Device Automation
Thursday October 3, 2024 9:45am - 10:15am EDT
Want a up-close look at a real-world case study on automating certificate management services in a highly distributed environment? Gain insights into the timeline it took US Customs & Border Protection to implement, the challenges they encountered, and their recommendations for successfully onboarding and training internal customers of the certificate service. Join this session to access lessons learned and best practice recommendations for aligning the certificate service to organizational hierarchy and policy controls followed by open discussion with the audience on topics such as automation and keystore configuration.
Speakers
avatar for Michael Ross

Michael Ross

Information Technology Specialist, US Customs & Border Protection
avatar for Zack Stronko

Zack Stronko

Computer Systems Engineer/Architect, US Customs & Border Protection
10 years experience working in an IT landscape, including the past 4 years implementing Venafi TPP for certificate management capabilities.  
avatar for Kunal Patel

Kunal Patel

Systems Engineer, US Customs & Border Protection
Experience in engineering/architecture of various systems ranging from middleware application engines 9websphere/weblogic/tomcat), web servers, linux administration, Identity Management to currently leading a team that implemented a complex Venafi environment at CBP for certificate... Read More →
Thursday October 3, 2024 9:45am - 10:15am EDT
Cityside

10:15am EDT

Networking Break & Sponsor Expo
Thursday October 3, 2024 10:15am - 10:45am EDT
Thursday October 3, 2024 10:15am - 10:45am EDT
Mezzanine

10:45am EDT

Ask Me Anything: Unpacking Key Product Initiatives
Thursday October 3, 2024 10:45am - 11:15am EDT
How will Venafi help you future-proof your organization to support your mission-critical objectives? Join Venafi’s Product Management team to learn where Venafi products are headed and how we will help you get there. You’ll have plenty of time to ask about future directions or how we can assist with immediate issues in our open-mic ask-me-anything session with product management experts.
Speakers
avatar for Setu Kulkarni

Setu Kulkarni

VP of Product Management, Venafi
Setu Kulkarni is our VP of Product and leads the Product Strategy, Product Management and User Experience teams that are responsible for the entire Venafi Control Plane.
avatar for Leo Ezhil

Leo Ezhil

Product Manager, Venafi
Senior Staff Product Manager at Venafi for over 5 years and have played a key role in the development of TLS Protect Cloud, leading the creation of critical platform features and driving key integrations, including cloud connectors. Additionally, responsible for all integrations on... Read More →
avatar for Aaron Hixson

Aaron Hixson

Director, Product Management, Venafi
Passionate about all things Cyber Security, Aaron Hixson has been with Venafi for 12 years. Aaron brings his background in systems administration to his Product Management work. Currently responsible for the Self-Hosted portfolio of products (TLS, CodeSign, and SSH).Born and raised... Read More →
avatar for Faisal Razzak

Faisal Razzak

Group Product Manager, Venafi
Faisal is a seasoned expert with over 15 years of experience in cybersecurity, cryptography, and machine identity security. As a Group Product Manager in Venafi’s R&D organization, he spearheads critical initiatives, including TLS Protect Cloud, Post-Quantum Cryptography, and Securing... Read More →
Thursday October 3, 2024 10:45am - 11:15am EDT
Great Room

10:45am EDT

Extending Automated Enterprise Machine Identity to the IBM Mainframe
Thursday October 3, 2024 10:45am - 11:15am EDT
Many of the largest organizations in the world depend on IBM Mainframe computers for their core business processing functions. But mainframe teams in these organizations can be very hesitant to communicate with vendors outside of their trusted mainframe scope. The BMC team leverages our Venafi partnership, proven solution, and mainframe network to help organizations extend machine identity security to the mainframe. See how the joint solution helps organizations automate the tedious, time-consuming and error-prone job of managing certificates on the mainframe platform.
Speakers
avatar for Ken Chism

Ken Chism

Director Worldwide Cybersecurity Sales, BMC Software
Ken received his Masters Degree in Cybersecurity in 2021 from Arizona State University, with undergrad studies in Management Information Systems at Drake University and the University of Arizona.  Ken leads the world-wide Cybersecurity Sales team at BMC Software and is highly involved... Read More →
Sponsors
Thursday October 3, 2024 10:45am - 11:15am EDT
Cityside

11:30am EDT

Building Standards Into Your Workload Identity Framework
Thursday October 3, 2024 11:30am - 12:00pm EDT
Are you ready to enable zero-trust architectures for workload identity? How much do you know about the various new draft standards and the new IETF working group, Workload Identity for Multi-Service Environments (WIMSE)? Join this session to review the advancements and advantages of emerging drafts, including enhanced security for service-to-service authentication and integration with transaction tokens, while pinpointing the existing gaps. We will also discuss the upcoming standards required for implementing zero-trust architectures for workload identities and how the initiatives of the Cloud Native Computing Foundation, IETF and OpenID Foundation are aligning to create a robust trust infrastructure for workload identities.
Speakers
avatar for Joseph Salowey

Joseph Salowey

Principal Security Engineer, Venafi
Joe currently works at Venafi as a Principal Product Security Engineer. He has spent the majority of his career working on security solutions at various companies including Cisco and Salesforce. He is especially focused in the areas of secure communications, authentication and authorization... Read More →
avatar for Justin Richer

Justin Richer

CTO, UberEther & Co-Chair, WIMSE, UberEther
Justin Richer is the CTO of UberEther, and is a security architect, software engineer, standards editor, and systems designer with over two decades of industry experience. He is the lead author of OAuth2 In Action from Manning Publications (with Antonio Sanso) and contributor to OAuth... Read More →
Thursday October 3, 2024 11:30am - 12:00pm EDT
Great Room

11:30am EDT

Securing Machine Identities in the Quantum Computing Era
Thursday October 3, 2024 11:30am - 12:00pm EDT
Are you prepared for the post-quantum era? Explore the evolving threat landscape and the role of post-quantum cryptography (PQC) in futureproofing machine identity security. We’ll demonstrate how our deep expertise in machine identity security and comprehensive professional services can help you speed adoption of PQC solutions. You’ll gain valuable insights into the urgency of addressing quantum threats and their potential impact on machine identities, the role of PQC algorithms, and how to gain the visibility, agility, and resilience you need for a quantum-safe future. You’ll also get a roadmap for adopting PQC through tailored services, readiness assessments, platform implementation, and ongoing services.  
Speakers
avatar for Paul Horn

Paul Horn

Chief Technology Officer, Accutive Security
Paul’s belief in the importance of cybersecurity education led him to achieve a CISSP certification and begin instructing cybersecurity professionals on best practices for cryptography and key management. In the years since, Paul has led the development and architecture for Accutive’s... Read More →
Sponsors
Thursday October 3, 2024 11:30am - 12:00pm EDT
Cityside

12:00pm EDT

Lunch
Thursday October 3, 2024 12:00pm - 1:30pm EDT
Thursday October 3, 2024 12:00pm - 1:30pm EDT
Harborside 1

12:00pm EDT

Sponsor Expo
Thursday October 3, 2024 12:00pm - 1:30pm EDT
Thursday October 3, 2024 12:00pm - 1:30pm EDT
Mezzanine

1:30pm EDT

Comprehensively Securing the Certificate Management Process, End-to-End
Thursday October 3, 2024 1:30pm - 2:00pm EDT
As a TLS Protect or Zero Touch PKI customer, you have powerful capabilities for automating the entire certificate lifecycle. But how are you ensuring that your certificate and PKI administrators securely access the systems that actually manage the certificates and that their admin credentials aren’t compromised? How do you ensure that these systems are able to get the credentials needed to securely access the organization’s hybrid-cloud application and IT infrastructure — so they can renew and validate certificates simply, securely and efficiently?

In this session, we’ll cover how CyberArk PAM, Secrets Management and the CyberArk Identity Security Platform enable organizations to holistically simplify automating and securing their entire certificate management process, end to end. You’ll learn how to leverage your existing investments to take advantage of the capabilities that are available today from CyberArk, some at no additional cost. These include protecting and rotating credentials in a single vault, best practices for securing admin access, and leveraging out-of-the-box certified integrations from CyberArk and Venafi, a CyberArk company.
Thursday October 3, 2024 1:30pm - 2:00pm EDT
Great Room

1:30pm EDT

Crypto Agility: Practical Steps that Benefit Your Business Well Before Quantum
Thursday October 3, 2024 1:30pm - 2:00pm EDT
Right now, quantum is the bogeyman. And while it’s still just an idea, it’s an idea that should inspire improvements to your crypto agility now while you are preparing for the ultimate quantum event. Join this session to learn practical steps that will not only prepare you for post-quantum cryptography but give you a leg up in addressing current challenges like the impending 90-day TLS certificate standard and CA distrust events. Learn about solutions that will deliver the discovery, automation and reporting you need now—and keep your business secure well into the future.  
Speakers
avatar for Patrick Dunaway

Patrick Dunaway

Operations Manager, Optiv
Operations manager, managed PKI
Sponsors
Thursday October 3, 2024 1:30pm - 2:00pm EDT
Cityside
 
Share Modal

Share this link via

Or copy link

Filter sessions
Apply filters to sessions.