As machine identities continue to radically outnumber human identities, machine identity management has become even more mission-critical—and Venafi has led the charge in solving that problem for countless customers. But now it’s time to rethink our security models to go beyond just managing machine identities: we need to secure them. Join this keynote address to share our vision of new paradigms in identity security that bring together developers and security teams in the common goal of protecting your organization’s most valuable digital assets: identities.
Matt Cohen is Chief Executive Officer of CyberArk. Cohen joined CyberArk in 2019 as Chief Revenue Officer and was promoted to Chief Operating Officer in November 2020. Cohen has a proven track record as a results-driven leader, playing an instrumental role in driving the execution... Read More →
Jeff is a visionary leader with over 25 years of leadership and management experience in information technology and cybersecurity. As former CEO of Venafi, he led the creation of the machine identity management category, which has become the next big area of cybersecurity investment... Read More →
Chief Information Security Officer (CISO), Kraft Heinz
Ricardo Lafosse is chief information security officer for Kraft Heinz. Lafosse is responsible for IT risk governance, OT security, incident management, technical disaster recovery, and determining enterprise-wide security policies and procedures. Lafosse regularly presents on security... Read More →
Wednesday October 2, 2024 9:00am - 9:30am EDT
Great Room
Post-quantum cryptography (PQC) threatens conventional cryptographic methods. And your post-quantum success is dependent on your pre-quantum readiness. Join a lively discussion on how businesses can prepare to mitigate emerging quantum computing threats of the near future and thrive in a world transformed by quantum computing. Our industry-leading panel will explore trends influencing the post-quantum readiness of today’s enterprises and how adopting automated, crypto-agile machine identity security plays a pivotal role in achieving a seamless transition to the post-quantum era – before quantum computers are mature enough to threaten your organization’s cryptography.
Leading Venafi’s growth in new innovations, Kevin is at the forefront of Venafi’s cutting edge machine identity management for workload identity, Kubernetes and AI. He also drives Venafi’s award-winning technology ecosystem and developer community to futureproof customer success... Read More →
I serve as a Technical Security Architect at Air France-KLM, specializing in machine identities (Machine-IAM). In this role, I ensure that IT and business projects align with the stringent security requirements set forth by the Air France-KLM CISO team.As the technical lead on security... Read More →
Carl Mehner is an information security professional who has worked for the past 15 years working with public key infrastructure, certificates, and building standards for secure protocols, such as TLS 1.3.
Dr. Colin Soutar is a Managing Director within Deloitte Risk & Financial Advisory. Colin serves as the Cyber lead for Government & Public Services innovation investments, and is also the Deloitte US and Global Quantum Cyber Readiness leader. After finishing his studies in Dundee... Read More →
Wednesday October 2, 2024 1:30pm - 2:00pm EDT
Great Room
If you’re just looking at key strength, algorithms, and lifetimes, you’re only seeing part of the picture. Beyond weak cryptography, insecure key stores and certificate mismanagement, certificate can create a lucrative attack surface through their identity and the trust of that identity. This session will introduce the elements of a certificate's attack surface and how to gauge risk to better prioritize management and alerting around high value certificate targets.
Karen Reinhardt brings over 25 years of experience in cybersecurity into her role as Principal Engineer of PKI at The Home Depot. She started her Infosec careers in 1999 as a founding member of the Qwest Communications (CenturyLink) Information security team and since then, has served... Read More →
Wednesday October 2, 2024 1:30pm - 2:00pm EDT
Cityside
Securing machine identities is more critical than ever, and traditional PKI systems can be cumbersome and resource-intensive, leaving organizations vulnerable to inefficiencies and security gaps. Join this session to explore the transformative potential of Zero Touch PKI—especially when combined with TLS Protect. Learn strategies for automating the entire lifecycle of user, device and TLS certificates—from issuance to renewal and revocation. Discover how this cutting-edge approach minimizes human intervention, reduces errors and accelerates deployment, all while enhancing security and compliance. Get best practices for modernizing your PKI to safeguard your digital transformation journey and fortify your organization's security posture in an increasingly complex machine identity landscape.
Florin Lazurca drives technical marketing direction for machine identity management at Venafi. He has broad knowledge of enterprise software and IT, SaaS services, and rapidly evolving cloud native and security technologies solutions. His background includes being an architect in... Read More →
George Parsons, Venafi's Head of PKI Strategy, has 30 years in PKI, crafting strategies tailored to the Global 5000's security landscape. With a BSc in Computer Science and an MBA, he melds academic insight with practical prowess. George made significant strides at VeriSign, reshaping... Read More →
We all know securing certificates and preventing outages is critical. But as organizations increasingly leverage digital technology to accelerate the business, does leadership recognize securing certificates is not enough? More than ever before, attackers are exploiting exposed secrets and machine identities to find weak points in compute environments. Don’t let it happen to you! In this session you'll learn why you need to secure your applications, secrets and cloud workloads.
Join us to learn how CyberArk’s battle-tested solution for secrets management reduces cyber risk for machine identities. Now security can “meet developers where they are” with flexible options, which help accelerate securing your organization’s digital technologies across cloud and hybrid environments.
Chris leads CyberArk’s product marketing initiatives focused on helping customers secure their machine identities and DevOps environments. He joined CyberArk in 2017. Prior roles include 9 years as a senior director at Gartner working with large enterprises, and earlier in his career... Read More →
Wednesday October 2, 2024 2:15pm - 2:45pm EDT
Cityside
How are you planning for your future? We’ll help you stay ahead in the ever-evolving security landscape with a comprehensive machine identity security roadmap that takes you from solving current problems through to solving for workload identity and post-quantum readiness. You'll learn how to effectively communicate your security strategy to board members, justify staffing and budgets, and establish yourself as a forward-thinking leader. Plus, you’ll gain insights from future-forward companies and see how they are preparing for the future of machine identity security. Get the knowledge and tools needed to navigate the complexities of machine identity security and ensure your organization's security posture is robust and future-proof.
Nick is a dedicated, passionate executive on a mission to protect the organization’s revenue streams and brand reputation. He works with Venafi customers to prevent misuse and compromise and stop costly outages while modernizing their platforms, balancing fast development with... Read More →
Setu Kulkarni is our VP of Product and leads the Product Strategy, Product Management and User Experience teams that are responsible for the entire Venafi Control Plane.
Carl Mehner is an information security professional who has worked for the past 15 years working with public key infrastructure, certificates, and building standards for secure protocols, such as TLS 1.3.
Wednesday October 2, 2024 3:00pm - 3:30pm EDT
Great Room
Are you considering adopting SSH certificates as a way to avoid some of the risks that come with standard SSH key pairs? For many organizations, that may be easier said than done. Join this session to explore the steps you need to take to migrate away from SSH keys and truly focus on implementing an effective SSH certificate solution. You’ll gain insights into real world applications and use cases with a focus on where you should prioritize. And you’ll walk away with an in-depth understanding of how you can manage and control your SSH environment with the right process.
Information Security Senior Advisor, ElevanceHealth
Nearly a decade in experience with Information Security, specializing in various facets of the SSH environment (system administration, middleware administration and encryption).Graduated from Indiana University with a Bachelor’s degree in Informatics focusing on Cybersecurity.Truly... Read More →
Wednesday October 2, 2024 3:00pm - 3:30pm EDT
Cityside
You don’t have to read the tea leaves to understand the multi-faceted value and contributions of women in cybersecurity. Join us for an afternoon Boston Tea Party -- complete with tea and sweets -- where we’ll explore how revolutionizing your organization’s gender diversity can enrich your security strategies, while countering the growing shortage of skilled cybersecurity experts. Our panel of outspoken advocates will share their personal successes in cybersecurity as well as advice on how to expand your team with women who are passionate about cybersecurity. You’ll also gain insights on how you can support the women already on your team and why the addition of women will make your team more successful.
As chief legal and people officer, Melissa is responsible for all legal affairs for the company as well as the global people strategy that propels Venafi’s team performance and vibrant company culture. Melissa is deeply committed to sustaining Venafi’s special culture and building... Read More →
Chief Information Security Officer (CISO), OneMain Financial
Jane Domboski currently serves as the Chief Information Security Officer (CISO) for OneMain Financial. Ms. Domboski is both an attorney and cybersecurity practitioner. She has served in both the public and private sectors. In the public sector, Ms. Domboski investigated cybercrime... Read More →
Tanya Gill has a career in Information Technology and Information Security that spans 24 years, with the last 19 focused in Information and Cybersecurity. Tanya has been on the forefront of building several security programs, including people, processes and technology. She has worked... Read More →
Karen Reinhardt brings over 25 years of experience in cybersecurity into her role as Principal Engineer of PKI at The Home Depot. She started her Infosec careers in 1999 as a founding member of the Qwest Communications (CenturyLink) Information security team and since then, has served... Read More →
Many of the largest organizations in the world depend on IBM Mainframe computers for their core business processing functions. But mainframe teams in these organizations can be very hesitant to communicate with vendors outside of their trusted mainframe scope. The BMC team leverages our Venafi partnership, proven solution, and mainframe network to help organizations extend machine identity security to the mainframe. See how the joint solution helps organizations automate the tedious, time-consuming and error-prone job of managing certificates on the mainframe platform.
Director Worldwide Cybersecurity Sales, BMC Software
Ken received his Masters Degree in Cybersecurity in 2021 from Arizona State University, with undergrad studies in Management Information Systems at Drake University and the University of Arizona. Ken leads the world-wide Cybersecurity Sales team at BMC Software and is highly involved... Read More →
Are you prepared for the post-quantum era? Explore the evolving threat landscape and the role of post-quantum cryptography (PQC) in futureproofing machine identity security. We’ll demonstrate how our deep expertise in machine identity security and comprehensive professional services can help you speed adoption of PQC solutions. You’ll gain valuable insights into the urgency of addressing quantum threats and their potential impact on machine identities, the role of PQC algorithms, and how to gain the visibility, agility, and resilience you need for a quantum-safe future. You’ll also get a roadmap for adopting PQC through tailored services, readiness assessments, platform implementation, and ongoing services.
Paul’s belief in the importance of cybersecurity education led him to achieve a CISSP certification and begin instructing cybersecurity professionals on best practices for cryptography and key management. In the years since, Paul has led the development and architecture for Accutive’s... Read More →