The countdown is on to Keyfactor Tech Days     | Secure your spot today!

Keyfactor’s Top 5 Webinars of 2021 (so far)

Industry Trends

The first half of 2021 has come and gone. Remember the days when we thought we’d never get past 2020? Here we are, closing out the first half of 2021.  

During these last six months, Keyfactor has hosted several webinars each month. We’ve had 20+ guest speakers share their expert insights and case studies on topics such as: embedding IoT device security in the supply chain, building the business case for a cloud-first PKI strategy, the state of machine identity management, and much more!

Our Top 5 Webinars for 2021 (so far)

Nearly 10,000+ people across the globe have viewed our webinars. As our webinars continue to be viewed by thousands, we thought a great way to kick off the 2nd half of 2021 would be to share our top 5 webinars of the year that are all available on-demand.

Biden’s Cybersecurity Executive Order: Your Questions answered by Crypto Experts

featuring: Ted Shorter – CTO (Keyfactor), Ellen Boehm – VP of IoT Strategy & Operations (Keyfactor), Tomas Gustavsson – CTO (PrimeKey)

Cybersecurity Executive Order QA

Why should I watch it?

The executive order (EO) touts modernizing critical infrastructure with Zero Trust Architecture and improving supply chain security. But what does this mean for both the public and private sectors? Where does the role of securing machine identities play in building stronger standards?

Our expert panel breaks down the most important sections of the EO and answer your questions on where cryptography plays a role in securing our nation for the future.

The State of Machine Identity Management 2021: Expert Insights and Key Takeaways

featuring: Chris Hickman, Chief Security Officer and Ryan Sanders, Sr. Product Marketing Manager

promo banner for the 2021 Ponemon report

Why should I watch it?

Hear key takeaways from the Ponemon Institute 2021 State of Machine Identity Management Report, including:

  • Why crypto-agility emerged as a top priority for organizations
  • Key risks and challenges in managing machine identities
  • The importance of machine identity management in Enterprise IAM strategy

How to Build End-to-End IoT Device Security at Scale

featuring: Ted Shorter – CTO (Keyfactor), Kim Bybjerg – Chairman (IMC), and Paul Hampton – Senior Product Manager (Thales)

How to Build End-to-End IoT Device Security at Scale

Why should I watch it?

By adopting a Zero Trust approach, IoT manufacturers can ensure device trustworthiness and security at scale through their product’s end-to-end lifecycle. In this panel with device security experts, discussion topics will include:

  • How businesses can gain a competitive advantage by embedding security in the devices they manufacture
  • Regulations relating to IoT security that manufacturers should be aware of
  • Where secure crypto fits into the product design and lifecycle process
  • Common IoT device security challenges that require a zero-trust manufacturing approach

Achieve IAM Agility for Machine Identities

featuring: Ted Shorter – CTO (Keyfactor) and Sean Ryan – Senior Analyst, Security & Risk (Forrester)

Why should I watch it?

The IAM practices of long-standing organizations were built for rigid structure and slow, predictable changes. The seismic shift to dynamic workloads, rapid change, agile business, and the like puts tremendous strain on these systems. This is especially true for the massive scale and high velocity of machine identities, which are growing exponentially across organizations.

Join this webinar to hear Sean Ryan, Senior Analyst – Security & Risk at Forrester, reveal the underlying problems with managing machine identities and propose strategies and tactics to overcome operational challenges and security risks.

Real-world Machine Identity Management in Action

featuring: Ryan Yackel – VP of Product Marketing (Keyfactor), and Toby Gaff – Director of Solutions Engineering (Keyfactor)

Real-World Machine Identity Management in Action

Why should I watch it?

To see real-world Machine Identity Management with for a demo how Keyfactor Command enables full visibility, control, automation, and orchestration. In this 30-minute webinar, you’ll learn:

  • How to get a continuous inventory of your machine identities
  • How to automate identity lifecycle
  • How to extend machine identity management with other tools (e.g. HashiCorp Vault, Istio)