Presentations

Here you will find an archive of our past conference presentations (when permitted) for your use. Please respect the copyright for the content and use this for your own educational or research purposes only.

bsidesPDX_logo_100
October 2018 - Portland, Oregon

BSides PDX

The Secret to Secrets Management

TechMentor
November 2014 - Orlando, Florida

TechMentor

Managing and Deploying BYOD Identity Solutions with a Microsoft PKI

thales
October 2014 - Marrakesh, Morocco

Thales eSecurity EMEA Channel Partners

Upgrading and Improving 2003 ADCS Security

verisec_logo_left_CMYK
May 2015 - Stockholm, Sweden

Get ahead of the Cyberthreats

The Information Threat Checklist: Five Things That Reveal if Your Systems are at Risk

TechMentor
November 2014 - Orlando, Florida

TechMentor

Top 20 PKI Deployment Mistakes

thales
October 2014 - Marrakesh, Morocco

Thales eSecurity EMEA Channel Partners

HSMs and the Evolving PKI Ecosystem

verisec_logo_left_CMYK
May 2015 - Stockholm, Sweden

Get ahead of the Cyberthreats

Protecting Networks and Data with Public Key Infrastructure (PKI)

microsoft-teched-barcelona-2014-golden_ratio-970x599
October 2014 - Barcelona, Spain

Microsoft TechEd Barcelona

Top 10 PKI Deployment Mistakes

logo
June 2014 - Portland, Oregon

ISACA WIllamette Valley

Managing and Assessing Risks in a PKI

Video Content

TechEd Europe 2014

Top 10 Mistakes in Microsoft Public Key Infrastructure
Deployments

How well designed and implemented is your Public Key Infrastructure? Enterprises around the world use Microsoft Windows based Public Key Infrastructure for digital certificates. However, most environments make the same mistakes. Learn what the most common mistakes are and how you can mitigate them. This session is based on new/exclusive content created for this conference. Borrowing from over 10 years of designing, assessing, and remediating Public Key Infrastructures around the world, a common theme emerges. As the creator of the Microsoft PKI Health Check, it was the presenters job to access and analyze PKI environments around the world. This content is based on the most common mistakes seen in customer after customer. The common threads are amazingly clear and often easy to remediate. This session focuses on providing real-world examples, identifying the risks, and tools and processes to correct these errors. Without these fixes, you could face service disruptions, security compromises, and integrity issues in your authentication systems.

BSides PDX 2018

The Secret to Secrets Management

The modern IT landscape is filled with secrets: certificates, cryptocurrency wallets, SQL connection strings, storage account keys, passwords, and encryption keys. Getting a handle on secrets management is a top challenge. A centralized approach to secrets management is vital to protect their data and assets, whereby poorly-managed security could lead to breach, non-compliance, or outage.