www.mimsummit2023.com Open in urlscan Pro
44.198.123.106  Public Scan

Submitted URL: http://mimsummit2023.com/
Effective URL: https://www.mimsummit2023.com/
Submission: On September 04 via manual from US — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

EDITOR

Help
Preview
New Block


PAGE STYLES


NAVIGATION




HERO




TEXT GRID 7




CALL TO ACTION 8




FULL WIDTH IMAGE 4




FULL WIDTH IMAGE 5




FULL WIDTH IMAGE 6




FULL WIDTH IMAGE 7




FULL WIDTH IMAGE 2




REGISTRATION




AGENDA




TEXT GRID




TEXT GRID 4




CALL TO ACTION 5




SPEAKERS




TEXT GRID 9




IMAGE/TEXT SPLIT




CALL TO ACTION 2




FULL WIDTH IMAGE




CALL TO ACTION




TEXT GRID 8




FULL WIDTH IMAGE 3




CALL TO ACTION 3




DESCRIPTION




SPONSORS




CALL TO ACTION 6




CALL TO ACTION 7




FOOTER



Close Save
Skip to Registration
Featured SpeakersAgendaWhy AttendPricing
Register


SEPTEMBER 18-19 | ILLUMINARIUM | LAS VEGAS, NV


#MIMSUMMIT2023


Reserve My Spot


JOIN FUTURE-FOCUSED PEERS, PRACTITIONERS AND INDUSTRY INFLUENCERS LIVE IN LAS
VEGAS AS WE EXPLORE GROUNDBREAKING SECURITY TRENDS IN MODERN MACHINE IDENTITY
MANAGEMENT, ZERO TRUST, AI, CLOUD NATIVE AND MORE.

 

Featured Speakers

 










AGENDA

 

All Dates
All Tracks
   

 * September 18
   
   5:00 pm – 6:00 pm GMT+2
   
   
   ON-SITE REGISTRATION AND NETWORKING BREAKFAST
   
   Illuminarium
   
   
   20230918T080000Z20230918T090000ZAmerica/Los_AngelesOn-Site Registration and
   Networking BreakfastYou can access the event landing here
   https://www.mimsummit2023.com/

 * September 18
   
   6:00 pm – 7:25 pm GMT+2
   
   
   OPENING KEYNOTE: THE FUTURE IS YOURS TO WIN!
   
   Illuminarium Main Stage
   
   There are several key areas where Venafi’s leaders see radical disruptions
   that will change the future of machine identity management. Join Venafi CEO
   Jeff Hudson and other executive leaders to see where your organization needs
   to evolve to embrace innovation, speed and adaptability with our architecture
   for the future where you’ll need to act and run locally, but secure globally.
   Get advice from customers who are already moving down that path. And how you
   can future proof your organization with a holistic approach to machine
   identity management.
   
   Read More
   
   20230918T090000Z20230918T102500ZAmerica/Los_AngelesOpening Keynote: The
   Future Is Yours to Win!You can access the event landing here
   https://www.mimsummit2023.com/

 * September 18
   
   7:25 pm – 7:50 pm GMT+2
   
   
   NETWORKING BREAK
   
   Virtual
   
   
   20230918T102500Z20230918T105000ZAmerica/Los_AngelesNetworking BreakYou can
   access the event landing here https://www.mimsummit2023.com/

 * September 18
   
   7:50 pm – 8:20 pm GMT+2
   
   
   ARE YOU READY TO COMPLY WITH NEW CA/BROWSER FORUM REQUIREMENTS FOR X.509
   CERTIFICATES?
   
   Illuminarium Main Stage
   
   The goal of the CA/Browser Forum is to standardize the usage of X.509 digital
   certificates. Join this session to explore the latest developments in the
   CA/Browser Forum, where working groups have been endorsing more rigorous
   requirements for the issuance and management of X.509 certificates. You’ll
   gain a comprehensive understanding of two critical developments. First, we'll
   delve into the significant updates from the Server Cert, Code Signing, and
   S/MIME working groups. Then, we'll explore the implications of updated
   requirements that may impact your machine identity management program. 
   
   Read More
   
   20230918T105000Z20230918T112000ZAmerica/Los_AngelesAre You Ready to Comply
   with New CA/Browser Forum Requirements for X.509 Certificates?You can access
   the event landing here https://www.mimsummit2023.com/

 * September 18
   
   7:50 pm – 8:20 pm GMT+2
   
   
   EFFORTLESS MUTUAL AUTHENTICATION WITH CILIUM
   
   Virtual Only
   
   Mutual authentication and encryption of traffic between different workloads
   are must-have security features for many organizations. In a cloud native
   environment, this has often been achieved using service mesh proxies that
   perform mTLS on behalf of each application, but is there a better way?   
   
   In this demo-rich session, you'll learn about a new approach to mutually
   authenticating workloads that has recently been added to Cilium, the wildly
   popular open source connectivity solution for Kubernetes and beyond. In
   contrast to mTLS, this approach works for any protocol (not just those that
   run over TCP) and avoids the operational complexity and overhead of injecting
   sidecar proxies into every workload. With a pluggable interface for identity
   management, it simplifies the deployment of workload identities and handles
   concerns such as certificate rotation in a way that's completely transparent
   to your cloud native applications.
   
   Read More
   
   20230918T105000Z20230918T112000ZAmerica/Los_AngelesEffortless Mutual
   Authentication with CiliumYou can access the event landing here
   https://www.mimsummit2023.com/

 * September 18
   
   7:50 pm – 8:20 pm GMT+2
   
   
   LOCALLY ENFORCE GLOBAL PKI POLICIES FOR KUBERNETES WORKLOADS [PLATFORM +
   SECURITY]
   
   Illuminarium Breakout Room
   
   Organizations are increasingly using Kubernetes and service meshes to run
   their workloads. This requires a renewed focus on how workload security is
   managed from an identity perspective. Join us to explore some nuances of
   workload security, including how to issue, renew and rotate machine
   identities for workloads as well as how these identities can be used for
   mutual authentication. You’ll also learn how InfoSec teams can ensure that
   machine identities comply with security policies. Plus, we’ll share new ways
   that platform engineering teams that operate in Kubernetes can define
   certificate services that are easily consumed by app teams. 
   
   Read More
   
   20230918T105000Z20230918T112000ZAmerica/Los_AngelesLocally Enforce Global PKI
   Policies for Kubernetes Workloads [Platform + Security]You can access the
   event landing here https://www.mimsummit2023.com/

 * September 18
   
   8:30 pm – 9:00 pm GMT+2
   
   
   COMPLY ANOTHER DAY: USING MODERN SUPPLY CHAIN TECHNIQUES TO AUTOMATE THE
   COMPLIANCE OF CONTAINER IMAGES IN A GLOBAL BANK
   
   Virtual Only
   
   For a bank, meeting regulatory compliance is of critical importance. With the
   adoption of microservices, containers, continuous delivery and other cloud
   native edge technologies, the challenge of maintaining that compliance grows.
   Security teams react by cracking down with manual compliance processes,
   stagnating development velocity and diminishing the benefits from any newly
   introduced technologies. 
   But there is good news! We helped a global bank architect a solution for
   automating the compliance process for container images, providing security in
   a way that doesn't compromise velocity. Come along and find out how we did it
   and maybe understand better how you can too.  
   
   Read More
   
   20230918T113000Z20230918T120000ZAmerica/Los_AngelesComply Another Day: Using
   Modern Supply Chain Techniques to Automate the Compliance of Container Images
   in a Global BankYou can access the event landing here
   https://www.mimsummit2023.com/

 * September 18
   
   8:30 pm – 9:00 pm GMT+2
   
   
   CAN SPIFFE HELP YOU SOLVE ‘SECRET ZERO’?
   
   Illuminarium Breakout Room
   
   More and more security teams face the daunting challenge of protecting
   complex and dynamic cloud native environments. As your organization embraces
   the power of Kubernetes, it’s paramount that you ensure robust machine
   identity security measures. That's where the Secure Production Identity
   Framework for Everyone (SPIFFE) is a game-changer — with its standardized
   approach to establish and manage strong identities for workloads in
   Kubernetes, hybrid cloud infrastructures and data centers. We’ll share
   real-world examples of how large companies leverage SPIFFE to solve the
   secret zero problem and take machine identity management to a new level. 
   
   Read More
   
   20230918T113000Z20230918T120000ZAmerica/Los_AngelesCan SPIFFE Help You Solve
   ‘Secret Zero’?You can access the event landing here
   https://www.mimsummit2023.com/

 * September 18
   
   8:30 pm – 9:00 pm GMT+2
   
   
   THE CYBERSECURITY CASE FOR ZERO TRUST
   
   Illuminarium Main Stage
   
   The Zero Trust Security framework provides essential security controls to
   prevent advanced cyber threats from compromising your applications and
   systems. Learn how you can use Zero Trust to further secure your systems and
   applications from malware, cyber-attackers and other internal and external
   cyber threats that public and private sector organizations face globally.
   You’ll explore new guidelines on implementing Zero Trust-based security
   controls and see why they are essential to organizational information
   security across traditional security domains such as network, data, device,
   application, identity, email, user and cloud, as well as the newer domains of
   API, AI, IoT and third-party systems (like SaaS).
   
   Read More
   
   20230918T113000Z20230918T120000ZAmerica/Los_AngelesThe Cybersecurity Case for
   Zero TrustYou can access the event landing here
   https://www.mimsummit2023.com/

 * September 18
   
   9:00 pm – 10:30 pm GMT+2
   
   
   BOOK SIGNING WITH THE VOICE OF CISOS: RAJ BADHWAR
   
   Illuminarium
   
   Pick up a CISO Guide authored by global influencer Raj Badhwar, chat with the
   author and get your personal copy signed. You’ll have immediate access to
   insights gleaned from 28 years of leadership in companies like Oracle, Voya
   Financial, AIG, BAE Systems, Bank of America and AOL Time Warner. Available
   at the event are The CISO Guide to Incident Response and The CISO Guide to
   Zero Trust Security. 
   
   Read More
   
   20230918T120000Z20230918T133000ZAmerica/Los_AngelesBook Signing with the
   Voice of CISOs: Raj BadhwarYou can access the event landing here
   https://www.mimsummit2023.com/

 * September 18
   
   9:00 pm – 10:30 pm GMT+2
   
   
   LUNCH AND SPONSOR NETWORKING
   
   Illuminarium
   
   
   20230918T120000Z20230918T133000ZAmerica/Los_AngelesLunch and Sponsor
   NetworkingYou can access the event landing here
   https://www.mimsummit2023.com/

 * September 18
   
   9:30 pm – 10:00 pm GMT+2
   
   
   MACHINE IDENTITY MANAGEMENT MATRIX COMPETITION
   
   Illuminarium Main Stage
   
   As part of the Machine Identity Management Development Fund, Venafi has
   sponsored over 50 new innovations to futureproof customer success. For the
   first time, Venafi customers will have the opportunity to meet Development
   Fund participants and vote which one wins to escape the matrix as the most
   promising new machine identity innovator. Attend this session, free your
   mind, and decide for yourself which innovation is most valuable to your
   organization. 
   
   
   
   During the competition, Venafi will announce the latest startups to join the
   Machine Identity Management Development Fund. Current Development Fund
   participants APIIDA, Corsha, Device Authority and Nirmata will compete.
   
   
   
   Learn more about the Machine Identity Management Development Fund
   at https://venafi.com/development-fund/
   
   Read More
   
   20230918T123000Z20230918T130000ZAmerica/Los_AngelesMachine Identity
   Management Matrix CompetitionYou can access the event landing here
   https://www.mimsummit2023.com/

 * September 18
   
   9:30 pm – 10:00 pm GMT+2
   
   
   GET NIST’S PERSPECTIVE ON ZERO TRUST ARCHITECTURES AND POST-QUANTUM
   CRYPTOGRAPHY
   
   Virtual Only
   
   NIST’s National Cybersecurity Center of Excellence (NCCoE) is an applied
   cybersecurity laboratory that brings together experts from industry,
   government, and academia to focus on standards that promote and compel
   adoption of cybersecurity and privacy capabilities. Join us to explore the
   exciting progress of two ongoing projects at the center. The aim of the first
   is to remove the shroud of complexity around designing for Zero Trust with
   end-to-end architecture implementations. The second focuses on easing the
   migration from current public-key cryptographic algorithms to post-quantum
   cryptographic algorithms that are resistant to quantum computer-based
   attacks. Don’t miss this chance to discuss the workstreams within these
   projects, provide input and understand better how the NCCoE can support your
   needs. 
   
   Read More
   
   20230918T123000Z20230918T130000ZAmerica/Los_AngelesGet NIST’s Perspective on
   Zero Trust Architectures and Post-Quantum CryptographyYou can access the
   event landing here https://www.mimsummit2023.com/

 * September 18
   
   10:30 pm – 11:00 pm GMT+2
   
   
   DEMYSTIFYING MACHINE IDENTITY MANAGEMENT
   
   Illuminarium Main Stage
   
   Machine identities secure our digital world in ways that many of you haven’t
   even imagined. Join us for a deep dive on critical, but perhaps
   underappreciated, uses of machine identities in your organization. We’ll
   explore innovative use cases for machine identity management and the critical
   role of a machine identity management control plane. Using an engaging “day
   in the life” perspective, we’ll also unpack our vision for the future of
   machine identity management and demonstrate some key concepts in the Venafi
   Control Plane. 
   
   Read More
   
   20230918T133000Z20230918T140000ZAmerica/Los_AngelesDemystifying Machine
   Identity ManagementYou can access the event landing here
   https://www.mimsummit2023.com/

 * September 18
   
   10:30 pm – 11:00 pm GMT+2
   
   
   EXTENDING VENAFI'S MACHINE IDENTITY MANAGEMENT TO MAINFRAMES
   
   Illuminarium Breakout Room
   
   In this session we will explore how large organizations are broadening the
   scope of Venafi's Machine Identity Management solution. By integrating
   certificate automation into mainframes, these enterprises minimize the risk
   of outages in mainframe applications and optimize the use of skilled
   mainframe resources for critical projects. This is crucial due to the
   increasing pace of certificate expirations, which burdens mainframe teams
   with manual certificate tasks.
   
   Read More
   
   20230918T133000Z20230918T140000ZAmerica/Los_AngelesExtending Venafi's Machine
   Identity Management to MainframesYou can access the event landing here
   https://www.mimsummit2023.com/

 * September 18
   
   10:30 pm – 11:00 pm GMT+2
   
   
   FRICTIONLESS MACHINE IDENTITY MANAGEMENT VIA AWS CLOUDFORMATION
   
   Virtual Only
   
   As your organization continues to embrace cloud native strategies, you may
   already be taking advantage of Infrastructure as Code services, such as AWS
   CloudFormation. If so, wouldn’t it be amazing if you could use the same
   technology to seamlessly shrink-wrap your machine identity issuance, renewal
   and policy enforcement? Explore a new use case for Venafi TLS Protect Cloud,
   where this control plane for machine identities operates as a natural
   extension of the AWS services. Join us as we present a recent addition to our
   Marketplace which can help you accelerate your cloud native development,
   while preventing application outages or security breaches. 
   
   Read More
   
   20230918T133000Z20230918T140000ZAmerica/Los_AngelesFrictionless Machine
   Identity Management via AWS CloudFormationYou can access the event landing
   here https://www.mimsummit2023.com/

 * September 18
   
   11:10 pm – 11:40 pm GMT+2
   
   
   ARE YOU WORKING FOR YOUR PKI? OR IS IT WORKING FOR YOU?
   
   Iluminarium Main Stage
   
   Traditional Public Key Infrastructures (PKIs) have long been a cornerstone of
   an organization's cybersecurity framework. However, with evolving business
   demands, these legacy PKIs often fall short. Their scalability is
   questionable, their complexity is daunting, and their management can be
   challenging. If you're faced with the decision to update your existing PKI,
   or if your root certificate is nearing its expiration, what's your plan of
   action? This discussion delves into the compelling reasons for transitioning
   from traditional PKI systems to a more contemporary PKI-as-a-service
   solution. 
   
   Read More
   
   20230918T141000Z20230918T144000ZAmerica/Los_AngelesAre You Working for Your
   PKI? Or Is it Working for You?You can access the event landing here
   https://www.mimsummit2023.com/

 * September 18
   
   11:10 pm – 11:40 pm GMT+2
   
   
   WHODUNNIT: THE ROLE OF MACHINE IDENTITY IN SUPPLY CHAIN SECURITY
   
   Virtual Only
   
   Ensuring the security of software supply chains is critical in today's
   interconnected digital landscape. The complexity of multiple components from
   diverse contributors challenges our ability to identify the origins of
   malicious activities. Build systems play a critical role in secure artifact
   production and distribution, but many industry-standard security techniques
   have left the CI/CD space behind. Learn how Machine Identity Management can
   help to counter that trend. We’ll share real-world case studies, practical
   implementations and integration strategies illustrating how Machine Identity
   Management can help mitigate risks, detect compromised components, and
   facilitate efficient incident response.
   
   Read More
   
   20230918T141000Z20230918T144000ZAmerica/Los_AngelesWhodunnit: The Role of
   Machine Identity in Supply Chain SecurityYou can access the event landing
   here https://www.mimsummit2023.com/

 * September 18
   
   11:10 pm – 11:40 pm GMT+2
   
   
   LEVEL UP YOUR ENTERPRISE CODE SIGNING
   
   Illuminarium Breakout Room
   
   Even if you are already signing code or just getting started with CodeSign
   Protect, this customer case study session will help get you to the next level
   of enterprise code signing. Join us to hear lessons learned, do’s and don’ts
   — especially when it comes to scaling enterprise code signing and onboarding
   application teams. You’ll learn new strategies for how to deploy CodeSign
   Protect to enable code signing in CI/CD pipelines. Key takeaways will also
   include how to deliver the right value proposition to internal stakeholders
   to ensure successful outcomes. 
   
   Read More
   
   20230918T141000Z20230918T144000ZAmerica/Los_AngelesLevel Up Your Enterprise
   Code SigningYou can access the event landing here
   https://www.mimsummit2023.com/

 * September 18
   
   11:50 pm – 12:20 am GMT+2
   
   
   MIGRATING AWAY FROM SSH KEYS: ENHANCING SSH AUTHENTICATION THROUGH SSH
   CERTIFICATES
   
   Illuminarium Breakout Room
   
   Managing SSH keys for an enterprise is a challenging task. It often comes
   with a never-ending series of fact-finding missions: Who owns the keys and
   the accounts? When are the keys being used? How? These are all questions
   we’ve asked ourselves as SSH key administrators. It can be frustrating and
   time consuming, and that’s why migrating to SSH certificates is paramount. In
   this session, learn how SSH certificates can resolve these issues, enhance
   authentication in the SSH protocol and enable improved automation across your
   rapidly developing cloud environments.
   
   Read More
   
   20230918T145000Z20230918T152000ZAmerica/Los_AngelesMigrating Away from SSH
   Keys: Enhancing SSH Authentication Through SSH CertificatesYou can access the
   event landing here https://www.mimsummit2023.com/

 * September 18
   
   11:50 pm – 12:20 am GMT+2
   
   
   CERTIFICATE GOVERNANCE VS. CERTIFICATE MANAGEMENT: WHICH IS BETTER FOR BETTER
   RISK MANAGEMENT?
   
   Virtual
   
   How do you keep up with every certificate issued for an enterprise when we
   have self-signed certs, cloud CAs, ad-hoc CAs, vendor CAs and public CAs—all
   in addition to typical enterprise CAs? Do you have to discover and manage
   every certificate? In this session, we’ll go into the differences between
   certificate governance and management, and we’ll cover how to use governance
   to catch up with your developers, vendors and users while lowering your
   security and functional risks. 
   
   Read More
   
   20230918T145000Z20230918T152000ZAmerica/Los_AngelesCertificate Governance vs.
   Certificate Management: Which Is Better for Better Risk Management?You can
   access the event landing here https://www.mimsummit2023.com/

 * September 18
   
   11:50 pm – 12:20 am GMT+2
   
   
   TALES FROM THE FIELD: IMPLEMENTING ZERO TRUST ARCHITECTURE AT FORTUNE 500
   COMPANIES
   
   Illuminarium Main Stage
   
   In this insightful fireside chat, we’ll explore the origins of Istio, the
   fastest graduating open source project in CNCF history, and its emergence as
   a crucial part of modern architectures like Kubernetes, single cloud and
   hybrid infrastructure environments. We’ll also discuss the important role
   Istio plays in building Zero Trust Architectures (ZTA) and identity-based
   authorization and authentication. 
   
    
   
   During this conversation, you’ll also hear about best practices and
   strategies that Fortune 500 companies are using to successfully implement
   ZTAs, including the deployment of Istio. If you are grappling with machine
   identity, Kubernetes optimization, and secure connectivity, you can expect
   practical tips and real-world examples. 
   
   Read More
   
   20230918T145000Z20230918T152000ZAmerica/Los_AngelesTales from the Field:
   Implementing Zero Trust Architecture at Fortune 500 CompaniesYou can access
   the event landing here https://www.mimsummit2023.com/
   

 * September 19
   
   12:20 am – 12:35 am GMT+2
   
   
   NETWORKING BREAK
   
   Virtual
   
   
   20230918T152000Z20230918T153500ZAmerica/Los_AngelesNetworking BreakYou can
   access the event landing here https://www.mimsummit2023.com/

 * September 19
   
   12:35 am – 1:05 am GMT+2
   
   
   PQC READINESS: HOW TO CONQUER THE QUANTUM THREATS OF TOMORROW, TODAY
   
   Illuminarium Main Stage
   
   Quantum computers will significantly advance the world’s technological
   capabilities, but all that computing power has the potential to break
   traditional cryptography like RSA or ECC encryption. And even though today’s
   quantum computers aren’t that powerful, one crucial fact remains: your
   post-quantum success is entirely dependent on your pre-quantum readiness. 
   
   
   
   How can you ensure your business doesn’t just survive, but thrives, in a
   post-quantum world? Join this panel discussion to explore the trends
   impacting post-quantum readiness in today’s enterprises. You’ll also discover
   how automated, crypto-agile machine identity management can help ensure a
   successful post-quantum migration—before quantum computers arrive on the
   scene. 
   
   Read More
   
   20230918T153500Z20230918T160500ZAmerica/Los_AngelesPQC Readiness: How to
   Conquer the Quantum Threats of Tomorrow, TodayYou can access the event
   landing here https://www.mimsummit2023.com/

 * September 19
   
   12:35 am – 1:05 am GMT+2
   
   
   HOW TO BUILD A SECURE, “ALWAYS-ON” BUSINESS: DESIGNING FOR SECURITY, COST AND
   RELIABILITY IN THE CLOUD
   
   Virtual Only
   
   As companies continue to embrace cloud technologies, it’s imperative they
   think about cloud as an operating model rather than an Infrastructure
   endpoint, i.e. IAAS. With complex distributed architectures, elastic
   infrastructure and a pay-as-you-go model, cloud promises the flexibility and
   scalability that many organizations need. However, incorrect implementations
   can significantly impact reliability, security and costs. Join us as we
   explore how to proactively engineer security, cost consciousness and
   reliability into your cloud workloads, helping you build the efficient,
   economical and automated operations needed for an “Always-On” business. 
   
   Read More
   
   20230918T153500Z20230918T160500ZAmerica/Los_AngelesHow to Build a Secure,
   “Always-On” Business: Designing for Security, Cost and Reliability in the
   CloudYou can access the event landing here https://www.mimsummit2023.com/

 * September 19
   
   1:15 am – 1:45 am GMT+2
   
   
   CLOSING KEYNOTE: SECURING THE FUTURE, TOGETHER
   
   Illuminarium Main Stage
   
   Venafi customers are among the most savvy, security-conscious organizations
   in the world. And together, we are making a big impact on the future of the
   digital economy. Join us as we recognize just some of the many ways that
   Venafi customers are helping to make the world a better, safer place. Plus,
   you’ll learn from our community award winner why you’ll benefit from joining
   like-minded experts in the Venafi Warrior Community.  
   
   Read More
   
   20230918T161500Z20230918T164500ZAmerica/Los_AngelesClosing Keynote: Securing
   the Future, TogetherYou can access the event landing here
   https://www.mimsummit2023.com/

 * September 19
   
   1:45 am – 3:45 am GMT+2
   
   
   NETWORKING RECEPTION AND FULL ILLUMINARIUM EXPERIENCE
   
   Illuminarium
   
   Intrigued by what you’ve seen and heard during Day 1 of the Summit? You
   haven’t seen the half of it. Join fellow attendees in experiencing the full
   immersive joy that the Illuminarium has to offer. It’s the most exciting way
   to compare notes and share your experiences with fellow attendees while
   relaxing over drinks and hors d’oeuvres.  
   
   Read More
   
   20230918T164500Z20230918T184500ZAmerica/Los_AngelesNetworking Reception and
   Full Illuminarium ExperienceYou can access the event landing here
   https://www.mimsummit2023.com/

 * September 19
   
   5:00 pm – 6:00 pm GMT+2
   
   
   ON-SITE REGISTRATION AND NETWORKING BREAKFAST
   
   Illuminarium
   
   
   20230919T080000Z20230919T090000ZAmerica/Los_AngelesOn-Site Registration and
   Networking BreakfastYou can access the event landing here
   https://www.mimsummit2023.com/

 * September 19
   
   5:15 pm – 5:45 pm GMT+2
   
   
   WOMEN IN CYBERSECURITY BREAKFAST PANEL
   
   Virtual
   
   Join us for a breakfast session where we celebrate the multi-faceted value
   and contributions of women in cybersecurity. Strengthening your
   organization’s gender diversity is a great way to help solve the growing
   shortage of skilled cybersecurity experts. Join a strong roster of women
   working in cybersecurity who will share advice on how to expand your team
   with women interested in cybersecurity. You’ll also gain insights on how you
   can support the women already on your team and why the addition of women will
   make your team more successful. 
   
   Read More
   
   20230919T081500Z20230919T084500ZAmerica/Los_AngelesWomen in Cybersecurity
   Breakfast PanelYou can access the event landing here
   https://www.mimsummit2023.com/

 * September 19
   
   6:00 pm – 6:50 pm GMT+2
   
   
   OPENING KEYNOTE: AI AND THE FUTURE OF MACHINE IDENTITY MANAGEMENT
   
   Illuminarium Main Stage
   
   Artificial intelligence (AI) and machine learning (ML) are rapidly changing
   the way we do business and protect our organizations. So, what does the
   future look like as we rapidly evolve from predictive ML to generative AI?
   Learn what you need to know about emerging threatscapes in the age of AI and
   why machine identity management is the prime protection to help you counter
   these new attack vectors.
   
   Also get a CIO perspective on the future of security and AI from Jamie
   Holcombe, CIO of the US Patent and Trademark Office, as he joins us for a
   fireside chat. Will we adopt it as a predictive security tool? And what are
   the necessary guardrails? What are visionaries doing right now to protect
   against future AI attacks?
   
   Read More
   
   20230919T090000Z20230919T095000ZAmerica/Los_AngelesOpening Keynote: AI and
   the Future of Machine Identity ManagementYou can access the event landing
   here https://www.mimsummit2023.com/

 * September 19
   
   7:00 pm – 7:30 pm GMT+2
   
   
   CISO PANEL: GAME CHANGERS FOR INFOSEC
   
   Illuminarium Main Stage
   
   Join forward-thinking security leaders as they explore machine identity
   trends that are driving changes in the role of InfoSec. As the attack surface
   continues to evolve, it’s challenging for InfoSec to predict the impact of
   technologies like AI, Quantum Computing and Cloud Native. And because there
   is now an element of fiscal accountability for breaches (SolarWinds), CISOs
   need to know immediately when something breaks. And they must be prepared to
   adapt immediately and globally. Join these CISOs to learn why you need to
   think beyond technology and focus on critical risk. 
   
   Moderator: Jeff Hudson
   
   Read More
   
   20230919T100000Z20230919T103000ZAmerica/Los_AngelesCISO Panel: Game Changers
   for InfoSecYou can access the event landing here
   https://www.mimsummit2023.com/

 * September 19
   
   7:30 pm – 7:50 pm GMT+2
   
   
   NETWORKING BREAK
   
   Virtual
   
   
   20230919T103000Z20230919T105000ZAmerica/Los_AngelesNetworking BreakYou can
   access the event landing here https://www.mimsummit2023.com/

 * September 19
   
   7:50 pm – 8:20 pm GMT+2
   
   
   YOUR COMPANY IS HOW OLD?! HOW ESTABLISHED COMPANIES LEAN INTO DIGITAL
   MODERNIZATION
   
   Illluminarium Main Stage
   
   In companies with a lot of history, acquisitions and customized solutions,
   there are many challenges—but there are even more opportunities. Whether you
   are just beginning your digital journey, standing up a dedicated application
   security practice or starting your path with SaaS providers and the Cloud—or
   even all of the above—modern Security Architectures require certificates and
   keys across the enterprise. Join this session to hear how one company with
   almost a century and a half on the books is embracing those challenges to
   modernize their security posture and move their entire enterprise forward. 
   
   Read More
   
   20230919T105000Z20230919T112000ZAmerica/Los_AngelesYour Company is How Old?!
   How Established Companies Lean into Digital ModernizationYou can access the
   event landing here https://www.mimsummit2023.com/

 * September 19
   
   7:50 pm – 8:20 pm GMT+2
   
   
   SUCCESSFULLY MANAGING AI MACHINE IDENTITIES FOR DIGITAL WORKERS
   
   Virtual Only
   
   Federal agencies use digital workers to automate processes, increase
   efficiencies, and discover insights from large volumes of data. Digital
   workers may use Artificial Intelligence, Chatbots or Machine Learning to
   interact with or use sensitive information to perform unattended, high-risk
   tasks, which may critically impact an agency’s mission. Find out why using
   human-based processes to create a digital worker identity may hinder a
   digital worker’s access or success. Ken and Ross will discuss the challenges
   in determining digital worker risk and describe a playbook for establishing
   digital worker identity. 
   
   Read More
   
   20230919T105000Z20230919T112000ZAmerica/Los_AngelesSuccessfully Managing AI
   Machine Identities for Digital WorkersYou can access the event landing here
   https://www.mimsummit2023.com/

 * September 19
   
   7:50 pm – 8:20 pm GMT+2
   
   
   NEW STRATEGIES FOR SIGNING AND VERIFYING CONTAINER IMAGES
   
   Illuminarium Breakout Room
   
   Software supply chains are still in the news. At the same time, Kubernetes
   workloads are increasing exponentially as well as the risks of running
   untrusted container images. We’ll explore the latest industry approaches
   around signing container images, with a particular focus on how to enforce
   signed images in Kubernetes clusters. Then we'll recommend how you can use
   Sigstore cosign and Notary V2 open-source projects to sign container images
   to meet enterprise trust requirements. Plus, we'll examine new ways you can
   verify container image signatures in Kubernetes and finish off with a demo of
   end-to-end signing and verification best practices.  
   
   Read More
   
   20230919T105000Z20230919T112000ZAmerica/Los_AngelesNew Strategies for Signing
   and Verifying Container ImagesYou can access the event landing here
   https://www.mimsummit2023.com/

 * September 19
   
   8:30 pm – 9:00 pm GMT+2
   
   
   BUDGET, NO BUDGET: HOW TO BUILD THE CASE FOR THE TECHNOLOGY AND PEOPLE
   INVESTMENTS YOU NEED TODAY
   
   Illuminarium Main Stage
   
   David Bliss will bring his experience using Value Cards to keep his
   leadership updated, secure budgets, and highlight his team’s contribution to
   PNC’s success. Learn how he uses Value Cards and their metrics to tie the
   business to PNC’s machine identity strategy. He will share best practices and
   how to overcome challenges, along with how the Value Cards are received by
   his executive leadership team.  
   
   Read More
   
   20230919T113000Z20230919T120000ZAmerica/Los_AngelesBudget, No Budget: How to
   Build the Case for the Technology and People Investments You Need TodayYou
   can access the event landing here https://www.mimsummit2023.com/

 * September 19
   
   8:30 pm – 9:00 pm GMT+2
   
   
   CHARTING A COURSE TO SUCCESS: NAVIGATING COMMON PITFALLS IN MACHINE IDENTITY
   MANAGEMENT PROJECTS
   
   Virtual Only
   
   Join this informative session to navigate through the top challenges that
   organizations encounter in their machine identity management projects. We’ll
   explore how these challenges can culminate into a perfect storm of failure if
   you do not take the proper steps to avoid them. Through real-world examples,
   insightful anecdotes, and actionable strategies, we will uncover the hidden
   currents that threaten to capsize machine identity management projects if you
   haven’t properly charted your course. 
   
   Read More
   
   20230919T113000Z20230919T120000ZAmerica/Los_AngelesCharting a Course to
   Success: Navigating Common Pitfalls in Machine Identity Management
   ProjectsYou can access the event landing here https://www.mimsummit2023.com/

 * September 19
   
   9:10 pm – 9:20 pm GMT+2
   
   
   CLOSING THOUGHTS: MOVING SECURELY INTO THE FUTURE
   
   Illuminarium Main Stage
   
   Over the past two days, we’ve looked into the future of machine identity
   management and the impact of AI, quantum computing, zero trust, cloud native
   and more. Now it’s time to go out and make it happen. Join us for final
   remarks on why we need to act quickly and definitively.  
   
   
   20230919T121000Z20230919T122000ZAmerica/Los_AngelesClosing Thoughts: Moving
   Securely into the FutureYou can access the event landing here
   https://www.mimsummit2023.com/

 * September 19
   
   9:30 pm – 3:30 am GMT+2
   
   
   WORKSHOP #3: FROM MISCONFIGURATION TO MASTERY: A CRASH COURSE ON KUBERNETES
   AND CERT-MANAGER
   
   Illuminarium Cafe
   
   Dive into the world of Kubernetes and gain a fundamental understanding of
   cert-manager, a powerful certificate management tool. In this interactive
   session with presentations, live demos and discussions, you'll learn the
   basics of Kubernetes architecture, components and key concepts. You’ll also
   explore the importance of secure communication within Kubernetes clusters and
   how cert-manager simplifies certificate provisioning, renewal and revocation.
   
   Read More
   
   20230919T123000Z20230919T183000ZAmerica/Los_AngelesWorkshop #3: From
   Misconfiguration to Mastery: A Crash Course on Kubernetes and cert-managerYou
   can access the event landing here https://www.mimsummit2023.com/

 * September 19
   
   10:30 pm – 2:30 am GMT+2
   
   
   WORKSHOP #1: SURPRISE! YOU’RE IN CHARGE OF BUILDING MACHINE IDENTITY
   AUTOMATION WITH VENAFI
   
   Illuminarium Main Stage
   
   Venafi APIs and libraries make it easy to access the power of the Venafi
   Control Plane. In this workshop, you’ll learn how to update existing code and
   build automation with Venafi APIs, including how to call Venafi’s powerful
   machine identity management from REST, Python, PowerShell and more. Explore
   resources such as our new Dev Central – and learn to eliminate headaches and
   get your work done faster by deploying and authenticating your API calls with
   OAuth and create at warp speed with VCert! 
   
   Read More
   
   20230919T133000Z20230919T173000ZAmerica/Los_AngelesWorkshop #1: Surprise!
   You’re in Charge of Building Machine Identity Automation With VenafiYou can
   access the event landing here https://www.mimsummit2023.com/

 * September 19
   
   10:30 pm – 2:30 am GMT+2
   
   
   WORKSHOP #2: MASTERING ROGUE ISSUERS AND EPHEMERAL SERVICE MESH IDENTITIES
   WITH VENAFI FIREFLY
   
   Illuminarium Breakout Room
   
   What do you do when an application team demands you give them a sub CA
   certificate? A common myth is issuing a sub CA certificate is like giving
   away the keys to the kingdom. But denying these requests isn't the answer.
   These teams often go rogue, create their own CAs, and hide it with complexity
   and obscurity – until something goes wrong! In this workshop, you’ll get
   hands-on with Venafi Firefly and learn how to say yes while maintaining the
   compliance, visibility and control that are critical. 
   
   Read More
   
   20230919T133000Z20230919T173000ZAmerica/Los_AngelesWorkshop #2: Mastering
   Rogue Issuers and Ephemeral Service Mesh Identities With Venafi FireflyYou
   can access the event landing here https://www.mimsummit2023.com/


A MODERN EVENT FOR THE MODERN AGE




REDEFINE WHAT'S POSSIBLE IN 2023—AND BEYOND

There's no stopping the innovation on this year's agenda. Get ready for a cloud
native future where identity is the definitive foundation of security.  


STELLAR INSIGHTS AND ADVICE

Discover the people, processes and technology you need to modernize your
security at machine speed—even your complex, cloud native environments.  


EXCEPTIONAL ENCOUNTERS

Build your domain expertise with countless chances to interact with esteemed
peers and industry experts through Q&As, how-to demos and ALL-NEW hands-on
technical workshops. 


TAKE A QUANTUM LEAP FORWARD

Our world is evolving at an unprecedented velocity. Find out how to disrupt the
future with a next-gen ecosystem of technology partners. 


COUNTLESS CONNECTIONS

You won't have to make the jump to the next galaxy to find networking
opportunities here! Meet other brilliant minds, exchange ideas and build new
partnerships at the world's foremost gathering of machine identity
professionals. 


ONE UNFORGETTABLE EVENT

Immerse yourself in an otherworldly venue, featuring wall-to-wall sights and
sounds, at an experience you won’t forget. Or join us virtually and shatter the
status quo from your home or office. 

Reserve My Spot


SUMMIT SPEAKERS

 


 * JEFF HUDSON
   
   CEO
   
   Venafi
   
   


 * KEVIN BOCEK
   
   VP, Ecosystem and Community
   
   Venafi
   
   


 * MIKE DODSON
   
   Chief Customer Officer
   
   Venafi
   
   


 * JAMIE HOLCOMBE
   
   CIO
   
   United States Patent and Trademark Office
   
   


 * JANE DOMBOSKI
   
   Chief Information Security Officer
   
   OneMain Financial
   
   


 * PREMKUMAR BALASUBRAMANIAN
   
   SVP and CTO, Digital Solutions
   
   Hitachi Vantara
   
   


 * RAJ BADHWAR
   
   VP, Global Head of Cybersecurity
   
   Jacobs Engineering
   
   


 * SID BHADANI
   
   Principal Cyber Security Architect
   
   Health Care Service Corporation (HCSC)
   
   


 * KAREN REINHARDT
   
   Principal Engineer, PKI & Encryption
   
   The Home Depot
   
   


 * JUDSON BENDER
   
   Enterprise Architect Lead (Security)
   
   OneAmerica
   
   


 * DAN LORENC
   
   CEO
   
   Chainguard
   
   


 * VARUN TALWAR
   
   Co-Founder, Tetrate and Co-Creator of Istio and gRPC
   
   
   
   


 * LIZ RICE
   
   Chief Open Source Officer
   
   Isovalent
   
   


 * MATTIAS GEES
   
   Director of Tech
   
   Venafi
   
   


 * IVAN WALLIS
   
   Global Architect - Cloud Native Solutions
   
   Venafi
   
   


 * JUSTIN HANSEN
   
   Field CTO
   
   Venafi
   
   


 * RAFAEL TANAKA
   
   Senior Curriculum Engineer
   
   Venafi
   
   


 * MARTY MILBERT
   
   Sr Director and Global Principal Architect (OCTO)
   
   Venafi
   
   


 * SANDEEP SINGH KOHLI
   
   Chief Marketing Officer
   
   Venafi
   
   


 * SHIVAJEE SAMDARSHI
   
   Chief Product Officer
   
   Venafi
   
   


 * GUNNAR ERNST
   
   Information Security Senior Advisor
   
   Elevance Health
   
   


 * DAVID BLISS
   
   Sr. Security Manager
   
   PNC Financial Services Group
   
   


 * MARENE ALLISON
   
   CEO of Marene Allison Consulting and Former CISO of Johnson & Johnson
   
   
   
   


 * SITARAM IYER
   
   Senior Director, Cloud Native Solutions
   
   Venafi
   
   


 * KEN CHISM
   
   World Wide Cybersecurity Sales Director
   
   BMC Software
   
   


 * TOM MEADOWS
   
   Solutions Engineer
   
   Venafi


 * ALAN MCGINLAY
   
   Ecosystem Architect
   
   Venafi
   
   


 * KEN MEYERS
   
   Director, Identity Assurance and Trusted Access Division
   
   General Services Administration
   
   


 * ROSS FOARD
   
   IT Specialist (INFOSEC)
   
   Cybersecurity and Infrastructure Security Agency
   
   


 * ANDERS JOHANSSON
   
   Customer Support Manager
   
   Venafi


 * TYSON MCMURTREY
   
   Professional Services Technical Delivery Manager
   
   Venafi
   
   


 * SAM HEYWOOD
   
   VP, Product Marketing
   
   Venafi
   
   


 * SETU KULKARNI
   
   VP, Product Management
   
   Venafi
   
   


 * NICK CURCURU
   
   Head of Solutions Marketing
   
   Venafi
   
   


 * FAISAL RAZZAK
   
   Group Manager, Product Management
   
   Venafi
   
   


 * GREG CRABB
   
   Cybersecurity Consulting Executive/CISO, 10-8, LLC & Former CISO, U.S. Postal
   Service
   
   
   
   


 * MATT BARKER
   
   Global Head of Cloud Native Services
   
   Venafi


 * BRUNO COUILLARD
   
   Co-Founder & CEO
   
   Crypto4A Technologies


 * DAVID MAHDI
   
   CIO, Transmit Security & Former VP, Gartner
   
   Transmit Security


 * MELISSA KEOHANE
   
   Chief Legal & People Officer
   
   Venafi


 * FLORIN LAZURCA
   
   Head of Technical Marketing
   
   Venafi


 * JIM BUGWADIA
   
   Co-founder & CEO
   
   Nirmata
   
   


 * ANUSHA IYER
   
   CEO
   
   Corsha
   
   


 * RYAN HURST
   
   CEO, Peculiar Ventures & Advisor, SandboxAQ
   
   
   
   


 * GEORGE PARSONS
   
   Head of PKI Strategy
   
   Venafi
   
   


 * JAMES PENNEY
   
   CTO
   
   Device Authority
   
   


 * CARL BOURNE
   
   Global Principal Architect, Office of the CTO
   
   Venafi
   
   


 * ALPER KERMAN
   
   Principal Lead for Zero Trust Efforts
   
   NIST NCCoE


 * BILL NEWHOUSE
   
   Cybersecurity Engineer
   
   NIST NCCoE
   
   


 * KRIS LUHRSEN
   
   Chief Sales Officer
   
   Venafi


 * EBONY SHAAF
   
   SVP, Head of Identity & Access Management
   
   First Citizens Banks


 * OANA GARNETT
   
   Director of Services
   
   Venafi
   
   


 * SCOTT BARRONTON
   
   Chief Information Security Officer
   
   Diebold Nixdorf
   
   


 * PAUL PLATEN
   
   Digital Identity Principal Consultant
   
   WebSecure
   
   


AGENDA COMING SOON!


OUR ANNUAL EVENT ALWAYS FEATURES A ROCKSTAR LINEUP OF SPEAKERS. PREVIOUS
SPEAKERS HAVE INCLUDED NETFLIX, AFLAC, HASHICORP, CISCO, ORACLE, CNCF, GARTNER,
LLOYD’S BANK, US POSTAL SERVICE AND MANY OTHERS.


CHECK BACK SOON TO SEE WHO’S TAKING THE STAGE IN 2023!

 


SHARE YOUR VISION AT MACHINE IDENTITY MANAGEMENT SUMMIT 2023!

We're looking for influential speakers to showcase real-world case studies,
technical how-tos, best practices and panel discussions for Machine Identity
Management Summit 2023. Whether you’re an industry pundit, aspiring thought
leader, ecosystem innovator or ground-breaking Venafi customer, we want to share
your vision of the future of machine identities and the role their modern
management plays.

 

Apply to Speak


Why should you attend the Machine Identity Management Summit?


THIS IS THE FRONTIER FOR UNSTOPPABLE INNOVATION. THE GATHERING GROUND FOR
SECURITY LEADERS LOOKING TO REDEFINE WHAT'S POSSIBLE. THE MUST-SEE INDUSTRY
EVENT OF 2023. HERE, WE'LL SHOWCASE THE LATEST TRENDS IN MODERN MACHINE IDENTITY
MANAGEMENT AND UNCOVER THE BEST WAYS TO ACCELERATE YOUR ENTERPRISE TOWARD THE
FUTURE.




WHY SHOULD YOU ATTEND THE MACHINE IDENTITY MANAGEMENT SUMMIT?


THIS IS THE FRONTIER FOR UNSTOPPABLE INNOVATION. THE GATHERING GROUND FOR
SECURITY LEADERS LOOKING TO REDEFINE WHAT'S POSSIBLE. THE MUST-SEE INDUSTRY
EVENT OF 2023. HERE, WE'LL SHOWCASE THE LATEST TRENDS IN MODERN MACHINE IDENTITY
MANAGEMENT AND UNCOVER THE BEST WAYS TO ACCELERATE YOUR ENTERPRISE TOWARD THE
FUTURE.

 


Reserve My Spot


CLOUD NATIVE MOVES FAST. YOUR IT SECURITY NEEDS TO MOVE EVEN FASTER. ARE YOU
READY TO MANAGE YOUR MACHINE IDENTITIES AT THE SPEED OF INNOVATION?


Join future-focused peers, expert practitioners and industry influencers LIVE in
Las Vegas as we explore groundbreaking security trends in modern machine
identity management, zero trust, AI, cloud native and more.

 

Can’t make it to Vegas? No problem! Stream this year's summit live from
anywhere.


EVENT SPONSORS



 * 
 * 
 * 

Questions about the event? Interested in sponsoring?


EMAIL US AT VENAFISUMMIT@VENAFI.COM


Summit FAQ
Justify Your Trip
Venafi.com