www.mimsummit2023.com
Open in
urlscan Pro
44.198.123.106
Public Scan
Submitted URL: http://mimsummit2023.com/
Effective URL: https://www.mimsummit2023.com/
Submission: On September 04 via manual from US — Scanned from DE
Effective URL: https://www.mimsummit2023.com/
Submission: On September 04 via manual from US — Scanned from DE
Form analysis
0 forms found in the DOMText Content
EDITOR Help Preview New Block PAGE STYLES NAVIGATION HERO TEXT GRID 7 CALL TO ACTION 8 FULL WIDTH IMAGE 4 FULL WIDTH IMAGE 5 FULL WIDTH IMAGE 6 FULL WIDTH IMAGE 7 FULL WIDTH IMAGE 2 REGISTRATION AGENDA TEXT GRID TEXT GRID 4 CALL TO ACTION 5 SPEAKERS TEXT GRID 9 IMAGE/TEXT SPLIT CALL TO ACTION 2 FULL WIDTH IMAGE CALL TO ACTION TEXT GRID 8 FULL WIDTH IMAGE 3 CALL TO ACTION 3 DESCRIPTION SPONSORS CALL TO ACTION 6 CALL TO ACTION 7 FOOTER Close Save Skip to Registration Featured SpeakersAgendaWhy AttendPricing Register SEPTEMBER 18-19 | ILLUMINARIUM | LAS VEGAS, NV #MIMSUMMIT2023 Reserve My Spot JOIN FUTURE-FOCUSED PEERS, PRACTITIONERS AND INDUSTRY INFLUENCERS LIVE IN LAS VEGAS AS WE EXPLORE GROUNDBREAKING SECURITY TRENDS IN MODERN MACHINE IDENTITY MANAGEMENT, ZERO TRUST, AI, CLOUD NATIVE AND MORE. Featured Speakers AGENDA All Dates All Tracks * September 18 5:00 pm – 6:00 pm GMT+2 ON-SITE REGISTRATION AND NETWORKING BREAKFAST Illuminarium 20230918T080000Z20230918T090000ZAmerica/Los_AngelesOn-Site Registration and Networking BreakfastYou can access the event landing here https://www.mimsummit2023.com/ * September 18 6:00 pm – 7:25 pm GMT+2 OPENING KEYNOTE: THE FUTURE IS YOURS TO WIN! Illuminarium Main Stage There are several key areas where Venafi’s leaders see radical disruptions that will change the future of machine identity management. Join Venafi CEO Jeff Hudson and other executive leaders to see where your organization needs to evolve to embrace innovation, speed and adaptability with our architecture for the future where you’ll need to act and run locally, but secure globally. Get advice from customers who are already moving down that path. And how you can future proof your organization with a holistic approach to machine identity management. Read More 20230918T090000Z20230918T102500ZAmerica/Los_AngelesOpening Keynote: The Future Is Yours to Win!You can access the event landing here https://www.mimsummit2023.com/ * September 18 7:25 pm – 7:50 pm GMT+2 NETWORKING BREAK Virtual 20230918T102500Z20230918T105000ZAmerica/Los_AngelesNetworking BreakYou can access the event landing here https://www.mimsummit2023.com/ * September 18 7:50 pm – 8:20 pm GMT+2 ARE YOU READY TO COMPLY WITH NEW CA/BROWSER FORUM REQUIREMENTS FOR X.509 CERTIFICATES? Illuminarium Main Stage The goal of the CA/Browser Forum is to standardize the usage of X.509 digital certificates. Join this session to explore the latest developments in the CA/Browser Forum, where working groups have been endorsing more rigorous requirements for the issuance and management of X.509 certificates. You’ll gain a comprehensive understanding of two critical developments. First, we'll delve into the significant updates from the Server Cert, Code Signing, and S/MIME working groups. Then, we'll explore the implications of updated requirements that may impact your machine identity management program. Read More 20230918T105000Z20230918T112000ZAmerica/Los_AngelesAre You Ready to Comply with New CA/Browser Forum Requirements for X.509 Certificates?You can access the event landing here https://www.mimsummit2023.com/ * September 18 7:50 pm – 8:20 pm GMT+2 EFFORTLESS MUTUAL AUTHENTICATION WITH CILIUM Virtual Only Mutual authentication and encryption of traffic between different workloads are must-have security features for many organizations. In a cloud native environment, this has often been achieved using service mesh proxies that perform mTLS on behalf of each application, but is there a better way? In this demo-rich session, you'll learn about a new approach to mutually authenticating workloads that has recently been added to Cilium, the wildly popular open source connectivity solution for Kubernetes and beyond. In contrast to mTLS, this approach works for any protocol (not just those that run over TCP) and avoids the operational complexity and overhead of injecting sidecar proxies into every workload. With a pluggable interface for identity management, it simplifies the deployment of workload identities and handles concerns such as certificate rotation in a way that's completely transparent to your cloud native applications. Read More 20230918T105000Z20230918T112000ZAmerica/Los_AngelesEffortless Mutual Authentication with CiliumYou can access the event landing here https://www.mimsummit2023.com/ * September 18 7:50 pm – 8:20 pm GMT+2 LOCALLY ENFORCE GLOBAL PKI POLICIES FOR KUBERNETES WORKLOADS [PLATFORM + SECURITY] Illuminarium Breakout Room Organizations are increasingly using Kubernetes and service meshes to run their workloads. This requires a renewed focus on how workload security is managed from an identity perspective. Join us to explore some nuances of workload security, including how to issue, renew and rotate machine identities for workloads as well as how these identities can be used for mutual authentication. You’ll also learn how InfoSec teams can ensure that machine identities comply with security policies. Plus, we’ll share new ways that platform engineering teams that operate in Kubernetes can define certificate services that are easily consumed by app teams. Read More 20230918T105000Z20230918T112000ZAmerica/Los_AngelesLocally Enforce Global PKI Policies for Kubernetes Workloads [Platform + Security]You can access the event landing here https://www.mimsummit2023.com/ * September 18 8:30 pm – 9:00 pm GMT+2 COMPLY ANOTHER DAY: USING MODERN SUPPLY CHAIN TECHNIQUES TO AUTOMATE THE COMPLIANCE OF CONTAINER IMAGES IN A GLOBAL BANK Virtual Only For a bank, meeting regulatory compliance is of critical importance. With the adoption of microservices, containers, continuous delivery and other cloud native edge technologies, the challenge of maintaining that compliance grows. Security teams react by cracking down with manual compliance processes, stagnating development velocity and diminishing the benefits from any newly introduced technologies. But there is good news! We helped a global bank architect a solution for automating the compliance process for container images, providing security in a way that doesn't compromise velocity. Come along and find out how we did it and maybe understand better how you can too. Read More 20230918T113000Z20230918T120000ZAmerica/Los_AngelesComply Another Day: Using Modern Supply Chain Techniques to Automate the Compliance of Container Images in a Global BankYou can access the event landing here https://www.mimsummit2023.com/ * September 18 8:30 pm – 9:00 pm GMT+2 CAN SPIFFE HELP YOU SOLVE ‘SECRET ZERO’? Illuminarium Breakout Room More and more security teams face the daunting challenge of protecting complex and dynamic cloud native environments. As your organization embraces the power of Kubernetes, it’s paramount that you ensure robust machine identity security measures. That's where the Secure Production Identity Framework for Everyone (SPIFFE) is a game-changer — with its standardized approach to establish and manage strong identities for workloads in Kubernetes, hybrid cloud infrastructures and data centers. We’ll share real-world examples of how large companies leverage SPIFFE to solve the secret zero problem and take machine identity management to a new level. Read More 20230918T113000Z20230918T120000ZAmerica/Los_AngelesCan SPIFFE Help You Solve ‘Secret Zero’?You can access the event landing here https://www.mimsummit2023.com/ * September 18 8:30 pm – 9:00 pm GMT+2 THE CYBERSECURITY CASE FOR ZERO TRUST Illuminarium Main Stage The Zero Trust Security framework provides essential security controls to prevent advanced cyber threats from compromising your applications and systems. Learn how you can use Zero Trust to further secure your systems and applications from malware, cyber-attackers and other internal and external cyber threats that public and private sector organizations face globally. You’ll explore new guidelines on implementing Zero Trust-based security controls and see why they are essential to organizational information security across traditional security domains such as network, data, device, application, identity, email, user and cloud, as well as the newer domains of API, AI, IoT and third-party systems (like SaaS). Read More 20230918T113000Z20230918T120000ZAmerica/Los_AngelesThe Cybersecurity Case for Zero TrustYou can access the event landing here https://www.mimsummit2023.com/ * September 18 9:00 pm – 10:30 pm GMT+2 BOOK SIGNING WITH THE VOICE OF CISOS: RAJ BADHWAR Illuminarium Pick up a CISO Guide authored by global influencer Raj Badhwar, chat with the author and get your personal copy signed. You’ll have immediate access to insights gleaned from 28 years of leadership in companies like Oracle, Voya Financial, AIG, BAE Systems, Bank of America and AOL Time Warner. Available at the event are The CISO Guide to Incident Response and The CISO Guide to Zero Trust Security. Read More 20230918T120000Z20230918T133000ZAmerica/Los_AngelesBook Signing with the Voice of CISOs: Raj BadhwarYou can access the event landing here https://www.mimsummit2023.com/ * September 18 9:00 pm – 10:30 pm GMT+2 LUNCH AND SPONSOR NETWORKING Illuminarium 20230918T120000Z20230918T133000ZAmerica/Los_AngelesLunch and Sponsor NetworkingYou can access the event landing here https://www.mimsummit2023.com/ * September 18 9:30 pm – 10:00 pm GMT+2 MACHINE IDENTITY MANAGEMENT MATRIX COMPETITION Illuminarium Main Stage As part of the Machine Identity Management Development Fund, Venafi has sponsored over 50 new innovations to futureproof customer success. For the first time, Venafi customers will have the opportunity to meet Development Fund participants and vote which one wins to escape the matrix as the most promising new machine identity innovator. Attend this session, free your mind, and decide for yourself which innovation is most valuable to your organization. During the competition, Venafi will announce the latest startups to join the Machine Identity Management Development Fund. Current Development Fund participants APIIDA, Corsha, Device Authority and Nirmata will compete. Learn more about the Machine Identity Management Development Fund at https://venafi.com/development-fund/ Read More 20230918T123000Z20230918T130000ZAmerica/Los_AngelesMachine Identity Management Matrix CompetitionYou can access the event landing here https://www.mimsummit2023.com/ * September 18 9:30 pm – 10:00 pm GMT+2 GET NIST’S PERSPECTIVE ON ZERO TRUST ARCHITECTURES AND POST-QUANTUM CRYPTOGRAPHY Virtual Only NIST’s National Cybersecurity Center of Excellence (NCCoE) is an applied cybersecurity laboratory that brings together experts from industry, government, and academia to focus on standards that promote and compel adoption of cybersecurity and privacy capabilities. Join us to explore the exciting progress of two ongoing projects at the center. The aim of the first is to remove the shroud of complexity around designing for Zero Trust with end-to-end architecture implementations. The second focuses on easing the migration from current public-key cryptographic algorithms to post-quantum cryptographic algorithms that are resistant to quantum computer-based attacks. Don’t miss this chance to discuss the workstreams within these projects, provide input and understand better how the NCCoE can support your needs. Read More 20230918T123000Z20230918T130000ZAmerica/Los_AngelesGet NIST’s Perspective on Zero Trust Architectures and Post-Quantum CryptographyYou can access the event landing here https://www.mimsummit2023.com/ * September 18 10:30 pm – 11:00 pm GMT+2 DEMYSTIFYING MACHINE IDENTITY MANAGEMENT Illuminarium Main Stage Machine identities secure our digital world in ways that many of you haven’t even imagined. Join us for a deep dive on critical, but perhaps underappreciated, uses of machine identities in your organization. We’ll explore innovative use cases for machine identity management and the critical role of a machine identity management control plane. Using an engaging “day in the life” perspective, we’ll also unpack our vision for the future of machine identity management and demonstrate some key concepts in the Venafi Control Plane. Read More 20230918T133000Z20230918T140000ZAmerica/Los_AngelesDemystifying Machine Identity ManagementYou can access the event landing here https://www.mimsummit2023.com/ * September 18 10:30 pm – 11:00 pm GMT+2 EXTENDING VENAFI'S MACHINE IDENTITY MANAGEMENT TO MAINFRAMES Illuminarium Breakout Room In this session we will explore how large organizations are broadening the scope of Venafi's Machine Identity Management solution. By integrating certificate automation into mainframes, these enterprises minimize the risk of outages in mainframe applications and optimize the use of skilled mainframe resources for critical projects. This is crucial due to the increasing pace of certificate expirations, which burdens mainframe teams with manual certificate tasks. Read More 20230918T133000Z20230918T140000ZAmerica/Los_AngelesExtending Venafi's Machine Identity Management to MainframesYou can access the event landing here https://www.mimsummit2023.com/ * September 18 10:30 pm – 11:00 pm GMT+2 FRICTIONLESS MACHINE IDENTITY MANAGEMENT VIA AWS CLOUDFORMATION Virtual Only As your organization continues to embrace cloud native strategies, you may already be taking advantage of Infrastructure as Code services, such as AWS CloudFormation. If so, wouldn’t it be amazing if you could use the same technology to seamlessly shrink-wrap your machine identity issuance, renewal and policy enforcement? Explore a new use case for Venafi TLS Protect Cloud, where this control plane for machine identities operates as a natural extension of the AWS services. Join us as we present a recent addition to our Marketplace which can help you accelerate your cloud native development, while preventing application outages or security breaches. Read More 20230918T133000Z20230918T140000ZAmerica/Los_AngelesFrictionless Machine Identity Management via AWS CloudFormationYou can access the event landing here https://www.mimsummit2023.com/ * September 18 11:10 pm – 11:40 pm GMT+2 ARE YOU WORKING FOR YOUR PKI? OR IS IT WORKING FOR YOU? Iluminarium Main Stage Traditional Public Key Infrastructures (PKIs) have long been a cornerstone of an organization's cybersecurity framework. However, with evolving business demands, these legacy PKIs often fall short. Their scalability is questionable, their complexity is daunting, and their management can be challenging. If you're faced with the decision to update your existing PKI, or if your root certificate is nearing its expiration, what's your plan of action? This discussion delves into the compelling reasons for transitioning from traditional PKI systems to a more contemporary PKI-as-a-service solution. Read More 20230918T141000Z20230918T144000ZAmerica/Los_AngelesAre You Working for Your PKI? Or Is it Working for You?You can access the event landing here https://www.mimsummit2023.com/ * September 18 11:10 pm – 11:40 pm GMT+2 WHODUNNIT: THE ROLE OF MACHINE IDENTITY IN SUPPLY CHAIN SECURITY Virtual Only Ensuring the security of software supply chains is critical in today's interconnected digital landscape. The complexity of multiple components from diverse contributors challenges our ability to identify the origins of malicious activities. Build systems play a critical role in secure artifact production and distribution, but many industry-standard security techniques have left the CI/CD space behind. Learn how Machine Identity Management can help to counter that trend. We’ll share real-world case studies, practical implementations and integration strategies illustrating how Machine Identity Management can help mitigate risks, detect compromised components, and facilitate efficient incident response. Read More 20230918T141000Z20230918T144000ZAmerica/Los_AngelesWhodunnit: The Role of Machine Identity in Supply Chain SecurityYou can access the event landing here https://www.mimsummit2023.com/ * September 18 11:10 pm – 11:40 pm GMT+2 LEVEL UP YOUR ENTERPRISE CODE SIGNING Illuminarium Breakout Room Even if you are already signing code or just getting started with CodeSign Protect, this customer case study session will help get you to the next level of enterprise code signing. Join us to hear lessons learned, do’s and don’ts — especially when it comes to scaling enterprise code signing and onboarding application teams. You’ll learn new strategies for how to deploy CodeSign Protect to enable code signing in CI/CD pipelines. Key takeaways will also include how to deliver the right value proposition to internal stakeholders to ensure successful outcomes. Read More 20230918T141000Z20230918T144000ZAmerica/Los_AngelesLevel Up Your Enterprise Code SigningYou can access the event landing here https://www.mimsummit2023.com/ * September 18 11:50 pm – 12:20 am GMT+2 MIGRATING AWAY FROM SSH KEYS: ENHANCING SSH AUTHENTICATION THROUGH SSH CERTIFICATES Illuminarium Breakout Room Managing SSH keys for an enterprise is a challenging task. It often comes with a never-ending series of fact-finding missions: Who owns the keys and the accounts? When are the keys being used? How? These are all questions we’ve asked ourselves as SSH key administrators. It can be frustrating and time consuming, and that’s why migrating to SSH certificates is paramount. In this session, learn how SSH certificates can resolve these issues, enhance authentication in the SSH protocol and enable improved automation across your rapidly developing cloud environments. Read More 20230918T145000Z20230918T152000ZAmerica/Los_AngelesMigrating Away from SSH Keys: Enhancing SSH Authentication Through SSH CertificatesYou can access the event landing here https://www.mimsummit2023.com/ * September 18 11:50 pm – 12:20 am GMT+2 CERTIFICATE GOVERNANCE VS. CERTIFICATE MANAGEMENT: WHICH IS BETTER FOR BETTER RISK MANAGEMENT? Virtual How do you keep up with every certificate issued for an enterprise when we have self-signed certs, cloud CAs, ad-hoc CAs, vendor CAs and public CAs—all in addition to typical enterprise CAs? Do you have to discover and manage every certificate? In this session, we’ll go into the differences between certificate governance and management, and we’ll cover how to use governance to catch up with your developers, vendors and users while lowering your security and functional risks. Read More 20230918T145000Z20230918T152000ZAmerica/Los_AngelesCertificate Governance vs. Certificate Management: Which Is Better for Better Risk Management?You can access the event landing here https://www.mimsummit2023.com/ * September 18 11:50 pm – 12:20 am GMT+2 TALES FROM THE FIELD: IMPLEMENTING ZERO TRUST ARCHITECTURE AT FORTUNE 500 COMPANIES Illuminarium Main Stage In this insightful fireside chat, we’ll explore the origins of Istio, the fastest graduating open source project in CNCF history, and its emergence as a crucial part of modern architectures like Kubernetes, single cloud and hybrid infrastructure environments. We’ll also discuss the important role Istio plays in building Zero Trust Architectures (ZTA) and identity-based authorization and authentication. During this conversation, you’ll also hear about best practices and strategies that Fortune 500 companies are using to successfully implement ZTAs, including the deployment of Istio. If you are grappling with machine identity, Kubernetes optimization, and secure connectivity, you can expect practical tips and real-world examples. Read More 20230918T145000Z20230918T152000ZAmerica/Los_AngelesTales from the Field: Implementing Zero Trust Architecture at Fortune 500 CompaniesYou can access the event landing here https://www.mimsummit2023.com/ * September 19 12:20 am – 12:35 am GMT+2 NETWORKING BREAK Virtual 20230918T152000Z20230918T153500ZAmerica/Los_AngelesNetworking BreakYou can access the event landing here https://www.mimsummit2023.com/ * September 19 12:35 am – 1:05 am GMT+2 PQC READINESS: HOW TO CONQUER THE QUANTUM THREATS OF TOMORROW, TODAY Illuminarium Main Stage Quantum computers will significantly advance the world’s technological capabilities, but all that computing power has the potential to break traditional cryptography like RSA or ECC encryption. And even though today’s quantum computers aren’t that powerful, one crucial fact remains: your post-quantum success is entirely dependent on your pre-quantum readiness. How can you ensure your business doesn’t just survive, but thrives, in a post-quantum world? Join this panel discussion to explore the trends impacting post-quantum readiness in today’s enterprises. You’ll also discover how automated, crypto-agile machine identity management can help ensure a successful post-quantum migration—before quantum computers arrive on the scene. Read More 20230918T153500Z20230918T160500ZAmerica/Los_AngelesPQC Readiness: How to Conquer the Quantum Threats of Tomorrow, TodayYou can access the event landing here https://www.mimsummit2023.com/ * September 19 12:35 am – 1:05 am GMT+2 HOW TO BUILD A SECURE, “ALWAYS-ON” BUSINESS: DESIGNING FOR SECURITY, COST AND RELIABILITY IN THE CLOUD Virtual Only As companies continue to embrace cloud technologies, it’s imperative they think about cloud as an operating model rather than an Infrastructure endpoint, i.e. IAAS. With complex distributed architectures, elastic infrastructure and a pay-as-you-go model, cloud promises the flexibility and scalability that many organizations need. However, incorrect implementations can significantly impact reliability, security and costs. Join us as we explore how to proactively engineer security, cost consciousness and reliability into your cloud workloads, helping you build the efficient, economical and automated operations needed for an “Always-On” business. Read More 20230918T153500Z20230918T160500ZAmerica/Los_AngelesHow to Build a Secure, “Always-On” Business: Designing for Security, Cost and Reliability in the CloudYou can access the event landing here https://www.mimsummit2023.com/ * September 19 1:15 am – 1:45 am GMT+2 CLOSING KEYNOTE: SECURING THE FUTURE, TOGETHER Illuminarium Main Stage Venafi customers are among the most savvy, security-conscious organizations in the world. And together, we are making a big impact on the future of the digital economy. Join us as we recognize just some of the many ways that Venafi customers are helping to make the world a better, safer place. Plus, you’ll learn from our community award winner why you’ll benefit from joining like-minded experts in the Venafi Warrior Community. Read More 20230918T161500Z20230918T164500ZAmerica/Los_AngelesClosing Keynote: Securing the Future, TogetherYou can access the event landing here https://www.mimsummit2023.com/ * September 19 1:45 am – 3:45 am GMT+2 NETWORKING RECEPTION AND FULL ILLUMINARIUM EXPERIENCE Illuminarium Intrigued by what you’ve seen and heard during Day 1 of the Summit? You haven’t seen the half of it. Join fellow attendees in experiencing the full immersive joy that the Illuminarium has to offer. It’s the most exciting way to compare notes and share your experiences with fellow attendees while relaxing over drinks and hors d’oeuvres. Read More 20230918T164500Z20230918T184500ZAmerica/Los_AngelesNetworking Reception and Full Illuminarium ExperienceYou can access the event landing here https://www.mimsummit2023.com/ * September 19 5:00 pm – 6:00 pm GMT+2 ON-SITE REGISTRATION AND NETWORKING BREAKFAST Illuminarium 20230919T080000Z20230919T090000ZAmerica/Los_AngelesOn-Site Registration and Networking BreakfastYou can access the event landing here https://www.mimsummit2023.com/ * September 19 5:15 pm – 5:45 pm GMT+2 WOMEN IN CYBERSECURITY BREAKFAST PANEL Virtual Join us for a breakfast session where we celebrate the multi-faceted value and contributions of women in cybersecurity. Strengthening your organization’s gender diversity is a great way to help solve the growing shortage of skilled cybersecurity experts. Join a strong roster of women working in cybersecurity who will share advice on how to expand your team with women interested in cybersecurity. You’ll also gain insights on how you can support the women already on your team and why the addition of women will make your team more successful. Read More 20230919T081500Z20230919T084500ZAmerica/Los_AngelesWomen in Cybersecurity Breakfast PanelYou can access the event landing here https://www.mimsummit2023.com/ * September 19 6:00 pm – 6:50 pm GMT+2 OPENING KEYNOTE: AI AND THE FUTURE OF MACHINE IDENTITY MANAGEMENT Illuminarium Main Stage Artificial intelligence (AI) and machine learning (ML) are rapidly changing the way we do business and protect our organizations. So, what does the future look like as we rapidly evolve from predictive ML to generative AI? Learn what you need to know about emerging threatscapes in the age of AI and why machine identity management is the prime protection to help you counter these new attack vectors. Also get a CIO perspective on the future of security and AI from Jamie Holcombe, CIO of the US Patent and Trademark Office, as he joins us for a fireside chat. Will we adopt it as a predictive security tool? And what are the necessary guardrails? What are visionaries doing right now to protect against future AI attacks? Read More 20230919T090000Z20230919T095000ZAmerica/Los_AngelesOpening Keynote: AI and the Future of Machine Identity ManagementYou can access the event landing here https://www.mimsummit2023.com/ * September 19 7:00 pm – 7:30 pm GMT+2 CISO PANEL: GAME CHANGERS FOR INFOSEC Illuminarium Main Stage Join forward-thinking security leaders as they explore machine identity trends that are driving changes in the role of InfoSec. As the attack surface continues to evolve, it’s challenging for InfoSec to predict the impact of technologies like AI, Quantum Computing and Cloud Native. And because there is now an element of fiscal accountability for breaches (SolarWinds), CISOs need to know immediately when something breaks. And they must be prepared to adapt immediately and globally. Join these CISOs to learn why you need to think beyond technology and focus on critical risk. Moderator: Jeff Hudson Read More 20230919T100000Z20230919T103000ZAmerica/Los_AngelesCISO Panel: Game Changers for InfoSecYou can access the event landing here https://www.mimsummit2023.com/ * September 19 7:30 pm – 7:50 pm GMT+2 NETWORKING BREAK Virtual 20230919T103000Z20230919T105000ZAmerica/Los_AngelesNetworking BreakYou can access the event landing here https://www.mimsummit2023.com/ * September 19 7:50 pm – 8:20 pm GMT+2 YOUR COMPANY IS HOW OLD?! HOW ESTABLISHED COMPANIES LEAN INTO DIGITAL MODERNIZATION Illluminarium Main Stage In companies with a lot of history, acquisitions and customized solutions, there are many challenges—but there are even more opportunities. Whether you are just beginning your digital journey, standing up a dedicated application security practice or starting your path with SaaS providers and the Cloud—or even all of the above—modern Security Architectures require certificates and keys across the enterprise. Join this session to hear how one company with almost a century and a half on the books is embracing those challenges to modernize their security posture and move their entire enterprise forward. Read More 20230919T105000Z20230919T112000ZAmerica/Los_AngelesYour Company is How Old?! How Established Companies Lean into Digital ModernizationYou can access the event landing here https://www.mimsummit2023.com/ * September 19 7:50 pm – 8:20 pm GMT+2 SUCCESSFULLY MANAGING AI MACHINE IDENTITIES FOR DIGITAL WORKERS Virtual Only Federal agencies use digital workers to automate processes, increase efficiencies, and discover insights from large volumes of data. Digital workers may use Artificial Intelligence, Chatbots or Machine Learning to interact with or use sensitive information to perform unattended, high-risk tasks, which may critically impact an agency’s mission. Find out why using human-based processes to create a digital worker identity may hinder a digital worker’s access or success. Ken and Ross will discuss the challenges in determining digital worker risk and describe a playbook for establishing digital worker identity. Read More 20230919T105000Z20230919T112000ZAmerica/Los_AngelesSuccessfully Managing AI Machine Identities for Digital WorkersYou can access the event landing here https://www.mimsummit2023.com/ * September 19 7:50 pm – 8:20 pm GMT+2 NEW STRATEGIES FOR SIGNING AND VERIFYING CONTAINER IMAGES Illuminarium Breakout Room Software supply chains are still in the news. At the same time, Kubernetes workloads are increasing exponentially as well as the risks of running untrusted container images. We’ll explore the latest industry approaches around signing container images, with a particular focus on how to enforce signed images in Kubernetes clusters. Then we'll recommend how you can use Sigstore cosign and Notary V2 open-source projects to sign container images to meet enterprise trust requirements. Plus, we'll examine new ways you can verify container image signatures in Kubernetes and finish off with a demo of end-to-end signing and verification best practices. Read More 20230919T105000Z20230919T112000ZAmerica/Los_AngelesNew Strategies for Signing and Verifying Container ImagesYou can access the event landing here https://www.mimsummit2023.com/ * September 19 8:30 pm – 9:00 pm GMT+2 BUDGET, NO BUDGET: HOW TO BUILD THE CASE FOR THE TECHNOLOGY AND PEOPLE INVESTMENTS YOU NEED TODAY Illuminarium Main Stage David Bliss will bring his experience using Value Cards to keep his leadership updated, secure budgets, and highlight his team’s contribution to PNC’s success. Learn how he uses Value Cards and their metrics to tie the business to PNC’s machine identity strategy. He will share best practices and how to overcome challenges, along with how the Value Cards are received by his executive leadership team. Read More 20230919T113000Z20230919T120000ZAmerica/Los_AngelesBudget, No Budget: How to Build the Case for the Technology and People Investments You Need TodayYou can access the event landing here https://www.mimsummit2023.com/ * September 19 8:30 pm – 9:00 pm GMT+2 CHARTING A COURSE TO SUCCESS: NAVIGATING COMMON PITFALLS IN MACHINE IDENTITY MANAGEMENT PROJECTS Virtual Only Join this informative session to navigate through the top challenges that organizations encounter in their machine identity management projects. We’ll explore how these challenges can culminate into a perfect storm of failure if you do not take the proper steps to avoid them. Through real-world examples, insightful anecdotes, and actionable strategies, we will uncover the hidden currents that threaten to capsize machine identity management projects if you haven’t properly charted your course. Read More 20230919T113000Z20230919T120000ZAmerica/Los_AngelesCharting a Course to Success: Navigating Common Pitfalls in Machine Identity Management ProjectsYou can access the event landing here https://www.mimsummit2023.com/ * September 19 9:10 pm – 9:20 pm GMT+2 CLOSING THOUGHTS: MOVING SECURELY INTO THE FUTURE Illuminarium Main Stage Over the past two days, we’ve looked into the future of machine identity management and the impact of AI, quantum computing, zero trust, cloud native and more. Now it’s time to go out and make it happen. Join us for final remarks on why we need to act quickly and definitively. 20230919T121000Z20230919T122000ZAmerica/Los_AngelesClosing Thoughts: Moving Securely into the FutureYou can access the event landing here https://www.mimsummit2023.com/ * September 19 9:30 pm – 3:30 am GMT+2 WORKSHOP #3: FROM MISCONFIGURATION TO MASTERY: A CRASH COURSE ON KUBERNETES AND CERT-MANAGER Illuminarium Cafe Dive into the world of Kubernetes and gain a fundamental understanding of cert-manager, a powerful certificate management tool. In this interactive session with presentations, live demos and discussions, you'll learn the basics of Kubernetes architecture, components and key concepts. You’ll also explore the importance of secure communication within Kubernetes clusters and how cert-manager simplifies certificate provisioning, renewal and revocation. Read More 20230919T123000Z20230919T183000ZAmerica/Los_AngelesWorkshop #3: From Misconfiguration to Mastery: A Crash Course on Kubernetes and cert-managerYou can access the event landing here https://www.mimsummit2023.com/ * September 19 10:30 pm – 2:30 am GMT+2 WORKSHOP #1: SURPRISE! YOU’RE IN CHARGE OF BUILDING MACHINE IDENTITY AUTOMATION WITH VENAFI Illuminarium Main Stage Venafi APIs and libraries make it easy to access the power of the Venafi Control Plane. In this workshop, you’ll learn how to update existing code and build automation with Venafi APIs, including how to call Venafi’s powerful machine identity management from REST, Python, PowerShell and more. Explore resources such as our new Dev Central – and learn to eliminate headaches and get your work done faster by deploying and authenticating your API calls with OAuth and create at warp speed with VCert! Read More 20230919T133000Z20230919T173000ZAmerica/Los_AngelesWorkshop #1: Surprise! You’re in Charge of Building Machine Identity Automation With VenafiYou can access the event landing here https://www.mimsummit2023.com/ * September 19 10:30 pm – 2:30 am GMT+2 WORKSHOP #2: MASTERING ROGUE ISSUERS AND EPHEMERAL SERVICE MESH IDENTITIES WITH VENAFI FIREFLY Illuminarium Breakout Room What do you do when an application team demands you give them a sub CA certificate? A common myth is issuing a sub CA certificate is like giving away the keys to the kingdom. But denying these requests isn't the answer. These teams often go rogue, create their own CAs, and hide it with complexity and obscurity – until something goes wrong! In this workshop, you’ll get hands-on with Venafi Firefly and learn how to say yes while maintaining the compliance, visibility and control that are critical. Read More 20230919T133000Z20230919T173000ZAmerica/Los_AngelesWorkshop #2: Mastering Rogue Issuers and Ephemeral Service Mesh Identities With Venafi FireflyYou can access the event landing here https://www.mimsummit2023.com/ A MODERN EVENT FOR THE MODERN AGE REDEFINE WHAT'S POSSIBLE IN 2023—AND BEYOND There's no stopping the innovation on this year's agenda. Get ready for a cloud native future where identity is the definitive foundation of security. STELLAR INSIGHTS AND ADVICE Discover the people, processes and technology you need to modernize your security at machine speed—even your complex, cloud native environments. EXCEPTIONAL ENCOUNTERS Build your domain expertise with countless chances to interact with esteemed peers and industry experts through Q&As, how-to demos and ALL-NEW hands-on technical workshops. TAKE A QUANTUM LEAP FORWARD Our world is evolving at an unprecedented velocity. Find out how to disrupt the future with a next-gen ecosystem of technology partners. COUNTLESS CONNECTIONS You won't have to make the jump to the next galaxy to find networking opportunities here! Meet other brilliant minds, exchange ideas and build new partnerships at the world's foremost gathering of machine identity professionals. ONE UNFORGETTABLE EVENT Immerse yourself in an otherworldly venue, featuring wall-to-wall sights and sounds, at an experience you won’t forget. Or join us virtually and shatter the status quo from your home or office. Reserve My Spot SUMMIT SPEAKERS * JEFF HUDSON CEO Venafi * KEVIN BOCEK VP, Ecosystem and Community Venafi * MIKE DODSON Chief Customer Officer Venafi * JAMIE HOLCOMBE CIO United States Patent and Trademark Office * JANE DOMBOSKI Chief Information Security Officer OneMain Financial * PREMKUMAR BALASUBRAMANIAN SVP and CTO, Digital Solutions Hitachi Vantara * RAJ BADHWAR VP, Global Head of Cybersecurity Jacobs Engineering * SID BHADANI Principal Cyber Security Architect Health Care Service Corporation (HCSC) * KAREN REINHARDT Principal Engineer, PKI & Encryption The Home Depot * JUDSON BENDER Enterprise Architect Lead (Security) OneAmerica * DAN LORENC CEO Chainguard * VARUN TALWAR Co-Founder, Tetrate and Co-Creator of Istio and gRPC * LIZ RICE Chief Open Source Officer Isovalent * MATTIAS GEES Director of Tech Venafi * IVAN WALLIS Global Architect - Cloud Native Solutions Venafi * JUSTIN HANSEN Field CTO Venafi * RAFAEL TANAKA Senior Curriculum Engineer Venafi * MARTY MILBERT Sr Director and Global Principal Architect (OCTO) Venafi * SANDEEP SINGH KOHLI Chief Marketing Officer Venafi * SHIVAJEE SAMDARSHI Chief Product Officer Venafi * GUNNAR ERNST Information Security Senior Advisor Elevance Health * DAVID BLISS Sr. Security Manager PNC Financial Services Group * MARENE ALLISON CEO of Marene Allison Consulting and Former CISO of Johnson & Johnson * SITARAM IYER Senior Director, Cloud Native Solutions Venafi * KEN CHISM World Wide Cybersecurity Sales Director BMC Software * TOM MEADOWS Solutions Engineer Venafi * ALAN MCGINLAY Ecosystem Architect Venafi * KEN MEYERS Director, Identity Assurance and Trusted Access Division General Services Administration * ROSS FOARD IT Specialist (INFOSEC) Cybersecurity and Infrastructure Security Agency * ANDERS JOHANSSON Customer Support Manager Venafi * TYSON MCMURTREY Professional Services Technical Delivery Manager Venafi * SAM HEYWOOD VP, Product Marketing Venafi * SETU KULKARNI VP, Product Management Venafi * NICK CURCURU Head of Solutions Marketing Venafi * FAISAL RAZZAK Group Manager, Product Management Venafi * GREG CRABB Cybersecurity Consulting Executive/CISO, 10-8, LLC & Former CISO, U.S. Postal Service * MATT BARKER Global Head of Cloud Native Services Venafi * BRUNO COUILLARD Co-Founder & CEO Crypto4A Technologies * DAVID MAHDI CIO, Transmit Security & Former VP, Gartner Transmit Security * MELISSA KEOHANE Chief Legal & People Officer Venafi * FLORIN LAZURCA Head of Technical Marketing Venafi * JIM BUGWADIA Co-founder & CEO Nirmata * ANUSHA IYER CEO Corsha * RYAN HURST CEO, Peculiar Ventures & Advisor, SandboxAQ * GEORGE PARSONS Head of PKI Strategy Venafi * JAMES PENNEY CTO Device Authority * CARL BOURNE Global Principal Architect, Office of the CTO Venafi * ALPER KERMAN Principal Lead for Zero Trust Efforts NIST NCCoE * BILL NEWHOUSE Cybersecurity Engineer NIST NCCoE * KRIS LUHRSEN Chief Sales Officer Venafi * EBONY SHAAF SVP, Head of Identity & Access Management First Citizens Banks * OANA GARNETT Director of Services Venafi * SCOTT BARRONTON Chief Information Security Officer Diebold Nixdorf * PAUL PLATEN Digital Identity Principal Consultant WebSecure AGENDA COMING SOON! OUR ANNUAL EVENT ALWAYS FEATURES A ROCKSTAR LINEUP OF SPEAKERS. PREVIOUS SPEAKERS HAVE INCLUDED NETFLIX, AFLAC, HASHICORP, CISCO, ORACLE, CNCF, GARTNER, LLOYD’S BANK, US POSTAL SERVICE AND MANY OTHERS. CHECK BACK SOON TO SEE WHO’S TAKING THE STAGE IN 2023! SHARE YOUR VISION AT MACHINE IDENTITY MANAGEMENT SUMMIT 2023! We're looking for influential speakers to showcase real-world case studies, technical how-tos, best practices and panel discussions for Machine Identity Management Summit 2023. Whether you’re an industry pundit, aspiring thought leader, ecosystem innovator or ground-breaking Venafi customer, we want to share your vision of the future of machine identities and the role their modern management plays. Apply to Speak Why should you attend the Machine Identity Management Summit? THIS IS THE FRONTIER FOR UNSTOPPABLE INNOVATION. THE GATHERING GROUND FOR SECURITY LEADERS LOOKING TO REDEFINE WHAT'S POSSIBLE. THE MUST-SEE INDUSTRY EVENT OF 2023. HERE, WE'LL SHOWCASE THE LATEST TRENDS IN MODERN MACHINE IDENTITY MANAGEMENT AND UNCOVER THE BEST WAYS TO ACCELERATE YOUR ENTERPRISE TOWARD THE FUTURE. WHY SHOULD YOU ATTEND THE MACHINE IDENTITY MANAGEMENT SUMMIT? THIS IS THE FRONTIER FOR UNSTOPPABLE INNOVATION. THE GATHERING GROUND FOR SECURITY LEADERS LOOKING TO REDEFINE WHAT'S POSSIBLE. THE MUST-SEE INDUSTRY EVENT OF 2023. HERE, WE'LL SHOWCASE THE LATEST TRENDS IN MODERN MACHINE IDENTITY MANAGEMENT AND UNCOVER THE BEST WAYS TO ACCELERATE YOUR ENTERPRISE TOWARD THE FUTURE. Reserve My Spot CLOUD NATIVE MOVES FAST. YOUR IT SECURITY NEEDS TO MOVE EVEN FASTER. ARE YOU READY TO MANAGE YOUR MACHINE IDENTITIES AT THE SPEED OF INNOVATION? Join future-focused peers, expert practitioners and industry influencers LIVE in Las Vegas as we explore groundbreaking security trends in modern machine identity management, zero trust, AI, cloud native and more. Can’t make it to Vegas? No problem! Stream this year's summit live from anywhere. EVENT SPONSORS * * * Questions about the event? Interested in sponsoring? EMAIL US AT VENAFISUMMIT@VENAFI.COM Summit FAQ Justify Your Trip Venafi.com