Rise of the Machines: Protecting These New Identities
There are two actors on every network—people and machines. People rely on user names and passwords to identify themselves and gain access to machines, apps and devices. Machines use digital keys and certificates for M2M communication and authentication. But we’re not protecting these growing machine identities. We spend billions each year on user name and password security, but almost none on protecting keys and certificates. Learn about these new security risks and the steps you can take immediately to get these risks under control.
Speakers Bio: Kevin Bocek has over 18 years in cybersecurity experience. He led the investigation that identified Secretary Hillary Clinton’s email server failed to use encryption, has authored several books, and is sought after for comment by the world’s leading media.