У нас вы можете посмотреть бесплатно Machine Identity Management Is the Foundation for Zero Trust или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
Machine identities now outnumber humans by roughly two to one. Learn how PKI, CLM, Kubernetes TLS and crypto agility form the backbone of Zero Trust and how to prepare for Google’s 90 day TLS and post quantum cryptography. Machines now outnumber humans. This talk shows how to see and control certificates across clouds and Kubernetes so Zero Trust actually works. Machines run today’s apps and services and authenticate with certificates. If you can’t see and control machine identities across clouds and Kubernetes, Zero Trust breaks down. This session explains the rise of workload identities, why hybrid and multi cloud introduce multiple CAs and trust anchors, what Google’s 90 day TLS validity means operationally, how to plan for post quantum cryptography and why automation is the only practical way to achieve crypto agility. 0:00 - Introduction to Machine Identity Management and Zero Trust 0:32 - Rise of Machine Identities: IoT and Connected Devices 1:08 - Physical vs Virtual Machine Identities Explained 2:13 - Evolution from Mechanical to Electronic Devices 3:28 - Digital Identities Outnumber Human Identities 2:1 4:09 - Rapid Digital Transformation in Last 15 Years 5:03 - Gartner Report: CLM More Critical Than MFA 5:40 - PKI and Certificate Lifecycle Management Challenges 6:34 - Certificate Outages Cost Organizations Money 7:16 - SolarWinds Attack: Code Signing Certificate Breach 7:55 - Post Quantum Cryptography Threat to Current Security 9:40 - Post Quantum Readiness: Organizational Challenges 10:35 - Google 90 Day Certificate Validity Impact 11:31 - Virtual Environments and Cloud Security Risks 12:15 - Kubernetes Container Security Complexity 13:12 - Path to Crypto Agility: Step-by-Step Framework 13:19 - Holistic Visibility: Discovering All Certificates 14:12 - Certificate Discovery Across Infrastructure 14:37 - Centralized Control and Certificate Governance 15:15 - Automation: The Key to Certificate Management 16:03 - Achieving Crypto Agility Maturity