Webinar 30.6.2020, 11:00 "Certificates and keys in the context of cyber security"

Webinar 30.6.2020, 11:00 "Certificates and keys in the context of cyber security"

Registration and information at: https://cybersicherheitsrat.de/2020/06/18/webinar-zertifikate-und-schlussel-im-kontext-der-cybersicherheit/

What is the status of your certificates and keys in your area of responsibility? Do you still have them all under control?

What legal/compliance requirements do you have to meet?
What is the status of your networks? What is the status of your servers and devices?
What is the status of your delivered products? Do you deliver vulnerabilities?

Do you have a complete overview?
Can you prove it?

Now that the IT-SA has been canceled, I am presenting our latest innovation for the first time, which will be important for corporations and large environments. This functionality provides the basis for a large number of new security functions that we will gradually introduce. In this way, we are creating additional options and flexibility for companies and reducing their complexity to a minimum. Keys and certificates as the basis of cyber security are just the beginning of the journey.

Cybersecurity, Made in Germany.

 

Certificates and keys form the basis of almost every security product or security strategy. Nevertheless, they often lead a shadowy existence in the context of cyber security and are considered a special topic for nerds. In practice, however, services unfortunately fail far too often because of certificates, even though these areas are supposedly managed (ISO 27001, SOX, GDPR, NATO RM, etc.). Faulty certificates can also be used to break into systems, encrypt data, intercept communications, exploit state privileges for espionage and deliver insecure or non-compliant products.

Accordingly, the strategic consideration of computer certificates and keys represents a major challenge for decision-makers and IT experts. However, the management methods used to date have been unstructured and based on manual handling and reactive management. Newer services in established structures make the task even more difficult. In view of this challenge and the clearly quantifiable costs arising from incorrect or mismanaged certificates, automated and depersonalized management methods can clearly provide a remedy here and lead to cost savings with increased security gains for companies.

In this joint webinar by the Cyber Security Council Germany and its member Data Warehouse, you will therefore receive an overview of the basics of cyber-secure, trustworthy and automated certificate management. Using examples, you will learn more about the impact on cyber security and gain the necessary overview for individual decision-making. Practical examples and current contexts will be demonstrated live. A special focus will also be placed on computer certificates, which have received little attention to date and act as abasis for trust and authorizations. Although these certificates are present in large numbers in every computer (client, server, devices) and form the basis for the encryption of devices and communication between participants, these trust relationships have not been managed to date and represent a major security risk for companies.