Webinars
Today
Webinar
Join this webinar to:
Combining Secrets and Key Management for Maximum Effect  

In the ever-expanding digital landscape, the proliferation of secrets and cryptographic keys poses a risk and a challenge, with many organizations struggling to maintain control. Relying on secrets management is no longer sufficient. A new comprehensive approach is needed, with more than 40% of data breaches involving stolen credentials.  

Join security and identity experts from KuppingerCole Analysts and Entrust to reveal the intrinsic and symbiotic relationship between key management and secrets, offering visibility, compliance assurance, and effective risk management. Learn the importance of safe, repeatable processes around keys and secrets to fortify security in a dynamic cyber landscape. 

Speakers' Contributions

Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, will explain how stolen credentials became a leading cause of data breaches and how, to tackle this risk for modern cloud-native or hybrid applications, secrets management must be reinvented. He will outline the requirements for managing the entire lifecycle of digital credentials and addressing the needs of various stakeholders. 

Michael Loger, Director Product Management at Entrust will provide a new definition of key and secrets management, and an overview of Entrust’s KeyControl solution, highlighting its secrets management capabilities, KeyControl ecosystem, unique architecture, and compliance management dashboard.  

Webinar
Beyond Secrets Management: Transforming Security in the Digital Age
Speakers
Martin Kuppinger Principal Analyst
KuppingerCole
Martin Kuppinger
Martin Kuppinger is Founder and Principal Analyst at KuppingerCole, a leading analyst company for identity focused information security, both in classical and in cloud environments. Prior to...
View profile
Michael Loger Director Product Management
Entrust Corporation
Michael Loger
Michael is an accomplished IT security expert with over two decades of experience in the industry. He has collaborated with prominent security brands in Europe, such as Tripwire, Intel, Thales,...
View profile
Lead Sponsor
Entrust Corporation
Top related content
Webinar Recording
Digital Trust: Critical to Digital Business Success
Jun 02, 2021
2020 pushed the notion of trust to the forefront of all our lives. It made customer trust in brands acutely important to the bottom line amidst a severe economic recession. It also forced many organisations to overcome long-standing reservations about trusting their employees to work from home and placing their faith in digital channels to serve customers.
Webinar Recording
Zero Trust Through Identity-Based Segmentation
Jul 21, 2021
As workers become more mobile and workloads move into the cloud, the traditional model of enforcing security at the network perimeter becomes ineffective. A Zero Trust model of strict identity verification and access control for every user or workload offers an alternative that secures data while ensuring it is accessible to those who need it.
Webinar Recording
A DevSecOps Maturity Model for Secrets Management
Oct 07, 2022
Recent high-profile software supply chain attacks have highlighted the importance of security in the DevOps environment. But this can be challenging because DevOps teams are at the forefront of digital transformation and use agile techniques to deliver applications quickly, often not following traditional paths of identity management. Join experts from KuppingerCole Analysts and GitGuardian as they discuss security vulnerabilities in DevOps environments, which are often due to a lack of visibility and control of widely distributed secrets such as API keys, database passwords, cloud...
Webinar Recording
Protecting the Keys to Your Kingdom Against Cyber-Attacks and Insider Threats
Dec 15, 2015
Do you really know who and how many employees in your company use a privileged account? Are these accounts properly managed and secured? Answering just one of these questions with "no" or "don't know" puts the most valuable data assets of your enterprise at risk.
Webinar Recording
Maturing a Zero-Trust Strategy for the Extended Enterprise
Mar 19, 2021
In the digital era, a 20th century perimeter-based approach to security is no longer appropriate or effective in securing the modern extended enterprise. Instead, a more flexible, identity-based approach is required that can be implemented at every layer of IT, from devices and networks to applications and data.
Event Recording
Martin Kuppinger - Identity, Access, Security: The Fundaments for Digital Risk Mitigation in the Age of Transformation
May 14, 2015
The Digital Transformation of Business is unstoppable. It affects virtually all industries. The IoT (Internet of Things) is just a part of this transformation, at the technical level. However, without changing business models, organizations will not succeed. Furthermore, connecting things with apps and services is imposing new challenges. These include product security and liability issues, but also appropriately dealing with customer “big” data. Identity, Access, and Security become critical success factors for the Digital Transformation of Business. Martin Kuppinger talks...
Webinar Recording
In an Age of Digital Transformation Managing Vendor and Partner Identity Is Critical
Sep 18, 2020
Organizations have been managing the identity and access of employees for many years to protect data and the overall security of the enterprise. However, the onset of digital transformation has driven a need for faster, cost-effective innovation and with it the increased utilization of third-party resources. Consequently, organizations have a greater need to manage third-party access to data, systems, and facilities. This includes contractors, vendors but also partners, affiliates, volunteers, and even service accounts and bots. Modern organizations are much more collaborative and open...
Event Recording
Eric Wolff: Understanding Best Practices for Cloud Key Lifecycle Management
Jun 22, 2020
Cloud Security best practices arise from the shared responsibility model for cloud computing, which states that customers are responsible for the security of data in the cloud. This session will cover the latest trends in cloud security, cloud provider shared security models, and the use of data encryption as a best practice. With cloud encryption key lifecycle management seen by many as a problem yet to be solved, the session will wrap with an overview of CipherTrust Cloud Key Manager from Thales.
Webinar Recording
Mastering the Digitalization of Business: Digital Identities and the Cloud
Jan 20, 2015
How to make use of cloud services and digital identities of employees, partners, customer and things to leverage your business to the next level It is the combination of identity services, mobility support, and cloud services that allows organizations not only digitalizing their business, but keeping it secure anyway. It is about enabling business agility while not ending up with unprecedented risks. Combining business innovation with IT innovation, particularly around identities and the cloud, is the foundation for successfully mastering the digital revolution.
FAQ
Why should I register for a KuppingerCole webinar?
Join this combined presentation to gain quick insights and hands-on solutions from a KuppingerCole analyst and selected industry expert, finishing with by a comprehensive Q&A for your individual business challenges.
How can I register for this webinar?
To register for the webinar, you need to log in to your KuppingerCole account first. If you do not have an account yet, you can sign up here. After logging in, please enter your requested personal data which is necessary for the further administration of your registration. Once registered, a booking confirmation will be sent to your indicated e-mail address.
How long does the webinar last?
Our webinars last approximately 50-60 minutes.
I did not receive a booking confirmation. What can I do?
If you didn’t receive the booking confirmation in your inbox, please check your spam folder. If you cannot find the booking confirmation in your spam folder, please contact us. We will get back to you within one business day.
What technical equipment do I need?
To participate, you need a computer or a laptop with Internet access. If you want to use the sound transmission via the computer, you will need headphones (headset) or speakers. You do not need a webcam or microphone. You can type in questions in the chat window. In the registration confirmation you will also receive a link that allows you to test the technical requirements in advance.
What does it cost to attend?
Our webinars are generally free of charge.
When will the recordings and presentation slides be available? Will I get notified? How can I access them?
The recordings and presentation slides will be available on the website shortly after the webinar. An e-mail will be sent to all registered users. In order to access the materials, you will need to log in first.
I registered for the webinar, but unfortunately I was not able to attend live. Do I still get access to the recordings and presentation slides?
Yes, the recordings and presentation slides are made available to all users that registered for the webinar, regardless if they attended live or were tied up with business.