Encryption: The Good, The Bad & The Ugly

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

Co-Sponsored by HANDD & SSH Communications Security

Sloppy management of authentication keys for SSH, an encryption protocol used for automation in IT systems, risks catastrophic IT failure in banks, government and industry.  Most organisations have no process for managing, removing, and changing access-granting keys. This violates SOX, FISMA, PCI, and HIPAA, all which require proper control of access to servers and proper termination of access.  
A cyber weapon or virus using SSH keys to spread could destroy IT infrastructure and online data of an enterprise or government agency within minutes.   Similar attacks were first used by the Morris worm, which took down the Internet in 1988. 
This webinar focuses on SSH user key remediation as a process and  will outline a basic process and set of tools which can be utilized to identify the existing trust relationships in your environment, bring legacy keys under control, and automate the creation, deployment, rotation and removal of keys.
This webinar will: 
  • Look at the consequences of poorly managed SSH keys  and risky insiders 
  • Consider how ands why IT security auditors are overlooking this problem 
  • Educate the audience about SSH key audits and remediation
  • Advise how to save costs and increase performance with correctly managed SSH keys. 
  • Outline a process and set of tools which can be utilized to identify existing trust relationships




Photo of Matthew McKenna

Matthew McKenna

CEO & Executive Vice President, SSH Communications

Photo of Bob Tarzey

Bob Tarzey

Analyst and Director, Quocirca

Brought to you by

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see Infosecurity Magazine’s privacy policy for more information.