Our website uses cookies

Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing Infosecurity Magazine, you agree to our use of cookies.

Okay, I understand Learn more

Encryption: The Good, The Bad & The Ugly

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up for your’s below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in out online comments.
Your password should be at least six characters long. It is case sensitive. Passwords can only consist of alphanumeric characters or ~!@#$%^&*()_-+=?.<>

By registering you agree with our terms and conditions and privacy policy.

Co-Sponsored by HANDD & SSH Communications Security

Sloppy management of authentication keys for SSH, an encryption protocol used for automation in IT systems, risks catastrophic IT failure in banks, government and industry.  Most organisations have no process for managing, removing, and changing access-granting keys. This violates SOX, FISMA, PCI, and HIPAA, all which require proper control of access to servers and proper termination of access.  
 
A cyber weapon or virus using SSH keys to spread could destroy IT infrastructure and online data of an enterprise or government agency within minutes.   Similar attacks were first used by the Morris worm, which took down the Internet in 1988. 
 
This webinar focuses on SSH user key remediation as a process and  will outline a basic process and set of tools which can be utilized to identify the existing trust relationships in your environment, bring legacy keys under control, and automate the creation, deployment, rotation and removal of keys.
 
This webinar will: 
 
  • Look at the consequences of poorly managed SSH keys  and risky insiders 
  • Consider how ands why IT security auditors are overlooking this problem 
  • Educate the audience about SSH key audits and remediation
  • Advise how to save costs and increase performance with correctly managed SSH keys. 
  • Outline a process and set of tools which can be utilized to identify existing trust relationships
 

 

 

Speakers

Matthew McKenna

CEO & Executive Vice President, SSH Communications

    Bob Tarzey

    Analyst and Director, Quocirca

    Brought to You by