Skip to main content
banner image
venafi logo

Black Hat 2016: Your Security Foundation Crumbles If Hackers Compromise Your Keys and Certificates

Black Hat 2016: Your Security Foundation Crumbles If Hackers Compromise Your Keys and Certificates

July 26, 2016 | Jennifer Carole
Key Takeaways
  • Visit our booth: #854 – enter to win a $50 Amazon gift card and earn a Starbucks card by completing our survey
  • On Aug 4, eat breakfast or lunch while you learn about how to secure your keys and certificates. At 9am and noon at Mandalay Bay Breakers H
  • See what you need to know to protect the foundation of your security: our hot list is below

Cybercriminals are targeting your organization with attacks that misuse keys and certificates to infiltrate your network. And you can’t detect them because they are hiding in encrypted traffic. In fact, Gartner predicts that by 2017, 50% of network attacks will use TLS. Yet, many organizations do not realize the severity of this threat.

90% of CIOs admit their current security isn’t effective

In a new study, CIOs admit they are wasting millions of dollars on layered security defenses, because these tools blindly trust keys and certificates.

The bad guys are using stolen, compromised, or forged keys and certificates not only to evade detection, but to achieve authentication and trusted status that circumvents other security controls and allows their actions to remain hidden.

Want to understand the real risk?

Venafi will show you how bad it can get. Our gameshow - “Are You Smarter than a Bad Guy?” -  will show how your security foundation is built on a system of trust that relies on keys and certificates. Brick by security-enhanced brick, we build a wall of metaphorical security systems that rest on your keys and certificates. This wall of bricks illustrates how the smallest compromise of that foundation (a hijacked key or certificate) can cause the whole system to come tumbling down.

Here’s what we’ll be talking about:

  • The Venafi Platform: if you’re building a strong global security foundation - we’ll show you how bad guys can still get in.
  • Eliminating TLS/SSL Blind Spots: if you think your cryptographic keys and digital certificates aren’t a risk - we’ll explain why they make you vulnerable.
  • Securing FAST IT: here’s how we bring DevOps into compliance without slowing their process.
  • Migrating to SHA-2: you don’t need to pay an analyst to tell you it’s time; we’ll help you migrate easily so your business isn’t affected.

We want to meet with you

Black Hat is a noisy, exciting, busy place. We want to make sure we make your to-do list and we have several ways to do just that. Here’s how you can find us. ​

  • Win a $50 Amazon Gift Card: Venafi Game Show
    Are you smarter than a bad guy? Are you betting your cybersecurity?

    Every 30 minutes at Booth 854
     
  • Join a Cybersecurity Workshop
    “How to Get More from Your Security Investment: Protect Keys and Certificates”

    Find out about the foundation of online security, changes in the threatscape resulting in the misuse of keys and certificates, how bad guys bypass your security controls and trategies that you can implement to address new threats.

    • Breakfast: 9 am – 10 am
      Thursday, August 4 | Mandalay Bay, Breakers H

    • Lunch: 12:00 – 1:00 pm
      Thursday, August 4 | Mandalay Bay, Breakers H 

Are Hackers Targeting Your Keys and Certificates?

It’s one of the hottest new ways to spoof websites, deploy malware, and steal data. Stop by booth #854 to visit with experts and see our latest innovations. Or contact us to learn more. 

Like this blog? We think you will love this.
woman with face down on desk, computer screen nearby
Featured Blog

How Americans Scored on Their Encryption Exam–And Why We Should Care [Encryption Digest 15]

Read More
Subscribe to our Weekly Blog Updates!

Join thousands of other security professionals

Get top blogs delivered to your inbox every week

See Popular Tags

You might also like

CIO Study: Certificate-Related Outages Continue to Plague Organizations
White Paper

CIO Study: Certificate-Related Outages Continue to Plague Organizations

Forrester Consulting Whitepaper: Securing the Enterprise with Machine Identity Protection
Industry Research

Forrester Consulting Whitepaper: Securing the Enterprise with Machine Identity Protection

Machine Identity Protection for Dummies
eBook

Machine Identity Protection for Dummies

About the author

Jennifer Carole
Jennifer Carole
Read Posts by Author
get-started-overlay close-overlay cross icon
get-started-overlay close-overlay cross icon
Venafi Risk assessment Form Image

Sign up for Venafi Cloud


Venafi Cloud manages and protects certificates



* Please fill in this field Please enter valid email address
* Please fill in this field Password must be
At least 8 characters long
At least one digit
At last one lowercase letter
At least one uppercase letter
At least one special character
(@%+^!#$?:,(){}[]~`-_)
* Please fill in this field
* Please fill in this field
* Please fill in this field
*

End User License Agreement needs to be viewed and accepted



Already have an account? Login Here

×
get-started-overlay close-overlay cross icon

How can we help you?

Thank you!

Venafi will reach out to you within 24 hours. If you need an immediate answer please use our chat to get a live person.

In the meantime, please explore more of our solutions

Explore Solutions

learn more

Email Us a Question

learn more

Chat With Us

learn more
Chat