Skip to main content
banner image
venafi logo

CISO Viewpoint: Why Get Serious about Your Cryptographic Risk Posture?

CISO Viewpoint: Why Get Serious about Your Cryptographic Risk Posture?

February 17, 2017 | Shelley Boose

Keys and certificates tend to be the unsung heroes in the security world. They play a vital role in authenticating machine-to-machine communications. Unlike their popular cousins, passwords, keys and certificates don’t seem to get the airtime that they deserve. Eventually, that validation does come, but often not until after an event such as a breach or outage.

We wanted to find out what tips the scale for IT security leaders. So, we asked three Fortune 1000 CISOs what made them decide to get serious about managing their cryptographic risk posture. Find out what influenced them to act immediately to strengthen management and security for their keys and certificates.

Watch the video below to see what motivated these Fortune 1000 CISOs to become more proactive about managing keys and certificates. 



Are you ready to strengthen management for your cryptographic risk posture?   Contact us.

Subscribe to our Weekly Blog Updates!

Join thousands of other security professionals

Get top blogs delivered to your inbox every week

See Popular Tags

You might also like

Spectre and Meltdown vulnerabilties

How to Prevent Meltdown and Spectre from Compromising Machine Identities

two men sitting across the table talking, one facing the screen, one facing backwards

CISO Viewpoint: How Important is Effective Key and Certificate Management to Cyber Security?

21% of websites use SHA-1

21% of Websites Still Use SHA-1. Don’t They Know It’s Broken?

About the author

Shelley Boose
Shelley Boose

Shelley is Director of PR and Content Marketing at Venafi. In her own words, "I help companies translate complex technologies into engaging and compelling, digital stories."

Read Posts by Author
get-started-overlay close-overlay cross icon
get-started-overlay close-overlay cross icon
Venafi Risk assessment Form Image

Sign up for Venafi Cloud

Venafi Cloud manages and protects certificates

* Please fill in this field Please enter valid email address
* Please fill in this field Password must be
At least 8 characters long
At least one digit
At last one lowercase letter
At least one uppercase letter
At least one special character
* Please fill in this field
* Please fill in this field
* Please fill in this field

End User License Agreement needs to be viewed and accepted

Already have an account? Login Here

get-started-overlay close-overlay cross icon

How can we help you?

Thank you!

Venafi will reach out to you within 24 hours. If you need an immediate answer please use our chat to get a live person.

In the meantime, please explore more of our solutions

Explore Solutions

learn more

Email Us a Question

learn more

Chat With Us

learn more