Skip to main content
banner image
venafi logo

CISO Viewpoint: Is Your Certificate Management Program Reactionary?

CISO Viewpoint: Is Your Certificate Management Program Reactionary?

certificate management, keys, breaches
January 10, 2017 | Shelley Boose

We recently interviewed John Graham, CISO at global manufacturer Jabil. We wanted to learn the role key and certificate management plays in managing his cryptographic risk posture.

The Jabil CISO suggests that organizations take a proactive role in discovering the scope and potential weakness in managing keys and certificates. This approach will allow you to address any weak areas before they impact your business.

He then shares the top three mistakes that many organizations make around digital certificate management. Find out if your organization may have overlooked any of these weak spots.

Watch the video below to see what motivated CISO John Graham to become more proactive about managing keys and certificates. 

 

Learn how key and certificate security can give you the visibility you need to proactively avoid outages and breaches. Contact us.

Like this blog? We think you will love this.
Image of ZenDesk sign on front of their headquarters in San Francisco, California
Featured Blog

The ZenDesk Breach and What It Says about TLS Certificates

ZenDesk discovered the breach o

Read More
Subscribe to our Weekly Blog Updates!

Join thousands of other security professionals

Get top blogs delivered to your inbox every week

See Popular Tags

You might also like

CIO Study: Certificate-Related Outages Continue to Plague Organizations
White Paper

CIO Study: Certificate-Related Outages Continue to Plague Organizations

Forrester Consulting Whitepaper: Securing the Enterprise with Machine Identity Protection
Industry Research

Forrester Consulting Whitepaper: Securing the Enterprise with Machine Identity Protection

Machine Identity Protection for Dummies
eBook

Machine Identity Protection for Dummies

About the author

Shelley Boose
Shelley Boose

Shelley is Director of PR and Content Marketing at Venafi. In her own words, "I help companies translate complex technologies into engaging and compelling, digital stories."

Read Posts by Author
get-started-overlay close-overlay cross icon
get-started-overlay close-overlay cross icon
Venafi Risk assessment Form Image

Sign up for Venafi Cloud


Venafi Cloud manages and protects certificates



* Please fill in this field Please enter valid email address
* Please fill in this field Password must be
At least 8 characters long
At least one digit
At last one lowercase letter
At least one uppercase letter
At least one special character
(@%+^!#$?:,(){}[]~`-_)
* Please fill in this field
* Please fill in this field
* Please fill in this field
*

End User License Agreement needs to be viewed and accepted



Already have an account? Login Here

×
get-started-overlay close-overlay cross icon

How can we help you?

Thank you!

Venafi will reach out to you within 24 hours. If you need an immediate answer please use our chat to get a live person.

In the meantime, please explore more of our solutions

Explore Solutions

learn more

Email Us a Question

learn more

Chat With Us

learn more
Chat