Name
Secure the Middle - SSH for CI/CD and Build Pipeline
Time
7:00 PM - 7:30 PM (EDT)
Description

SSH keys are the central linchpins that connect cloud platforms, CI/CD tools, and traditional on-premises development environments. As such, organizations rely heavily on SSH keys to identify and authenticate administrators and machines for all their critical business functions.
But manual management of SSH keys lacks the visibility and intelligence necessary to prevent security breaches. This could leave your organization vulnerable to failed audits and the potential for adversaries to exploit vulnerable SSH keys to gain access to critical systems. Risks like root access orphan keys, duplicate keys or shared private keys are rampant in most organizations, leaving them vulnerable to security breaches and failed audits.
Learn how to streamline and secure SSH key lifecycles, so they are optimized for development environments and reduce risks. Learn new ways to ensure systems continue to run smoothly and aren’t exposed to security breaches.

Kevin Jacque Cris Madrigal