Exhibit Hall Demonstration: The Rise of Machine Identity Challenges in Technology Modernization

  • Room: West Hall, Aisle 600
Tuesday, September 25, 2018: 2:20 PM - 2:35 PM

Speaker(s)

Speaker
Steve Briley
Federal Solution Architect
Venafi

Description

There are two kinds of actors on every network—people and machines—and both need to be authenticated before allowing access to services and data. People rely on usernames, passwords, smart cards, and biometrics to access machines, but machines, like web servers, applications, cloud services, and containers, don’t use these methods of identification. They use keys and certificates for machine-to-machine authentication. The use of machines is driving unprecedented improvements in agency efficiency, productivity, agility and speed. With technology modernization increasing reliance on machines, the number of machines on agency networks is growing exponentially. To communicate securely, each machine needs a unique identity to authenticate and secure communications. However, agencies’ abilities to create, manage and protect these machine identities is simply not keeping up with the pace of their evolution. Billions are spent each year on ICAM/IdAM solutions, but virtually all of it is dedicated to securing human access with almost nothing on protecting machine identities. Cyber criminals take advantage of the lack of investment in machine identity protection. Simply put: machine identities are a lucrative target for cyber criminals. Nefarious actors use unprotected keys and certificates to eavesdrop on private communications, make phishing sites or malicious code look valid, and hide their nefarious activity in encrypted traffic—getting malware in and sensitive data out. In this demonstration, we will look at the different types of machines identities and where they proliferate in your network. We will see the role and life cycle of machine identities, and where we are falling short in protecting them. We will then look at where there are current risks as well as where new risks are emerging. We will conclude with steps you can take immediately to get these risks under control. What participants will learn: - They will know what comprises machine identities and how these relate to human identities in the digital world - They will understand the changing definition of “machine” and the factors causing machine growth - They will know current risks that leverage unprotected machine identities, and real-world examples of business impacts - They will recognize where most agencies are falling short in protecting machine identities - They will be able to create a customized roadmap that considers the emerging risks to machine identities.