On-demand Cryptography Webinars

Hardcoded Keys

April 6 2021
32:52

In this webinar, we will take a fresh look at the hardcoded key problem, working through some real case studies, and identifying strategies that are effective in eliminating them at scale.

WATCH WEBINAR ->

Certificate Outages (and how to avoid them)

February 5 2021
40:11

In this webinar we'll look at examples of real "rubber hits the road" issues with organising certificate management. We'll look at the various ways that a certificate can fall through the cracks of an automated process, taking examples from real world cases.

WATCH WEBINAR ->
Cloud crypto webinar

Cloud KMS | Cloud Crypto Comparison Part 1

October 2 2020
29:15

In this webinar we will be comparing the KMSs offered by Azure, AWS and Google Cloud. We will explain how the services differ and what impact that can have on someone wishing to deploy a multi-cloud solution.

WATCH WEBINAR ->
Cloud Crypto webinar

Cloud KMS | Cloud Crypto Comparison Part 2

October 23 2020
28:12

In this webinar we discuss why you might consider using a third-party cryptography service in your cloud deployment. Including key custody, security, performance, functionality from vendors like Unbound, Futurex, Utimaco, Fortanix, Hashicorp vault etc.

WATCH WEBINAR ->
Crypto Inventory webinar

Introduction to Building a Cryptography Inventory

October 16 2019
37:12

What is a Cryptography Inventory and why should you build one? In this webinar we also discuss how cryptography goes wrong, and how a cryptography inventory can help in mitigating these risks.

WATCH WEBINAR ->
Crypto inventory webinar

Scope & Coverage of a Cryptography Inventory

May 25 2019
30:47

In this webinar we’ll show you how to define the objectives and scope of your inventory project, including coverage for: algorithms, keys, certificates, protocols, providers/libraries. We’ll also talk about how to automate these processes.

WATCH WEBINAR ->

Crypto Failures | Breaches Causes & Consequences

February 10 2020
27:34

In this webinar we show the different ways cryptography can be subverted by attackers and look at real case studies of breaches. We’ll examine the exact cause of the weakness in the way cryptography was deployed, and the consequences and impact for the company that was breached.

WATCH WEBINAR ->
Crypto failures webinar Part 2

Crypto Failures | Deep Dive

March 25 2020
25:19

We deep dive into the causes of several high-profile crypto breaches, including: Marriott, where partial use of encryption lead to more than 5 million passport numbers being extracted in the clear, the Ericsson outage caused by an expired certificate, and the Oracle Weblogic server incident.

WATCH WEBINAR ->
Joint webinar with Unbound Tech

Cloud Migration Challenges and Mitigations

April 15 2020
28:33

In this webinar, Cryptosense’s CEO, Graham Steel, and Unbound Tech’s VP R&D, Guy Pe’er, will discuss the common challenges of cloud migration specifically, for IaaS.

WATCH WEBINAR ->