On-Demand Webinars

Watch and share recorded webinars


Turnkey Certificate-based Security Extension for ThingWorx IoT Platform Users

When does IoT risk become real? Immediately after allowing for the collection and transmission of functional data leveraged for descriptive, predictive, and prescriptive action across all industries and critical infrastructure. Only when a device collecting or transmitting that data carries a unique identity – a device certificate – can we ensure secure validation of device, data, and code. A shared token or key, or plain-text passwords, cannot provide that security assurance level. CMS VerdeTTo Security Access Valve enables ThingWorx IoT platform users to establish their own dedicated IoT Directory and build a high assurance security model based on trusted identity and certificates. Alternatively, VerdeTTo integrates an organization’s already established dedicated IoT Directory and Root of Trust with their ThingWorx IoT platform, enabling certificate-based authentication and granular authorization for every device connection. 

Download the presentation


Cloudy with a chance of PKI

Cloud computing has revolutionized the IT industry with increased efficiency, cost reduction and enhanced security. However, IT security professionals are often still leery of sending critical and complicated systems, such as Public Key Infrastructure (PKI), to the cloud. Enrollment, group policies, disparate processes and applications surrounding PKI made it historically difficult and dangerous to securely execute a fully hosted solution. With new technical implementation models and advances in compliance and security regulations, leveraging certificates with cloud based services can allow companies to execute more quickly, upgrade their security posture, and focus on business critical capabilities.

Download the presentation


2017 PKI & IoT Security Predictions

In 2017, Public Key Infrastructure (PKI) will continue to solidify its place as a fundamental digital identification, authentication and encryption standard—especially as the Internet of Things (IoT) evolves and security concerns heighten. The need for trusted digital identities will become paramount to the overall security of the Internet. As businesses attempt to secure the IoT, PKI is re-emerging as a cost-effective and proven technology that delivers a secure and high-performance solution.

Download the presentation


Public Key Infrastructure (PKI) Implementation Management Best Practices

Today’s evolving cyber security landscape demands the high assurance, scalability and security of digital certificates issued from a trusted Public Key Infrastructure (PKI) to successfully secure enterprises. However, an effective PKI can be difficult to implement and manage without knowledgeable and dedicated resources in-house. Although attempting a deployment on your own sounds appealing and more cost effective, the key to a successful PKI implementation is fully understanding the entirety of the project before beginning. By outlining each critical task up front, it’s easy to quickly realize the importance of enlisting dedicated resources to assist with the entire process from day one.

Download the presentation


Avoiding the Pitfalls of Digital Certificate Templates

Microsoft® enterprise certificate authorities (CAs) can be set up easily. The challenge comes with efficiently managing the complexity of the supporting PKI environment to ensure long-term certificate trust. Many use digital certificate templates to help manage certificate format and content and automate enrollment processes across a host of use cases. While the templates are powerful tools to ensure that the appropriate subscribers have access to the correct certificates through an authorized enrollment method, pitfalls exist related to template creation, configuration and management that can result in broken PKI trust and assurance.

Download the presentation


Digital Certificates - Rx for Embedding Security into Vulnerable Healthcare Systems

The healthcare sector continues to build some of the largest, lucrative and vulnerable stores of data, making them attractive targets for cyber criminals. Malicious actors are more prevalent, organized and creative in their attacks on vulnerable vectors. While HIPAA security rules have long been in place, compliance continues to move at a snail’s pace and those responsible for product innovation are being forced to pay closer attention to security, IT, legal, risk and regulatory considerations earlier in the development life cycle. Many organizations are also having to revisit those same considerations for products and services already in use to satisfy regulatory or compliance requirements, remediate an issue, preserve reputation and promote a competitive advantage.

Download the presentation


Beyond Certificate Management - PKI Operations Management for the Enterprise

As enterprise and IoT certificate usage continues to increase, many have made the leap from unmanaged certificates, to tracking with a spreadsheet, to implementing certificate management software.  While automating the certificate lifecycle with software is a good first step, the backbone Public Key Infrastructure (PKI) and the operations that support this crucial IT service must be enhanced to ensure it continues to maintain the intended level of trust in the organization.

Download the presentation


Controlling your certificates and SSH user keys

Experts from Certified Security Solutions and SSH Communications Security join forces to outline common enterprise challenges, risks, and best practices related to controlling digital certificates and SSH user keys. Join Certified Security Solutions' CTO Ted Shorter and SSH Communications Security's Chief Strategy Officer Matthew McKenna as they share their insight and understanding to help companies efficiently and effectively manage certificates and SSH user keys.

Download the presentation


Mid-Year Update: 2016 PKI & IoT Security Predictions

In 2016 digital identity usage has grown exponentially across the global Internet. As businesses continue to brace against cyber adversaries and look to secure the Internet of Things (IoT), Public Key Infrastructure (PKI) is continuing to prove that it is an economical and reliable technology that delivers a secure and high-performance solution. Learn what’s changed since last December’s “Top Six PKI and IoT Security Predictions.” 

                    Download the presentation            


PKI - The New Set of Best Practices

Are your certificates really secure? Will they pass an audit? Learn why legacy PKI installations and digital certificates that sit unattended may fail to pass modern security audits and regulatory compliance. The complexity and speed of regulatory requirements outpace today’s PKI environments and place many organizations at great risk. Chris Hickman, VP of Managed Services at CSS, will present the common weaknesses of PKI implementations and how organizations are addressing these concerns to meet increased audit and compliance scrutiny.

                    Download the presentation


SHA-2 Upgrade Planning Considerations

SHA-1 digital certificates are no longer being issued and are scheduled to reach their end-of-life before January 1, 2017. Continued use of SHA-1 places your organization in a cryptographically insecure position against cyber adversaries.   

During the Digital Identity Insights webinar, hosted by Wayne Harris, Principal Consultant at CSS, you will learn the top five considerations for moving your organization from SHA-1 to SHA-2. 

                    Download the presentation            


Digital Certificates - A Critical Line of Defense Against Cybercrime

Digital certificates are a critical line of defense against cybercrime. From authenticating traditional user endpoints to enabling trusted e-commerce purchases, digital certificates and the public key infrastructure (PKI) that issues them create a high assurance foundation for digital security when implemented correctly.

Partnering to provide best-in-class PKI solutions, Certified Security Solutions (CSS) and Thales e-Security invite you to a live webinar to discuss digital certificate use cases, the security threat landscape and resolutions to dangerous enterprise problems putting your company at risk for costly outages and data breaches.

                    Download the presentation            


PKI for IoT: Not Your Average Enterprise PKI

Digital certificate usage is growing as innovators recognize their value in authentication, encryption, and signing related to identities, data, and devices tied to IoT/IoE and the Industrial Internet. Robots on the plant floor, smart light bulbs, implanted medical devices, software, and sensitive data all need protection. In the evolving world of IoT, digital certificates provide an additional layer of security that is not only cost-effective and efficient, but also scales to meet high volume requirements while only consuming a small footprint on a network stack.

As purchasing a high volume of third-party digital certificates is not cost-effective, more and more organizations are establishing their own Certificate Authority (CA) and managing their own Public Key Infrastructure (PKI) to support trusted certificate issuance for a growing world of IoT devices. While the steps involved in setting up your own CA may seem like a cake walk, your specific PKI environment is what’s critical to ensuring your certificates are always trusted for your specific use cases. A PKI established to help secure enterprise systems will be vastly different from an IoT-specific PKI.

                    Download the presentation            


Digital Certificate Management Best Practices

Digital certificates aren’t just for enterprise systems anymore. With the increased usage of digital certificates to authenticate digital identities tied to IoT/IoE and Industrial Internet devices, many organizations are experiencing growth in their store of digital certificates – from a handful – to millions. With this growth, organizations are also experiencing a surge in digital certificate-related outages and breaches, fueling an emerging awareness of the importance of managing a growing world of digital certificates.

                    Download the presentation            


Digital Identity Insights: Dangerous Access

Join digital identity expert Chris Hickman for a review of the current state of the Internet of Things (IoT) from a security perspective and the critical role that digital identity authentication has in helping companies secure consumer-facing technology. This webinar is a fit for anyone involved with planning for the design of security features in upcoming products or those interested in ways to boost the security of existing products.

    Download the presentation             

PKI Top Trends

Is your Public Key Infrastructure (PKI) running on a 2003 or 2008 server? Are you interested in upgrading to 2012 R2? Even better, having someone entirely manage it for you?

Security vulnerabilities such as Heartbleed and the deprecation of SHA-1 put the need for a solid enterprise certificate management strategy as a top priority. Challenges surrounding certificate expirations, manual upgrades and issuing certificates to devices at the edge of your network are elongating cumbersome day-to-day tasks, placing increasing pressures on an already swelling list of IT management responsibilities. Certified Security Solutions, Inc. (CSS) facilitates a proper infrastructure build, integrates PKI-enabled applications, and manages the lifecycle of digital certificates. Our PKI experts assist organizations in developing, delivering and maintaining strong public key infrastructures that provides long-term value. Taking into account your business goals and needs, as well as current assets and capabilities, CSS’ PKI solutions are designed to meet the appropriate assurance requirements including the increasingly important multi-part control and secure key storage, while avoiding undue operational burden on IT personnel and budget.

SHA-1 The Beginning of the End

By now, you may have already heard that Microsoft will start deprecating trust in certificates with SHA-1 signatures in 2016. In our view, this is a prudent move by Microsoft. We’ve long known that SHA-1 was weakening, and showing signs that a practical attack could appear in the next few years.

But what does this mean for your digital certificates and PKI? Is there anything you should be doing about it?

Watch this webinar recording to learn the ramifications around Microsoft’s decision to retire SHA-1 signed certificates, and suggested steps to ensure the continued health of your digital certificate usage, whether purchased from a provider or issued from your own CA.