PKI today is ubiquitous – it’s in the cloud, it’s on the manufacturing floor, it’s everywhere. Why? Because, in a Zero Trust world, every device, every workload, and every connected thing must be authenticated and verified. However, PKI has become incredibly complex to manage. Different teams and applications have unique trust requirements, use cases, technical and security needs, creating a distributed fabric of PKI tools and infrastructure. Join us to discover best practices for managing “decentralized PKI” and how to consolidate where possible.
Explain how the usage of PKI has evolved and expanded.
Identify new threats, regulatory mandates, and changes to PKI.
Recognize key considerations for different PKI and CA tools.