Special Offer: Get 50% off your first 2 months when you do one of the following
Personalized offer codes will be given in each session
WEBINAR ENDED

PKI Threat Detection and Recon: Code Signing - “The Signed Back Door” & Voldemort

About This Webinar

Join us for an hour of Live Q&A at our PKI Solutions "Office Hours." - The PKI Threat Detection and Recon: Code Signing - “The Signed Back Door” & Voldemort Episode

A default check box or a PKI misconfiguration can give adversaries access to a code signing certificate or they can just create their own. As a result, the bad guys can setup a back door that evades detection.

Harry Potter fans know Tom Riddles Diary was a sneaky backdoor that almost got Ginny killed.

Join Shawn Rabourn, our in-house PKI wizard for our webinar that will get into:

1. Threat modeling basics: your business, Public Key Infrastructure, and adversarial POV
2. Kinds of misconfigurations that can lead to signed backed doors and malicious code signing
3. How antivirus software will just trust malware and treat it as legit – like putting Fluffy to sleep
4. PKI Best Practices and hardening measures you can take
5. How PKI Spotlight can monitor code signing certs and associated events to get notified of threats in real time

Harry Potter fans come prepared to WIN! You WILL be quizzed on PKI Threat Detection and Recon. (And also Harry Potter trivia)

Please bring your questions and concerns about this topic.

You will have an opportunity to ask us anything within the webinar's chat function.

Even if you think you have 100% of your threat detection, recon and code signing issues handled by the right staff with the right skillset, there are OFTEN issues that slip through the cracks. We will discuss those here.

If you are facing challenges with your PKI and have issues with code signing, threat detection, recon, remote access, availability, scale, and management, we are here to help.

- Shawn Rabourn, CTO, PKI Solutions
- Mark B. Cooper, president and founder, PKI Solutions, aka The PKI Guy

Feel free to send your questions in advance to thepkiguy@pkisolutions.com.

Agenda
  • Threat modeling basics: your business, Public Key Infrastructure, and adversarial POV
  • Kinds of misconfigurations that can lead to signed backed doors and malicious code signing
  • How antivirus software will just trust malware and treat it as legit – like putting Fluffy to sleep
  • PKI Best Practices and hardening measures you can take
  • How PKI Spotlight can monitor code signing certs and associated events to get notified of threats in real time
  • Q&A
Categories:
BUSINESS & FINANCE SCIENCE & TECH
Who can view: Everyone
Webinar Price: Free
Featured Presenters
Webinar hosting presenter
CTO, PKI Solutions
Shawn brings over two decades of full-range information security and identity management experience in engineering, design, and architecture roles. His background includes time in the trenches with Azure, Active Directory, Certificate Services/Public Key Infrastructure, Identity Management, Enterprise Governance and Risk Management, Business Continuity, and Compromise Response.
Webinar hosting presenter Mark Cooper
President and founder of PKI Solutions
Mark B. Cooper, president and founder of PKI Solutions, is known as “The PKI Guy” since his early days at Microsoft. He has deep knowledge and experience in all things Public Key Infrastructure (PKI). PKI Solutions Inc. provides consulting, training — including online training — and implements software solutions for Microsoft PKI and related technologies at enterprises, many of them Fortune 500 companies. PKI Solutions has led hundreds of PKI trainings, including private trainings, across the country and around the world. Cooper is an avid proponent of the SHAKEN/STIR global standard to end robocalls, that uses authentication and PKI to verify callers’ identities. Prior to founding PKI Solutions, Cooper was a senior engineer at Microsoft, where he was a PKI and identity management subject matter expert who designed, implemented, and supported Active Directory Certificate Services (ADCS) environments for Microsoft’s largest customers.
Hosted By
PKI Solutions webinar platform hosts PKI Threat Detection and Recon: Code Signing - “The Signed Back Door” & Voldemort
Helpful insights and guidance from the PKI Solutions team
Documents
Attended (111)
Recommended