Are These The Droids You’re Looking For - Bringing Balance to Application Identities

May 10, 2023

If the entire security industry warped into a Galaxy Far, Far, Away, are we wrong to think that Identity Security would be the force that surrounds us? We know who the human players are – but what about droids? Are they human? Non-human?

Join us for a special presentation on finding the balance of controls between human and non-human identities. Did you know 98% of all identities are non-human right now? Our team will share how to apply human-centric controls like strong authentication and least privilege to machine identities while maintaining speed and positive developer experience.

We’ll share how to secure the enterprise with:
-Non-human secrets rotation and machine identity
-Removing hardcoded credentials from applications, scripts, and other code
-Kubernetes integrations for Conjur

Previous Video
DevOps Tools are the Weak Link for Software Supply Chain Security: Here’s a Fix
DevOps Tools are the Weak Link for Software Supply Chain Security: Here’s a Fix

Puppet, Chef, Ansible, and others are great for developers but pose serious risk.

Next Article
Workforce Password Management — Security Details and Architecture
Workforce Password Management — Security Details and Architecture

This document provides an overview of security architecture, procedures as well as security principles foun...