Key Management

Discover the latest collection of talks and videos on Key Management from industry experts.

Recent talks on Key Management

Take Control of Your Email Security: Leveraging AWS KMS for Complete Encryption Key Control
Channel Logo

Take Control of Your Email Security: Leveraging AWS KMS for Complete Encryption Key Control

Email remains the lifeblood of organizational communication—and the weakest link in your security chain if not encrypted properly. Are you in control of your
encryption keys, or are you leaving critical decisions—and risks—in someone else’s hands? Join Echoworx and AWS for a deep exploration into how managing
your own encryption keys (MYOK) with AWS Key Management Service (AWS KMS) can redefine your email security. Gain complete control without sacrificing…

Integrate mainframe development with Jira, ServiceNow and other modern applications—it’s key to accelerated development
Channel Logo

Integrate mainframe development with Jira, ServiceNow and other modern applications—it’s key to
accelerated development

Your mainframe systems are critical, but when agile teams work in Jira without visibility into them, you're leaving major gaps in planning and execution. How
much longer can you afford this disconnect? Join Lance Knight, Value Stream Architect and former ConnectALL CEO on March 27 for a live talk and demo on
bringing mainframe development into the agile value stream using ConnectALL. You'll discover: 1. How easy it is to automate Endevor with modern applica…

Transform Federal IT with Secure, Automated Endpoint Management
Channel Logo

Transform Federal IT with Secure, Automated Endpoint Management

Federal IT leaders face unprecedented challenges: managing an increasing number of dispersed endpoints, maintaining security protocols, and meeting
ever-evolving compliance standards. NinjaOne, a FedRAMP®-ready endpoint management solution, is purpose-built to simplify and automate the most
complex aspects of IT operations—all while adhering to high levels of security and compliance demanded by federal agencies. Join us to discover the trans…

Security Foundation: Why your cloud keys matter and how to manage them in cloud.
Channel Logo

Security Foundation: Why your cloud keys matter and how to manage them in cloud.

Protecting your sensitive data in the cloud is paramount, and encryption at rest is a critical component of a robust security posture. However, navigating the
various options and choosing the right strategy can be complex. This talk provides an overview of encryption of data at rest in Cloud. We’ll review the factors
that affect when you should own and control your own keys, and the differences between the different Google Cloud offerings. Join this webinar to learn: …

Key Tools to Strive for Better Distribution Strategy and Operations with Acumatica
Channel Logo

Key Tools to Strive for Better Distribution Strategy and Operations with Acumatica

The fast-paced distribution landscape can be overwhelming if you’re still using outdated, disjointed business management systems. Learn how Acumatica can
transform your distribution operations with streamlined inventory management, sales orders processing, and more. Discover the current challenges in the
distribution industry, such as supply chain disruptions, rising operational costs, and labor shortages Learn about Acumatica Customer Wilmar’s journey with…

Securing API Keys: The Hidden Threat Behind the U.S. Treasury Department Breach
Channel Logo

Securing API Keys: The Hidden Threat Behind the U.S. Treasury Department Breach

In December 2024, a breach within the U.S. Treasury Department was traced back to a compromised API key. This attack underscores a growing security
vulnerability that many organizations overlook: unprotected API keys. API keys serve as digital passwords for applications, but when left unsecured, they
provide attackers with easy access to sensitive systems and data. In this informative webinar, we will dive into the critical role that API keys play in modern …

Consolidating ITFM And FinOps Practices
Channel Logo

Consolidating ITFM And FinOps Practices

The right digital investments can spur growth for your organisation. But if you do not have the insights to help you determine what the right investments are,
then where do you start? In this panel discussion, experts from a variety of industries - including the CFO from Microsoft SA, will dive deep into some of the
key trends and topics shaping IT Financial Management (ITFM) in 2024. By watching, you will hear first-hand from panelists at organisations like ABSA, Exper…

MetriSight Ep.78 - Key Takeaways from EC25
Channel Logo

MetriSight Ep.78 - Key Takeaways from EC25

Metrigy analysts share what most piqued their interest among the myriad customer experience- and workplace colloboration-related announcements and
conversations at Enterprise Connect 2025.

Coming up next

Smarter Pen Testing with Threat Intel
Channel Logo

Smarter Pen Testing with Threat Intel

Traditional penetration tests often miss the mark, failing to replicate the real-world tactics of today's sophisticated threat actors. In this session, Alex Holden,
CISO of Hold Security, cuts through the noise and reveals how to transform your pen testing program with actionable threat intelligence. You'll discover the
latest attack trends and learn practical methods to simulate realistic cyber threats against your own defenses. From vulnerability exploitation to ransomwar…

Turning Incidents into Insights: A Product-Led Approach to Incident Response
Channel Logo

Turning Incidents into Insights: A Product-Led Approach to Incident Response

From data breaches to ransomware attacks, the cost of cybercrime is skyrocketing, demanding a new approach to security. Playing defense is no longer
enough. Organizations need to anticipate threats and build resilience into their systems. CISOs and security leaders face immense pressure to stay ahead
of the curve and build resilient organizations capable of withstanding and recovering quickly from security breaches. A product-led approach offers a proac…

Value Stream Networks Powered by DevOps
Channel Logo

Value Stream Networks Powered by DevOps

Value stream networks provide insight into areas for improvement and indicate where teams can optimize workflows and help drive business value. In this
month's episode, Helen Beal and guests take a look at how value stream networks and DevOps can work symbiotically.

DevOps Operating in a Hybrid Project/Product World
Channel Logo

DevOps Operating in a Hybrid Project/Product World

When product and project management are brought into the DevOps lifecycle, businesses can unlock competitive advantages. In this episode, Helen Beal
and guests get together to share the initial challenges of working closer together, give advice on how teams can overcome these hurdles, and look at the
benefits that lay waiting on the other side.

Securing Financial Institutions: Navigating the Next Wave of Cyber Threats
Channel Logo

Securing Financial Institutions: Navigating the Next Wave of Cyber Threats

Join us for an engaging fireside chat as we explore the evolving cyber threat landscape targeting the financial sector. We'll discuss key insights into the rise in
DDoS attacks, AI-driven bot traffic, and sophisticated phishing campaigns. Learn how attackers are leveraging AI to bypass defenses and execute deepfake
phishing, and understand the impact of prolonged DDoS-as-a-Service and hacktivist campaigns. We'll also dive into the credential stuffing economy, reveali…

Protecting Against Threats: Advanced Anomaly Detection and Malware Scanning
Channel Logo

Protecting Against Threats: Advanced Anomaly Detection and Malware Scanning

Are you concerned about emerging cyber threats that traditional security measures may miss? Learn how advanced anomaly detection and malware
scanning can help you identify and neutralize unknown risks. Discover how to protect your organization from sophisticated attacks and safeguard your
valuable data. You’ll learn • Detect anomalies in your data: Learn how to identify unusual patterns and behaviors that may indicate a security threat. • Prot…

Benchmarking Roundup 2025 Contact Center
Channel Logo

Benchmarking Roundup 2025 Contact Center

Many Contact Center Center professionals are unfamiliar with the key performance indicators (KPIs) that are important to track and trend and even fewer
are aware of what constitutes acceptable performance. In this webcast, Jeff Rumburg will share the results of MetricNet’s 2025 Global Benchmarking
Initiative for Contact Centers, discuss the methodology, define the KPIs used for benchmarking, and share performance data from more than 140 compani…

Exploring the Evolution and Future of Sustainable Finance
Channel Logo

Exploring the Evolution and Future of Sustainable Finance

Sustainable finance has transformed from a niche concept tied to responsible investment into a mainstream force shaping global markets. Spanning sectors,
jurisdictions, and financial segments, it now influences a wide range of products, services, and regulatory initiatives. But how far have we come—and where
are we headed next? We will explore key trends and themes that have shaped sustainable finance over time. What has been achieved, and what challenge…

Attend Summits on Key Management

Super Powering the Service Desk in 2022

Super Powering the Service Desk in 2022

IT service desks have traditionally been viewed as a cost center, called upon in times of employee problems. However, advancements in machine learning, AI
and Robotic Process Automation coupled with the shift to hybrid working means that the modern service desk can - and needs to - offer so much more. No…

|7 sessions
Driving Innovation & Automation in ITSM

Driving Innovation & Automation in ITSM

ITSM was the unsung hero of 2020 and 2021, helping businesses hold the fort during the switch to remote and then hybrid working. And with Gartner
predicting that IT organizations are set to overspend on ITSM tech by $750m in 2023, it seems that ITSM teams are finally getting their dues. Yet with the se…

|9 sessions
Overcoming Supply Chain Challenges

Overcoming Supply Chain Challenges

Effectively manage the supply chain in a globalized and uncertain business environment with emerging technologies and proven security strategies.

|8 sessions
The Future of ITSM

The Future of ITSM

Stay up to date on the latest trends and technologies in IT service management (ITSM), including AI-driven service management, cloud ITSM solutions, and
IT-style automated workflows for non-IT departments.

|9 sessions
Securing Environments with Identity & Access Management

Securing Environments with Identity & Access Management

IAM is fast becoming a top business priority. With more transactions and services coming online, businesses’ attack surfaces are growing fast. This risk is
exacerbated by the rise of AI in identity-based attacks. Meanwhile, as regulators tighten requirements around protecting identities, getting visibility on user …

|10 sessions
Inside ITSM & Digital Transformation

Inside ITSM & Digital Transformation

IDC predicts that direct Digital Transformation (DX) investment will reach $6.8 trillion in 2023, and already a key driver of an organization's DX journey, ITSM’s
role looks set to grow even more in 2022. Yet knowing how ITSM can help deliver a successful Digital Transformation initiative is different to understanding t…

|6 sessions

Watch series about Key Management

Reduce IT Asset Cost and Risk
48 episodes
Series Company Logo

Reduce IT Asset Cost and Risk

Realize major savings and mitigate asset-related risk with the AI platform for business transformation.

Watch series

Put AI to Work with Strategic Portfolio Management and Enterprise Architecture
34 episodes
Series Company Logo

Put AI to Work with Strategic Portfolio Management and Enterprise Architecture

Maximize your business transformation with strategic portfolio management and enterprise architecture. Align your strategies with workflows to effectively
plan, deliver, and measure value, while leveraging AI Agents to drive automation within ServiceNow.

Watch series

CCM Implementation Guidelines v2
16 episodes
Series Company Logo

CCM Implementation Guidelines v2

The Cloud Controls Matrix WG and Shared Security Responsibility Model project teams are creating 17 videos—equal to the number of CCM v4 security
domains—to raise awareness of the CCM implementation guidelines v2.0 and the cloud-shared security responsibility model (SSRM).

Watch series

ServiceNow Cyber & Tech Risk
45 episodes
Series Company Logo

ServiceNow Cyber & Tech Risk

Monitor risk and compliance in real time on an integrated platform. Manage third-party risks and business continuity as you innovate.

Watch series

Secure machine identities
26 episodes
Series Company Logo

Secure machine identities

Simplify securing non-human identities for all applications, DevOps pipelines and cloud workloads Your organization has more clouds, more machines and
more identities to manage - there are now 45 non-human identities for each human. Learn how solve this challenge by extending the reach of your secrets …

Watch series

Unlocking Secrets Management
9 episodes
Series Company Logo

Unlocking Secrets Management

With the massive increase in cloud services and workloads, the use of secrets rapidly grows and leads to secrets sprawl, however, “62% of organizations do
not know how many keys or certificates they have throughout their company.” The increase in data breach incidents from leaked credentials is also alarmi…

Watch series