Turner has worked directly with many of the world's largest Global 2000 companies to solve security and operational challenges related to cryptographic key and certificate management. In addition to working with and presenting at IEEE, IETF and ISACA, Turner has worked closely with the NIST, where he coauthored the July 2012 Information Technology Laboratory (ITL) bulletin, Preparing for and Responding to Certification Authority Compromise and Fraudulent Certificate Issuance, and the NISTIR 7966, Security of Interactive and Automated Access Management Using Secure Shell (SSH). Prior to Venafi, Turner was a vice president for Novell's Resource Management group and served as vice president of product management at CertCo, a spinout from Bankers Trust that delivered public key infrastructure (PKI) and secure electronic commerce solutions to the financial services industry.
Unused or unmonitored SSH keys grant alarming levels of privileged access beyond users, proliferating into your machine-to-machine communications and services. Learn how securing your SSH inventory beyond your PAM solution helps compliance with NIST, FISMA, and CDM along with five steps you can take today to...
Turner has worked directly with many of the world's largest Global 2000 companies to solve security and operational challenges related to cryptographic key and certificate management. In addition to working with and presenting at IEEE, IETF and ISACA, Turner has worked closely with the NIST, where he coauthored the July 2012 Information Technology Laboratory (ITL) bulletin, Preparing for and Responding to Certification Authority Compromise and Fraudulent Certificate Issuance, and the NISTIR 7966, Security of Interactive and Automated Access Management Using Secure Shell (SSH). Prior to Venafi, Turner was a vice president for Novell's Resource Management group and served as vice president of product management at CertCo, a spinout from Bankers Trust that delivered public key infrastructure (PKI) and secure electronic commerce solutions to the financial services industry.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cybered.io, you agree to our use of cookies.