Entrust | Who’s Minding the Keys to the Kingdom? - Home
Register    ➤

Andrew Sheedy

Digital Security Consultant

Entrust

Read More

Andrew Sheedy

Digital Security Consultant

Entrust

Andrew has been involved in the US federal PKI and Identity landscape for nearly 20 years from the very early days of HSPD-12 and has spent time at ActivIdentity, HID and Yubico, and most recently joined Entrust about 3 years ago.  His current role is providing PKI and credentialing expertise in the support of Entrusts Public Sector and Enterprise practices.

David Low

Global Vice President of Professional Services, Digital Security

Entrust

Read More

David Low

Global Vice President of Professional Services, Digital Security

Entrust

David is responsible for the worldwide delivery of applied cryptographic solutions, including PKI, Identity, HSM and consulting solutions across a variety of businesses.  Prior to his work at Entrust, David built and led a centralized services group for GuidePoint Security, focusing on the SIEM and network security space.

David also worked at RSA Security for 10 years building and leading a team of product specialist sales engineers.  During that time, David developed a solution for card data tokenization for a large card processor and led the technology integration team for the partnership.  Today, that solution represent one of the most commercially successful payment-based data protection solutions.

David holds an undergraduate Computer Science degree for Worcester Polytechnic Institute, and a master’s degree in information security from Brandeis University.

Constance Sayers

Chief Revenue Officer

GovExec

Read More

Constance Sayers

Chief Revenue Officer

GovExec

.

Watch Now!

Cryptographic keys are some of your organization’s most precious assets, therefore it’s essential to know who is minding them. The value of any key is equivalent to the value of all the data it protects. A single stolen or misallocated key could lead to a huge data breach with the consequential reputational damage, penal regulatory fines, and loss of investor and customer confidence.

When using HSMs to protect these keys, you add a robust layer of security, preventing attackers from finding them. HSMs are specifically designed to establish a root of trust, safeguarding and managing cryptographic keys and processes within a certified hardware environment.

Did you know that….

  • Cryptographic keys stored in the software are not hard to find?
  • On average, a hacker has 160 days before they are detected in your network?
  • Modern encryption solutions cannot be decrypted through deciphering techniques?

Resources

Resources

Web Page

Digital Security

Data Security Starts Here

PDF

HSMs: A Critical Component of an Enterprise’s Cybersecurity Strategy

HSMs: A Critical Component of an Enterprise’s Cybersecurity Strategy