¶ºÒõ¹Ý

HERO  Image

Events & webinarsÌý

Get insights about digital security from our trusted
team of SSL, IoT and PKI experts.

Conferences, Tradeshows, Webinars and Other Security-Focused Happenings

Calendar white10 Large Circle Image
Webinar | July 11, 2024 | 9:00 AM PT

The Entrust Distrust — What Happened, What it Means, and What Steps to Take

We helped thousands navigate the Symantec distrust in 2018 and we’re here to apply what we learned to assist Entrust customers in making a successful migration. Join Jeremy Rowley, CISO, and Brian Trzupek, SVP Product Management, for a special webinar to discuss the details of the recent distrust announcement and build a strong roadmap for making a smooth transition without disrupting your business.

Calendar white10 Large Circle Image
Event Sponsor | August 3-8, 2024 | Las Vegas, U.S.A.

Black Hat USA

Now in its 27th year, Black Hat USA returns to the Mandalay Bay Convention Center in Las Vegas with a 6-day program. The event will open with four days of specialized (August 3-8), with courses for all skill levels. The two-day main conference (August 7-8) will feature more than , dozens of open-source tool demos in Arsenal, a robust Business Hall, networking and social events, and much more.

Interested in meeting with a ¶ºÒõ¹Ý expert? Email events@digicert.com and we will find a time to connect with you in person at Black Hat USA.

Calendar white10 Large Circle Image
Event Sponsor | September 9-11, 2024 | Gold Coast, Australia

Gartner IT Symposium/Xpo

CIOs and IT leaders came together on the Gold Coast in Australia to dive into the technology, insights and trends shaping the future of IT and business, which included accelerating business transformation, cybersecurity, customer experience, data analytics, executive leadership and more.Ìý With extensive coverage onÌýthe impact of generative AI on every industry and job role.

Calendar white10 Large Circle Image
Event Sponsor | December 9-11, 2024 | Grapevine, U.S.A.

Gartner Identity & Access Management Summit

Join ¶ºÒõ¹Ý at the Gartner Identity & Access Management Summit.

In a world where the traditional corporate network perimeter has become obsolete — the identity infrastructure has become the new battleground for bad actors. Identity and access management (IAM) models that rely on legacy approaches to manage the identities of users and machines across growing lists of applications and environments have become complex and ill-equipped to adapt to the changing needs of business and technological advancements. Security leaders must evolve their IAM toward an identity-first approach that puts identity-based controls at the heart of your organization’s protection architecture to enhance its cybersecurity posture while delivering digital transformation and business value.