🔒🤖 The Next Step in GitGuardian’s Approach to NHI Security

DISCOVER

🔒🤖 The Next Step in GitGuardian’s Approach to NHI Security

DISCOVER
No items found.

STL TechWeek 2025

STL TechWeek 2025

2025 STL TechWeek will feature A total of 250 speakers over a full 5 day event series across 10 innovation tracks

Conference
AMER
In-person
Mar 31, 2025 - Apr 04, 2025

St. Louis, MO

St. Louis, MO

Join us, be part of the vision!

By submitting this form, I agree to GitGuardian’s Privacy Policy

Thank you! Your registration has been recorded!
Oops! Something went wrong while submitting the form.

STL TechWeek 2025

2025 STL TechWeek will feature A total of 250 speakers over a full 5 day event series across 10 innovation tracks

No items found.

Speakers

Dwayne McDaniel

Dwayne McDaniel

Agenda

Fire icon

I'm A Machine, And You Should Trust Me: The Future Of Non-Human Identity

Security boils down to trust. Trusting that the code will do what is expected and is free from vulnerabilities. Trusting that the entities that interact with our data and resources have the right to access those resources.

While we have many ways to check that our code is trustworthy, we have traditionally addressed the trusted access question with the same approach: long-lived credentials. This approach to trusted access does not take into account who or what is requesting that resource. These secrets, which quite often leak, are an attacker's best friend and are how attackers think about getting into and moving throughout your system.

What if instead of simply asking for a security key or credential to gain access, our applications, workloads, and resources asked "Who are you and how can you prove that?" Humans can move towards leveraging our non-changing characteristics, like biometrics, which has seen wider adoption recently. But what about machines? Especially in the world where pods and workloads last for only hours or days?

Attend this session to:
- Better communicate about why we must do things differently and soon
- Learn how the open-source software community has looked at addressing the identity problem
- Understand what commercial options are available
- Map a path away from the world of long-lived credentials

The future of identity and access management is the future of security, IT, and, ultimately, business resiliency.  

Fire icon

Who Goes There? Actively Detecting Intruders With Cyber Deception Tools

Intrusion detection is critical in defending against cyberattacks, but traditional methods often identify breaches too late. In this session, GitGuardian willexplore how honeytokens—decoy credentials that trigger alarms—offer a proactive solution for detecting intruders in real-time. From open-source to enterprise options, discover how to deploy honeytokens at scale and stay ahead of attackers.

No items found.

Break

Reserve your spot now!

Join GitGuardian and their crew!

STL TechWeek 2025

Dwayne McDaniel

Join us, be part of the vision!

By submitting this form, I agree to GitGuardian’s Privacy Policy

Thank you! Your registration has been recorded!
Oops! Something went wrong while submitting the form.