Securing machine identities and SSH keys: Deploying Zero Trust to close gaps that attackers exploit
Attendees will learn:
- Why unmanaged machine identities and SSH keys present a growing blind spot for attackers to exploit.
- How new regulatory pressures and zero trust strategies demand stronger controls over privileged machine-to-machine access.
- Practical approaches to gaining visibility, automating key management, and reducing operational risk.
Watch Now

Event Speakers

Miikka Sainio is Principal Architect and Product Owner at SSH Communications Security. With over 25 years in software development, he specializes in user-centric design and secure access solutions, developing software and services in companies ranging from small startups to Nokia. As a Solutions Architect, he has led and coordinated large, international development teams in delivering high-impact consumer and enterprise products.

With over 13 years of experience working in Unix and Cybersecurity teams in Fortune 500 companies, Saketh currently is responsible for Pre-sales, Architecture and Strategic Accounts in Americas. Prior to SSH, Saketh spent most of time in enterprise architecture and evaluating solutions that are eventually deployed into Production along with Deployment Strategy. Saketh enjoys talking about security topics, best practices, and user experiences with different software solutions.

Adrian is an outspoken researcher that doesn’t shy away from uncomfortable truths. He loves to write about the security industry, tell stories, and still sees the glass as half full.
