HERO  Image

EVENTS & WEBINARS 

Get insights about digital security from our trusted
team of SSL, IoT and PKI experts.

Conferences, Tradeshows and Other
Security-Focused Happenings

Calendar white10 Large Circle Image
Webinar | June 12, 9am PT / 12pm ET | Online

Optimizing Enterprise Certificate Management for Security and Digital Trust

Streamlined certificate lifecycle management enables organizations to adapt swiftly to evolving security threats and technological advancements. By maintaining visibility and control over certificate usage and expiry dates, enterprises can identify potential risks proactively and implement preemptive measures to mitigate them.

Join our session “Optimizing Enterprise Certificate Management for Security and Digital Trust” featuring Asif Karel - DigiCert’s Product Management Director and Michael Rudloff DigiCert Technical Product Specialist on Monday, June 12th at 9am PT / 12pm ET.

Calendar white10 Large Circle Image
Event Sponsor | June 24-27, 2024 | Washington, DC, U.S.A.

Connectivity Standards Alliance (CSA) Member Meeting

Join us at the upcoming Connectivity Standards Alliance (CSA) Member Meeting. CSA is where they ignite creativity and collaboration in the IoT, by developing, evolving, and promoting universal open standards that enable all objects to securely connect and interact.

Calendar white10 Large Circle Image
Event Sponsor | September 9-11, 2024 | Gold Coast, Australia

Gartner IT Symposium/Xpo

CIOs and IT leaders came together on the Gold Coast in Australia to dive into the technology, insights and trends shaping the future of IT and business, which included accelerating business transformation, cybersecurity, customer experience, data analytics, executive leadership and more.  With extensive coverage on the impact of generative AI on every industry and job role.

Calendar white10 Large Circle Image
Event Sponsor | December 9-11, 2024 | Grapevine, U.S.A.

Gartner Identity & Access Management Summit

Join DigiCert at the Gartner Identity & Access Management Summit.

In a world where the traditional corporate network perimeter has become obsolete — the identity infrastructure has become the new battleground for bad actors. Identity and access management (IAM) models that rely on legacy approaches to manage the identities of users and machines across growing lists of applications and environments have become complex and ill-equipped to adapt to the changing needs of business and technological advancements. Security leaders must evolve their IAM toward an identity-first approach that puts identity-based controls at the heart of your organization’s protection architecture to enhance its cybersecurity posture while delivering digital transformation and business value.

WEBINARS AND RESOURCES