TechNet Presents: MCS Talks Enterprise Architecture session 4 – Security and PKI
This session will start by discussing the areas you should consider when securing an enterprise using a defence in depth approach and help you to identify the technologies to use. We’ll go on to identify which of these technologies rely on or can leverage a Public Key Infrastructure (PKI), before moving on to discussing how to identify an organisation’s PKI requirements and how to design a PKI implementation around these. We’ll look at the considerations you need to take into account when planning a PKI revocation strategy and the security considerations around deploying a PKI. Finally, we will look at some specific deployment solutions giving consideration to the Contoso environment used throughout this series as well as sharing some of our own experiences.
You may be interested in one of our upcoming sessions that is focused on PKI design and is available
Just a quick reminder that we have session 4 of the series which will discuss defence in depth, and will