TechNet Presents: MCS Talks Enterprise Architecture session 4 – Security and PKI
This session will start by discussing the areas you should consider when securing an enterprise using a defence in depth approach and help you to identify the technologies to use. We’ll go on to identify which of these technologies rely on or can leverage a Public Key Infrastructure (PKI), before moving on to discussing how to identify an organisation’s PKI requirements and how to design a PKI implementation around these. We’ll look at the considerations you need to take into account when planning a PKI revocation strategy and the security considerations around deploying a PKI. Finally, we will look at some specific deployment solutions giving consideration to the Contoso environment used throughout this series as well as sharing some of our own experiences.