play_circle_filled Identity Security ProTalks

47-Day Reality Check: How to Prepare for the Certificate Automation Shift

Hero Image
  • Calendar icon September 16 Calendar icon Americas: 2PM ET | EMEA: 3PM CET | APAC: 11AM SGT

Prepare for 47-day TLS certificate lifecycles with scalable automation best practices


The clock is ticking. With the 47-day TLS certificate lifecycle mandate fast approaching in early 2029 – and the first phase of enforcement going into effect in March 2026 – organizations must act now to avoid outages and compliance risks.

It’s time to build your execution plan.

This is the first webinar in a two-part series designed to help teams understand the new certificate reality and take immediate, actionable steps toward automation. In Part 1, you’ll learn how to assess your current certificate landscape, identify ownership gaps, and enforce renewal policy to lay the foundation for a scalable automation strategy, using proven benchmarks and real KPIs.

You’ll walk away from Part 1 with an understanding of how to:

  • Inventory and categorize all public TLS certificates across hybrid environments
  • Prioritize high-risk certificates and detect shadow issuance
  • Establish certificate ownership and enforce lifecycle policies
  • Configure alerting and notification
  • Use the Certificate Automation Maturity Model to benchmark readiness

Don’t delay. Register now to future-proof your organization with simple certificate automation.

Presenters:

Florin Lazurca

Director of Product Marketing, CyberArk

Justin Hansen

Director, Field Technology Office, CyberArk

REGISTER NOW

About CyberArk
CyberArk (NASDAQ: CYBR) is the global leader in identity security, trusted by organizations around the world to secure human and machine identities in the modern enterprise. CyberArk’s AI-powered Identity Security Platform applies intelligent privilege controls to every identity with continuous threat prevention, detection and response across the identity lifecycle. With CyberArk, organizations can reduce operational and security risks by enabling zero trust and least privilege with complete visibility, empowering all users and identities, including workforce, IT, developers and machines, to securely access any resource, located anywhere, from everywhere. Learn more at cyberark.com.