The Countdown to 47 Days: Are You Ready for the Biggest Change in TLS Certificate Lifecycle Management?
Fill form to unlock content
Error - something went wrong!
Download Now
Thank you!
Starting in 2026, these changes will roll out in phases, forcing teams to renew certificates more frequently and rethink how they manage risk and compliance.
In this 45-minute session, certificate security experts George Parsons and Ryan Hurst will break down what’s changing, the operational risks of delayed action, and how organizations can use automation and policy alignment to adapt at scale.
Many teams today still rely on manual processes to check TLS certificate expiration, increasing the chances of missed deadlines and unexpected outages. Shorter certificate lifespans mean even a single expired TLS certificate can disrupt critical systems. Whether you're managing five or 10,000 certificates, knowing how to maintain visibility is essential.
You’ll leave the session with a clear understanding of how to:
- Modernize your TLS certificate lifecycle management strategy
- Communicate risk across technical and business teams, leadership, and the Board
- Build this change into your budget now (and quantify inaction to frame your business case)
- Ensure your infrastructure is ready for 47-day renewal cycles — mandatory for public PKI, and increasingly valuable for internal PKI as well.
Join us to get ahead of the transition and bring resilience to your TLS/SSL certificate lifecycle.