Similarly, we can think of long key and certificate validity periods as long password-rotation periods: If passwords are out there forever, someone with malevolent intentions is bound to discover and use them.
FORBES: Cyber Security And The Rise Of The Silicon-Based Life Form