WORLD PASS EXCLUSIVE SESSION: Conquering the Post-Quantum Threats of Tomorrow, Today
About
We stand at the brink of a monumental shift towards post-quantum cryptography (PQC), which poses a significant threat to conventional cryptographic methods. Our ability to navigate the PQC landscape hinges entirely on our pre-quantum readiness today. How can we safeguard our businesses and thrive in a world transformed by quantum computing? In this panel session, experts will discuss trends influencing the post-quantum readiness of today’s enterprises and explore how adopting automated, crypto-agile machine identity management plays a pivotal role in ensuring a seamless transition to the post-quantum era – well before quantum computers become a widespread reality.
Learning Objectives:
Realistic Threat Modeling — Organizations are vulnerable due to their reliance on the internet and cloud-native computing. Learn from recent breaches, like the CircleCI incident and State Department attack involving breached Microsoft accounts, to understand how cryptographic vulnerabilities can be exploited. Establish threat models that encompass traditional and quantum threats
Inventory and Asset Management — Know where your keys are and how they're being protected. Implement robust inventory management for cryptographic artifacts, including APIs, machine identities, etc. Understand the dependencies and relationships within your cryptographic infrastructure
Operational Agility — Recognize that agility isn't just about changing cryptographic algorithms. It also involves being operationally agile. Ensure you can swiftly respond to cryptographic incidents, update systems and manage cryptographic artifacts. Key management, certificate management and automation are crucial
This website uses cookies to improve your experience, provide social media features and deliver advertising offers that are relevant to you. If you continue without changing your settings, you consent to our use of cookies in accordance with our privacy policy. You may disable cookies.