InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

ISSA Thought Leadership Series: The Definitive Need for Crypto-Agility

Presented by

ISSA International

About this talk

On the eve of quantum computing, the definitive need for crypto-agility is greater than ever. The ability to locate, manage, and securely update digital certificates on a network or on a device seems like a simple task, yet with the advent of new Enterprise use cases and flourishing IoT device introductions, management at massive scale becomes a challenge. Facing mounting pressures, IT security personnel and product managers are tasked with implementing solutions fit for today’s environment plus tomorrow’s post-quantum world. Join renowned Public Key Infrastructure (PKI) expert and Certified Security Solutions (CSS) CTO, Ted Shorter, as he outlines the defense against quantum computing and the IoT device invasion, crypto-agility: · How can crypto-agility lend itself to a truly future-proof Enterprise and IoT device security strategy? · Cryptographic kryptonite: demystifying quantum computing · Challenges with digital certificate/device management at scale Moderator: Dr. Shawn Murray, Principal Scientist, US Missile Defense Agency & Director, ISSA International Presenters: Ted Shorter, CTO, Certified Security Solutions (CSS) Michael Gardiner, Principal Architect, Gemalto Michele Mosca, Founder, Institute for Quantum Computing Mike Brown, CTO & Co-Founder, ISARA Corporation
Information Systems Security Association

Information Systems Security Association

40697 subscribers391 talks
Developing and Connecting Cybersecurity Leaders Globally
ISSA is the community of choice for international cybersecurity professionals dedicated to advancing individual growth, managing technology risk and protecting critical information and infrastructure.
Related topics