Hi [[ session.user.profile.firstName ]]

Post Quantum Series: III. The Road to Post Quantum Crypto Agility

Post quantum experts at Entrust Datacard have been working closely with think tanks and academic leaders who are doing advanced research on quantum computing. We’re sharing our insights on specific tasks that will help you plan and prepare your organization for a PQ world.

• Common cryptographic protocols that will need to be migrated to post quantum
• When to employ commonly used cryptographic applications and protocols and when to use different PQ algorithms
• How to determine the right time to deploy post quantum crypto when different kinds of data have different “shelf-lives”
Recorded May 7 2020 51 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Mike Ounsworth, Software Security Architect, Entrust Datacard
Presentation preview: Post Quantum Series: III. The Road to Post Quantum Crypto Agility

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Making Passwordless Work with your Existing IT Environment Sep 30 2020 3:00 pm UTC 45 mins
    Rajan Barara, Product Management Director-Entrust Datacard
    In this the fifth webinar in the Passwordless Series, we will look at how to make Passwordless Work with your Existing IT Environment

    Unless your business is brand new, you already have a considerable investment in IT. Costly upgrades and replacements should not be required to realize passwordless authentication or the associated benefits of improved workforce security and productivity. Participants in this session will learn:
    - Key questions to ask passwordless vendors
    - How to leverage existing Microsoft environments
    - How to attain high assurance credential-based authentication with your existing PKI implementation
  • Best practices for verification to support reduced certificate lifetimes Sep 2 2020 3:00 pm UTC 34 mins
    Dathan Demone, Director Verification Services, Entrust Datacard
    Starting on Sept. 1, 2020, Apple's decision to reduce certificate lifetimes to 398 days will take effect. Join us for part two of our Road to 398 webinar where we'll discuss best practices for certificate verification.
    During this 30-minute webinar, our verification expert will share tools and tips for verification processes that support reduced TLS/SSL certificate lifetimes and maintain compliance.

    Topics Covered:
    • Updates on CA/B Forum requirements for verification around shorter certificate lifetimes
    • Tools for renewing certificates in bulk with fewer touch points
    • Methodologies for streamlining certificate verification
    • What we've learned from our customers and how we've addressed it
  • Sicherheitsstrategien für die Cloud Aug 27 2020 8:00 am UTC 60 mins
    Matthias Partl Cloud Solution Architect (Azure) Microsoft Identity & Security and Bernd Stamp Technical Lead - DACH nCipher
    Praktiken zur Absicherung Ihrer Cloud Ressourcen und Daten.
    Cloud Sicherheit zu verstehen ist mehr denn je essentiell - gerade in der heutigen Zeit, in der Sie die neuen Rahmenbedingungen zwingen, die Digitale Transformation so schnell wie möglich umzusetzen.
    Dabei sind Sie und der Cloud Service Provider gemeinsam für die Sicherheit Ihrer Cloud basierten Daten verantwortlich.

    In diesem Experten-Video erfahren Sie, welche Sicherheitsgrundlagen Microsoft Azure für das Hosten Ihrer Infrastruktur, Anwendungen und Daten in der Cloud bietet; wie die hochsicheren nShield HSMs von Ncipher Security Ihnen ermöglichen von der Flexibilität und Wirtschaftlichkeit der Cloud Dienste zu profitieren und gleichzeitig die Sicherheit Ihres Encryption Key Managments zu stärken indem sie die Kontrolle über Ihre Schlüssel behalten.

    Highlights aus der Agenda:
    • Azure Secure Foundation (Sicherheitsgrundlagen)
    • Bring Your Own Key (BYOK) für Microsoft Azure Key Vault
    • Hold your own Key (HYOK) für Azure Information Protection
    • Schutzen Sie Ihre Encryption Keys (Verschlüsselungsschlüssel ?) in einer FIPS 140-2 zertifizierten HSM (Hardware Security Module)
    • Sellen Sie sicher, dass die Schlüssel nie für Anwendungen in der Cloud sichtbar sind
    • Trennen Sie Anwendungen und Key Management Funktionen

    Wir freuen uns auf Ihre Teilnahme!
  • Healthcare Goes Passwordless and Touchless Aug 26 2020 3:00 pm UTC 45 mins
    Jenn Markey - leads product marketing for Entrust Datacard’s authentication business segment
    In this the fourth webinar in the Passwordless Series, we will look at Passwordless and Cloud-based Identities for Healthcare Workers

    As we all prepare for a new era of work, there are some workforce authentication considerations specific to healthcare environments. Healthcare workers often access patient records and medical systems on shared workstations. As well, many employees work across multiple locations. This makes using a physical authenticator like a smart card a risk factor for surface transmission. Session participants will hear about:

    - The unique authentication challenges and requirements for healthcare workers
    - The importance of credential-based touchless authentication
    - The real-world touchless identity case study of a critical care hospital network
  • Road to 398: Complying with reduced TLS/SSL certificate lifetimes Aug 19 2020 3:00 pm UTC 52 mins
    Chris Bailey, VP of Trust Services and Mark Giannotti, Manager, Technical Sales, Entrust Datacard
    Apple's decision to reduce certificate lifetimes to 398 days will take effect Sept. 1, 2020. Preparing your web properties for a seamless transition starts now.

    Join our TLS/SSL experts as they share some tips to avoid unexpected certificate lapses and simplify certificate management.

    Topics covered:

    • The details of the new CA/B Forum baseline requirements
    • The potential impact of shorter certificate lifetimes
    • How to use the Ansible Module to automate certificate deployment at scale
    • Other tools that can help simplify certificate lifetime management
  • Beware the dark side,use trusted machines & HSMs to support critical business Aug 18 2020 3:00 pm UTC 60 mins
    Paul Cleary,Senior Solutions Engineer-Venafi and Juan Asenjo,Director of Products,Solutions and Partner Marketing-nCipher
    As organizations deploy more automated systems to run critical business, the demand for device and application (machine) identities is rapidly increasing. Protecting machine identities is critical to ensure integrity of operations and the security of data processed by machines.

    This webcast will examine the growing challenges faced by organizations when managing increasing volumes of machine identities. Our speakers will discuss how to implement automated orchestration of keys and certificates, describe best practices, and explain why a root of trust is vital for security and regulatory compliance.

    Join the webcast and learn:
    • What are the main challenges managing machine identities
    • How to enable trust in machines supporting critical business
    • Why a root of trust is required for high assurance security

    This webinar is for you if you are responsible for:
    • Managing digital transformation and cloud migration
    • Overseeing security best practices in your organization
    • Auditing and ensuring your organizational compliance
  • Credential-based Passwordless Authentication for Secure Workforce Identities Aug 12 2020 3:00 pm UTC 45 mins
    Rajan Barara, Product Management Director-Entrust Datacard
    In this the third webinar in the Passwordless Series, we will look at Credential-based Passwordless Authentication for Secure Workforce Identities

    From an IT perspective, passwords are inherently insecure. From a user perspective, passwords are annoying. Going passwordless is intended to address both of these concerns. Be forewarned, however, that not all passwordless solutions are created equal. Webinar participants will learn:

    - How to build their internal case to go passwordless
    - Key questions to ask different passwordless vendors
    - Importance of credential-based passwordless authentication for high assurance use cases
  • Bring Your Own Encryption in a Hybrid and Multi-cloud World Aug 11 2020 3:00 pm UTC 60 mins
    Sid Dutta, Micro Focus Voltage and Sander Temme, nCipher Security
    Current market research indicates that the majority of enterprises have a multi-cloud and/or hybrid cloud strategy. Due to COVID-19, over half of enterprises now expect cloud usage to exceed prior plans. Recognizing the pressures of data breaches and regulatory compliance, Cloud Service Providers (CSPs) have started to offer their own data security solutions, each with a different approach and potentially confusing array of capabilities.
    Join this webcast to understand:
    •What the major CSPs are offering in crypto and key management services
    •Where to Bring Your Own Key (BYOK) and Bring Your Own KMS (BYOKMS)
    •How to take encryption and key management from on-premises to multi-cloud
    Learn how to leverage the power of Voltage SecureData and nCipher nShield as a Service. Implement robust, standards-compliant, enterprise-grade stateless key management and cryptographic services. Support data privacy in enterprise hybrid, multi-cloud, and cloud-agnostic models.
  • MDSL Partner Webinar: Automate and Manage S/MIME Deployment at Scale Aug 11 2020 11:30 am UTC 60 mins
    Midou Boulfissane – MEA Sales Manager and Roger Maghames – Sales Manager
    Protect your organization’s emails with streamlined, automated S/MIME deployment
    Email hackers and phishing scams are getting more advanced. Fortunately, so are the S/MIME solutions designed to stop them.

    Watch this webinar to see how you can automate secure email certificate deployment at scale to digitally sign and encrypt your email and attachments.

    Topics covered in this 45-minute webinar include:
    • How automation removes the errors and friction associated with manual S/MIME deployment
    • How to stay in front of your compliance obligations
    • How to deploy digitally signed and encrypted email at-scale in minutes, not days
    • How you can now secure your business against email based threats
  • Encryption at the speed of life: Securing the future of Instant Card Issuance Aug 6 2020 5:00 pm UTC 60 mins
    Andy Cease: Marketing Manager Financial Solutions, EDC & Juan Asenjo: Director Product Solution & Partner Marketing, EDC
    Whether you’re issuing a credit or debit card instantly in a branch or centrally from a bureau, the security of the end-to-end solution is of utmost importance. Processing sensitive, personally identifiable financial data requires encryption – and the technology that underpins this cryptography depends on hardware security modules (HSMs). Entrust Datacard and nCipher have teamed up to create the built-for-purpose nShield Issuance HSM that is optimized for the increasingly complex needs of payment technology. As the industry evolved from Magstripe to EMV chip to dual-interface contactless, the card security paradigms continues to evolve. Having the right crypto engine ensures you can keep pace with evolving needs.

    • What are the security threats faced by the evolving card issuance technologies
    • Why a certified HSM root of trust is required to secure card issuance software
    • How to ensure instant gratification for your customers’ card issuance demand
  • Proteja sus claves - O no pierda el tiempo cifrando su información Aug 4 2020 3:00 pm UTC 60 mins
    Jose Rivera, Director de Ventas para América Latina nCipher Security
    En estos tiempos de cambio, nuestro enfoque en nCipher Security es proteger la salud, la seguridad y la productividad de los clientes, socios y colegas. También sabemos que ahora más que nunca, cuando se trata de nuevos entornos de trabajo, riesgos de vulnerabilidad y otros problemas, la protección de datos es esencial. Estamos aquí para respaldar y proteger los datos más críticos de su negocio en estos tiempos difíciles.
    Sabía usted que….

    • ¿Las claves criptográficas almacenadas en el software no son difíciles de encontrar?
    • ¿En promedio, un hacker tiene 160 días antes de ser detectado en su red?
    • ¿Las soluciones modernas de cifrado no se pueden descifrar mediante técnicas de descifrado?

    En este webcast, analizaremos por qué los Módulos de Seguridad de Hardware (HSMs) de uso general de nCipher se utilizan para resolver problemas del mundo real; independientemente del tamaño de la empresa o de la industria.
    También descubrirá por qué es importante proteger las claves criptográficas asociadas con el cifrado de la base de datos, el cifrado de archivos, las firmas y certificados digitales, la certificación de dispositivos IoT, Blockchain, pagos digitales, SSL, PKI y más. Las claves criptográficas están en todas partes. Contamos con más de 180 socios tecnológicos tales como F5, Palo Alto, CyberArk, Gigamon y BeyondTrust, solo por nombrar algunos.
    ¡Proteja sus llaves a toda costa y regístrese hoy!
    Le mostraremos por qué es tan importante. De clic aquí para registrarse
  • IoT exploits, accidents and vulnerabilities Recorded: Jul 30 2020 48 mins
    Kelvin Cusack Product Manager, nCipher Security and Mark Penny Principal PKI Consultant, EMEA, nCipher Security
    Securing IoT deployments with HSMs
    The Internet of Things (IoT) is opening up new opportunities for businesses and consumers, and is the linchpin of almost every digital transformation initiative. However, IoT also presents considerable security risks and challenges for organisations. Attackers impersonating a trusted device could conduct man-in-the-middle or other attacks; unsecured devices could expose protected content or enable access to other connected systems.

    Without a root of trust, communications could be compromised, altered, delivered incompletely, or lost.

    Join this IoT security webcast and learn how to bring trust to the internet of things with hardware security modules (HSMs). We will cover:
    • Recent examples of IoT vulnerabilities
    • Challenges enterprises are facing
    • Security solutions to address the challenges
    • IoT market trends analysis
  • Color personalization for government identity documents Recorded: Jul 23 2020 36 mins
    Sebastien Tormos - Field Marketing Director, EMEA
    A webinar just for the government organizations
    One solution does not fit all customer needs
    Many options for Secure Color personalization each with their pros and cons, up to the customer to determine what fits them best
    All benefit from the MX Series Platform architecture
  • 2020 Australia Encryption Trends Study–Are you protecting what matters the most? Recorded: Jul 23 2020 61 mins
    James Cook, Regional Sales Director Australia & Jay Schiavo, VP of Certificate Solutions Products and Markets, EDC
    With the explosion and proliferation of data that comes from new digital initiatives and increased mobility, most organizations are expanding their use of encryption. But what are the top priorities for Australian organisations?

    The Australia edition of the 2020 Global Encryption Trends Study, conducted by the Ponemon Institute and sponsored by nCipher, will be released in July 2020. It highlights how leading organisations are applying encryption strategies with detailed insights into the use cases that are growing the fastest.

    Join us for this webinar to learn about the key insights and findings from this industry-leading study and receive advice on addressing encryption’s top challenges.

    You'll take away:
    1.Data to benchmark your encryption strategy, comparing Australia vs. global trends
    2.Which data types are most often encrypted by Australian enterprises
    3.How to strengthen encryption key management at scale for mission-critical workloads
    4.Where organizations are using hardware security modules (HSM) for increased trust and key protection
    5.How to protect identities with cryptographic automation, document signing and code signing solutions
  • Passwordless and cloud-based identity for the new era of work Recorded: Jul 22 2020 35 mins
    Jenn Markey - Product Marketing, Entrust Datacard
    In this the second webinar in the Passwordless Series, we will look at passwordless and cloud identity in the new era of work.

    Where and how we work are forever changed. In a recent Entrust Datacard customer survey, 84% of respondents expect the recent shift to a sizeable remote workforce to be permanent. As perimeter-based security models give way to digital workforce identities, now is the time to make sure your authentication implementation is up to the challenge. In this webinar, session participants will learn best practices for a secure remote workforce including:
    - High assurance credential-based authentication
    - Passwordless authentication with enhanced SSO
    - Cloud-based identity for flexible and scalable workforce security
  • The Future Of The Payment Card Recorded: Jul 22 2020 39 mins
    Jean-Louis Meyer EMEA Director of Payment Solutions
    Payment markets have historically tended to evolve slowly over time. People are creatures of habit, and this is no less true for the way that we pay for things than it is for other aspects of day-to-day life. In recent years however, we have seen a rapid rate of technological change and significant innovation in payment methods that have brought ever-greater choice in how we pay for things!

    Entrust Datacard have been in business for over 50 years and continue to be global leaders in the field of payment cards!

    So, I guess the question is; how can we prepare ourselves for the future?

    In our unique webinar Entrust Datacard’s Director of Payment solutions looks at the evolution of the payment card, and why change brings valuable opportunity!

    We will look at:

    - Alternative payment methods and threats for the card (payment apps, digital wallet, cryptocurrencies, QR code, IoP, regulations).

    - New opportunities in the world of the payment card! Especially with the impact of COVID 19.

    - Entrust Datacard will also look at why it’s going towards a physical and digital convergence.
  • Paperless remote signatures for digital transformation Recorded: Jul 22 2020 46 mins
    Ena Hurmola - nCipher Security and Dan-Ionuţ Grigore, Cybersecurity Business Unit Director, certSIGN
    Undergoing digital transformation yet still relying on paper documents?
    certSIGN Paperless remote electronic signature application is the perfect solution for a 100% digital business.

    Discover in this webinar how you can have effective electronic workflows, by integrating this solution into your enterprise ecosystem, ensuring complete legal compliance, ease of use, fast roll-out, high assurance security and the capability to enable your mobile workforce (particularly important in the current environment!)

    • Remote electronic signatures: the What? based on the legal framework
    • certSIGN Paperless: the Why? based on the benefits
    • Case study: the How? based on our customer example (First Bank)
    • Security: the Wow! based on certSIGN Paperless QSCD certification + nCipher HSMs
  • Virtual Lunch and Learn: What you don’t understand about crypto can hurt you Recorded: Jul 22 2020 61 mins
    Joseph Ling, Chief Solutions Architect, nCipher Security
    We know from the Hong Kong Encryption Trends Study that many Hong Kong enterprises have adopted encryption to protect their data. But what kind of encryption should you choose? Will you just convert the data into something illegible and put it back into storage? I am sure you won’t.

    How about going back to basics – let’s learn why protecting encryption keys should be your ultimate focus. In this webinar you will learn:
    - The evolution of encryption
    - The difference between symmetric and asymmetric encryption
    - The truth about modern encryption – it takes just 160 days for a hacker to find your keys
    - Why you should secure your keys in hardware

    Crypto keys are everywhere – from database encryption, file encryption, digital signatures and certificates to IoT device certification, blockchain, digital payments, SSL/TLS, PKI and more. And together with solutions from BeyondTrust, CyberArk, F5, Gigamon and Palo Alto, to name but a few, nCipher’s general purpose HSMs can protect all your keys at all costs!

    We will show you why it is so important. Click here to register now and for the chance to receive a HK$100 Food Panda evoucher!

    A HK$100 Food Panda evoucher will be sent to the first 60 registrations who also attend the webinar.
  • PKI Heute, neue Entwicklungen und Zukunftsaspekte Recorded: Jul 15 2020 47 mins
    Stefan Bumerl and Bernd Stamp
    PKI hat sich in mehr als 30 Jahren zu einem umfassenden Security Backbone entwickelt der vielfach unterschätzt wird. Alternative Systeme bieten bei weitem keine vergleichbaren Möglichkeiten. Die Funktionsvielfalt in Kombination mit Theoretikern haben zum Teil verschreckt, dabei ist PKI heute jünger und frischer denn je und mit einem praktischen Blick darauf auch sehr gut einzusetzen!

    In drei aufeinander folgenden Webinaren beantworten die Spezialisten von nCipher und CRYPTAS die Frage: Wo geht es mit den aktuellen Entwicklungen der PKI hin und was sagt/bietet der Markt dazu?

    PKI neue Entwicklungen - In diesem zweiten von drei Webinaren werden die folgenden Themen diskutiert:

    - Key Management: PKI vs. FIDO, WHfB, Mobile, etc. – Unterschiede, Vor-/Nachteile und was wofür benötigt wird?
    - Security best practice (Cyber security Framework) und wie PKI hier einen Unterschied macht.
    - Anforderungen für den gesamten LifeCycle: vom Enrollment über die Nutzung und Validierung bis zum Widerruf.
    - Brennpunktanwendungen: Digitalisierung von Abläufen und Langzeit-Archivierung.

    Im Anschluss an diese drei Webinare wird CRYPTAS in Zusammenarbeit mit nCipher und anderen Partnern im Herbst 2020 einen PKI-Roundtable organisieren. Weitere Informationen werden folgen, und Sie sind im Voraus herzlich willkommen.
  • Protect your sensitive email, files and electronic document signing - Galaxkey Recorded: Jul 15 2020 40 mins
    Yashaan Cooper Regional Manager – Middle East and Africa Galaxkey and Simon Taylor Channel Account Manager nCipher Security
    Organizations are continuously faced with the challenge of sharing data with authorized internal and external stakeholders, while at the same time protecting it from increasing cyber threats. This data often contains commercially, regulatory and even nationally sensitive information.

    As more email and file sharing applications are hosted in virtual, cloud-based and hybrid platforms, protecting the confidentiality and integrity of enterprise data can be difficult. While encryption solutions are seen as suitable controls, they require specialized knowledge and configuration, which can cause operational barriers to security practices.

    Register for this live webcast to understand how Galaxkey and nCipher Security deliver complete data encryption with simple usage and strong hardware-based key management that enables you to:
    -share and store data securely on existing infrastructures
    -deliver an easy to use encryption platform for business users
    -automate complete management of encryption keys
    -enable fast and flexible deployment options
    -facilitate compliance with regulatory requirements
    -provide business solutions such as electronic document signing and on-prem collaboration securely
nCipher, an Entrust Datacard company
Entrust Datacard offers the trusted identity and secure transaction technologies that make those experiences reliable and secure. Solutions range from the physical world of financial cards, passports and ID cards to the digital realm of authentication, certificates and secure communications.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Post Quantum Series: III. The Road to Post Quantum Crypto Agility
  • Live at: May 7 2020 9:05 am
  • Presented by: Mike Ounsworth, Software Security Architect, Entrust Datacard
  • From:
Your email has been sent.
or close