Hi [[ session.user.profile.firstName ]]

Approaches to Deploying Post-Quantum Cryptography

Quantum is coming, so you should start freaking out now!

Well maybe don't freak yet until you hear from two experts, with their two opposing views of how to handle post-quantum algorithms (PQC).

Join Russ Housley, Founder & Owner of Vigil Security explains while people gain confidence in the PQC algorithms and their implementations, security protocols should mix traditional and PQC algorithms.

Then hear from Massimiliano (Max) Pala, Principal Architect | Security Services at CableLabs, brings as he brings his expertise from the broadband industry to propose a way to augment the PKI to support quantum-safe algorithms without the need to establish separate infrastructures.

You learn:
- How modern (or classic) cryptography rely on problems that are hard to reverse
- How to start planning for the day with only PQC algorithms are used​
- When to use separate certificates for traditional and PQC algorithms​


Originally presented at the 2020 Keyfactor Critical Trust Virtual Summit.
Recorded Oct 28 2020 28 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Russ Housley, Founder & Owner of Vigil Security & Max Pala, Principal Architect | Security Services at Cable
Presentation preview: Approaches to Deploying Post-Quantum Cryptography

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • The Business Case for a Cloud-First PKI Strategy Mar 10 2021 6:00 pm UTC 60 mins
    Chris Hickman - Chief Security Officer, Ryan Yackel - VP of Product Management, Blake Wood - Director of Business Development
    The explosion of machine identities, keys, and certificates across multi-cloud and DevOps environments have stretched your on-premise PKI to its limits.

    And with over 62% of organizations currently or planning on outsourcing their PKI, now might be time to evaluate a new approach to PKI for the future.

    In this webinar, we explore the evolving complexity and costs of PKI, how to balance potential risks against those costs, and ways your organization can build the business case for a cloud-first PKI strategy.

    Join Chris Hickman, Chief Security Officer at Keyfactor, and Blake Wood, Director of Business Development at Thales, as they talk:

    - How PKI has evolved and continues to grow in complexity
    - Options for PKI deployment
    - The costs of on-premise PKI
    - The Future of PKI in the cloud
  • The What, Why and How of Zero Trust Manufacturing Mar 3 2021 6:00 pm UTC 30 mins
    Ellen Boehm, VP of IoT Strategy & Tomas Gustavsson, CTO
    The complexity of multiple points in the supply chain created a trust gap between product design/firmware development and hardware. Manufacturing finds it difficult to embed identity into the process and maintain identities throughout the device lifecycle once it’s deployed into the field. These factors have led to the emergence of adopting a Zero Trust Manufacturing approach to IoT device identity.

    In this webinar, Ellen Boehm, VP of IoT Strategy at Keyfactor, and Tomas Gustavsson, CTO at Primekey, we will show why the Zero Trust model is critical to the IoT lifecycle and how to put this theory into practice.
  • Securing the Next Generation of Connected Vehicles Recorded: Feb 18 2021 62 mins
    Ted Shorter, CTO & Co-Founder and Ryan Sanders, Senior Product Manager
    From a security standpoint, early editions of connected vehicles had a rough start. Securing automobiles is hard – perhaps harder than just about any other device. 

    In this webinar, Ted Shorter, CTO + Co-Founder, and Ryan Sanders, Senior Product Manager, will outline the unique security challenges that engineers face when securing connected vehicles, address the role that PKI and cryptography play in securing them – and how the same principles can improve security for other connected products where high assurance and scalability are a must.
  • Keyfactor Certificate Automation with AWS and Azure Key Vault Recorded: Feb 17 2021 30 mins
    Brian Taricska, Solutions Engineer and Ryan Yackel, VP of Product Marketing
    As your business takes on new multi-cloud initiatives, securing machine identities can get out of hand quickly. While it may be easy to issue certificates from these platforms, keeping track of where they are and when they will expire can be difficult.

    Without continuous visibility into all certificates used in AWS and Azure, you are at risk of an unexpected outage that can cost seriously downtime to your business.

    In this webinar, we will dive into how Keyfactor integrates with both AWS Certificate Manager and Azure Key Vault to continuously monitor your certificate statuses and orchestrate their distribution with ease.

    Join Brian Taricska, Solutions Engineer, and Ryan Yackel, VP of Product Marketing, for a 30-minute discussion and live demo of Keyfactor + AWS Cert Management and Azure Key Vault integrations.

    See how you can use Keyfactor to:

    -Discover all keys and certificates from AWS and Azure
    -Automation of certificate deployments
    -Orchestrate workflows and alerts
  • Navigating IoT Security: Your Questions Answered by Crypto Experts Recorded: Feb 10 2021 30 mins
    Ellen Boehm, VP of IoT Strategy and Chris Conlon, Engineering Manager
    Securing vehicles is hard – perhaps harder than just about any other device. Don’t take our word for it. A simple internet search reveals that all major automobile manufacturers have experienced a vehicle security exposure.

    Join Keyfactor and wolfSSL for a Live Q&A with VP of IoT Strategy, Ellen Boehm, and Engineering Manager, Chris Conlon, as they take your questions live and discuss embedding strong cryptography into vehicle and IoT devices:

    -Unique security challenges that engineers face when securing connected vehicles
    -Address the role that cryptography plays in securing vehicles
    -Practical advice on how these same principles can improve security for other connected IoT devices where high assurance and scalability are a must
  • Self-Service Certificate Automation using Keyfactor and ServiceNow Recorded: Jan 19 2021 31 mins
    Wael Altaqi, Sr. Solutions Engineer and Ryan Sanders, Sr. Product
    Everyone from network engineers to developers need fast, easy access to trusted SSL/TLS certificates. If not, you can bet they’ll find alternative, non-compliant ways to get them.

    If you’re already using ServiceNow ITSM, it often makes sense to use the same familiar interface to give your users self-service access to certificates. In this webinar, we’ll dive into how Keyfactor integrates with ServiceNow to simplify and automate certificate requests, renewals, and alerting.

    Join Wael Altaqi, Sr. Solutions Engineer and Ryan Sanders, Sr. Product Marketing Manager, for a 30-minute discussion and live demo of the Keyfactor + ServiceNow integration.
  • Reign in Your Rogue Admins: Best Practices for Managing SSL/TLS Certificates Recorded: Dec 16 2020 34 mins
    Sami Van Vliet, Principal Product Manager at Keyfactor and Mrugesh Chandarana, Senior Product Manager at HID
    It’s not the SSL/TLS certificates you track that cause outages, it’s the unknown and untracked certificates hiding in your network – beyond your visibility. The problem is that most organizations don’t know where all of their certificates live, who uses them, and most importantly, when they expire.

    All it takes is one unexpected expiration to create a costly network or application outage. How do you keep track of every certificate in your inventory?

    In this webinar, Sami Van Vliet, Principal Product Manager at Keyfactor (and former Rogue Web Admin herself) and Mrugesh Chandarana, Senior Product Manager at HID, will walk through five best practices to monitor and control your SSL/TLS certificate inventory – and mitigate the risk of unknown and rogue certificates.

    Originally presented at the 2020 Keyfactor Critical Trust Virtual Summit.
  • Critical Trust Health Check: Insights from Keyfactor Customers Recorded: Dec 4 2020 29 mins
    Joe Elbers, Customer Success Manager and Brandon Tubandt, SVO of Operation & Customer Success
    Ever wanted to know how your PKI operations and key management practices stack up against the broader Keyfactor community?

    Join members of Keyfactor’s Customer Success Team, Joe Elbers (Customer Success Manager) and Brandon Tubandt (SVP, Operations & Customer Success), as they share some of our customer health scores and outline how you can score as high as they did with future product feature adoption.


    Originally presented at the 2020 Keyfactor Critical Trust Virtual Summit.
  • Developing a Unified Cryptography Strategy, Why Now? Recorded: Dec 4 2020 47 mins
    Kevin von Keyserling, Co-Founder and Chief Strategy Officer & Ted Shorter, Co-Founder and Chief Technology Officer
    Are you ready to manage any certificate, any key, at any time with ease? How about orchestrating crypto across your business?

    With the acceleration of enterprise infrastructure toward software-defined systems, the ubiquity of DevOps with its rapid CI/CD pipeline, instantaneous deployment of cloud-based services, and IoT devices, enterprises often end up with tens of thousands — even millions — of keys and certificates. And they're typically unaware of the total number of these entities.

    Keyfactor Co-Founders, Ted Shorter (Chief Technology Officer) and Kevin von Keyserling (Chief Strategy Officer) discuss how to get started with a unified crypto strategy, and preview what's to come from Keyfactor R&D.


    Originally presented at the 2020 Keyfactor Critical Trust Virtual Summit.
  • Top 3 Ways to Extend Certificate Management with Keyfactor Command Recorded: Dec 4 2020 35 mins
    Anthony Ricci, VP of Solutions Engineering and Rex Wheeler, Director of Product Readiness
    Keyfactor Command's flexible architecture allows our customers to extend key and certificate management throughout their connected ecosystems. But what are the top use cases our customers solve using our API?

    Find out more as the Keyfactor team walks through the top 3 use cases we see our customers employ to extend the Keyfactor platform.


    Originally presented at the 2020 Keyfactor Critical Trust Virtual Summit.
  • Assess Your Certificate Management Maturity: A Workshop with PKI Experts Recorded: Dec 2 2020 54 mins
    Sami Van Vliet, Principal Product Manager and Ryan Yackel, VP Product Marketing
    As SSL/TLS certificate usage continues to reach extreme levels, other factors like the shorter certificate lifespans, expanding use cases, and the rise of quantum have put pressure on certificate management practices.

    However, the broad scope of certificate management makes it hard to know how mature your current practices are today and where they need to be for the future. The transition from manual spreadsheet-based tracking to full certificate lifecycle automation often comes with significant bumps in the road, but in our experience, it is well worth the effort.

    That’s where this model comes in to help.

    Join Sami Van Vliet, Principal Product Manager, and Ryan Yackel, VP Product Marketing as they walk through each level of a practical guide on how to scale and automate certificate management.

    In this webinar, you will learn:
    -How to self-assess your team’s progress against five maturity levels
    -Common scenarios experienced at each level
    -Tips for implementing required process changes that will get you to your next level in certificate management maturity
  • What to Watch Out for in 2021: Top Trends in Crypto Recorded: Nov 11 2020 35 mins
    John Ray (Director of HSM Product Management, Thales), Mike Brown (CTO, ISARA), Chris Hickman (CSO, Keyfactor)
    We can agree 2020 was anything but ordinary – but what can we expect in the year ahead? From sleeping dragons to expected crypto-compromises, this panel discussion will cover some of the ways that cryptographic keys and digital certificates will be used (and misused) in 2021 and beyond.

    In this webinar, you’ll hear directly from those at the forefront of cryptography as they share insights on:

    -How IoT & DevOps are testing the limits of PKI
    -The impact of shorter SSL/TLS certificate lifecycles
    -Emerging code-signing and SSH-based attacks
    -The threat of Impending root CA expirations

    Originally presented at the 2020 Keyfactor Critical Trust Virtual Summit.
  • Real-World Results for IoT Device Design Manufacturers Recorded: Nov 2 2020 30 mins
    Brandon Hensley, Manager, Product Technology Infrastructure & Security and Ken Peirce, Senior Encryption Strategist at GM
    Join us for an intimate panel featuring security experts from the automotive and medical manufacturing industry discussing challenges and solutions for IoT device design.


    We'll walk through some real-world use cases on how Keyfactor customers solve their IoT device identity challenges and ways you might be able to do the same.

    Originally presented at the 2020 Keyfactor Critical Trust Virtual Summit.
  • Building the Business Case for a Cloud-First PKI Strategy Recorded: Oct 29 2020 22 mins
    Kevin von Keyserling, Chief Strategy Officer and Toby Gaff, Director of Solutions Engineering
    PKI is complex, and it’s only getting harder. Whether you’re ready to deploy, or you’ve taken on the responsibility to run an existing PKI, it takes more than just CA software to get it right.

    Hear directly from PKI practitioners in this webinar as they share the importance and complexity of PKI and why enterprises are making the move to cloud-hosted PKI.

    In this webinar, you’ll learn:

    -How PKI has evolved and the challenges that arise
    -If a move to the cloud is right for your organization
    -How to evaluate Managed PKI solutions

    Originally presented at the 2020 Keyfactor Critical Trust Virtual Summit.
  • Securing the CI/CD Pipeline Without Disrupting Developers Recorded: Oct 29 2020 25 mins
    Shian Sung, Senior DevSecOps Engineer at Keyfactor, and Chris Paul, Cybersecurity SME at Infinite Ranges
    During this webinar, we’ll explore how TLS and code-signing certificates fit in the CI/CD pipeline and why an integrated and automated approach is key to success. You’ll learn how to give developers fast access to certificates they need for day-to-day operations while ensuring better visibility, control, and governance for security.

    Join Shian Sung, Senior DevSecOps Engineer at Keyfactor and Chris Paul, Cybersecurity SME at Infinite Ranges as they take a technical deep-dive into common use cases and toolsets like HashiCorp Vault, Kubernetes, and Jenkins.


    Originally presented at the 2020 Keyfactor Critical Trust Virtual Summit.
  • Approaches to Deploying Post-Quantum Cryptography Recorded: Oct 28 2020 28 mins
    Russ Housley, Founder & Owner of Vigil Security & Max Pala, Principal Architect | Security Services at Cable
    Quantum is coming, so you should start freaking out now!

    Well maybe don't freak yet until you hear from two experts, with their two opposing views of how to handle post-quantum algorithms (PQC).

    Join Russ Housley, Founder & Owner of Vigil Security explains while people gain confidence in the PQC algorithms and their implementations, security protocols should mix traditional and PQC algorithms.

    Then hear from Massimiliano (Max) Pala, Principal Architect | Security Services at CableLabs, brings as he brings his expertise from the broadband industry to propose a way to augment the PKI to support quantum-safe algorithms without the need to establish separate infrastructures.

    You learn:
    - How modern (or classic) cryptography rely on problems that are hard to reverse
    - How to start planning for the day with only PQC algorithms are used​
    - When to use separate certificates for traditional and PQC algorithms​


    Originally presented at the 2020 Keyfactor Critical Trust Virtual Summit.
  • Protecting SSH Keys in Multi-Cloud Operations Recorded: Oct 28 2020 33 mins
    Mark Thompson, SVP of Product Management and Ryan Sanders, Product Marketing Manager
    You can’t survive without them, but without the right controls, SSH keys can quickly change from passwordless bliss to security black hole. People come and go, workloads are spun up and torn down, and before you know it, you have a mess of unmanaged and untracked SSH keys across your network. If even a single private key is compromised, you’re left vulnerable to attack.

    In this webinar, we will address the emerging risks of SSH key sprawl, best practices to take back control of your SSH landscape, and how the Keyfactor SSH Key Manager can help.

    Originally presented at the 2020 Keyfactor Critical Trust Virtual Summit.
  • Leadership in Cybersecurity: Insights from FinServ Experts Recorded: Oct 28 2020 37 mins
    Uri Lichtenfeld, Exec. Dir. of Tech Business Dev, Simon Hunt, EVP of Cybersecurity Product Innovation, & Ted Shorter, CTO
    Today’s ever evolving digital landscape requires cybersecurity leaders to be more agile, responsive and empathetic than ever. Join Simon Hunt, EVP of Cybersecurity Product Innovation at Mastercard, Uri Lichtenfeld, Executive Director of Technology Business Development at Morgan Stanley, and Ted Shorter, CTO at Keyfactor, for an intimate panel discussion on cybersecurity leadership insights and trends from the financial sector.  

    In this panel, you’ll hear:  
      
    -Lessons learned from the panelists combined 50+ years of experience in cybersecurity leadership 
    -How major events, like COVID-19, shift roles and priorities of senior leaders 
    -Practical strategies to protect transactions and prevent attacks in a remote-first world 


    Originally presented at the 2020 Keyfactor Critical Trust Virtual Summit.
  • Lessons Learned from PKI Experts Recorded: Oct 28 2020 29 mins
    Chris Hickman, CSO at Keyfactor, Rich Popson, CISO at Sensata Technologies, & David Falgiano, VP of Security Eng. at M&T Bank
    If Public Key Infrastructure (PKI) is so critical to enterprise security, then why do so many PKI deployments fail? Like most organizations, your lean security team is struggling to keep up with PKI maintenance compounded by growing security demands.

    But don't hear from us, hear from the experts!

    In this panel discussion, you’ll hear from PKI industry experts and current Keyfactor customers on the lessons they've learned over the years managing and deploying PKI.

    They'll as they address best practices, new opportunities for expansion, and common mistakes to avoid when planning and deploying your PKI.

    Join a panel discussion with David Falgiano, CISSP, VP of Security Engineering at M&T Bank and Rich Popson, Senior Information Security & Risk Manager (CISO) at Sensata Technologies for an engaging discussion with Keyfactor's CSO, Chris Hickman, as they answer questions like:

    -What are the key red flags or challenges you should be looking out for in your current PKI?
    -Do you or should you have a dedicated team for PKI and cryptography?
    -At what point does PKI move from a technology challenge to a business imperative?
    -What types of things do you look for in next-gen software for managing and orchestrating crypto? (e.g. keys, certs)


    Originally presented at the 2020 Keyfactor Critical Trust Virtual Summit.
  • Replacing Legacy Machine Identity Management Solutions Recorded: Oct 19 2020 33 mins
    Niko Ruhe, Senior Solutions Architect at Keyfactor and Ryan Yackel, VP of Product & Content Marketing at Keyfactor
    Thinking about making the switch from your legacy machine identity management solution? Ryan Yackel, VP of Product & Content Marketing at Keyfactor, will discuss with Niko Ruhe, Senior Solutions Architect, how his team has migrated hundreds of customers from their current certificate management solution to the Keyfactor Platform. He'll showcase how Keyfactor can be deployed quickly and efficiently while your old system is migrated at the same time.

    In this webinar, we’ll cover:

    -Machine Identity – What is it?
    -Capabilities required for machine identity management
    -Migration process from legacy solutions
    -A migration customer-success story


    Originally presented at the 2020 Keyfactor Critical Trust Virtual Summit.
Leader in Cloud-First PKI as-a-Service & Crypto-Agility Solutions
Keyfactor is the leader in cloud-first PKI as-a-Service and crypto-agility solutions. Our Crypto-Agility Platform empowers security teams to seamlessly orchestrate any key, any certificate, anywhere across the enterprise.

We help our customers apply cryptography in the right way from modern, multi-cloud enterprises to complex IoT supply chains.

With decades of cybersecurity experience, Keyfactor is trusted by more than 500 enterprises across the globe.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Approaches to Deploying Post-Quantum Cryptography
  • Live at: Oct 28 2020 4:35 pm
  • Presented by: Russ Housley, Founder & Owner of Vigil Security & Max Pala, Principal Architect | Security Services at Cable
  • From:
Your email has been sent.
or close