InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Planning for Algorithm Deprecation and PQC Migration Across Your Cryptographic Infrastructure

Presented by

Parnashree Saha, Security Architect at Encryption Consulting

About this talk

With NIST’s selection of post-quantum algorithms now finalized and global timelines beginning to take shape, cryptographic change is no longer a distant concern. Organizations that rely on public-key infrastructure, code signing, or encrypted communications need to start preparing for this shift to ensure long-term resilience and compliance. In this webinar, we’ll unpack what the transition to quantum-safe cryptography means in practical terms. From understanding algorithm deprecation to identifying impacted systems, you’ll gain clear guidance on how to begin or advance your journey toward crypto agility. Whether you're managing certificates, building secure systems, or guiding organizational risk, this session will help you move forward with clarity and confidence. Key Takeaways: - Understand what the move to post-quantum cryptography means for RSA, ECC, and other current algorithms - Learn how to identify and assess your cryptographic assets and dependencies - Explore what a practical PQC readiness roadmap looks like - Get insight into the latest NIST algorithm selections and timelines - Discover ways to reduce disruption while building toward quantum-safe infrastructure
Encryption Consulting LLC

Encryption Consulting LLC

1665 subscribers64 talks
Global Leaders in Applied Cryptography!
We are the world's leading provider of applied cryptography. Over 100 Fortune 500 corporations have sought our help in protecting their most sensitive data and solving the most complex problems. Through our products and professional services, you can strengthen your ability to protect cryptographic keys, digital certificates, software code signing, Certificate Lifecycle management, and more. We are committed to staying up-to-date with the latest technology trends, compliances, and best practices in data security, and we leverage this expertise to help our clients achieve their security goals.
Related topics