InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

From FIPS 140-2 to 140-3: What You Need to Know Before Time Runs Out

Presented by

Surbhi Singh, Senior Consultant at Encryption Consulting

About this talk

The transition from FIPS 140-2 to FIPS 140-3 is an important step toward modernizing cryptographic security. While FIPS 140-2 validations remain in effect until September 21, 2026, moving to FIPS 140-3 ensures continued alignment with federal standards. This webinar is designed to help organizations better understand what the transition means in practical terms. We'll cover the key differences between FIPS 140-2 and FIPS 140-3, outline what to expect during the transition process, and share best practices to help you plan ahead with confidence. Whether you’re at the beginning of your journey or already preparing, this session will provide the clarity and insights you need to move forward smoothly. Key Takeaways: - Get a clear understanding of the FIPS 140-3 transition timeline and what the 2026 milestone means for cryptographic modules. - Learn the key technical and procedural differences between FIPS 140-2 and FIPS 140-3. - Understand the potential challenges of using modules certified under older standards as the transition progresses. - Gain insights on how to review your cryptographic environment and prepare for future certification requirements. - Walk away with practical steps to begin planning your transition to FIPS 140-3 with clarity and confidence.
Encryption Consulting LLC

Encryption Consulting LLC

1632 subscribers63 talks
Global Leaders in Applied Cryptography!
We are the world's leading provider of applied cryptography. Over 100 Fortune 500 corporations have sought our help in protecting their most sensitive data and solving the most complex problems. Through our products and professional services, you can strengthen your ability to protect cryptographic keys, digital certificates, software code signing, Certificate Lifecycle management, and more. We are committed to staying up-to-date with the latest technology trends, compliances, and best practices in data security, and we leverage this expertise to help our clients achieve their security goals.
Related topics