InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Introduction to CNSA 2.0- Inside the NSA’s Push for Quantum-Resistant Security

Presented by

Surbhi Singh, Senior Consultant at Encryption Consulting

About this talk

As quantum threats grow closer to reality, cybersecurity leaders must prepare their cryptographic infrastructures for a post-quantum future. CNSA 2.0, introduced by the NSA, outlines a suite of cryptographic algorithms designed to protect National Security Systems (NSS) from both current and future attacks. In this session, we break down what CNSA 2.0 means for you. From timelines and algorithm changes to hybrid cryptography and real-world implementation guidance, this webinar will equip you with the insights to transition securely and strategically. Key Takeaways: Understand what CNSA 2.0 is and how it differs from CNSA 1.0 Explore the approved algorithm suite including ML-DSA, ML-KEM, SHA-2, and SHA-3 Review transition timelines, adoption mandates, and enforcement mechanisms Learn how hybrid cryptography plays a role during the transition Get ahead of compliance requirements and vendor expectations Discover how to build a crypto-agile code signing strategy aligned with CNSA 2.0 See how Encryption Consulting can support your PQC readiness journey
Encryption Consulting LLC

Encryption Consulting LLC

1672 subscribers65 talks
Global Leaders in Applied Cryptography!
We are the world's leading provider of applied cryptography. Over 100 Fortune 500 corporations have sought our help in protecting their most sensitive data and solving the most complex problems. Through our products and professional services, you can strengthen your ability to protect cryptographic keys, digital certificates, software code signing, Certificate Lifecycle management, and more. We are committed to staying up-to-date with the latest technology trends, compliances, and best practices in data security, and we leverage this expertise to help our clients achieve their security goals.
Related topics