-
Building a Robust Cryptography Inventory for the Post-Quantum Era
Roman CinkaisDone
-
Aligning Teams and Roles in CZERTAINLY: An Effective Approach
Jakub MorávekDone
-
PKI Maturity Model Updates
Jiří LuckýDone
-
Networking
Organizers, Participants, Partners, AttendeesDone
-
Resource Management: The Often Overlooked Key to Sustained Trust and Security
Ahmad HerzallahDone
-
Public Certificate Monitoring and Transparency
Jan TomášekDone
-
Closing Note
Roman CinkaisDone
-
Break
Done
-
Future-Proofing Security with Crypto Agility
Giulio GennariDone
-
Leveraging eIDAS Solutions for Faster Digitalization and Enhanced Document Security
Jack PiekarskiDone
This presentation provides an overview of essential cryptography requirements from a subset of security frameworks like PCI DSS 4.0, NIS 2 Directive, ISO 27001 and their impact on PKI landscape. We will explore how to achieve effective compliance using PKI tools and encryption management, and review the latest updates in these critical security standards and directives. Attendees will gain insights into implementing these technologies and standards to enhance organizational security and compliance. Ideal for IT professionals and security managers, this session offers practical guidance on navigating the impending pressure on companies to effectively tackle modern cybernetic threats.