3KeyNote 2024
-
Break
Done
-
Building a Robust Cryptography Inventory for the Post-Quantum Era
Roman CinkaisDone
-
Aligning Teams and Roles in CZERTAINLY: An Effective Approach
Jakub MorávekDone
-
Networking
Organizers, Participants, Partners, AttendeesDone
-
Leveraging eIDAS Solutions for Faster Digitalization and Enhanced Document Security
Jack PiekarskiDone
-
Welcome Note
Done
-
Future-Proofing Security with Crypto Agility
Giulio GennariDone
-
Registration and Breakfast
Done
-
Public Certificate Monitoring and Transparency
Jan TomášekDone
-
Resource Management: The Often Overlooked Key to Sustained Trust and Security
Ahmad HerzallahDone
This presentation provides an overview of essential cryptography requirements from a subset of security frameworks like PCI DSS 4.0, NIS 2 Directive, ISO 27001 and their impact on PKI landscape. We will explore how to achieve effective compliance using PKI tools and encryption management, and review the latest updates in these critical security standards and directives. Attendees will gain insights into implementing these technologies and standards to enhance organizational security and compliance. Ideal for IT professionals and security managers, this session offers practical guidance on navigating the impending pressure on companies to effectively tackle modern cybernetic threats.