-
Aligning Teams and Roles in CZERTAINLY: An Effective Approach
Jakub MorávekDone
-
Mastering Cryptography in Compliance Standards
Michal TutkoDone
-
Break
Done
-
Closing Note
Roman CinkaisDone
-
Future-Proofing Security with Crypto Agility
Giulio GennariDone
-
Resource Management: The Often Overlooked Key to Sustained Trust and Security
Ahmad HerzallahDone
-
Registration and Breakfast
Done
-
PKI Maturity Model Updates
Jiří LuckýDone
-
Welcome Note
Done
-
Building a Robust Cryptography Inventory for the Post-Quantum Era
Roman CinkaisDone
We will delve into the critical processes behind the issuance and management of public certificates, which are foundational to secure online communications. The session will begin with an overview of how public certificates are issued, highlighting the key entities involved and the steps necessary to ensure trust in digital certificates. Following this, we will explore Certificate Transparency (CT) logs, explaining their role in enhancing the security and reliability of the certificate ecosystem by providing a public record of certificates issued by Certificate Authorities (CAs).
The presentation will then transition to the practical aspect of monitoring public certificates using the CZERTAINLY platform. We will demonstrate how CZERTAINLY can be leveraged to track and manage certificates, ensuring that potential threats, such as misissued certificates, are promptly detected and addressed. This live demonstration will showcase the platform's features, including automated certificate discovery, alerting mechanisms, and integration with CT logs, offering a comprehensive approach to maintaining the integrity and security of public certificates.