-
Registration and Breakfast
Oct. 21
-
3Key Note
Oct. 21
-
The impact of Generative AI and Deepfake on the transparency and authenticity of information
Roman CinkaisOct. 21
-
Practical guide on how to use CBOM to build cryptographic visibility
Jiří LuckýOct. 21
-
Break
Oct. 21
-
Securing the Future: NIS2 and the Role of PKI
Michal TutkoOct. 21
-
Lunch
Oct. 21
-
Beyond Spreadsheets: Managing a Comprehensive Certificate Inventory
Lubomír WassermannOct. 21
-
The Changing Face of Certification Authorities: Compliance, Agility, and Trust
Oct. 21
-
Break
Oct. 21
In modern PKI and certificate lifecycle systems, strong auditing and logging capabilities are foundational to securing trust, accountability, and compliance. This session explores how CZERTAINLY captures rich audit records of all system and user activities across the platform — from certificate issuance and revocation to policy changes and administrative actions.
You’ll gain insight into the internal architecture of CZERTAINLY logs, including log schemas, event metadata, and retention concerns. Then, through a step-by-step demonstration, we’ll show how to export audit data into an Elastic (Elasticsearch) index, configure parsers and mappings, and build meaningful visualizations in Kibana. You'll walk away with hands-on know-how to surface trends, detect anomalies, generate compliance reports, and integrate operational insights into your security stack.
Whether you’re building your first audit pipeline or optimizing visibility in a mature PKI environment, this talk will equip you with the patterns and best practices to turn raw logs into actionable, high-fidelity observability.