-
The Changing Face of Certification Authorities: Compliance, Agility, and Trust
-
Registration and Breakfast
Done
-
Strategic Roadmap for Our Products and Services
3Key TeamDone
-
Closing Note
Done
-
Lunch
Done
-
The impact of Generative AI and Deepfake on the transparency and authenticity of information
Roman CinkaisDone
-
Securing the Future: NIS2 and the Role of PKI
Michal TutkoDone
-
Break
Done
-
Break
Done
-
3Key Note
Done
In today’s interconnected world, trust is no longer static — it must be built, maintained, verified, and retired continuously across the full lifecycle of systems and devices. In this talk, I will introduce the concept of Trust Lifecycle Management (TLM): what it is, why it’s critical, how it spans from deeply embedded devices to large-scale enterprise systems, and why legacy security solutions fall short.
You will walk away with:
- A clear framework for what stages make up a trust lifecycle (e.g. trust bootstrapping, attestation, renewal, revocation, auditing) and how they interoperate
- Concrete examples showing how TLM helps manage risk in heterogeneous environments — from IoT and embedded firmware to cloud services and organizational policies
- A diagnosis of why conventional security approaches (e.g. perimeter firewalls, identity-only models, point-in-time credential management) are insufficient in modern dynamic environments
- Practical lessons and guidelines for architecting a TLM-capable system, as well as pitfalls to watch out for
Whether you are designing secure devices, building enterprise infrastructure, or bridging between them, this talk will help you see trust not as a one-time checkbox but as a dynamic asset — and will equip you with tools to operationalize that mindset in your environment.