-
The Changing Face of Certification Authorities: Compliance, Agility, and Trust
-
Beyond Spreadsheets: Managing a Comprehensive Certificate Inventory
Lubomír WassermannDone
-
Interoperable Digital Signing with CSC API
Done
-
3Key Note
Done
-
The impact of Generative AI and Deepfake on the transparency and authenticity of information
Roman CinkaisDone
-
From Cryptographic Events to Kibana Dashboards
Jakub MorávekDone
-
Closing Note
Done
-
Registration and Breakfast
Done
-
Strategic Roadmap for Our Products and Services
3Key TeamDone
-
Securing the Future: NIS2 and the Role of PKI
Michal TutkoDone
In today’s interconnected world, trust is no longer static — it must be built, maintained, verified, and retired continuously across the full lifecycle of systems and devices. In this talk, I will introduce the concept of Trust Lifecycle Management (TLM): what it is, why it’s critical, how it spans from deeply embedded devices to large-scale enterprise systems, and why legacy security solutions fall short.
You will walk away with:
- A clear framework for what stages make up a trust lifecycle (e.g. trust bootstrapping, attestation, renewal, revocation, auditing) and how they interoperate
- Concrete examples showing how TLM helps manage risk in heterogeneous environments — from IoT and embedded firmware to cloud services and organizational policies
- A diagnosis of why conventional security approaches (e.g. perimeter firewalls, identity-only models, point-in-time credential management) are insufficient in modern dynamic environments
- Practical lessons and guidelines for architecting a TLM-capable system, as well as pitfalls to watch out for
Whether you are designing secure devices, building enterprise infrastructure, or bridging between them, this talk will help you see trust not as a one-time checkbox but as a dynamic asset — and will equip you with tools to operationalize that mindset in your environment.