- 
                            
    The Changing Face of Certification Authorities: Compliance, Agility, and Trust
    
- 
                            
    Interoperable Digital Signing with CSC API
    Done
- 
                            
    Networking
    Done
- 
                            
    Break
    Done
- 
                            
    Break
    Done
- 
                            
    Strategic Roadmap for Our Products and Services
    3Key TeamDone
- 
                            
    Practical guide on how to use CBOM to build cryptographic visibility
    Jiří LuckýDone
- 
                            
    Beyond Spreadsheets: Managing a Comprehensive Certificate Inventory
    Lubomír WassermannDone
- 
                            
    From Device to Enterprise: Why Trust Lifecycle Management Is the Missing Link in Secure Systems
    GuestsDone
- 
                            
    Registration and Breakfast
    Done
Generative AI and deepfake technologies are reshaping the digital landscape — offering powerful new capabilities but also introducing profound risks to information integrity and trust. As manipulated and fabricated content becomes increasingly indistinguishable from reality, verifying the authenticity and provenance of digital information has never been more critical.
This presentation explores how Public Key Infrastructure (PKI) and related cryptographic mechanisms can help restore trust in a world of synthetic media. We will examine practical applications such as digital signatures, code signing, and trusted timestamping that ensure the origin, integrity, and authenticity of content across domains. The session will also introduce emerging initiatives like the C2PA standard, which extends content provenance and authenticity across image, video, and document ecosystems.
By focusing on PKI-based trust frameworks, the session demonstrates how cryptographic assurance can counter manipulation, enhance transparency, and build long-term resilience in the evolving digital information environment.