Post-quantum cryptography & crypto agility: Rethinking security - SITS
Webinar Aufzeichnung

Post-quantum cryptography & crypto agility: Rethinking security

ONLINE
ENGLISH

Companies are facing the challenge of introducing crypto-agile processes as cryptographic methods and regulatory requirements continue to evolve. At the same time, the threat posed by quantum computers, which could break traditional encryption methods, is growing.

However, switching to new cryptographic methods is complex: Many companies do not have a complete inventory of their cryptography, and migration processes are often tied to numerous technical dependencies. As a result, updating can take a lot of time, time that is scarce in light of the evolving threat landscape."

Crypto-agility provides a solution here. It enables cryptographic methods to be replaced flexibly and efficiently with better alternatives, without the need to fundamentally change existing systems or processes. Join our webinar to learn how you can successfully implement crypto-agility in your organization.

Agenda

  • Why is crypto agility crucial today?

    The challenges of constantly changing cryptography and the threat posed by quantum computers.

  • The building blocks of crypto-agile processes

    What does it take to adapt cryptographic processes flexibly and securely?

  • Cryptography inventory: Analyzing and evaluating systems

    How to gain an overview of cryptographic processes in your systems.

  • Best practices for secure migration

    Successful strategies for updating cryptographic processes – with a focus on post-quantum security.