Featured
Make cryptographic mistakes of the past the keys to your future!
Robert Hann, VP of Sales, Digital Security, Entrust & Julien Probst, Chief Customer Officer, InfoSec Global
Do you have full visibility into all your cryptographic assets? Your organization relies on those assets to ensure all the people, systems and machines in your environment are secured, and without visibility, you can’t control your risk. Whether trying to rein in distributed IT environments, ensuring you’re able to quickly react to changing standards and regulations, or preparing for the looming threat of post-quantum – knowing what’s in your environment is critical, and the first step to crypto agility.
Join Entrust and InfoSec Global to learn why discovery of your cryptographic assets is so important, and why having an inventory of certificates and cryptographic assets across your organization is the key to the future of your security.
All episodes
-
Post Quantum Series: I. What is the state of the quantum world?
John Gray, PKI Software Architect
Post quantum experts at Entrust Datacard have been working closely with think tanks and academic leaders who are doing advanced research on quantum computing.
We’re sharing our insights with IT professionals through our three-part post quantum webinar series.Perhaps you’ve heard a little bit about quantum computing, but you’re not quite sure what to make of it? You’re not alone. Many IT professionals are still not clear on what it is or how it will impact their business.
Get a better understanding of quantum computing and find out what you need to know in the first session of our three-part webinar series:
• What common cryptographic protocols will need to be migrated to post quantum algorithms
• There is no 'one size fits all' – choosing PQ algorithms to fit your use cases
• How to determine the right time to deploy post quantum crypto for data with different "shelf-lives" -
Post Quantum Series: II. Preparing for a post quantum world
Mike Ounsworth, Software Security Architect, Entrust Datacard and John Gray, PKI Software Architect, Entrust Datacard
Learn how to prepare for a future where quantum computing power will be able to break existing RSA and ECC cryptographic algorithms, as well other topics surrounding post quantum cryptography that are critical to understanding the impact quantum computing will have on the world and your business.
• What are the post quantum cryptography replacements for RSA and ECC?
• What are the international standards bodies doing to prepare for a post quantum world?
• What can your organization do right now to prepare for the future? -
Post Quantum Series: III. The Road to Post Quantum Crypto Agility
Mike Ounsworth, Software Security Architect, Entrust Datacard
Post quantum experts at Entrust Datacard have been working closely with think tanks and academic leaders who are doing advanced research on quantum computing. We’re sharing our insights on specific tasks that will help you plan and prepare your organization for a PQ world.
• Common cryptographic protocols that will need to be migrated to post quantum
• When to employ commonly used cryptographic applications and protocols and when to use different PQ algorithms
• How to determine the right time to deploy post quantum crypto when different kinds of data have different “shelf-lives” -
The Great Disruptors: DevOps, IoT, Cloud, WFH, and Multi-Cloud Environments
Jay Schiavo / VP, ECS Products and Markets / Entrust
Best Practices for Creating a Strong Cryptographic Strategy for Ongoing Crypto Excellence
Topics will include:
What is a Cryptographic Center of Excellence?
Crypto is critical infrastructure
How to navigate the demands of changing regulations and expanding use cases
The importance of establishing a CryptoCoE
A new approach: five building blocks for Entrust CryptoCoE
Q&A -
The future of cryptography?
NA
It’s the year 2030: Quantum computers are capable of cracking all of the public-key algorithms that provided protection for sensitive data in 2021. Hackers use them to access information in private emails and state authorities use them to obtain data belonging to suspicious institutions. Debit card payments are no longer possible, and trading in cryptocurrencies such as Bitcoin is vulnerable to attack.
Experts predict that within ten years there will be functioning quantum computers capable of calculating mathematical problems such as the prime factorization of very large numbers millions of times faster than today’s normal computers. And those quantum computers would be able to crack encryption methods which we now believe to be secure.
How realistic is this prediction, and what does it mean for cryptography?
Join this live webcast to
- Hear why organizations need to start thinking about post-quantum security threats now: Migrating to post-quantum cryptography will be difficult. One of the key reasons to start thinking about PQ early is to ensure your business is crypto agile; knowing where you use cryptography, understanding its criticality to your operations and to start preparing today for the shape of things to come.
- Discover how HSMs provide assurance against unauthorized access to data and identity in a world rife with both internal and external security challenges: Cryptocurrencies and non-fungible tokens (NFTs) are hot investments – representing new forms of digital assets that are disrupting traditional financial services. It’s clear we are witnessing a rapid expansion of the digital asset market and the exponential growth of the role of digital asset custodians. -
How governments are getting serious about cybersecurity
Jenn Markey, VP of Product Mkgt (Payments & Identity), Entrust Samantha Mabey, Director of Product Mkgt Mgt, Entrust
There have been some recent notable breaches – like SolarWinds in early 2020 – that have directly impacted several organizations and the top branches of the US government. And if nothing else, it underlined the urgent need for more stringent cybersecurity measures and regulations. From the DoD introducing their Cybersecurity Maturity Model Certification (CMMC) framework, to the White House Executive order around improving the nation’s cybersecurity, to the United Nations agreeing on a framework for responsible nation-state behavior, governments around the globe are getting serious when it comes to cybersecurity. Join us for this webinar where we will revisit some of these high profile breaches and what’s being done to prevent similar incidents in the future.
• Federal and local / state perspectives
• Foundational security practices
• The evolving landscape in IoT security
• Looking ahead in Post Quantum -
Best Practices for Creating a Strong Cryptographic Strategy
Jay Schiavo - VP, Products
Our panel of experts unveiled the CryptoCoE. In this webinar you will discover the thinking that went behind creating the building blocks for a cryptographic center of excellence. You will also hear from Entrust’s security leaders who were able to leverage these new tools and resources to bolster our own defenses against crypto related threats. Top 3 Takeaways:
o Why a CryptoCoE is essential for digital business
o Overview of the new Entrust CryptoCoE
o Entrust case study illuminating the role and value of a CryptoCoE -
Securing Digital Business: PKI
Chris Bailey - VP of Strategy, Entrust
For the third webinar of our CryptoCoE best practices webinars series, we brought together a panel of PKI, compliance, and cryptographic strategy experts to discuss the significant role well-managed PKIs play in protecting data, systems, and users. PKI, a Critical Enabler for Securing Digital Transformation. Topics included:
o Q&A on best practices for establishing, running, and maintaining a compliant PKI
o Mitigating risk around cryptographic dependent operations
o Bringing PKI services into compliance with industry requirements
o A new approach to improved cryptographic strategy -
Crypto Governance: Laying the Foundation for a Strong Crypto Strategy
Neal Fuerst, Director of Technology & Solutions at Entrust
The Entrust Cryptographic Center of Excellence (CryptoCoE) is designed to help organizations balance the risk associated with IT practices that expand crypto use cases by accelerating a crypto strategy for enhanced digital security.
In the second webinar of our CryptoCoE webinar series, we discuss best practices for bringing the right policies, procedures, processes and people together for ongoing crypto excellence. In this webinar you can expect to learn more about:
The foundation and concept that lies above and behind crypto policy
• Assessing the crypto governance posture of your IT systems
• How to build strong governance in stages
• Understanding data protection – what and how to protect it
• Data-at-rest and data-in-transit
• Asymetric vs. symetric cryptography
• Mapping crypto to applicable Data Protection Standards and Regulatory Requirements
• A new approach: why establishing a CryptoCoE is important for securing crypto as critical infrastructure -
Make cryptographic mistakes of the past the keys to your future!
Robert Hann, VP of Sales, Digital Security, Entrust & Julien Probst, Chief Customer Officer, InfoSec Global
Do you have full visibility into all your cryptographic assets? Your organization relies on those assets to ensure all the people, systems and machines in your environment are secured, and without visibility, you can’t control your risk. Whether trying to rein in distributed IT environments, ensuring you’re able to quickly react to changing standards and regulations, or preparing for the looming threat of post-quantum – knowing what’s in your environment is critical, and the first step to crypto agility.
Join Entrust and InfoSec Global to learn why discovery of your cryptographic assets is so important, and why having an inventory of certificates and cryptographic assets across your organization is the key to the future of your security.