̽»¨ÊÓÆµ

̽»¨ÊÓÆµ, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

Fortanix-Microsite-Logo.png
Multi-Vendor

WEST 2025 Executive Briefing Series: Leveraging Confidential Computing to Address Post-Quantum Cryptography (PQC) Challenges


Event Date: January 29, 2025
Hosted By: Fortanix & ̽»¨ÊÓÆµ
Location: San Diego, CA

Fortanix and ̽»¨ÊÓÆµ partnered at WEST 2025 for an Executive Briefing Session to explore how your team could innovate, adapt, and collaborate.

As quantum computing advances, it poses new challenges threatening the encryption methods we rely on today, compromising the security of sensitive information. attendees oined us at WEST 2025 for an exclusive executive briefing exploring how to safeguard their sensitive information by leveraging confidential computing.

During this session, attendees gained insight into the key technologies used to address these challenges:

  • Confidential Computing: This approach ensures that data remains protected, even during processing
  • Post-Quantum Cryptography (PQC): The new encryption methods designed to withstand future quantum threats

Attendees discovered how integrating these technologies creates a comprehensive defense mechanism that not only protects their data now but also prepares their organization for the quantum future.

Resources


Tenable-microsite.png
Resources

Tenable and HCL BigFix Reduce Risk by Optimizing Remediation Workflows

Understanding the most critical vulnerabilities and using that information to match with the right remediation steps is a constant challenge for today’s organizations. They lack visibility of their attack surface, are usually guessing to prioritize vulnerabilities using antiquated methods like CVSS and fall short with the proper remediation steps. Functionally, security teams are tasked with identifying and prioritizing those vulnerability insights and IT operations are responsible for remediating the affected assets. To be effective in reducing cyber risk, these disparate teams need to work in unison. But, they constantly find themselves out of sync, sometimes resorting to inefficient collaboration methods such as email or spreadsheets that lack the proper remediation steps. Even IT ticketing systems fall short as they lack the ‘last mile’ when it comes to the actual remediation process. The result of these fragmented, manual steps requires a lot of time and resources to keep up with remediation efforts. IT never has the time to be up to date with the most relevant findings that security sends them. This drives the need to optimize remediation workflows by combining the proper security context with automated patch management to tackle vulnerabilities that pose the greatest risk to the business.


Fill out the form below to view this Resource.