̽»¨ÊÓÆµ

̽»¨ÊÓÆµ, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

Fortanix-Microsite-Logo.png
Fortanix

Managing the Transition to Post-Quantum Cryptography (PQC)


Event Date: December 17, 2024
Hosted By: Fortanix & ̽»¨ÊÓÆµ

Under National Security Memorandum/NSM-10, United States government agencies and industry are directed to “prioritize the timely and equitable transition of cryptographic systems to quantum-resistant cryptography” (PQC) by 2035. Agencies require visibility of their cryptographic inventory and support for new algorithms, standardized by NIST, to report progress towards this strategic goal. In the implementation of cryptographic systems, NSM-10 emphasizes the need for “cryptographic agility, both to reduce the time required to transition and to allow for seamless updates for future cryptographic standards.”

Watch the on-demand recording of the webinar where we discussed how the Fortanix® Data Security Manager™ and Key Insight™ technologies can support agencies in their transition to PQC standards for quantum information security. We discussed relevant developments in quantum computing that reinforce the need to act now in respect of PQC migration. We also provided an overview of necessary capabilities for robust cryptographic security and cryptographic agility.

During this webinar, attendees learned more about:

  • Automated cryptographic key discovery and inventory management
  • Role-based access control (RBAC) for human and machine users
  • Configurable policy management and auditability
  • Agile cryptographic implementation and control
  • Scalability and ease of integration
Access the on-demand recording to learn more about managing the transition to Post-Quantum Cryptography!

Fill out the form below to view this archived event.


Resources


Featured

This Dell Technologies resource outlines their approach to delivering comprehensive solutions tailored to customer outcomes, particularly in the federal and defense sectors. It emphasizes the integration of cutting-edge technologies and partnerships to address evolving challenges like security, digi...

Automate Threat Advisories and Post-hoc Detection for Cyber Rapid Response.

SBOM Manager
Datasheet
Stay compliant with regulations and ahead of industry trends by gaining immediate insights into your SBOM portfolio. Empower your team to ingest, generate, store, manage, monitor and distribute SBOMs for the software you build, OSS you use, and 3rd party vendor applications—all in one place with Son...

Achieve Complete Visibility, Behavior Analytics and Real-Time Reports for Your Zscaler Log Data.

SentryCard is created for organizations that need absolute certainty about who is entering their facilities, accessing their devices, or logging into their websites.

When the U.S. Army looked into technology that could spot funds with the potential to be lost due to expiring contracts, it tapped AI to find contracts with unused funds, empowering contracting officers to reclaim the money and reallocate it to other vital areas—boosting the deobligation rate ...

 Discover how the Axway VA Suite offers a versatile and robust certificate validation solution for both standard and custom desktop and server applications.

Aqua’s Cloud Native Application Protection Platform (CNAPP) protects your cloud native applications with a single, unified solution throughout their entire lifecycle. Unifying key security capabilities, CNAPP can protect against both known and unknown threads using a combination of shift-left ...

In the AI and Machine Learning boom, organizations vie for data and model scalability. Collaboration with third-party organizations (TPOs) is crucial yet hindered by data and model confidentiality concerns. Download this datasheet to learn how Duality’s Secure Collaborative AI solution addresses the...

National security agencies face a tough task in maintaining operational security while analyzing data across domains. Traditional methods involve centralized data collection, which is costly and poses privacy risks. Download this datasheet to learn how Duality Zero Footprint Investigations and Intel...