The road to productive quantum-safe PKI
Arrival: 13:00, Program begins: 13:30
First-hand insights into Quantum Computing and Post-Quantum PKI readiness
During this meeting, you will receive first-hand updates on the current state of quantum computer development and post-quantum cryptographic standardization and implementation progress.
Technology providers have made significant advances in preparing quantum-resistant solutions to protect today’s systems from tomorrow’s threats. However, in practice, several use cases could not yet be realized end-to-end due to missing architectural or operational building blocks. We will provide an update on implementation readiness, practical migration approaches, and why Crypto Discovery is essential to understand your cryptographic exposure before defining priorities and allocating resources.
The tools exist. The roadmap is emerging. The time to act is now.
Quantum Computer Development Update
Quantum Computers will soon be available, it is undisputed. Today's public-key cryptography will be broken and need to be replaced with Post-Quantum Cryptography.
Post-Quantum Cryptography (PQC)
PQC standards have been defined and can be implemented. Further PQC Algorithms are under development and undergoing extensive testing.
Technology Update
Technology providers are taking proactive steps to integrate quantum-resistant capabilities, enabling organizations to build long-term digital trust.
Implementation
Technology is available and it is now essential to actively plan and promote their implementation to ensure long-term digital trust and resilience.
Experts Will Provide First-Hand Insights
Top expertise on post-quantum cryptography research and implementation in actionable technology

Silvio Dragone will provide first-hand information and update on the state of its quantum computers development and post-quantum cryptographic algorithms. When can we expect quantum computers to break asymmetric cryptography methods used today, such as RSA, EC, ECDSA and other traditional algorithms.

Tomas Gustavsson will provide practical insights on NIST’s, and other's deadlines, how to implement quantum-resistant algorithms into your IAM fabric's PKI and signing solutions. Learn real-world steps to ensure compliance with emerging standards and safeguard your organization from future quantum threats.

Silvio Dragone will provide first-hand information and update on the state of its quantum computers development and post-quantum cryptographic algorithms. When can we expect quantum computers to break asymmetric cryptography methods used today, such as RSA, EC, ECDSA and other traditional algorithms.

Tomas Gustavsson will provide practical insights on NIST’s, and other's deadlines, how to implement quantum-resistant algorithms into your IAM fabric's PKI and signing solutions. Learn real-world steps to ensure compliance with emerging standards and safeguard your organization from future quantum threats.
A first look at what’s coming
All you need to know to attend
Tuesday, June 9th
Quantum computers will offer new opportunities and introduce new challenges for cybersecurity, requiring corporates to define strategic transformation programs that ensure long-term protection of sensitive data, systems, and trust.

with Silvio Dragone, IBM
An expert update on quantum computing progress, realistic timelines, and the current status of quantum-resistant algorithms — and what this means for existing PKI and security architectures

with Tomas Gustavsson, Keyfactor
Real-world insights into implementing PQC in existing environments, including hybrid approaches, 2025 pilot results, integration challenges, and lessons learned from early adoption projects.
with InfoSec Global
Why visibility into cryptographic usage is essential: identify dependencies, assess risk exposure, and build aprioritized, risk-based migration strategy grounded in data.
with ID Security
A practical roadmap outlining phased project steps — discovery, risk assessment, prioritization, pilot, and rollout— enabling organizations to move from awareness to controlled implementation.
