The road to productive quantum-safe PKI

Tuesday 9th June, 2026
Arrival: 13:00, Program begins: 13:30
overview

First-hand insights into Quantum Computing and Post-Quantum PKI readiness

During this meeting, you will receive first-hand updates on the current state of quantum computer development and post-quantum cryptographic standardization and implementation progress.

Technology providers have made significant advances in preparing quantum-resistant solutions to protect today’s systems from tomorrow’s threats. However, in practice, several use cases could not yet be realized end-to-end due to missing architectural or operational building blocks. We will provide an update on implementation readiness, practical migration approaches, and why Crypto Discovery is essential to understand your cryptographic exposure before defining priorities and allocating resources.

The tools exist. The roadmap is emerging. The time to act is now.

Quantum Computer Development Update

Quantum Computers will soon be available, it is undisputed. Today's public-key cryptography will be broken and need to be replaced with Post-Quantum Cryptography.

Post-Quantum Cryptography (PQC)

PQC standards have been defined and can be implemented. Further PQC Algorithms are under development and undergoing extensive testing.

Technology Update

Technology providers are taking proactive steps to integrate quantum-resistant capabilities, enabling organizations to build long-term digital trust.

Implementation

Technology is available and it is now essential to actively plan and promote their implementation to ensure long-term digital trust and resilience.

Speakers

Experts Will Provide First-Hand Insights  

Top expertise on post-quantum cryptography research and implementation in actionable technology

Silvio Dragone is a Senior Technical Staff Member at IBM Research Europe, located in Rüschlikon. With over two decades of experience at IBM, he has contributed significantly to cryptographic research
Silvio Dragone
Senior Technical Staff Member at IBM Research

Silvio Dragone will provide first-hand information and update on the state of its quantum computers development and post-quantum cryptographic algorithms. When can we expect quantum computers to break asymmetric cryptography methods used today, such as RSA, EC, ECDSA and other traditional algorithms.

Tomas Gustavsson is PKI developer and IT Security expert since 1994 and a founder of the EJBCA Open-SourcePKI project, a certification authority software now widely deployed inproduction globally.
Tomas Gustavsson
Chief PKI Officer at Keyfactor

Tomas Gustavsson will provide practical insights on NIST’s, and other's deadlines, how to implement quantum-resistant algorithms into your IAM fabric's PKI and signing solutions. Learn real-world steps to ensure compliance with emerging standards and safeguard your organization from future quantum threats.

agenda

A first look at what’s coming

All you need to know to attend

Tuesday, June 9th

Hotel Widder, Zürich
(view on GoogleMaps)
13:00-13:30
Welcome & Registration
13:30-13:45
Welcome note with Thomas Weber

Quantum computers will offer new opportunities and introduce new challenges for cybersecurity, requiring corporates to define strategic transformation programs that ensure long-term protection of sensitive data, systems, and trust.

13:45-14:30
Quantum Computing & Quantum-Resistant Algorithms
with Silvio Dragone, IBM

An expert update on quantum computing progress, realistic timelines, and the current status of quantum-resistant algorithms — and what this means for existing PKI and security architectures

14:30-15:15
Practical Implementation of Post-Quantum Cryptography
with Tomas Gustavsson, Keyfactor

Real-world insights into implementing PQC in existing environments, including hybrid approaches, 2025 pilot results, integration challenges, and lessons learned from early adoption projects.

15:15-15:45
Break
15:45-16:15
Crypto Discovery as the Foundation for PQC Strategy
with InfoSec Global

Why visibility into cryptographic usage is essential: identify dependencies, assess risk exposure, and build aprioritized, risk-based migration strategy grounded in data.

16:15-16:45
From Analysis to Execution: A Structured PQC Project Approach
with ID Security

A practical roadmap outlining phased project steps — discovery, risk assessment, prioritization, pilot, and rollout— enabling organizations to move from awareness to controlled implementation.

16:45-17:15
Panel Discussion
17:15-17:30
Closing Remark
17:30-19:00
Networking Aperitif

Don't miss out, register now

Join us for a day packed with information and networking possibilities