Webinars Search 24 ITEMS
Best Practices for Bringing the Right Policies, Procedures, Processes and People Together for Ongoing Crypto Excellence
The Entrust Cryptographic Center of Excellence (CryptoCoE) is designed to help organizations balance the risk associated with IT practices that expand crypto use cases by accelerating a crypto strategy for enhanced digital security. In the second webinar of our CryptoCoE webinar series, we discuss best practices for bringing the right policies, procedures, processes and people together for ongoing crypto excellence.
The CA/Browser Forum has approved a new policy, planned to take effect on October 1, 2021, that will standardize both OV and EV TLS/SSL to the same validation period: 398 days. This shorter period will undoubtedly require your team to spend more time each year completing domain validation for TLS/SSL certificates. This webinar offers best practices your team can implement today to prepare for these changes.
For thousands of years, we have associated identity with people. Identifying ourselves and others has enabled many generations of humans to authenticate, control or gain access, and build trust in individuals and communities. Over the last few decades, as we have become accustomed to the need to identify machines and manage access to networks and information systems, we have seen a shift in focus to trust in those networks and systems. Now we stand on the threshold of technological developments that will challenge our understanding of identity and trust, and demand that we evolve our responses accordingly. Drawing on her cutting-edge research, Dr Baines will take us on a journey to a near future in which people are outnumbered, and authenticity is way more complex than establishing who’s real and who’s a bot. Webinar Topics • Reframe your views on identity and trust • Discover emerging technologies that will transform security
What is a Cryptographic Center of Excellence? Crypto is critical infrastructure How to navigate the demands of changing regulations and expanding use cases The importance of establishing a CryptoCoE A new approach: five building blocks for Entrust CryptoCoE Q&A
Alors que la plupart des secteurs adoptent davantage de services basés dans le cloud afin de répondre au mieux aux exigences de leurs clients et gagner en souplesse, en efficacité et en rentabilité, ils doivent garder à l'esprit que la perte, le vol ou l'utilisation abusive d'une seule clé cryptographique critique suffit à avoir un impact significatif sur l'entreprise.
Create user-optimized, authenticated, tamper-proof pdfs with Entrust and iText. With the pandemic forcing the adoption of remote work, digital transformation has quickly made it to the top of the priority list for many organizations. Replacing paper documents with an electronic version is one of the many tasks you may be facing as part of this transformation. In this webinar, you’ll discover how easy it is to generate optimized, authenticated, tamper-proof PDF documents using iText 7 and Entrust Signing Automation Service. • Challenges of switching from paper to PDF • How iText can help (iText 7 Core) • How Entrust can help (Entrust Signing Automation Service) • Demo of how they work together • Q&A
Learn how to prepare for a future where quantum computing power will be able to break existing RSA and ECC cryptographic algorithms, as well other topics surrounding post quantum cryptography that are critical to understanding the impact quantum computing will have on the world and your business. • What are the post quantum cryptography replacements for RSA and ECC? • What are the international standards bodies doing to prepare for a post quantum world? • What can your organization do right now to prepare for the future?
Post quantum experts at Entrust Datacard have been working closely with think tanks and academic leaders who are doing advanced research on quantum computing. We’re sharing our insights with IT professionals through our three-part post quantum webinar series. Perhaps you’ve heard a little bit about quantum computing, but you’re not quite sure what to make of it? You’re not alone. Many IT professionals are still not clear on what it is or how it will impact their business. Get a better understanding of quantum computing and find out what you need to know in the first session of our three-part webinar series: • What common cryptographic protocols will need to be migrated to post quantum algorithms • There is no 'one size fits all' – choosing PQ algorithms to fit your use cases • How to determine the right time to deploy post quantum crypto for data with different "shelf-lives"
Post quantum experts at Entrust Datacard have been working closely with think tanks and academic leaders who are doing advanced research on quantum computing. We’re sharing our insights on specific tasks that will help you plan and prepare your organization for a PQ world. • Common cryptographic protocols that will need to be migrated to post quantum • When to employ commonly used cryptographic applications and protocols and when to use different PQ algorithms • How to determine the right time to deploy post quantum crypto when different kinds of data have different “shelf-lives”
Best Practices for Securing Digital Business - PKI, a Critical Enabler for Securing Digital Transformation
The Entrust Cryptographic Center of Excellence (CryptoCoE) is designed to help organizations balance the risks associated with IT practices that expand cryptographic use cases by accelerating a crypto strategy for enhanced digital security. For the third webinar of our CryptoCoE best practices webinars series, we brought together a panel of PKI, compliance, and cryptographic strategy experts to discuss the significant role well-managed PKIs play in protecting data, systems, and users.