No events on this day.
No events on this day.
This complimentary webcast is designed for security architects, engineers, and cyber defenders who need a practical, no-hype understanding of post-quantum cryptography (PQC) and quantum security and what it means for real systems. Co-hosted by SANS Institute and Applied Quantum. We’ll keep the introduction short – just enough to align on the threat model and the standards landscape - then we’ll go deeper into the parts that usually get skipped such as: Where PQC actually lands in modern enterprises (protocols, libraries, certificates, HSMs, third-party platforms); Why the migration is bigger than an algorithm swap; What breaks first (often: performance assumptions, interoperability, certificate and handshake sizes, network edge constraints); How to get traction fast using inventory + prioritization + crypto-agility patterns
***Quantum Security Community*** *is a free, global, practitioner-led network sharing real-world PQC insights and supporting one another through the most […]
***Quantum Security Community*** *is a free, global, practitioner-led network sharing real-world PQC insights and supporting one another through the most […]
***Quantum Security Community*** *is a free, global, practitioner-led network sharing real-world PQC insights and supporting one another through the most […]
This complimentary webcast is designed for payments security leaders who need a clear, no‑nonsense view of the quantum threat - and what to do about it now, without fluff. Co‑hosted by QSECDEF and Applied Quantum, this session cuts through generic PQC talk and focuses on what makes payments different: crypto everywhere, many independent parties, and millisecond operational envelopes that you can’t break. We focus on the real blockers in payments: interdependencies, performance budgets, and vendor/partner sequencing. Payments are unusually crypto‑dense and time‑dense: a single authorization spans parties that don’t share one change calendar, and the chain must complete inside strict timeout/retry behavior. We’ll use an interbank cryptography stack mapping as a concrete illustration of how many trust boundaries exist before you even introduce PQC - and why “just upgrade the algorithm” is not a plan.
No events on this day.
No events on this day.
No events on this day.