Filters

Changing any of the form inputs will cause the list of events to refresh with the filtered results.

  • Quantum Security Awareness (Telecommunications Edition): PQC for 5G/6G and Roaming Trust – Core Latency, Secure Elements, and Standards-Led Migration

    Quantum Security Awareness – Industry Editions
    Virtual Event

    This complimentary webcast is designed for telecom security leaders who need a clear, no‑nonsense understanding of the quantum threat - and what to do about it now. The session skips generic “PQC 101” and goes straight to the telecom reality: global interoperability, five‑nines availability, tight control‑plane latency budgets, and identity anchored in secure elements at massive scale. Telecom has a uniquely hard problem because you can’t “modernize crypto” inside one domain and declare victory. Your cryptography spans multiple planes and multiple supply chains: core network service interfaces (mTLS and certificate lifecycles), management APIs, roaming and interconnect trust, lawful intercept / regulatory interfaces, and the SIM/eSIM/UICC ecosystem that anchors subscriber identity and provisioning. And unlike many enterprise environments, telecom change isn’t just “push a new library” - it’s a choreography across vendors, partners, and standards, with a continuous service obligation.

  • Quantum Security Awareness (Electricity Edition): Quantum-Safe Grid Operations – OT Trust Anchors, Safety, and Decades-Long Lifecycles

    Virtual Event

    This complimentary webcast is designed for utility and grid security leaders who need a clear, no‑nonsense understanding of the quantum threat - and what to do about it now, without hand‑waving. The session is built around the operational reality of electricity: safety and stability are non‑negotiable, outage windows are precious, and many OT assets are expected to run for decades. That combination makes “we’ll upgrade the crypto later” an unsafe assumption. Electricity providers face a quantum readiness problem that is OT‑dominant and integrity‑dominant. Confidentiality matters - but for grid operations, the sharper edge is often Trust Now, Forge Later (TNFL): if signatures and certificates that underpin trusted firmware, trusted configs, and trusted device identities become forgeable in the future, attackers don’t just read traffic - they can introduce changes that look legitimate in environments where patching is slow, device refresh is rare, and “roll back” may not exist. This is why electricity quantum readiness tends to start with trust anchors (signing roots, identity, remote access control points) rather than a generic “PQC everywhere” plan.

  • Quantum Security Awareness for Executives – Free Webcast

    Virtual Event

    This complimentary webcast is designed for security leaders who need a clear, no-nonsense understanding of the quantum threat - and what to do about it now. Co-hosted by SANS Institute and Applied Quantum, the session explains what's changing in the cryptographic landscape, why the migration to quantum-safe standards is far larger than most organizations expect, and what practical steps you can take today. Quantum risk is not a future-only problem. Adversaries can harvest encrypted data today for later decryption, while regulators and customers increasingly expect demonstrable progress now - not just plans for 2030 or 2035.

  • Quantum Security Awareness for Practitioners – Free Technical Webcast

    Virtual Event

    This complimentary webcast is designed for security architects, engineers, and cyber defenders who need a practical, no-hype understanding of post-quantum cryptography (PQC) and quantum security and what it means for real systems. Co-hosted by SANS Institute and Applied Quantum. We’ll keep the introduction short – just enough to align on the threat model and the standards landscape - then we’ll go deeper into the parts that usually get skipped such as: Where PQC actually lands in modern enterprises (protocols, libraries, certificates, HSMs, third-party platforms); Why the migration is bigger than an algorithm swap; What breaks first (often: performance assumptions, interoperability, certificate and handshake sizes, network edge constraints); How to get traction fast using inventory + prioritization + crypto-agility patterns

  • Quantum Security Awareness (Banking Edition): Trust Anchors at Bank Scale – PKI, Signing, and Long‑Lived Evidence

    Quantum Security Awareness – Industry Editions
    Virtual Event

    This complimentary webcast is designed for banking security leaders who need a clear, no‑nonsense understanding of the quantum threat - and what to do about it now.  The session avoids generic “PQC 101” and goes straight to what makes banking different: institutional identity and long‑lived evidence are the real blast radius. In a bank, cryptography isn’t just protecting data in transit - it is the foundation of trust at scale: CA hierarchies, enterprise PKI, service‑to‑service mTLS, customer and workforce authentication, signed tokens (e.g., OAuth/JWT ecosystems), document and transaction signing, code‑signing in CI/CD, and the regulated archives that prove what happened, when, and under which authorization. The uncomfortable banking‑specific reality is that “confidentiality later” is only half the story: if signatures and PKI trust anchors become forgeable in the future, the bank’s ability to prove integrity, provenance, and non‑repudiation comes under pressure.

  • Quantum Security Awareness for Executives – Free Webcast

    Virtual Event

    This complimentary webcast is designed for security leaders who need a clear, no-nonsense understanding of the quantum threat - and what to do about it now. Co-hosted by SANS Institute and Applied Quantum, the session explains what's changing in the cryptographic landscape, why the migration to quantum-safe standards is far larger than most organizations expect, and what practical steps you can take today. Quantum risk is not a future-only problem. Adversaries can harvest encrypted data today for later decryption, while regulators and customers increasingly expect demonstrable progress now - not just plans for 2030 or 2035.

Privacy Preference Center