Deploying a robust cryptographic key management infrastructure is widely regarded as a difficult challenge with complexities that can stump even experienced technical architects. But is this actually the case in reality? Not necessarily.
This session dispels common myths around key management and details a range of best practices built over many years in the “crypto trenches.” In particular, the session focuses on how cryptographic module developers can design for easy integration, how end-users can architect their ecosystem to make key management less challenging, how application developers can natively integrate FIPS-validated key management into their own products, and how consultants, labs, and industry thought leaders can maintain a forward-looking stance on the needs of their constituencies.
With topics ranging from “Help! I manage keys on an Excel spreadsheet. Where do I start?” to “as a crypto module developer, how do I position my own products for easy integration“, to “how do I decide whether my application should use PKCS #11, Java, KMIP, or something else entirely to interface with HSMs?” and more, this session will cover a broad set of topics with cross-industry applications.
Click here for details and agenda.