Field CTO, VP of Solutions Engineering Keyfactor, United States
The foundations of digital trust are facing unprecedented disruption.
With NIST setting a transition timeline to post-quantum cryptography — depreciating widely used algorithms like RSA, ECDSA, and DH by 2030 — and the CA/Browser Forum mandating TLS certificate lifespan reductions to just 47 days by 2029, security teams are being forced to rethink cryptographic agility from the ground up.
This is more than a compliance checkbox. It’s a massive operational challenge — and one that can’t wait until the final hour. A fragmented or manual certificate management approach won’t scale. Without a strategy, organizations risk outages, insecure systems and missed deadlines in an era where both quantum threats and certificate expiration can take down critical infrastructure.
In this session, we’ll dive into:
- What NIST’s crypto-agility paper really means, and how to apply it in real-world environments
- The operational implications of shorter certificate lifespans—and how automation is no longer optional
- How to develop a cryptographic inventory, prioritize remediation, and future-proof your architecture
- Practical steps to align PQC migration and certificate lifecycle management under one cohesive roadmap
Cryptography is no longer background noise—it’s an urgent, strategic priority. This session will arm security architects and infrastructure leaders with a clear action plan to adapt before trust expires.