In no other time have we had to question, to this degree, what is real and what is fake. Everyday doubt is pervasive: We see a photo of a friend with Tom Cruise and ask ourselves, ‘Is this real?’ We see a hamburger and ask ourselves, ‘Is it cake?’ On the surface, everything and nothing is cake.
In our complex IT infrastructure, there is no more of a terrifying question than, 'Is it cake?' Our systems - from legacy applications to acquisition software, PKIs to databases - can appear solid. But as we take the knife and start to cut, the truth is revealed: cryptography is often hidden within application code. Within the next five years, quantum computers are thought to have sufficient power to break our current cryptographic systems, those systems that are central to authentication, authorization, and identity management. When migrating to a quantum resistant identity architecture, we cannot haphazardly swap our algorithms; it requires inspecting the cryptographic core of the entire technology stack.
This session will confront how a fractured cryptographic system poses risk to an enterprise and its customers. We will detail the essential process of taking inventory of your cryptographic assets—the hardest, yet most critical, first step. We'll discuss the need to plan for algorithmic change, looking beyond today's government-sponsored mandates towards true quantum readiness. You will leave the session equipped with the tools (knife) to determine if your technology is as agile as it appears (or if it's cake).