This page is fully or partially automatically translated.

Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

Action of qSkills
Congress@it-sa Lecture programme

Store now, decrypt later: Risk factor quantum computing

Why post-quantum cryptography needs to be on your IT agenda now.

calendar_today Tue, 10.10.2023, 16:00 - 16:45

event_available On site

place Room Budapest, NCC Ost

Action description

south_east

Themes

Education and training Data security / DLP / Know-how protection Trend topic

Event

This action is part of the event Congress@it-sa

Action description

Are you currently using secure encryption methods and recommended key lengths to protect your critical confidential data? The impression of security is deceptive: intelligence agencies and other organizations are already collecting encrypted data today in order to decrypt it in the future.

A relevant attack vector will be in quantum computing, which is likely to break many of today's procedures in a few years. If you want your data, which will be intercepted tomorrow, to remain protected the day after tomorrow, you need to act now.

Learn from our qSkills cryptography expert what measures you can implement or plan today.
... read more

Participation Limit: 55

Language: German

Questions and Answers: Yes

close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.