Quantum computing is rapidly approaching, and with it comes both huge opportunity and significant risk for today’s cryptographic systems. Valentin Chatelard, Machine IAM Security Architect at Air France-KLM, breaks down how his team modernized their PKI to scale with demand, integrated automation, and prepared for the post-quantum future. He walks through the critical steps of conducting a full PKI audit, embracing crypto-agility, and aligning governance to support the shift to hybrid and quantum-safe cryptography.
Want to put these ideas into practice? Learn more about CyberArk Zero Touch PKI (formerly known as Venafi Zero Touch PKI) to take Valentin’s recommendations from concept to reality at your organization! https://www.cyberark.com/products/zer...
~~~
Ready to dive deeper? Discover the power Machine Identity Security: https://www.cyberark.com/products/mac...
OUR CHANNELS
For the latest in the world of identity security: / @cyberarksoftware
For on-demand, expert-lead cybersecurity training courses: / @cyberarkuniversity
Talk to a CyberArk Expert to get started: https://www.cyberark.com/contact/
Contact Technical Support for help whenever you need it: https://www.cyberark.com/services-sup...
Поделиться в:
Доступные форматы для скачивания:
Скачать видео mp4
Информация по загрузке:
Скачать аудио mp3
Похожие видео
array(10) {
[0]=>
object(stdClass)#4930 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "oVZWM9foikk"
["related_video_title"]=>
string(92) "The Case for Secrets Management and Why You Need to Secure ALL Machine Identities | CyberArk"
["posted_time"]=>
string(22) "11 дней назад"
["channelName"]=>
string(39) "CyberArk, Machine Identity Security Hub"
}
[1]=>
object(stdClass)#4903 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "fuzPvdZ_8J8"
["related_video_title"]=>
string(83) "Industry Insights on Machine Identity Security Trends and Best Practices | CyberArk"
["posted_time"]=>
string(23) "1 месяц назад"
["channelName"]=>
string(39) "CyberArk, Machine Identity Security Hub"
}
[2]=>
object(stdClass)#4928 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "Yd25PiuGKuY"
["related_video_title"]=>
string(74) "Attack Vector Demo: How to compromise a self-signed CA in Istio | CyberArk"
["posted_time"]=>
string(27) "8 месяцев назад"
["channelName"]=>
string(39) "CyberArk, Machine Identity Security Hub"
}
[3]=>
object(stdClass)#4935 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "BT38K6NqETE"
["related_video_title"]=>
string(125) "Эксперт по кибербезопасности о ваших паролях, вирусах и кибератаках"
["posted_time"]=>
string(27) "6 месяцев назад"
["channelName"]=>
string(22) "Раскадровка"
}
[4]=>
object(stdClass)#4914 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "wjZofJX0v4M"
["related_video_title"]=>
string(148) "LLM и GPT - как работают большие языковые модели? Визуальное введение в трансформеры"
["posted_time"]=>
string(19) "1 год назад"
["channelName"]=>
string(11) "3Blue1Brown"
}
[5]=>
object(stdClass)#4932 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "blWdjRUPP6E"
["related_video_title"]=>
string(72) "Разведчик о том, как использовать людей"
["posted_time"]=>
string(25) "3 недели назад"
["channelName"]=>
string(18) "Коллектив"
}
[6]=>
object(stdClass)#4927 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "9-Jl0dxWQs8"
["related_video_title"]=>
string(97) "Как LLM могут хранить факты | Глава 7, Глубокое обучение"
["posted_time"]=>
string(27) "9 месяцев назад"
["channelName"]=>
string(11) "3Blue1Brown"
}
[7]=>
object(stdClass)#4937 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "s7pnANMPigg"
["related_video_title"]=>
string(119) "Как Telegram связан с ФСБ? Что это значит лично для вас? Расследование"
["posted_time"]=>
string(22) "13 дней назад"
["channelName"]=>
string(27) "Важные истории"
}
[8]=>
object(stdClass)#4913 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "_M8jWRF7NkM"
["related_video_title"]=>
string(81) "Future Proofing Your Machine Identity Security: A Step-by-Step Roadmap | CyberArk"
["posted_time"]=>
string(23) "1 месяц назад"
["channelName"]=>
string(39) "CyberArk, Machine Identity Security Hub"
}
[9]=>
object(stdClass)#4931 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "8hLd7czWmOU"
["related_video_title"]=>
string(175) "ПОТАПЕНКО: "Теперь не до смеха!". Что произошло на ПМЭФ, где Сечин, внучка Путина, Греф, Набиуллина"
["posted_time"]=>
string(19) "2 дня назад"
["channelName"]=>
string(24) "И Грянул Грэм"
}
}