PrimeKey Tech Days 2020

PrimeKey Tech Days

Attend PrimeKey Tech Days to keep up with widespread changes in cryptography, PKI, and related IT-security topics. PrimeKey Tech Days is a unique hard-core tech event that brings together PKI and security leaders from all over the world. The event will be online and PrimeKey will film live from a studio in Stockholm, Sweden.There will be live presentations from experts at leading global companies and demos from practitioners showing PKI in action. Take the opportunity to learn from excellent speakers while networking online.

Date: September 16
Place: Online
Social media: #PKTechDays

Technical webinars

We are excited to extend the program this year to include two technical webinars facilitated by PrimeKey experts.

PrimeKey Identity Authority Manager Webinar 

Facilitator: Andreas Phillip
Location: Online
Date: 2020-09-15

The PrimeKey Identity Authority Manager Workshop will cover:

  • How Digital Identities are issued during the production process
  • The requirements and challenges around issuing birth certificates
  • How Identity Authority Manager brings the CA Service to the manufacturing warehouse
  • Hands-on training to adapt the processes for issuing certificates

PrimeKey SEE Webinar 

Facilitator: Oreste Panaia-Costa
Location: Online
Date: 2020-09-15

The PrimeKey SEE Workshop will cover:

  • The general concept of the SEE and a brief discussion of use cases for the SEE
  • Introduction to the operation and security features of the SEE, including the Random Number Generator
  • Installation of an application within a Virtual Machine and then installation of the Virtual Machine on the SEE
  • Introduction to the operational states of the SEE
  • Using the web-based User Interface to monitor, configure and manage virtual machines

The topics are very high level and I really like the networking.

-Alexander Eßer, Bank-Verlag Product Manager, Security & Trust Services


PrimeKey Tech Days 2020

Register your interest. We will email an official invitation when details are set.

    I accept that PrimeKey stores my information, and I accept cookies for analysis and business identification. Read more about cookies and privacy policy here.

Follow us on LinkedIn and Twitter for event updates.



Agenda for PrimeKey Tech Days

A detailed 2020 agenda will be added here as soon as possible.

To keep updated, follow us on LinkedIn and Twitter.

Attend PrimeKey Tech Days to listen to distinguished speakers from leading international companies and organizations. We are excited to continue to plan the 6th edition of the event that gives experts in PKI, Crypto, Open Source, eIDAS, Digital Signing and other areas of IT security an opportunity to connect and share knowledge on widespread changes and more.



In 2019, we had speakers from Acumen, Bank-Verlag, Cisco, Crypto Workshop / Bouncy Castle, Ericsson, HARICA, Infineon Technologies, ISARA, Nimbus, NTT, PKI Solutions, and Unbound Tech.


Ryan ThomasRyan Thomas

In May 2019, FIPS 140-3 got approved and is effective from September 2019. This is major news for HSM manufactures and users alike, given that FIPS 140 is a de-facto standard worldwide. The “dash three” is now referencing ISO standards 19790:2012 and 24759:2017. Ryan Thomas, a Laboratory Manager at Acumen Security, has overseen many FIPS get certified products during his career. Ryan will update us on what is new for “dash-three”, how to prepare for transition from the good-old “dash two”, and also put it in the international perspective. Well worth for anyone responsible for planning of new, or operations of an existing PKI systems.




Alexander Eßer

Alexander Esser

Alexander, Product Manager, Security & Trust Services at Bank-Verlag in Germany, will guide us through Bank-Verlag’s journey to become an eIDAS compliant TSP, the challenges encountered in the process and how the decision to face those challenges by utilizing a PKI in a Box, eased Bank-Verlag’s way towards compliance.





Crypto Workshop / Bouncy Castle

David Hook

David Hook

Post quantum cryptography is a current topic in some industries, but not in others (yet). In particular devices with very long life times can benefit from being prepared for crypto agility, and ability to transition to quantum resistant cryptographic algorithms.

David Hook, who implements many of the proposed algorithms, is here to give us tips and tricks to help us avoid a post quantum “apocalypse”.





Robert Khello and Juha Sääskilahti 

Juha Saaskilahti

Robert IT Security Expert

Security is a critical component of telecom systems, and naturally PKI plays a crucial part in this. Ericsson is one of the most trusted names for building robust and secure telecom infrastructures. Robert and Juha will give us insight into PKI security in the telecom domain.







Dimitris Zacharopoulos

David Hook

The CA Browser forum defines the requirement for so-called “Publicly trusted CAs”. Those are CAs that are trusted in web browsers by default, for example Mozilla, Google Chrome, Apple Safari and Microsoft. As such, the forum is critically important for the security of the Internet. Dimitris Zacharopoulos, from the Hellenic Academic and Research Institution in Greece is the chairman of CAB Forum and will tell us what is going on in this PKI experts’ group, things that affect us all.





Michael Brown

Michael Brown

Everyone has heard about Post Quantum Cryptography. ISARA is a leading company in Post Quantum Cryptography, collaborating with Microsoft, DigiCert, HSM vendors and of course PrimeKey. In this presentation, we will learn about the latest updates in the standardization, including Second PQC Standardization Conference, that will take place a few weeks before PrimeKey TechDays. This is of relevance to anyone needing a strategic outlook on how PKI technology will evolve in the upcoming years.




Arno Fiedler

Arno Fiedler

Arno Fiedler will present “Cyber Physical Identities: Who is the stepfather of the digital twin?” Returning to PrimeKey Tech Days as one of the most appreciated speakers, Arno is a longtime member of ETSI and is an expert in the European security standards. Note that several countries outside the European Union are looking at adopting the same or a similar approach to eIDAS and/or the Cybersecurity Act. We are eager to hear how to put digital twin in the context of governing standards and regulations, as well as to see what is possibly missing.



NTT and Infineon

Liam Blundell & Nicholas Croudace 


Liam Blundell

Liam Blundell from NTT and Nicholas Croudace from Infineon will show PKI in action when it comes to issuing certificates for a Multicopter equipped with Secure Elements, thus giving strong identity to these aircrafts. In this real-world use case, Nicholas will focus on IoT /drone security from the Infineon chipmaker technology perspective while Liam will share the managed PKI perspective. This presentation will show how managed PKI services provided by a global company looks and what they offer your customers.



PKI Solutions

Mark B. Cooper

Mark B. Cooper is President & Founder of PKI Solutions, and he is a leading PKI cybersecurity expert, sought-after speaker, author of several books and trainer. Also known as “The PKI Guy”, Mark will deliver a presentation about a new standard called SHAKEN/STIR (Signature-based Handling of Asserted Information using ToKENs and Secure Telephony Identity Revisited). The aim with this standard is to combat robocalls and caller ID spoofing. PKI is the backbone of SHAKEN/STIR, using digital certificates to ensure the calling number of a telephone call has not been spoofed. Quite an interesting and hot topic!


Unbound Tech

Oz Mishli

One of the Axioms of PKI is “Hardware Security Modules are a must for any serious PKI deployment”. Unbound Tech is one of the companies that challenge this thinking, or at least makes us understand this axiom in a new way. For today’s and tomorrow’s distributed systems, with a number of truly trusted points that may change over time and circumstances, the traditional HSMs are cumbersome to say the least. Unbound Tech is innovative, and their approach is based on some really cool mathematics; in the field of cryptography, it is called “Multi-party computing”.



To keep updated, follow us on LinkedIn and Twitter.



How can we help?

    I accept that PrimeKey stores my information, and I accept cookies for analysis and business identification. Read more about cookies and privacy policy here.
Contact us