PrimeKey Tech Days 2020

September 16

PrimeKey Tech Days Online 2020

Date: September 16
Place: Online
Social media: #PKTechDays

PrimeKey Tech Days is your opportunity to keep up with widespread changes in cryptography, PKI, and related IT-security topics. This is a unique hard-core tech event that brings together PKI and security leaders from all over the world. The event will be online and PrimeKey will film live from a studio in Stockholm, Sweden. There will be presentations from experts at leading global companies and demos from practitioners showing PKI in action.

Sign up now to learn from excellent speakers, network online with your peers from all over the globe, and why not take the chance to talk to PrimeKey product managers, support agents and crypto nerds.

 

The topics are very high level and I really like the networking.

-Alexander Eßer, Bank-Verlag Product Manager, Security & Trust Services

 

Agenda

The complete agenda for PrimeKey Tech Days will be announced during the summer but here is a sneak peek of what we have to offer:

  • Agile Crypto
  • AI and eIDAS
  • Identity Authority Management
  • EU Cybersecurity Act
  • Common Criteria and Audit Compliance
  • Integration stories
  • Hard Core PKI
  • …and much more!

Technical Presentations

We are excited to extend the program this year to include two technical presentations facilitated by PrimeKey experts. This will give you a hands on experience and let you in on the technical level of two exciting products.

PrimeKey Identity Authority Manager 

Facilitator: Andreas Phillipp

The presentation will cover:

  • How Digital Identities are issued during the production process
  • The requirements and challenges around issuing birth certificates
  • How Identity Authority Manager brings the CA Service to the manufacturing warehouse
  • How to adapt the processes for issuing certificates

PrimeKey SEE 

Facilitator: Oreste Panaia-Costa

The presentation will cover:

  • The general concept of the SEE and a brief discussion of use cases for the SEE
  • Introduction to the operation and security features of the SEE, including the Random Number Generator
  • Installation of an application within a Virtual Machine and then installation of the Virtual Machine on the SEE
  • Introduction to the operational states of the SEE
  • Using the web-based User Interface to monitor, configure and manage virtual machines

 

To keep updated, follow us on LinkedIn and Twitter.

Attend PrimeKey Tech Days to listen to distinguished speakers from leading international companies and organizations. We are excited to continue to plan the 6th edition of the event that gives experts in PKI, Crypto, Open Source, eIDAS, Digital Signing and other areas of IT security an opportunity to connect and share knowledge on widespread changes and more.

 


 

AI-based user identification in the eIDAS world

Kalev Pihl Kalev Pihl, CEO at SK ID Solutions, Tallinn, Estonia

Clemens WankoClemens Wanko, Head of Trust Infrastructure / eIDAS Accredited CAB, TUV TRUST IT, Germany

A reliable user Identification is crucial for Qualified Trust Service under eIDAS. That typically involved human interaction in the past. Now, for the first time, an AI based approach with no human involvement has been certified under eIDAS. We are going to present that new identification process and the hurdles taken to achieve eIDAS conformity and a corresponding certification.

eIDAS compliant Remote Signing Service

Cinkas RomanCinkas Roman, CEO 3Key Company

Jack PiekarskiJack Piekarski, Esysco

Under eIDAS, an electronic signature is considered to be advanced if it has met several requirements, including:

  • It uniquely identifies and links to its signatory
  • The private key used to create the electronic signature is under the sole control of the signatory
  • If the data is tampered with after the message has been signed, the signature must identify that this has
    happened
  • Invalidating the signature in the event its accompanying data has changed

PrimeKey® SignServer was designed to provide a central and API centric signature and sealing services. The key element to enable SignServer for the eIDAS domain is strong authentication of the user to invoke the signature process and retaining sole control of their signing key. Learn more about compliant remote signing at PrimeKey Tech Days 2020.

EU Cybersecurity Act

Slawomir GorniakSlawomir Gorniak, Expert in Security Tools and Architecture, ENISA

The EU Cybersecurity Act, which entered into force last year, starts reaching its maturity. The EU Agency for Cybersecurity (ENISA) has assumed its new tasks and is reorienting its internal structure accordingly. The EU framework for cybersecurity certification is now implemented, following the creation of all advisory groups and launch of the elaboration of the first draft candidate certification schemes.

Identity Authority Manager – Experiences from the pilot projects

MartinMartin Rauch, Senior Consultant, Siemens

More and more Siemens devices are provided with Manufacturer Device Certificates or so-called IDevIDs. For the enrollment of the Manufacturer Device Certificates, a (local) Registration Authority in the production environment is needed. The challenges are the different operational environments, production processes and the capabilities of the devices. This requires a very flexible solution, deployed at the production line, easily adaptable to the requirements of the production and offering the highest security. Together with Siemens, PrimeKey started a project for the development of such a new product. This presentation reports on the experiences made in Siemens factories during piloting.

Structured crypto to keep society running

Sini Ruohomaa, EricssonSini Rouhomaa, Senior Specialist, Ericsson

Cryptography spreads across our society like SARS-CoV-2, and will stick around like the seasonal flu. How to live with it and avoid broken- off handshakes and acute system malfunction syndrome? This presentation looks at using cryptography in the context of critical infrastructure, contrasting the stereotypical viewpoint of crypto as it appears in World Wide Web transport layer security. This is a second wave of a series on improving security through clarified structure*. The presentation targets people interested in cryptography for different demanding application areas, and aims to soften the bumps that lurk on the second half of the proverbial hype curve – may they all be flattened.

*) See also: Securing Crypto Deployments in the Wild, PrimeKey Tech Days 2018.


… More speakers will be revealed soon!

To keep updated, follow us on LinkedIn and Twitter.

 

 

How can we help?

    I accept that PrimeKey stores my information, and I accept cookies for analysis and business identification. Read more about cookies and privacy policy here.
Contact us