From Tuesday, October 28 to Thursday, October 30, 2025, the PKI Consortium will host its fourth Post-Quantum Cryptography (PQC) Conference at the Connexion Conference & Event Centre in Kuala Lumpur, Malaysia.
This premier three-day event begins with hands-on workshops, followed by two days of expert-led talks, panels, and breakout sessions. It attracts top executives, technical leaders, and practitioners from both the public and private sectors, all focused on shaping the future of cryptography.
The conference is open to all individuals interested in Post-Quantum Cryptography and is not limited to PKI Consortium members.
Interested in sponsoring the Post-Quantum Cryptography Conference? For detailed information about sponsorship opportunities, please contact us. You can also download the sponsorship brochure for a comprehensive overview and pricing of our sponsorship packages.
The conference features a balanced program with strategic, informational, and educational sessions in the Plenary room, and technical deep dives in the Breakout room. Attendees can look forward to keynote speeches, interactive sessions, and panel discussions led by Post-Quantum Cryptography (PQC) experts. To ensure a focus on education, speakers are not permitted to promote products or services during presentations.
Please note that this is a preliminary agenda and is subject to change. Final details, including topics, abstracts, speakers, panels, workshops and time slots, will be updated here in the coming weeks and months, with more speakers and panels to be announced. Call for Abstracts - Submit a proposal for a talk, panel discussion, or workshop
Albert de Ruiter
Vice Chair PKI Consortium and Policy Authority PKI Dutch Government (Logius)
Albert de Ruiter operates the Policy Authority at Logius, the digital government service organization of the Netherlands. He is also a member of the QvC (Quantum Secure Cryptography) working group of the Dutch government, a board member of HAPKIDO, and a member of the PKI Consortium. Albert is known for introducing the idea of a Post-Quantum Cryptography Conference to the PKI Consortium in 2022.
Alessandro Amadori
Cryptographer at TNO
Alessandro Amadori is a cryptographer at TNO focusing on the migration to Post-quantum Cryptography. He holds a PhD from Eindhoven University of Technology in cryptographic implementations. He has contributed in several PQC migration projects like HAPKIDO, and is one a co-author of the second edition of the PQC migration handbook.
Alexander Löw
CEO at Data-Warehouse
Dr. Alexander Löw is the CEO of Data-Warehouse GmbH and serves as a Senator in the German Senate of Economy. He holds the position of Vice President of the German Cybersecurity Council Association and is the innovative mind behind IQIMS and PCert. With a deep understanding of cybersecurity since the 1980s and 25 years of experience as a Data Protection Officer (DPO), Alexander has a strong focus on Public Key Infrastructure (PKI). He has been involved in the conceptualization, building, and maintenance of industrial and governmental CAs (e.g., Macao, German Airforce, BMW) since 2001. In 2012, following a significant APT attack, he began automating PKI processes to enhance cybersecurity. Since 2014, he has been actively involved in publishing and presenting on PKI and cybersecurity topics, and has been conducting PKI trainings for the German BSI Alliance for Cybersecurity since 2015. In 2024, he joined the NIST Post-Quantum Migration Working Group to contribute to the development of standard 1800-38B.
Alexey Bocharnikov
APAC Quantum Security Lead at Accenture
Alexey, a Director at Accenture, brings over 15 years of expertise in cybersecurity strategy, risk management, quantum computing, and cryptography. He currently holds the position of APAC Quantum Security Lead and Director of Cyber Strategy at AN/Z.
Prior to Accenture, Alexey honed his expertise at EY, contributing to the Global Innovation Quantum Technology Lab and leading Global Quantum Security efforts. Before EY, Alexey served as a County Information Security Officer at Deutsche Bank’s Moscow Branch.
Alexey is a vocal advocate for best practices and proactive risk management in cyber strategy and quantum security. His thought leadership includes authoring articles, contributing to international reports, producing educational videos, and speaking at industry conferences.
A
Andrew Cheung
President & CEO at 01 Communique Laboratory Inc.
Mr. Cheung boasts over 25 years of invaluable experience as a Chief Executive Officer and Chief Technology Officer. Throughout his illustrious career, he has consistently spearheaded cutting-edge innovations, and driven product
development, resulting in a portfolio of 9 patents within the computer software industry. Notably, his outstanding contributions were recognized with a nomination for the prestigious Ernst and Young Entrepreneur-Of-The-Year award in 2001.
Since founding his company in 1992, Andrew has positioned himself as a technology pioneer in Post-Quantum Cybersecurity and Remote Access technologies. With over 15 years of hands-on experience and extensive expertise in patent application, prosecution, and litigation processes, he has established himself as a formidable force in the field.
He remains at the forefront of technological advancements, with his latest innovation focusing on cybersecurity. His groundbreaking work in Post-Quantum Cryptography (PQC), leveraging NIST-approved quantum-resistant algorithms, is a testament to his forward-thinking approach. By combining his PQC engine with patent-protected measures into a wide array of applications, including cryptocurrencies, emails, and AI machine learning systems. This proactive approach ensures robust protection against potential cyber threats posed by quantum computers, thereby safeguarding the integrity of classical computer systems as we know them today.
Basil Hess
Senior Research Engineer at IBM Research
Basil is a Senior Research Engineer at IBM Research Europe - Zurich. His focus is on the implementation side of cryptography, quantum-safe cryptography and quantum-safe migration.
The projects he is involved include Open Quantum Safe - software for prototyping quantum-resistant cryptography, he’s a co-author of CycloneDX CBOM (Cryptography Bill of Materials), and two submissions to the NIST PQC Standardization for additional digital signature schemes: MAYO and SQIsign.
Basil holds a PhD in Information Systems and a MSc in Computer Science, both from ETH Zurich.
Blair Canavan
Director, Alliances at Thales
Blair has 30+ years of IT cybersecurity sales, channel, marketing, and business development experience. Blair continuously expanded his cybersecurity and cryptographic expertise starting with Symantec and several cyber start-ups including Chrysalis-ITS (Thales), InfoSec Global, Crypto4A and since September 2019, back with Thales’ Global Technology Alliances team, including the Quantum cryptography portfolio. Blair recently represented the Canadian Forum for Digital Infrastructure Resilience (CFDIR) to articulate the standards and Government guidance at Mobile World Congress (MWC) in 2023. He is an avid presenter, start-up consultant, and IT industry contributor. Blair holds an Hons.BA from the University of Waterloo, and Wilfrid Laurier University, Ontario, Canada.
Bruno Couillard
Co-Founder & CEO at Crypto4A
Bruno Couillard is the CEO and co-founder of Crypto4A Technologies Inc., where he leads the development of cutting-edge crypto-agile and post-quantum cybersecurity solutions, including the QxHSM and QxEDGE. With over 35 years of experience in cryptography, key management, and quantum-safe technology, Bruno has worked extensively in both commercial and military applications.
Previously, he co-founded Chrysalis-ITS and spearheaded the development of the Luna HSM, now a part of Thales. He also contributed to the creation of the PKCS#11 Standard. In addition to his entrepreneurial work, Bruno has served as a cryptographic evaluator for the Canadian Government and played a key role in the Canadian Cryptographic Modernization Program (CCMP).
Bruno is an active board member of Quantum Industry Canada (QIC), co-chair of the Quantum Industry Developers and Users Working Group, and a member of the Canadian National Quantum Strategy committee. Through these roles, he continues to promote and shape a quantum-safe cybersecurity ecosystem.
Chris Hickman
Security Officer
As Chief Security Officer at Keyfactor, Chris Hickman is at the forefront of advancing the company’s position as a leader of digital trust security solutions in the technical landscape of cryptographic infrastructure and digital certificates. With extensive experience in smart card management systems, PKI design, and directory services, Chris is committed to integrating the voice of the customer into Keyfactor’s platform to drive innovative solutions and accelerate digital trust in the evolving security landscape. He spearheads Keyfactor’s post-quantum cryptography (PQC) strategies to support organizations in their quantum-readiness journeys. He remains an industry-wide trusted resource on enhancing digital trust through SaaS-delivered PKI solutions and certificate lifecycle automation software to support security teams of modern enterprises.
Corey Bonnell
Industry Technology Strategist
Corey Bonnell is a Technology Strategist at DigiCert. He has over 15 years of engineering experience in several domains with a deep focus on Public Key Infrastructure. Corey represents DigiCert in several standards organizations, such as the CA/Browser Forum, ETSI, and IETF. He has been involved in the standardization process of emerging standards relating to post-quantum cryptography and is a frequent participant in IETF post-quantum cryptography hackathons.
D
Danny Setyowati
Student at Republic of Indonesia Defense University
Cyber Defense Engineering Student from Republic of Indonesia Defense University
David Hook
VP Software Engineering at Keyfactor
David has been working on Cryptography APIs and secure protocols since the mid-1990s and in IT and open-source since the mid-1980s. He is a founder and still active committer of the Legion of the Bouncy Castle Cryptography project which began in the year 2000 and provides APIs in Java, C#, and Kotlin. David founded Crypto Workshop, now part of Keyfactor, in 2012 in order to better support the Bouncy Castle APIs and its user community. Shortly after, he led the work on the FIPS certification of the Bouncy Castle APIs, resulting in their first certifications in 2016. His deep interest is in providing tools to simplify the development of solutions that make use of cryptography and secure protocols, with an emphasis on standards-based approaches. He is based in Melbourne, Australia.
E
Efstathia Katsigianni
IBM Quantum Safe Project Executive at IBM Research & Development
Dr. Efstathia Katsigianni works as an IBM Quantum Safe Project Executive in Berlin, Germany. She is also an IBM Quantum Ambassador and holds a doctoral degree in mathematics. Efstathia has 7 years of experience working in Cybersecurity with focus on cryptography, quantum-safe cryptography, public key infrastructures and automotive security as well as cryptographic key management solutions. In her current role, she works as part of IBM Research on innovative solutions and is responsible for their implementation for customers.
F
Frank Michaud
Principal Enginer Tech Lead for Cisco Crypo Services at Cisco
Frank Michaud has been the technical leader of Cisco Cryptographic Services (CS) since October 2022, playing a pivotal role within the Senior Tech Talent of the Cisco Security & Trust organization. He leads the Post-Quantum Cryptography (PQC) transition for CS, provides critical security guidance to Cisco Business Units, and pioneers innovative Public Key Infrastructure (PKI) solutions. Frank is widely recognized as a leading technical expert in the identity domain across the industry and serves as a technology advisor to Cisco’s Security CTO.
Since joining Cisco in 2016, Frank has been instrumental in driving innovation across IoT security, edge computing, identity management, authentication, and software security. His career, which began in 2000, includes significant contributions at leading security companies such as Kudelski Nagravision and NXP Semiconductors, where he developed foundational software solutions, hardware designs, and security architectures for highly sensitive domains.
Frank has actively contributed to several standards bodies and consortia, including GlobalPlatform and IEEE. Over the course of his career, he has been the driving force behind 15 patents, demonstrating his sustained commitment to advancing security technologies and solutions. He has also presented at the RSA Conference (RSAC), where he addressed topics related to PQC.
Ganesh Mallaya
at AppViewX Inc
Ganesh Mallaya is a Distinguished Architect at AppViewX, where he has helped revolutionize certificate lifecycle management (CLM) and PKI solutions for global enterprises. A member of the CA/Browser Forum and a Harvard-certified cybersecurity strategist, he serves as a trusted advisor to organizations on post-quantum cryptography (PQC), digital trust infrastructure, and CLM modernization across complex, regulated environments
Giuseppe Damiano
Vice President of Product Management for the HSM product offering at Entrust
Giuseppe is currently the Vice President of Product Management for the HSM product offering at Entrust. With over 30 years of experience, he is a senior expert in developing and managing PKI solutions and infrastructures, data security, and electronic payment systems.
Greg Wetmore leads the global team responsible for building and enhancing the digital security product portfolio at Entrust, such as the Identity, Data Security, and Critical Infrastructure solutions. Greg joined Entrust in 2000 and has held a number of leadership positions on the engineering team over that period. Greg is a key industry advisor and speaks regularly on topics like digital identity, IoT, Zero Trust and post-quantum security. Greg holds an Engineering degree from Queen’s University Kingston, Ontario, Canada.
H
Hao Qin
Senior Research Fellow at Centre for Quantum Technologies, National University of Singapore
Dr. Hao Qin is a senior researcher in National Quantum-Safe Network, affiliated with Centre for Quantum Technologies, National University of Singapore. He serves as the co-chair of the Quantum Communication Networks Task Force under Singapore’s IMDA, vice chair of the Joint Coordination Activity on Quantum Key Distribution Networks and associate rapporteur for Q15/17 “Quantum-based Security” under the UN’s ITU. His research focuses on the practical aspects of quantum communication networks, including implementation security and testing evaluation, network and key management, use cases and applications, as well as standardization and certification.
J
Jing Yan Haw
Senior Research Fellow at Centre for Quantum Technologies, National University of Singapore
Dr. Jing Yan Haw is a Senior Researcher and technical lead at the National Quantum-Safe Network (NQSN), Centre for Quantum Technologies, National University of Singapore. With over a decade of experience in quantum science, he focuses on quantum key distribution (QKD), quantum security validation, and quantum-safe standards. He serves as an editor for the IMDA-TSAC Quantum Communication Networks Task Force and as a committee member of the Singapore Computer Society’s Quantum Technology SIG. He also contributes to ITU-T Q15/17 “Quantum-based Security” and ETSI ISG QKD standards. Dr. Haw earned his PhD from the Australian National University in experimental quantum communication and has published in Nature Photonics, Nature Communications, PRX Quantum, and Optica.
John Buselli
Offering Manager at IBM Quantum
John Buselli is an Offering Manager for the IBM Quantum Group and is currently focused on the development and delivery of IBM’s Quantum Safe Program. In this role, he oversees product strategy, market development and customer-facing programs. Since joining IBM Research in 2015, John has focused on cyber security, confidential computing, privacy-enhancing technologies, data governance and securing AI Analytic initiatives.
He previously led a global team at IBM tasked with building an Information Governance/Compliance Practice within the IBM software organization. His career has been focused on establishing and expanding initial markets, products and operations for early-stage software firms including Verity (purchased by HP), and KVS (acquired by Symantec) Princeton Softech (purchased by IBM) as well as senior leadership roles at Seer Technologies and Texas Instruments.
Jonathan Jackson
Senior Director, Strategic Solutions at BlackBerry Malaysia
Jonathan has over two decades experience in helping organisations across APAC and EMEA deal with the ever-evolving cyber threats across multiple sectors – including government, defense, intelligence, energy, health, critical infrastructure, finance and legal. He specialises in cybersecurity, threat intelligence and digital forensics, and has an in-depth understanding of the ASEAN cybersecurity threat landscape – since being based in Kuala Lumpur since mid-2023.
In Jonathan’s role, he regularly advises ministers, boards and executives on how to manage, predict and prevent the threats to IoT, networks, applications, endpoints and people. Currently he is dedicated to supporting Malaysia’s cyber-resilience initiatives and the establishment of BlackBerry’s new Cybersecurity Center of Excellence. Jonathan also participates in the ASEAN Cyber Crime Task Force, facilitating public-private cyber capability.
Jonathan has been with BlackBerry for over 12 years and was the Head of Security Advisory for BlackBerry ANZ before leading a team as Director of Engineering for Asia Pacific & Japan. Prior to this, he worked for Nokia where he held a number of roles focusing on security and digital transformation.
K
Kevin Hilscher
Sr. Director, Product Management at DigiCert
Kevin works at the intersection of IoT and cybersecurity. Kevin is the product leader for the DigiCert Device Trust portfolio of products, focused on securing the Internet of Things (IoT). Kevin’s passion is for building platforms and device software for securing connected products, helping customers focus on building a superior connect product and not security “plumbing”. Kevin routinely speaks at industry conferences on the topic of IoT, product security, post-quantum cryptography (PQC), and IoT cybersecurity regulations. Kevin came to DigiCert from Microsoft Azure IoT, where he spent 7 years working with IoT customers, helping them build and secure connected products.
Michael Osborne
CTO IBM Quantum Safe at IBM Research
Michael Osborne is an IBM Distinguished Engineer and the global CTO for IBM Quantum Safe. He leads the cryptographic research activities at the IBM Research Center in Rüschlikon, Switzerland. His current focus includes advancing new generations of advanced cryptography, such as those selected by NIST as the next generation of PQC algorithms. He also leads the development of methods and technologies to help organizations migrate to use new Quantum-Safe standards.
Muralidharan Palanisamy
CSO at AppViewX Inc
Muralidharan Palanisamy is the Co-Founder and Chief Solutions Officer at AppViewX, where he leads enterprise solutions focused on scalable security automation, certificate lifecycle management, and crypto-agility. With over 20 years of experience in designing and delivering high-performance workload management systems for web-scale online banking and financial platforms, he brings a unique blend of practical systems engineering and forward-looking cryptographic strategy.
His background includes building resilient infrastructure for high-availability, low-latency environments that demand airtight security and compliance. Muralidharan has led transformative initiatives across PKI modernization, TLS automation, and DNS-based trust models—working closely with Fortune 500 institutions navigating zero-trust, crypto-diversity, and now post-quantum readiness.
As quantum computing accelerates, he advocates for a holistic approach to crypto transformation—where post-quantum migration intersects with operational resilience, automation, and real-world workload demands. He is a regular contributor to industry thought leadership and a passionate voice for secure, scalable, and agile trust frameworks in the post-quantum era.
Navaneeth Rameshan
Senior Research Developer at IBM Research
Dr. Navaneeth Rameshan is a senior research developer at IBM Research - Zurich, focused on applied cryptography and cloud security. He is driven by building tangible solutions to real-world security challenges, with multiple contributions across IBM Cloud services including Key Protect, Hyper Protect Crypto Service, Secrets Manager, and the IBM Kubernetes Service.
His work includes quantum-safe integrations across diverse stacks, scalable middleware for HSMs and private PKI systems, many of which are deployed and in production today. He has also led architectural efforts to enable seamless migration to post-quantum cryptography. With a hands-on, systems-level approach, he aims to bridge research and engineering to make quantum-safe security practical at scale.
Nils Gerhardt
Chief Technology Officer at Utimaco
Nils Gerhardt has 20 years’ experience in the cyber security industry. In his current role, Nils is the Chief Technology Officer for Utimaco, a leading provider of cyber security solutions, and supervisory board member of ISITS AG. Before joining Utimaco, Nils worked at Giesecke + Devrient in various executive management roles with regional and global responsibilities in Germany, Canada, and the USA. As Chairman of the Board of GlobalPlatform, a global industry organization, Nils brought major companies together to define the standards for secure digital services and devices.
Octavian Maciu
Hardware Product Manager at PQShield
Octavian Maciu is a Hardware Product Manager at PQShield, where he contributes to the development and evolution of the company’s hardware offerings during a pivotal time for Post-Quantum Cryptography (PQC). With a background in hardware design, he brings a blend of technical expertise and product insight to the role.
Before joining PQShield, Octavian worked on advanced semiconductor and hardware technologies at Qualcomm, and conducted research at the French National Centre for Scientific Research (CNRS). He holds a Master of Science in Micro and Nanoelectronics from the University of Strasbourg.
At PQShield, his work focuses on enabling secure, efficient hardware implementations that meet the demands of quantum-resilient cryptographic standards.
Paul van Brouwershaven
Chair PKI Consortium and Director of Technology at SSL.com
Paul van Brouwershaven is a distinguished leader in cybersecurity with over two decades of experience specializing in Public Key Infrastructure (PKI). He currently serves as the Director of Technology at SSL.com. In addition to his role, Paul chairs the PKI Consortium and also leads its PQC Working Group. Prior to his current roles, Paul held the position of Director Technology Compliance at Entrust and was the Technology Solutions Director at GlobalSign.
Beyond his leadership roles, Paul is also the Owner of Digitorus, a specialized software development and consultancy company he founded in 2016. Digitorus focuses on PKI, Digital Signatures, and Trustworthy Systems. His extensive expertise in PKI is further highlighted by his past role as Vice Chair of the CA/Browser Forum, where he contributed to defining industry standards for digital certificates.
Pieter Schneider
Program Manager Quantum Secure Cryptography at Dutch Ministry of the Interior & Kingdom Relations
Pieter Schneider works as Program Manager Quantum Secure Cryptography NL (QvC-NL) at CIO Rijk of the Ministry of the Interior & Kingdom Relations. Pieter has a broad background in the security domain and cybersecurity. In his current role, he manages the QvC-NL program, which aims to help the Netherlands manage the risks of quantum technology on cryptography in time.
R
Reza Azarderakhsh
CTO at PQSecure and FAU
Dr. Reza Azarderakhsh is a Professor at Florida Atlantic University and the CEO of PQSecure Technologies. He is a leading expert in post-quantum cryptographic engineering, specializing in secure hardware/software co-design, side-channel protections, and formal verification. Dr. Azarderakhsh has published over 140 papers in top-tier conferences and journals related to post-quantum cryptography, contributing significantly to national and international efforts in quantum-safe security for embedded and constrained systems.
Ronny Döring
R&D System Engineer at Deutsche Telekom AG
Ronny Döring is an R&D System Engineer at Deutsche Telekom AG, T-Labs, with a focus on post-quantum cryptography and secure communication protocols. He coordinates experimental work in the T-Labs Quantum Lab and explores the practical integration of advanced cryptographic technologies.
As part of the EU project OpenQKD, Ronny has demonstrated how quantum key distribution (QKD) and post-quantum cryptography (PQC) can be integrated into core network infrastructures, enhancing the resilience and future-readiness of digital communication systems. His research and implementation efforts aim to build a secure communications framework that combines both quantum and classical technologies to meet the challenges of tomorrow’s digital landscape.
Shane Kelly
Principal Crypto Architect at DigiCert
Shane Kelly has worked on solving various software security problems for his customers, from bespoke embedded systems to large-scale cloud-based deployments. Mr. Kelly has spent over eight years implementing, integrating, and optimizing post-quantum algorithms.
At DigiCert, Kelly provides secure, robust, customer-oriented post-quantum cryptography solutions. His focus is on making the transition from current cryptographic solutions to post-quantum solutions as simple as possible given the enormous challenges involved.
Somrak Petchartee
Research Operations Manager, NT Telecom Public Company Limited
Dr.-Ing. Somrak Petchartee is a seasoned researcher and engineer with over 30 years of multidisciplinary experience encompassing radio frequency (RF) design, high-performance computing with FPGA, robotics, embedded systems, sensor technology, and post-quantum cryptography. He earned his Doctor of Engineering from the University of the Federal Armed Forces, Munich, where his doctoral research addressed tactile sensing for object manipulation. He also holds a Master of Engineering in Computer Science from the Asian Institute of Technology and a Bachelor of Engineering in Telecommunications (First-Class Honors) from King Mongkut’s Institute of Technology Ladkrabang.
Dr. Petchartee has held pivotal roles across academia, defense, and industry, leading advanced research initiatives at NT Telecom and contributing to collaborative projects in quantum sensing and Single Proton Detector in partnership with Thammasat University. His scholarly contributions span numerous publications in tactile sensing, intelligent systems, and quantum technologies. He is also a regular invited speaker at prominent technology and innovation forums across Asia.
His work has been recognized with several prestigious awards, including the SEPO Thailand Innovation Award, the Best Paper Award from the Journal of Computers for his research on polynomial dynamic time wraping (DTW), and the Emerald Literati Award for Excellence. Dr. Petchartee remains committed to advancing secure and intelligent systems through interdisciplinary research and applied innovation.
S
Stefan van den Berg
Researcher Cryptography and Cyber Security at TNO
Stefan van den Berg is a cryptographer at the department Applied Cryptography and Quantum Algorithms at TNO. He has a background in information security and embedded systems. His work focuses on development of various Privacy-Enhancing Technologies, Post-Quantum Cryptography solutions and Quantum Applications.
Sudha Iyer
Head Cybersecurity Architect at Citi
Sudha Iyer is Head Cybersecurity Architect at Citi, a founding member of the FS-ISAC PQC group, and an international project leader at ISO for blockchain and smart contract security. She has 23 years of experience in cryptographic architecture and is deeply engaged in cross-sector cybersecurity forums and leads several cryptographic and data security standards efforts.
S
Sven Konings
Software Developer
Konings is a Software Developer at ZYNYO, working on digital signatures. As part of the HAPKIDO project he is working on the transition to quantum-safe digital signatures. Sven studied at the University of Twente and graduated in both masters Computer Science and Science Education and Communication."
Sven Rajala
International PKI Man of Mystery at Keyfactor
An award winning seasoned cyber-security consultant with extensive subject matter expertise on PKI, automation of PKI/Signing Solutions, and containers. I have over 18 years of experience working in both the private sector and with federal government departments and agencies. I am frequently called upon to participate in client discussions, presentations, and seminars on topics including PKI, EJBCA, and PKI Devsecops. I also host the Key Master series by Keyfactor found on the YouTube Keyfactor Developers channel.
Tadahiko Ito
Senior Researcher
Tadahiko Ito is a Senior Researcher at Intelligent Systems Laboratory, SECOM CO., LTD. His research at SECOM includes cryptographic protocols, policy management, cryptographic key management, and planning for PQC transitions. He is a member of the CRYPTREC (Cryptographic Technology Research Working Group) PQC Research Working Group. Since 2017, he has represented SECOM Trust Systems at the CA/B Forum. He has co-authored several IETF RFCs, including RFC 8813, RFC 9295, and RFC 9336, among other publications.
Tan Teik Guan
CEO at pQCee
Dr. Tan Teik Guan is the CEO and Co-founder of pQCee, a startup dedicated to helping organizations achieve post-quantum cryptographic readiness. A specialist in cryptographic security design and integration, he has led the implementation of secure systems for financial institutions, government agencies, and enterprises across Asia.
Before founding pQCee, Dr. Tan spent over a decade at the helm of DS3, a multi-factor authentication solutions provider, which he led to a successful acquisition. His work bridges theoretical cryptography and real-world applications, earning him a trusted reputation in the field.
He holds a BSc and MSc in Computer Science from the National University of Singapore and a PhD in Information Systems from the Singapore University of Technology and Design. He continues to be active in cybersecurity standards and policy development, with a strong interest in advancing quantum-resilient infrastructures.
T
Tan Wai Kaey
IoT & Cybersecurity Engineer
Tan Wai Kaey is an IoT and Cybersecurity Engineer with a strong academic foundation and professional certifications, including CEH (Certified Ethical Hacker), CC (Certified in Cybersecurity), and CCNA (Cisco Certified Network Associate). Her expertise includes penetration testing, vulnerability assessment, secure software development, and cryptography. She has contributed to projects involving secure web applications, database management, and lightweight post-quantum cryptographic solutions. As the former cybersecurity lead for the Google Developer Student Club (GDSC), she led workshops and initiatives to enhance technical skills and promote cybersecurity awareness.
Tomas Gustavsson
Chief PKI Officer at Keyfactor
Tomas Gustavsson is the chief public key infrastructure (PKI) officer at Keyfactor. He pioneered open-source public key infrastructure with EJBCA, now embraced by thousands of organizations. With a background in computer science, Tomas established EJBCA to fortify trusted digital identities globally. He advocates for cybersecurity through innovation, collaboration, and open-source principles.
Tony Chen
Solutions Engineer
Meet Tony Chen, the cybersecurity wizard with over 9 years of PKI magic up his sleeve! As an Asia-Pacific and Japan Solution Engineer at Keyfactor, he’s the go-to guy for all things secure and know-how of solutions to keep the digital world safe and sound.
Udara Pathum
Senior Software Engineer at WSO2
Udara Pathum is a Senior Software Engineer at WSO2, leading initiatives in post-quantum cryptography (PQC) since 2023. He focuses on integrating PQC algorithms into real-world identity and access management (IAM) and public key infrastructure (PKI) systems, ensuring they are future-ready against quantum threats. Udara has authored several articles sharing real-world insights on PQC integration, hybrid cryptographic transitions, and adoption strategies. His goal is to help organizations future-proof their security infrastructure without disrupting existing systems.
Zsolt Rózsahegyi
CEO at i4p informatics
Zsolt Rózsahegyi is CEO and co-founder of i4p Informatics. He holds engineering degrees from the Technical University of Budapest and Carnegie Mellon University. Zsolt was previously founder and CEO of one of Europe’s first Qualified Trust Service Providers and played a key role in shaping Hungary’s electronic signature legislation. His expertise spans applied cryptography, PKI, timestamping, secure software development, and quantum-safe systems.
8:30
Registration
9:00
Room 1
Advancing CBOM: Hands-On with CycloneDX v1.7 and PKI Extensions
Michael Osborne
CTO IBM Quantum Safe at IBM Research
The Linux Foundation CBOM with ClycloneDX
The CBOM workshop will help participants understand and become familiar with the upcoming extensions to the CycloneDX CBOM standard v1.7. In particular new extensions targeted at reporting PKI certificates. We are actively talking to industry vendors who have expressed interest in collaborating on this workshop.
We will explore:
Use open-source software recently transferred to the Linux Foundation. The software will be used as a basis for a hands-on section of the course.
Become familiar with the upcoming extensions to the CycloneDX CBOM standard v1.7
To get the most out of this interactive experience, attendees are strongly encouraged to bring a laptop. Hands-on activities and guided tooling demonstrations will be included throughout the session.
Room 2
PKI and Crypto Agility: Know Your Infrastructure
Alexander Löw
CEO at Data-Warehouse
Building and Monitoring Your Cryptographic Inventory with PCert
This workshop offers a deep dive into cryptographic discovery and inventory practices essential for organizations aiming to establish robust CBOM (Cryptographic Bill of Materials) and SBOM (Software Bill of Materials). Participants will learn how to identify and catalog all cryptographic assets across complex environments, laying the foundation for a comprehensive and actionable cryptographic inventory.
We will explore:
What needs to be discovered and collected to ensure full cryptographic visibility,
How to build a universal cryptographic inventory that supports ongoing operational and compliance needs,
Automation strategies for cryptographic management processes, including analysis, risk assessment, and prioritization aligned with the organizational context.
Additionally, we will address the challenges of managing systems of systems and intricate network topologies. The workshop will compare agent-based and agentless approaches to cryptographic discovery, including real-world implementation examples highlighting trade-offs and success factors.
Importantly, this session is designed to empower both technical teams and decision-makers. By reframing cryptographic challenges as data and asset management problems, the workshop reduces complexity and enables strategic engagement with existing technological capabilities.
To get the most out of this interactive experience, attendees are strongly encouraged to bring a laptop. Hands-on activities and guided tooling demonstrations will be included throughout the session.
Room 3
Enabling Quantum-Safe, Crypto -Agile Security with Crypto4A's QxHSM™: Business & Technical Insights
Bruno Couillard
Co-Founder & CEO at Crypto4A
As quantum computing threatens modern cryptography, organizations must prepare their infrastructure for a post-quantum world. Hardware security modules (HSMs) — key to digital trust — must evolve. This workshop covers the strategic and technical foundations of quantum-safe security, focusing on Crypto4A’s 5th-generation QxHSM™.
We will explore:
Part 1: Business Imperatives (2 hrs) - Explore drivers behind PQC adoption, including regulations, risk mitigation, and use cases like harvest-now-decrypt-later. Learn what defines a quantum-safe HSM and how QxHSM™ supports crypto-agility, reduces complexity, and ensures trust and compliance.
Part 2: Technical Foundations (1.5 hrs) - Dive into PQC integration, key management, and secure HSM architecture. A live demo of QxHSM™ highlights key creation, usage, policy control, and agility.
Join us to learn how to future-proof your cryptographic systems using quantum-safe security that’s built in — not bolted on.
Room 4
Securing the future Internet of Things with ML-KEM and ML-DSA
K
Kevin Hilscher
Sr. Director, Product Management at DigiCert
Today’s Internet of Things (IoT) relies on a variety of protocols and communications technologies…CoAP, LwM2M, LoRaWAN, NB-IoT, Wi-Fi, Thread … many of which are not quantum-safe.
While large-scale quantum computers capable of breaking current encryption aren’t yet available, the concept of ““harvest now, decrypt later”” is a significant concern. Now that NIST has released final versions of its first three Post-Quantum Cryptography (PQC) standards the race is on to make IoT quantum-safe.
We will explore:
Learn what it takes to make an MQTT-based IoT solution quantum safe.
Implement and transmit data between a device and an MQTT broker using MQTT with TLS 1.3, ML-KEM, and ML-DSA using open-source tools.
In order to fully participate in this workshop you will need a Ubuntu 22.04 (arm64 or x64) virtual machine capable of running Mosquitto MQTT broker, Wireshark and some client tools (2-4GB RAM, 15-20GB disk).
Room 5
Create your own quantum-safe signed PDF documents with hybrid cryptography
Alessandro Amadori
Cryptographer at TNO
S
Sven Konings
Software Developer
S
Stefan van den Berg
Researcher Cryptography and Cyber Security at TNO
This workshop is from a collaborative effort between TNO and Zynyo. Standards are now established and libraries are being released, the integration of Post-Quantum Cryptography into products is increasing. However, the adoption of PQC is not yet universal across all scenarios and use-cases. This workshop provides a unique opportunity for participants to create signed PDF documents using hybrid PQC using software DSS that creates digital signatures based on ETSI standards in line with European legislation such as the eIDAS regulation.
We will explore:
Participants will sign PDF documents using different types of hybrid certificates,
validate signatures to confirm their authenticity and integrity,
Visualize signed PDFs and have tangible proof of their validity.
To get the most out of this interactive experience, attendees are strongly encouraged to bring a laptop. Hands-on activities and guided tooling demonstrations will be included throughout the session.
11:00
Break
11:30
Room 1
Continuation of the morning workshop
The morning workshop continues until lunch.
Room 2
Continuation of the morning workshop
The morning workshop continues until lunch.
Room 3
Continuation of the morning workshop
The morning workshop continues until lunch.
Room 4
Continuation of the morning workshop
The morning workshop continues until lunch.
Room 5
Continuation of the morning workshop
The morning workshop continues until lunch.
13:00
Lunch
14:00
Room 1
To be announced shortly
This workshop will be announced shortly
Room 2
Hands-On PQC Migration: From Cryptographic asset inventory to PQC Crypto-agility
Tomas Gustavsson
Chief PKI Officer at Keyfactor
Chris Hickman
Security Officer
Tony Chen
Solutions Engineer
With NIST setting a clear 2030 deadline for the deprecation of RSA and ECC in favor of quantum-safe algorithms, organizations face an urgent need to assess and modernize their cryptographic landscape. This workshop offers a practical, end-to-end session on post-quantum cryptography (PQC) migration—starting with cryptographic asset discovery and inventory, through quantum risk assessment, and culminating in the replacement of legacy algorithms with NIST-approved PQC standards.
We will explore:
Create a PQC PKI and hybrid PKI using EJBCA,
Issue a signing certificate to SignServer, and demonstrate how to integrate with a hardware security module (HSM) to secure cryptographic keys and operations—bridging the gap between proof of concept and real world deployment.
Demonstrate cryptographic asset monitoring and automatic cryptographic migration using Keyfactor solutions,
Highlight the key steps for PQC transition at scale and with agility.
This session will equip you with the tools and strategies needed to future-proof your quantum safe cryptographic infrastructure.
To get the most out of this interactive experience, attendees are strongly encouraged to bring a laptop. Hands-on activities and guided tooling demonstrations will be included throughout the session.
Room 3
Enabling Quantum-Safe, Crypto -Agile Security with Crypto4A's QxHSM™: Business & Technical Insights
Bruno Couillard
Co-Founder & CEO at Crypto4A
As quantum computing threatens modern cryptography, organizations must prepare their infrastructure for a post-quantum world. Hardware security modules (HSMs) — key to digital trust — must evolve. This workshop covers the strategic and technical foundations of quantum-safe security, focusing on Crypto4A’s 5th-generation QxHSM™.
We will explore:
Part 1: Business Imperatives (2 hrs) - Explore drivers behind PQC adoption, including regulations, risk mitigation, and use cases like harvest-now-decrypt-later. Learn what defines a quantum-safe HSM and how QxHSM™ supports crypto-agility, reduces complexity, and ensures trust and compliance.
Part 2: Technical Foundations (1.5 hrs) - Dive into PQC integration, key management, and secure HSM architecture. A live demo of QxHSM™ highlights key creation, usage, policy control, and agility.
Join us to learn how to future-proof your cryptographic systems using quantum-safe security that’s built in — not bolted on.
Room 4
To be announced shortly
This workshop will be announced shortly
Room 5
To be announced shortly
This workshop will be announced shortly
15:30
Break
16:00
Room 1
Continuation of the afternoon workshop
The afternoon workshop continues until the end of the day.
Room 2
Continuation of the afternoon workshop
The afternoon workshop continues until the end of the day.
Room 3
Continuation of the afternoon workshop
The afternoon workshop continues until the end of the day.
Room 4
Continuation of the afternoon workshop
The afternoon workshop continues until the end of the day.
Room 5
Continuation of the afternoon workshop
The afternoon workshop continues until the end of the day.
18:00
End of Day One
8:30
Registration
9:00
Advancing CBOM: Hands-On with CycloneDX v1.7 and PKI Extensions
Michael Osborne
CTO IBM Quantum Safe at IBM Research
The Linux Foundation CBOM with ClycloneDX
The CBOM workshop will help participants understand and become familiar with the upcoming extensions to the CycloneDX CBOM standard v1.7. In particular new extensions targeted at reporting PKI certificates. We are actively talking to industry vendors who have expressed interest in collaborating on this workshop.
We will explore:
Use open-source software recently transferred to the Linux Foundation. The software will be used as a basis for a hands-on section of the course.
Become familiar with the upcoming extensions to the CycloneDX CBOM standard v1.7
To get the most out of this interactive experience, attendees are strongly encouraged to bring a laptop. Hands-on activities and guided tooling demonstrations will be included throughout the session.
PKI and Crypto Agility: Know Your Infrastructure
Alexander Löw
CEO at Data-Warehouse
Building and Monitoring Your Cryptographic Inventory with PCert
This workshop offers a deep dive into cryptographic discovery and inventory practices essential for organizations aiming to establish robust CBOM (Cryptographic Bill of Materials) and SBOM (Software Bill of Materials). Participants will learn how to identify and catalog all cryptographic assets across complex environments, laying the foundation for a comprehensive and actionable cryptographic inventory.
We will explore:
What needs to be discovered and collected to ensure full cryptographic visibility,
How to build a universal cryptographic inventory that supports ongoing operational and compliance needs,
Automation strategies for cryptographic management processes, including analysis, risk assessment, and prioritization aligned with the organizational context.
Additionally, we will address the challenges of managing systems of systems and intricate network topologies. The workshop will compare agent-based and agentless approaches to cryptographic discovery, including real-world implementation examples highlighting trade-offs and success factors.
Importantly, this session is designed to empower both technical teams and decision-makers. By reframing cryptographic challenges as data and asset management problems, the workshop reduces complexity and enables strategic engagement with existing technological capabilities.
To get the most out of this interactive experience, attendees are strongly encouraged to bring a laptop. Hands-on activities and guided tooling demonstrations will be included throughout the session.
Enabling Quantum-Safe, Crypto -Agile Security with Crypto4A's QxHSM™: Business & Technical Insights
Bruno Couillard
Co-Founder & CEO at Crypto4A
As quantum computing threatens modern cryptography, organizations must prepare their infrastructure for a post-quantum world. Hardware security modules (HSMs) — key to digital trust — must evolve. This workshop covers the strategic and technical foundations of quantum-safe security, focusing on Crypto4A’s 5th-generation QxHSM™.
We will explore:
Part 1: Business Imperatives (2 hrs) - Explore drivers behind PQC adoption, including regulations, risk mitigation, and use cases like harvest-now-decrypt-later. Learn what defines a quantum-safe HSM and how QxHSM™ supports crypto-agility, reduces complexity, and ensures trust and compliance.
Part 2: Technical Foundations (1.5 hrs) - Dive into PQC integration, key management, and secure HSM architecture. A live demo of QxHSM™ highlights key creation, usage, policy control, and agility.
Join us to learn how to future-proof your cryptographic systems using quantum-safe security that’s built in — not bolted on.
Securing the future Internet of Things with ML-KEM and ML-DSA
K
Kevin Hilscher
Sr. Director, Product Management at DigiCert
Today’s Internet of Things (IoT) relies on a variety of protocols and communications technologies…CoAP, LwM2M, LoRaWAN, NB-IoT, Wi-Fi, Thread … many of which are not quantum-safe.
While large-scale quantum computers capable of breaking current encryption aren’t yet available, the concept of ““harvest now, decrypt later”” is a significant concern. Now that NIST has released final versions of its first three Post-Quantum Cryptography (PQC) standards the race is on to make IoT quantum-safe.
We will explore:
Learn what it takes to make an MQTT-based IoT solution quantum safe.
Implement and transmit data between a device and an MQTT broker using MQTT with TLS 1.3, ML-KEM, and ML-DSA using open-source tools.
In order to fully participate in this workshop you will need a Ubuntu 22.04 (arm64 or x64) virtual machine capable of running Mosquitto MQTT broker, Wireshark and some client tools (2-4GB RAM, 15-20GB disk).
Create your own quantum-safe signed PDF documents with hybrid cryptography
Alessandro Amadori
Cryptographer at TNO
S
Sven Konings
Software Developer
S
Stefan van den Berg
Researcher Cryptography and Cyber Security at TNO
This workshop is from a collaborative effort between TNO and Zynyo. Standards are now established and libraries are being released, the integration of Post-Quantum Cryptography into products is increasing. However, the adoption of PQC is not yet universal across all scenarios and use-cases. This workshop provides a unique opportunity for participants to create signed PDF documents using hybrid PQC using software DSS that creates digital signatures based on ETSI standards in line with European legislation such as the eIDAS regulation.
We will explore:
Participants will sign PDF documents using different types of hybrid certificates,
validate signatures to confirm their authenticity and integrity,
Visualize signed PDFs and have tangible proof of their validity.
To get the most out of this interactive experience, attendees are strongly encouraged to bring a laptop. Hands-on activities and guided tooling demonstrations will be included throughout the session.
11:00
Break
11:30
Continuation of the morning workshop
The morning workshop continues until lunch.
Continuation of the morning workshop
The morning workshop continues until lunch.
Continuation of the morning workshop
The morning workshop continues until lunch.
Continuation of the morning workshop
The morning workshop continues until lunch.
Continuation of the morning workshop
The morning workshop continues until lunch.
13:00
Lunch
14:00
To be announced shortly
This workshop will be announced shortly
Hands-On PQC Migration: From Cryptographic asset inventory to PQC Crypto-agility
Tomas Gustavsson
Chief PKI Officer at Keyfactor
Chris Hickman
Security Officer
Tony Chen
Solutions Engineer
With NIST setting a clear 2030 deadline for the deprecation of RSA and ECC in favor of quantum-safe algorithms, organizations face an urgent need to assess and modernize their cryptographic landscape. This workshop offers a practical, end-to-end session on post-quantum cryptography (PQC) migration—starting with cryptographic asset discovery and inventory, through quantum risk assessment, and culminating in the replacement of legacy algorithms with NIST-approved PQC standards.
We will explore:
Create a PQC PKI and hybrid PKI using EJBCA,
Issue a signing certificate to SignServer, and demonstrate how to integrate with a hardware security module (HSM) to secure cryptographic keys and operations—bridging the gap between proof of concept and real world deployment.
Demonstrate cryptographic asset monitoring and automatic cryptographic migration using Keyfactor solutions,
Highlight the key steps for PQC transition at scale and with agility.
This session will equip you with the tools and strategies needed to future-proof your quantum safe cryptographic infrastructure.
To get the most out of this interactive experience, attendees are strongly encouraged to bring a laptop. Hands-on activities and guided tooling demonstrations will be included throughout the session.
Enabling Quantum-Safe, Crypto -Agile Security with Crypto4A's QxHSM™: Business & Technical Insights
Bruno Couillard
Co-Founder & CEO at Crypto4A
As quantum computing threatens modern cryptography, organizations must prepare their infrastructure for a post-quantum world. Hardware security modules (HSMs) — key to digital trust — must evolve. This workshop covers the strategic and technical foundations of quantum-safe security, focusing on Crypto4A’s 5th-generation QxHSM™.
We will explore:
Part 1: Business Imperatives (2 hrs) - Explore drivers behind PQC adoption, including regulations, risk mitigation, and use cases like harvest-now-decrypt-later. Learn what defines a quantum-safe HSM and how QxHSM™ supports crypto-agility, reduces complexity, and ensures trust and compliance.
Part 2: Technical Foundations (1.5 hrs) - Dive into PQC integration, key management, and secure HSM architecture. A live demo of QxHSM™ highlights key creation, usage, policy control, and agility.
Join us to learn how to future-proof your cryptographic systems using quantum-safe security that’s built in — not bolted on.
To be announced shortly
This workshop will be announced shortly
To be announced shortly
This workshop will be announced shortly
15:30
Break
16:00
Continuation of the afternoon workshop
The afternoon workshop continues until the end of the day.
Continuation of the afternoon workshop
The afternoon workshop continues until the end of the day.
Continuation of the afternoon workshop
The afternoon workshop continues until the end of the day.
Continuation of the afternoon workshop
The afternoon workshop continues until the end of the day.
Continuation of the afternoon workshop
The afternoon workshop continues until the end of the day.
18:00
End of Day One
Advancing CBOM: Hands-On with CycloneDX v1.7 and PKI Extensions
9:00
Room 1
Abstract
The Linux Foundation CBOM with ClycloneDX
The CBOM workshop will help participants understand and become familiar with the upcoming extensions to the CycloneDX CBOM standard v1.7. In particular new extensions targeted at reporting PKI certificates. We are actively talking to industry vendors who have expressed interest in collaborating on this workshop.
We will explore:
Use open-source software recently transferred to the Linux Foundation. The software will be used as a basis for a hands-on section of the course.
Become familiar with the upcoming extensions to the CycloneDX CBOM standard v1.7
To get the most out of this interactive experience, attendees are strongly encouraged to bring a laptop. Hands-on activities and guided tooling demonstrations will be included throughout the session.
Speakers
Michael Osborne
CTO IBM Quantum Safe at IBM Research
Michael Osborne is an IBM Distinguished Engineer and the global CTO for IBM Quantum Safe. He leads the cryptographic research activities at the IBM Research Center in Rüschlikon, Switzerland. His current focus includes advancing new generations of advanced cryptography, such as those selected by NIST as the next generation of PQC algorithms. He also leads the development of methods and technologies to help organizations migrate to use new Quantum-Safe standards.
PKI and Crypto Agility: Know Your Infrastructure
9:00
Room 2
Abstract
Building and Monitoring Your Cryptographic Inventory with PCert
This workshop offers a deep dive into cryptographic discovery and inventory practices essential for organizations aiming to establish robust CBOM (Cryptographic Bill of Materials) and SBOM (Software Bill of Materials). Participants will learn how to identify and catalog all cryptographic assets across complex environments, laying the foundation for a comprehensive and actionable cryptographic inventory.
We will explore:
What needs to be discovered and collected to ensure full cryptographic visibility,
How to build a universal cryptographic inventory that supports ongoing operational and compliance needs,
Automation strategies for cryptographic management processes, including analysis, risk assessment, and prioritization aligned with the organizational context.
Additionally, we will address the challenges of managing systems of systems and intricate network topologies. The workshop will compare agent-based and agentless approaches to cryptographic discovery, including real-world implementation examples highlighting trade-offs and success factors.
Importantly, this session is designed to empower both technical teams and decision-makers. By reframing cryptographic challenges as data and asset management problems, the workshop reduces complexity and enables strategic engagement with existing technological capabilities.
To get the most out of this interactive experience, attendees are strongly encouraged to bring a laptop. Hands-on activities and guided tooling demonstrations will be included throughout the session.
Speakers
Alexander Löw
CEO at Data-Warehouse
Dr. Alexander Löw is the CEO of Data-Warehouse GmbH and serves as a Senator in the German Senate of Economy. He holds the position of Vice President of the German Cybersecurity Council Association and is the innovative mind behind IQIMS and PCert. With a deep understanding of cybersecurity since the 1980s and 25 years of experience as a Data Protection Officer (DPO), Alexander has a strong focus on Public Key Infrastructure (PKI). He has been involved in the conceptualization, building, and maintenance of industrial and governmental CAs (e.g., Macao, German Airforce, BMW) since 2001. In 2012, following a significant APT attack, he began automating PKI processes to enhance cybersecurity. Since 2014, he has been actively involved in publishing and presenting on PKI and cybersecurity topics, and has been conducting PKI trainings for the German BSI Alliance for Cybersecurity since 2015. In 2024, he joined the NIST Post-Quantum Migration Working Group to contribute to the development of standard 1800-38B.
Enabling Quantum-Safe, Crypto -Agile Security with Crypto4A's QxHSM™: Business & Technical Insights
9:00
Room 3
Abstract
As quantum computing threatens modern cryptography, organizations must prepare their infrastructure for a post-quantum world. Hardware security modules (HSMs) — key to digital trust — must evolve. This workshop covers the strategic and technical foundations of quantum-safe security, focusing on Crypto4A’s 5th-generation QxHSM™.
We will explore:
Part 1: Business Imperatives (2 hrs) - Explore drivers behind PQC adoption, including regulations, risk mitigation, and use cases like harvest-now-decrypt-later. Learn what defines a quantum-safe HSM and how QxHSM™ supports crypto-agility, reduces complexity, and ensures trust and compliance.
Part 2: Technical Foundations (1.5 hrs) - Dive into PQC integration, key management, and secure HSM architecture. A live demo of QxHSM™ highlights key creation, usage, policy control, and agility.
Join us to learn how to future-proof your cryptographic systems using quantum-safe security that’s built in — not bolted on.
Speakers
Bruno Couillard
Co-Founder & CEO at Crypto4A
Bruno Couillard is the CEO and co-founder of Crypto4A Technologies Inc., where he leads the development of cutting-edge crypto-agile and post-quantum cybersecurity solutions, including the QxHSM and QxEDGE. With over 35 years of experience in cryptography, key management, and quantum-safe technology, Bruno has worked extensively in both commercial and military applications.
Previously, he co-founded Chrysalis-ITS and spearheaded the development of the Luna HSM, now a part of Thales. He also contributed to the creation of the PKCS#11 Standard. In addition to his entrepreneurial work, Bruno has served as a cryptographic evaluator for the Canadian Government and played a key role in the Canadian Cryptographic Modernization Program (CCMP).
Bruno is an active board member of Quantum Industry Canada (QIC), co-chair of the Quantum Industry Developers and Users Working Group, and a member of the Canadian National Quantum Strategy committee. Through these roles, he continues to promote and shape a quantum-safe cybersecurity ecosystem.
Securing the future Internet of Things with ML-KEM and ML-DSA
9:00
Room 4
Abstract
Today’s Internet of Things (IoT) relies on a variety of protocols and communications technologies…CoAP, LwM2M, LoRaWAN, NB-IoT, Wi-Fi, Thread … many of which are not quantum-safe.
While large-scale quantum computers capable of breaking current encryption aren’t yet available, the concept of ““harvest now, decrypt later”” is a significant concern. Now that NIST has released final versions of its first three Post-Quantum Cryptography (PQC) standards the race is on to make IoT quantum-safe.
We will explore:
Learn what it takes to make an MQTT-based IoT solution quantum safe.
Implement and transmit data between a device and an MQTT broker using MQTT with TLS 1.3, ML-KEM, and ML-DSA using open-source tools.
In order to fully participate in this workshop you will need a Ubuntu 22.04 (arm64 or x64) virtual machine capable of running Mosquitto MQTT broker, Wireshark and some client tools (2-4GB RAM, 15-20GB disk).
Speakers
K
Kevin Hilscher
Sr. Director, Product Management at DigiCert
Kevin works at the intersection of IoT and cybersecurity. Kevin is the product leader for the DigiCert Device Trust portfolio of products, focused on securing the Internet of Things (IoT). Kevin’s passion is for building platforms and device software for securing connected products, helping customers focus on building a superior connect product and not security “plumbing”. Kevin routinely speaks at industry conferences on the topic of IoT, product security, post-quantum cryptography (PQC), and IoT cybersecurity regulations. Kevin came to DigiCert from Microsoft Azure IoT, where he spent 7 years working with IoT customers, helping them build and secure connected products.
Create your own quantum-safe signed PDF documents with hybrid cryptography
9:00
Room 5
Abstract
This workshop is from a collaborative effort between TNO and Zynyo. Standards are now established and libraries are being released, the integration of Post-Quantum Cryptography into products is increasing. However, the adoption of PQC is not yet universal across all scenarios and use-cases. This workshop provides a unique opportunity for participants to create signed PDF documents using hybrid PQC using software DSS that creates digital signatures based on ETSI standards in line with European legislation such as the eIDAS regulation.
We will explore:
Participants will sign PDF documents using different types of hybrid certificates,
validate signatures to confirm their authenticity and integrity,
Visualize signed PDFs and have tangible proof of their validity.
To get the most out of this interactive experience, attendees are strongly encouraged to bring a laptop. Hands-on activities and guided tooling demonstrations will be included throughout the session.
Speakers
Alessandro Amadori
Cryptographer at TNO
Alessandro Amadori is a cryptographer at TNO focusing on the migration to Post-quantum Cryptography. He holds a PhD from Eindhoven University of Technology in cryptographic implementations. He has contributed in several PQC migration projects like HAPKIDO, and is one a co-author of the second edition of the PQC migration handbook.
S
Sven Konings
Software Developer
Konings is a Software Developer at ZYNYO, working on digital signatures. As part of the HAPKIDO project he is working on the transition to quantum-safe digital signatures. Sven studied at the University of Twente and graduated in both masters Computer Science and Science Education and Communication."
S
Stefan van den Berg
Researcher Cryptography and Cyber Security at TNO
Stefan van den Berg is a cryptographer at the department Applied Cryptography and Quantum Algorithms at TNO. He has a background in information security and embedded systems. His work focuses on development of various Privacy-Enhancing Technologies, Post-Quantum Cryptography solutions and Quantum Applications.
Continuation of the morning workshop
11:30
Room 1
Abstract
The morning workshop continues until lunch.
Speakers
Continuation of the morning workshop
11:30
Room 2
Abstract
The morning workshop continues until lunch.
Speakers
Continuation of the morning workshop
11:30
Room 3
Abstract
The morning workshop continues until lunch.
Speakers
Continuation of the morning workshop
11:30
Room 4
Abstract
The morning workshop continues until lunch.
Speakers
Continuation of the morning workshop
11:30
Room 5
Abstract
The morning workshop continues until lunch.
Speakers
To be announced shortly
14:00
Room 1
Abstract
This workshop will be announced shortly
Speakers
Hands-On PQC Migration: From Cryptographic asset inventory to PQC Crypto-agility
14:00
Room 2
Abstract
With NIST setting a clear 2030 deadline for the deprecation of RSA and ECC in favor of quantum-safe algorithms, organizations face an urgent need to assess and modernize their cryptographic landscape. This workshop offers a practical, end-to-end session on post-quantum cryptography (PQC) migration—starting with cryptographic asset discovery and inventory, through quantum risk assessment, and culminating in the replacement of legacy algorithms with NIST-approved PQC standards.
We will explore:
Create a PQC PKI and hybrid PKI using EJBCA,
Issue a signing certificate to SignServer, and demonstrate how to integrate with a hardware security module (HSM) to secure cryptographic keys and operations—bridging the gap between proof of concept and real world deployment.
Demonstrate cryptographic asset monitoring and automatic cryptographic migration using Keyfactor solutions,
Highlight the key steps for PQC transition at scale and with agility.
This session will equip you with the tools and strategies needed to future-proof your quantum safe cryptographic infrastructure.
To get the most out of this interactive experience, attendees are strongly encouraged to bring a laptop. Hands-on activities and guided tooling demonstrations will be included throughout the session.
Speakers
Tomas Gustavsson
Chief PKI Officer at Keyfactor
Tomas Gustavsson is the chief public key infrastructure (PKI) officer at Keyfactor. He pioneered open-source public key infrastructure with EJBCA, now embraced by thousands of organizations. With a background in computer science, Tomas established EJBCA to fortify trusted digital identities globally. He advocates for cybersecurity through innovation, collaboration, and open-source principles.
Chris Hickman
Security Officer
As Chief Security Officer at Keyfactor, Chris Hickman is at the forefront of advancing the company’s position as a leader of digital trust security solutions in the technical landscape of cryptographic infrastructure and digital certificates. With extensive experience in smart card management systems, PKI design, and directory services, Chris is committed to integrating the voice of the customer into Keyfactor’s platform to drive innovative solutions and accelerate digital trust in the evolving security landscape. He spearheads Keyfactor’s post-quantum cryptography (PQC) strategies to support organizations in their quantum-readiness journeys. He remains an industry-wide trusted resource on enhancing digital trust through SaaS-delivered PKI solutions and certificate lifecycle automation software to support security teams of modern enterprises.
Tony Chen
Solutions Engineer
Meet Tony Chen, the cybersecurity wizard with over 9 years of PKI magic up his sleeve! As an Asia-Pacific and Japan Solution Engineer at Keyfactor, he’s the go-to guy for all things secure and know-how of solutions to keep the digital world safe and sound.
Enabling Quantum-Safe, Crypto -Agile Security with Crypto4A's QxHSM™: Business & Technical Insights
14:00
Room 3
Abstract
As quantum computing threatens modern cryptography, organizations must prepare their infrastructure for a post-quantum world. Hardware security modules (HSMs) — key to digital trust — must evolve. This workshop covers the strategic and technical foundations of quantum-safe security, focusing on Crypto4A’s 5th-generation QxHSM™.
We will explore:
Part 1: Business Imperatives (2 hrs) - Explore drivers behind PQC adoption, including regulations, risk mitigation, and use cases like harvest-now-decrypt-later. Learn what defines a quantum-safe HSM and how QxHSM™ supports crypto-agility, reduces complexity, and ensures trust and compliance.
Part 2: Technical Foundations (1.5 hrs) - Dive into PQC integration, key management, and secure HSM architecture. A live demo of QxHSM™ highlights key creation, usage, policy control, and agility.
Join us to learn how to future-proof your cryptographic systems using quantum-safe security that’s built in — not bolted on.
Speakers
Bruno Couillard
Co-Founder & CEO at Crypto4A
Bruno Couillard is the CEO and co-founder of Crypto4A Technologies Inc., where he leads the development of cutting-edge crypto-agile and post-quantum cybersecurity solutions, including the QxHSM and QxEDGE. With over 35 years of experience in cryptography, key management, and quantum-safe technology, Bruno has worked extensively in both commercial and military applications.
Previously, he co-founded Chrysalis-ITS and spearheaded the development of the Luna HSM, now a part of Thales. He also contributed to the creation of the PKCS#11 Standard. In addition to his entrepreneurial work, Bruno has served as a cryptographic evaluator for the Canadian Government and played a key role in the Canadian Cryptographic Modernization Program (CCMP).
Bruno is an active board member of Quantum Industry Canada (QIC), co-chair of the Quantum Industry Developers and Users Working Group, and a member of the Canadian National Quantum Strategy committee. Through these roles, he continues to promote and shape a quantum-safe cybersecurity ecosystem.
To be announced shortly
14:00
Room 4
Abstract
This workshop will be announced shortly
Speakers
To be announced shortly
14:00
Room 5
Abstract
This workshop will be announced shortly
Speakers
Continuation of the afternoon workshop
16:00
Room 1
Abstract
The afternoon workshop continues until the end of the day.
Speakers
Continuation of the afternoon workshop
16:00
Room 2
Abstract
The afternoon workshop continues until the end of the day.
Speakers
Continuation of the afternoon workshop
16:00
Room 3
Abstract
The afternoon workshop continues until the end of the day.
Speakers
Continuation of the afternoon workshop
16:00
Room 4
Abstract
The afternoon workshop continues until the end of the day.
Speakers
Continuation of the afternoon workshop
16:00
Room 5
Abstract
The afternoon workshop continues until the end of the day.
Speakers
8:30
Registration
9:00
Plenary
Opening
Paul van Brouwershaven
Chair PKI Consortium and Director of Technology at SSL.com
Albert de Ruiter
Vice Chair PKI Consortium and Policy Authority PKI Dutch Government (Logius)
9:30
Plenary
Keynote
The speaker(s) for this session will be announced soon!
10:00
Plenary
Keynote
The speaker(s) for this session will be announced soon!
11:00
Break
11:30
Plenary
PKI Agility and the Difference to Cryptographic Agility: Lessons from the Past and Present
Michael Osborne
CTO IBM Quantum Safe at IBM Research
Cryptographic agility is often misunderstood as purely a technical problem. This presentation challenges that assumption, arguing that agility requirements are context-dependent, often organizational in nature, and ultimately a subset of broader organizational agility.
We begin by classifying different types of PKI agility according to the need for being agile. This includes replacing the underlying cryptographic algorithms and why size matters, re-issuing certificates, replacing certificates hierarchies, reacting to key compromise and migrating to quantum safety. Through concrete examples, we show how lack of agility impacts dimensions differently. Some of the lessons date back 20 years to the transition from RSA to ECC and the experience gained deploying hybrid systems in sensitive government projects. Other lessons are more recent, for example the hybrid secure-boot mechanism on the IBM mainframe.
Breakout
The internet is ready for some PQC certificates
Shane Kelly
Principal Crypto Architect at DigiCert
The size of PQC certificate chains has thrown a wrench into plans to migrate to PQC. A full certificate chain using ML-DSA-65 will cause problems for some systems out there however there are alternatives. This talk explores those alternatives and argues that we should be using some PQC in our certificates right now. The talk will also explore what a future PKI could look like at the conclusion of NISTs additional signature competition.
12:00
Plenary
Quantum Security in Practice: Lessons from a Dozen of Client Engagements
Alexey Bocharnikov
APAC Quantum Security Lead at Accenture
The quantum threat is no longer theoretical, it’s becoming a strategic concern for cybersecurity leaders. This session shares insights from a dozen client case studies across industries and regions, highlighting how organizations are preparing for quantum risk in practical terms.
Through real examples from field engagements, the talk explores how security teams are assessing quantum readiness, making critical decisions with incomplete information, and adapting to shifting standards under real operational pressures.
Rather than focusing on abstract principles, the session offers a grounded look at quantum security in action. Designed to resonate with technically savvy professionals, the narrative blends foundational context with hands-on application, providing actionable takeaways for those navigating the evolving path toward post-quantum resilience.
Breakout
A Framework for Cryptographic Agility
Navaneeth Rameshan
Senior Research Developer at IBM Research
Cryptography is no longer a “set it and forget it” component of software architecture. With the rapid emergence of post-quantum cryptographic standards and the constant discovery of new vulnerabilities, organizations face a growing need to adapt quickly without rewriting applications every time the cryptographic landscape shifts.
This talk will focus on the practical aspects of designing cryptographic systems that enable organizations to transition to post-quantum cryptography in a crypto-agile manner. By embedding agility into the way cryptography is consumed through abstraction, policy, key lifecycle management, and pluggable backends, organizations can avoid costly re-architecture each time cryptographic standards evolve. The framework is modular and composable, allowing teams to adopt incremental levels of cryptographic agility. This allows organizations to evolve toward a truly agile posture at a pace aligned with their security, performance, and compliance needs.
12:30
Plenary
To be announced shortly
The speaker(s) for this session will be announced soon!
Breakout
To be announced shortly
The speaker(s) for this session will be announced soon!
13:00
Lunch
14:00
Plenary
ASEAN’s Post-Quantum Future: Securing Communications in an Era of Disruptive Change
Jonathan Jackson
Senior Director, Strategic Solutions at BlackBerry Malaysia
As ASEAN economies surge toward digital evolution. the foundation of secure communications is facing an existential challenge. The rise of quantum computing is an imminent reality that threatens to dismantle traditional encryption, leaving government data, diplomatic channels & commercial transactions vulnerable to unprecedented risks - including ‘harvest now, decrypt later’ threats. Discuss the profound implications of quantum computing on SEA’s cybersecurity landscape and the urgent need for proactive preparation & public-private sector synergy. In a region of diverse technological maturity, escalating cyber threats & heightened geopolitical risk, building quantum-resilient communications is not only a technical necessity, it is fundamental to national security, economic stability & ASEAN’s collective digital sovereignty.
Breakout
The PQC Landscape: Protocols and Standards
David Hook
VP Software Engineering at Keyfactor
Following the initial announcement of three PQC standards by NIST in 2024, and the subsequent announcement of a fourth more recently and a fifth on the way, a global game of catch up has started among standards bodies to lift the protocols and algorithm applications out of the classical era into PQC. The presentation will look at the current state of standards efforts in regards to protocols and applications and provide some thoughts on how things are evolving and why,
14:30
Plenary
A structured approach to the quantum-safe transformation
E
Efstathia Katsigianni
IBM Quantum Safe Project Executive at IBM Research & Development
As the risk increases for a ‘cryptographically relevant quantum computer’ to appear, the high level of complexity, required time, and the required cost of a migration to adopt quantum-safe cryptography become apparent. Priorities for the quantum-safe migration need to become therefore clear and an organization-wide migration program needs to be set-up. This presentation will describe an approach to migrating to quantum-safe cryptography, drawing on real customer examples from different industries. It will explore the challenges of each stage and discuss some concrete steps taken in both strategic and technical dimensions. This presentation will describe a phased approach, starting with establishing awareness and understanding of the quantum-impact on an organization, as well as the establishment of a structured model for an efficient transformation. It will also focus on where cryptographic monitoring and cryptographic agility elements fit into this journey.
Breakout
Turning Quantum Threats into Opportunities: Modernizing WebPKI with QUIC and Metrics-Driven Insights
Muralidharan Palanisamy
CSO at AppViewX Inc
“As the web accelerates toward Post-Quantum Cryptography (PQC), many discussions focus on key exchange and signature upgrades in TLS. This session takes a metrics-driven technical lens to argue and accelerate PQC migration and a catalyst for a necessary transformation of the WebPKI HTTPS/TLS stack with QUIC.
We will present a comprehensive analysis of the performance, latency, and security implications of PQC along with recent and upcoming changes to WebPKI in the context of QUIC and HTTP/3, including:
Latency Benchmarks: Comparing TLS 1.3 over TCP vs QUIC, 0-RTT and session resumption and security posture shifts.
Early results from hybrid PQC handshakes (e.g., X25519 + Kyber) over QUIC, with handshake size, CPU & memory footprint,Impact of short-lived certificates and ACME automation on revocation, incident response, and operational risk.
Protocol Layer Efficiency: Analysis of QUIC, multi-stream behavior, and WebPKI’s role in seamless multi-origin TLS”
15:00
Plenary
PQC in Action: From Global Standards to Secure Deployments
Nils Gerhardt
Chief Technology Officer at Utimaco
This session delivers the latest insights into Post Quantum Cryptography (PQC), beginning with an update on current standards, regulatory developments, and emerging technologies. It continues by connecting these advancements to real-world customer projects, illustrating how PQC is being applied across industries. As PQC moves from theory to deployment, attendees will explore how organizations are securing digital communications, implementing hybrid encryption, and enabling secure firmware updates. The session offers practical knowledge and implementation strategies — providing a clear view of the current state of PQC standardization, industry adoption, and the technical challenges of real-world integration.
Breakout
Real-World Readiness for PQC: Gaps, Gains, and Groundwork
Tomas Gustavsson
Chief PKI Officer at Keyfactor
The migration to quantum safe algorithms have started. Many of the pieces needed to migrate are now there and can be used in practice, but there are still gaps so an organization’s full use of PKI is not yet possible to migrate. The depth and width of this algorithmic migration is so vast that it will be continuous work for years to come filling in gaps as we go. This presentation will take a look at a number of practical use cases that has been tested and proven to work, as well as use cases where it is currently not possible to migrate. Standards, software, hardware and other components will be judged depending on their readiness or not, and of course some performance tests. Are you ready to get your hands dirty?
15:30
Break
16:00
Plenary
Get Fit For The Qubit: The Dutch approach to a Quantum Secure Society
Pieter Schneider
Program Manager Quantum Secure Cryptography at Dutch Ministry of the Interior & Kingdom Relations
This presentation gives a thorough overview of the Dutch Roadmap and Ambitions concerning a Quantum Safe Society. This roadmap has been established in 2023, but went through various changes as the attention towards the subject of Quantum Computing grew. Besides the involvement of the central government, also knowledge institutions helped in developing the roadmap. The presentation will cover how the roadmap came to be, the various challenges it met along the way and how those challenges were met. The presentation will also include a forecast towards 2026 and beyond, on what the Dutch Government aims to achieve on the national level, not only on the Governmental level, but also for Vital Industries. And how will the European Commissions’ Coordinated Implementation Roadmap for the Transition to Post-Quantum Cryptography Influence the current Dutch efforts? I’ll address all this during this presentation!
Breakout
Working on Quantum-Safe Encrypted Emails
Tan Teik Guan
CEO at pQCee
In the presentation, we will share how we implemented PQC encryption of emails which can inter-operate between Microsoft Office365 and Google Gmail. We will describe the motivation, requirements, design and architecture of how email encryption can be achieved, and how key management is carried out seamlessly. The outcome is that we can start to protect emails against harvest-now-decrypt-later attacks.
16:30
Plenary
To be announced shortly
The speaker(s) for this session will be announced soon!
Breakout
To be announced shortly
The speaker(s) for this session will be announced soon!
17:00
Plenary
Closing remarks for day 2
Paul van Brouwershaven
Chair PKI Consortium and Director of Technology at SSL.com
Albert de Ruiter
Vice Chair PKI Consortium and Policy Authority PKI Dutch Government (Logius)
17:05
Networking
19:00
End of Day Two
8:30
Registration
9:00
Opening
Paul van Brouwershaven
Chair PKI Consortium and Director of Technology at SSL.com
Albert de Ruiter
Vice Chair PKI Consortium and Policy Authority PKI Dutch Government (Logius)
9:30
Keynote
The speaker(s) for this session will be announced soon!
10:00
Keynote
The speaker(s) for this session will be announced soon!
11:00
Break
11:30
PKI Agility and the Difference to Cryptographic Agility: Lessons from the Past and Present
Michael Osborne
CTO IBM Quantum Safe at IBM Research
Cryptographic agility is often misunderstood as purely a technical problem. This presentation challenges that assumption, arguing that agility requirements are context-dependent, often organizational in nature, and ultimately a subset of broader organizational agility.
We begin by classifying different types of PKI agility according to the need for being agile. This includes replacing the underlying cryptographic algorithms and why size matters, re-issuing certificates, replacing certificates hierarchies, reacting to key compromise and migrating to quantum safety. Through concrete examples, we show how lack of agility impacts dimensions differently. Some of the lessons date back 20 years to the transition from RSA to ECC and the experience gained deploying hybrid systems in sensitive government projects. Other lessons are more recent, for example the hybrid secure-boot mechanism on the IBM mainframe.
The internet is ready for some PQC certificates
Shane Kelly
Principal Crypto Architect at DigiCert
The size of PQC certificate chains has thrown a wrench into plans to migrate to PQC. A full certificate chain using ML-DSA-65 will cause problems for some systems out there however there are alternatives. This talk explores those alternatives and argues that we should be using some PQC in our certificates right now. The talk will also explore what a future PKI could look like at the conclusion of NISTs additional signature competition.
12:00
Quantum Security in Practice: Lessons from a Dozen of Client Engagements
Alexey Bocharnikov
APAC Quantum Security Lead at Accenture
The quantum threat is no longer theoretical, it’s becoming a strategic concern for cybersecurity leaders. This session shares insights from a dozen client case studies across industries and regions, highlighting how organizations are preparing for quantum risk in practical terms.
Through real examples from field engagements, the talk explores how security teams are assessing quantum readiness, making critical decisions with incomplete information, and adapting to shifting standards under real operational pressures.
Rather than focusing on abstract principles, the session offers a grounded look at quantum security in action. Designed to resonate with technically savvy professionals, the narrative blends foundational context with hands-on application, providing actionable takeaways for those navigating the evolving path toward post-quantum resilience.
A Framework for Cryptographic Agility
Navaneeth Rameshan
Senior Research Developer at IBM Research
Cryptography is no longer a “set it and forget it” component of software architecture. With the rapid emergence of post-quantum cryptographic standards and the constant discovery of new vulnerabilities, organizations face a growing need to adapt quickly without rewriting applications every time the cryptographic landscape shifts.
This talk will focus on the practical aspects of designing cryptographic systems that enable organizations to transition to post-quantum cryptography in a crypto-agile manner. By embedding agility into the way cryptography is consumed through abstraction, policy, key lifecycle management, and pluggable backends, organizations can avoid costly re-architecture each time cryptographic standards evolve. The framework is modular and composable, allowing teams to adopt incremental levels of cryptographic agility. This allows organizations to evolve toward a truly agile posture at a pace aligned with their security, performance, and compliance needs.
12:30
To be announced shortly
The speaker(s) for this session will be announced soon!
To be announced shortly
The speaker(s) for this session will be announced soon!
13:00
Lunch
14:00
ASEAN’s Post-Quantum Future: Securing Communications in an Era of Disruptive Change
Jonathan Jackson
Senior Director, Strategic Solutions at BlackBerry Malaysia
As ASEAN economies surge toward digital evolution. the foundation of secure communications is facing an existential challenge. The rise of quantum computing is an imminent reality that threatens to dismantle traditional encryption, leaving government data, diplomatic channels & commercial transactions vulnerable to unprecedented risks - including ‘harvest now, decrypt later’ threats. Discuss the profound implications of quantum computing on SEA’s cybersecurity landscape and the urgent need for proactive preparation & public-private sector synergy. In a region of diverse technological maturity, escalating cyber threats & heightened geopolitical risk, building quantum-resilient communications is not only a technical necessity, it is fundamental to national security, economic stability & ASEAN’s collective digital sovereignty.
The PQC Landscape: Protocols and Standards
David Hook
VP Software Engineering at Keyfactor
Following the initial announcement of three PQC standards by NIST in 2024, and the subsequent announcement of a fourth more recently and a fifth on the way, a global game of catch up has started among standards bodies to lift the protocols and algorithm applications out of the classical era into PQC. The presentation will look at the current state of standards efforts in regards to protocols and applications and provide some thoughts on how things are evolving and why,
14:30
A structured approach to the quantum-safe transformation
E
Efstathia Katsigianni
IBM Quantum Safe Project Executive at IBM Research & Development
As the risk increases for a ‘cryptographically relevant quantum computer’ to appear, the high level of complexity, required time, and the required cost of a migration to adopt quantum-safe cryptography become apparent. Priorities for the quantum-safe migration need to become therefore clear and an organization-wide migration program needs to be set-up. This presentation will describe an approach to migrating to quantum-safe cryptography, drawing on real customer examples from different industries. It will explore the challenges of each stage and discuss some concrete steps taken in both strategic and technical dimensions. This presentation will describe a phased approach, starting with establishing awareness and understanding of the quantum-impact on an organization, as well as the establishment of a structured model for an efficient transformation. It will also focus on where cryptographic monitoring and cryptographic agility elements fit into this journey.
Turning Quantum Threats into Opportunities: Modernizing WebPKI with QUIC and Metrics-Driven Insights
Muralidharan Palanisamy
CSO at AppViewX Inc
“As the web accelerates toward Post-Quantum Cryptography (PQC), many discussions focus on key exchange and signature upgrades in TLS. This session takes a metrics-driven technical lens to argue and accelerate PQC migration and a catalyst for a necessary transformation of the WebPKI HTTPS/TLS stack with QUIC.
We will present a comprehensive analysis of the performance, latency, and security implications of PQC along with recent and upcoming changes to WebPKI in the context of QUIC and HTTP/3, including:
Latency Benchmarks: Comparing TLS 1.3 over TCP vs QUIC, 0-RTT and session resumption and security posture shifts.
Early results from hybrid PQC handshakes (e.g., X25519 + Kyber) over QUIC, with handshake size, CPU & memory footprint,Impact of short-lived certificates and ACME automation on revocation, incident response, and operational risk.
Protocol Layer Efficiency: Analysis of QUIC, multi-stream behavior, and WebPKI’s role in seamless multi-origin TLS”
15:00
PQC in Action: From Global Standards to Secure Deployments
Nils Gerhardt
Chief Technology Officer at Utimaco
This session delivers the latest insights into Post Quantum Cryptography (PQC), beginning with an update on current standards, regulatory developments, and emerging technologies. It continues by connecting these advancements to real-world customer projects, illustrating how PQC is being applied across industries. As PQC moves from theory to deployment, attendees will explore how organizations are securing digital communications, implementing hybrid encryption, and enabling secure firmware updates. The session offers practical knowledge and implementation strategies — providing a clear view of the current state of PQC standardization, industry adoption, and the technical challenges of real-world integration.
Real-World Readiness for PQC: Gaps, Gains, and Groundwork
Tomas Gustavsson
Chief PKI Officer at Keyfactor
The migration to quantum safe algorithms have started. Many of the pieces needed to migrate are now there and can be used in practice, but there are still gaps so an organization’s full use of PKI is not yet possible to migrate. The depth and width of this algorithmic migration is so vast that it will be continuous work for years to come filling in gaps as we go. This presentation will take a look at a number of practical use cases that has been tested and proven to work, as well as use cases where it is currently not possible to migrate. Standards, software, hardware and other components will be judged depending on their readiness or not, and of course some performance tests. Are you ready to get your hands dirty?
15:30
Break
16:00
Get Fit For The Qubit: The Dutch approach to a Quantum Secure Society
Pieter Schneider
Program Manager Quantum Secure Cryptography at Dutch Ministry of the Interior & Kingdom Relations
This presentation gives a thorough overview of the Dutch Roadmap and Ambitions concerning a Quantum Safe Society. This roadmap has been established in 2023, but went through various changes as the attention towards the subject of Quantum Computing grew. Besides the involvement of the central government, also knowledge institutions helped in developing the roadmap. The presentation will cover how the roadmap came to be, the various challenges it met along the way and how those challenges were met. The presentation will also include a forecast towards 2026 and beyond, on what the Dutch Government aims to achieve on the national level, not only on the Governmental level, but also for Vital Industries. And how will the European Commissions’ Coordinated Implementation Roadmap for the Transition to Post-Quantum Cryptography Influence the current Dutch efforts? I’ll address all this during this presentation!
Working on Quantum-Safe Encrypted Emails
Tan Teik Guan
CEO at pQCee
In the presentation, we will share how we implemented PQC encryption of emails which can inter-operate between Microsoft Office365 and Google Gmail. We will describe the motivation, requirements, design and architecture of how email encryption can be achieved, and how key management is carried out seamlessly. The outcome is that we can start to protect emails against harvest-now-decrypt-later attacks.
16:30
To be announced shortly
The speaker(s) for this session will be announced soon!
To be announced shortly
The speaker(s) for this session will be announced soon!
17:00
Closing remarks for day 2
Paul van Brouwershaven
Chair PKI Consortium and Director of Technology at SSL.com
Albert de Ruiter
Vice Chair PKI Consortium and Policy Authority PKI Dutch Government (Logius)
17:05
Networking
19:00
End of Day Two
Opening
9:00
Plenary
Speakers
Paul van Brouwershaven
Chair PKI Consortium and Director of Technology at SSL.com
Paul van Brouwershaven is a distinguished leader in cybersecurity with over two decades of experience specializing in Public Key Infrastructure (PKI). He currently serves as the Director of Technology at SSL.com. In addition to his role, Paul chairs the PKI Consortium and also leads its PQC Working Group. Prior to his current roles, Paul held the position of Director Technology Compliance at Entrust and was the Technology Solutions Director at GlobalSign.
Beyond his leadership roles, Paul is also the Owner of Digitorus, a specialized software development and consultancy company he founded in 2016. Digitorus focuses on PKI, Digital Signatures, and Trustworthy Systems. His extensive expertise in PKI is further highlighted by his past role as Vice Chair of the CA/Browser Forum, where he contributed to defining industry standards for digital certificates.
Albert de Ruiter
Vice Chair PKI Consortium and Policy Authority PKI Dutch Government (Logius)
Albert de Ruiter operates the Policy Authority at Logius, the digital government service organization of the Netherlands. He is also a member of the QvC (Quantum Secure Cryptography) working group of the Dutch government, a board member of HAPKIDO, and a member of the PKI Consortium. Albert is known for introducing the idea of a Post-Quantum Cryptography Conference to the PKI Consortium in 2022.
Keynote
9:30
Plenary
Abstract
The speaker(s) for this session will be announced soon!
Speakers
Keynote
10:00
Plenary
Abstract
The speaker(s) for this session will be announced soon!
Speakers
PKI Agility and the Difference to Cryptographic Agility: Lessons from the Past and Present
11:30
Plenary
Abstract
Cryptographic agility is often misunderstood as purely a technical problem. This presentation challenges that assumption, arguing that agility requirements are context-dependent, often organizational in nature, and ultimately a subset of broader organizational agility.
We begin by classifying different types of PKI agility according to the need for being agile. This includes replacing the underlying cryptographic algorithms and why size matters, re-issuing certificates, replacing certificates hierarchies, reacting to key compromise and migrating to quantum safety. Through concrete examples, we show how lack of agility impacts dimensions differently. Some of the lessons date back 20 years to the transition from RSA to ECC and the experience gained deploying hybrid systems in sensitive government projects. Other lessons are more recent, for example the hybrid secure-boot mechanism on the IBM mainframe.
Speakers
Michael Osborne
CTO IBM Quantum Safe at IBM Research
Michael Osborne is an IBM Distinguished Engineer and the global CTO for IBM Quantum Safe. He leads the cryptographic research activities at the IBM Research Center in Rüschlikon, Switzerland. His current focus includes advancing new generations of advanced cryptography, such as those selected by NIST as the next generation of PQC algorithms. He also leads the development of methods and technologies to help organizations migrate to use new Quantum-Safe standards.
The internet is ready for some PQC certificates
11:30
Breakout
Abstract
The size of PQC certificate chains has thrown a wrench into plans to migrate to PQC. A full certificate chain using ML-DSA-65 will cause problems for some systems out there however there are alternatives. This talk explores those alternatives and argues that we should be using some PQC in our certificates right now. The talk will also explore what a future PKI could look like at the conclusion of NISTs additional signature competition.
Speakers
Shane Kelly
Principal Crypto Architect at DigiCert
Shane Kelly has worked on solving various software security problems for his customers, from bespoke embedded systems to large-scale cloud-based deployments. Mr. Kelly has spent over eight years implementing, integrating, and optimizing post-quantum algorithms.
At DigiCert, Kelly provides secure, robust, customer-oriented post-quantum cryptography solutions. His focus is on making the transition from current cryptographic solutions to post-quantum solutions as simple as possible given the enormous challenges involved.
Quantum Security in Practice: Lessons from a Dozen of Client Engagements
12:00
Plenary
Abstract
The quantum threat is no longer theoretical, it’s becoming a strategic concern for cybersecurity leaders. This session shares insights from a dozen client case studies across industries and regions, highlighting how organizations are preparing for quantum risk in practical terms.
Through real examples from field engagements, the talk explores how security teams are assessing quantum readiness, making critical decisions with incomplete information, and adapting to shifting standards under real operational pressures.
Rather than focusing on abstract principles, the session offers a grounded look at quantum security in action. Designed to resonate with technically savvy professionals, the narrative blends foundational context with hands-on application, providing actionable takeaways for those navigating the evolving path toward post-quantum resilience.
Speakers
Alexey Bocharnikov
APAC Quantum Security Lead at Accenture
Alexey, a Director at Accenture, brings over 15 years of expertise in cybersecurity strategy, risk management, quantum computing, and cryptography. He currently holds the position of APAC Quantum Security Lead and Director of Cyber Strategy at AN/Z.
Prior to Accenture, Alexey honed his expertise at EY, contributing to the Global Innovation Quantum Technology Lab and leading Global Quantum Security efforts. Before EY, Alexey served as a County Information Security Officer at Deutsche Bank’s Moscow Branch.
Alexey is a vocal advocate for best practices and proactive risk management in cyber strategy and quantum security. His thought leadership includes authoring articles, contributing to international reports, producing educational videos, and speaking at industry conferences.
A Framework for Cryptographic Agility
12:00
Breakout
Abstract
Cryptography is no longer a “set it and forget it” component of software architecture. With the rapid emergence of post-quantum cryptographic standards and the constant discovery of new vulnerabilities, organizations face a growing need to adapt quickly without rewriting applications every time the cryptographic landscape shifts.
This talk will focus on the practical aspects of designing cryptographic systems that enable organizations to transition to post-quantum cryptography in a crypto-agile manner. By embedding agility into the way cryptography is consumed through abstraction, policy, key lifecycle management, and pluggable backends, organizations can avoid costly re-architecture each time cryptographic standards evolve. The framework is modular and composable, allowing teams to adopt incremental levels of cryptographic agility. This allows organizations to evolve toward a truly agile posture at a pace aligned with their security, performance, and compliance needs.
Speakers
Navaneeth Rameshan
Senior Research Developer at IBM Research
Dr. Navaneeth Rameshan is a senior research developer at IBM Research - Zurich, focused on applied cryptography and cloud security. He is driven by building tangible solutions to real-world security challenges, with multiple contributions across IBM Cloud services including Key Protect, Hyper Protect Crypto Service, Secrets Manager, and the IBM Kubernetes Service.
His work includes quantum-safe integrations across diverse stacks, scalable middleware for HSMs and private PKI systems, many of which are deployed and in production today. He has also led architectural efforts to enable seamless migration to post-quantum cryptography. With a hands-on, systems-level approach, he aims to bridge research and engineering to make quantum-safe security practical at scale.
To be announced shortly
12:30
Plenary
Abstract
The speaker(s) for this session will be announced soon!
Speakers
To be announced shortly
12:30
Breakout
Abstract
The speaker(s) for this session will be announced soon!
Speakers
ASEAN’s Post-Quantum Future: Securing Communications in an Era of Disruptive Change
14:00
Plenary
Abstract
As ASEAN economies surge toward digital evolution. the foundation of secure communications is facing an existential challenge. The rise of quantum computing is an imminent reality that threatens to dismantle traditional encryption, leaving government data, diplomatic channels & commercial transactions vulnerable to unprecedented risks - including ‘harvest now, decrypt later’ threats. Discuss the profound implications of quantum computing on SEA’s cybersecurity landscape and the urgent need for proactive preparation & public-private sector synergy. In a region of diverse technological maturity, escalating cyber threats & heightened geopolitical risk, building quantum-resilient communications is not only a technical necessity, it is fundamental to national security, economic stability & ASEAN’s collective digital sovereignty.
Speakers
Jonathan Jackson
Senior Director, Strategic Solutions at BlackBerry Malaysia
Jonathan has over two decades experience in helping organisations across APAC and EMEA deal with the ever-evolving cyber threats across multiple sectors – including government, defense, intelligence, energy, health, critical infrastructure, finance and legal. He specialises in cybersecurity, threat intelligence and digital forensics, and has an in-depth understanding of the ASEAN cybersecurity threat landscape – since being based in Kuala Lumpur since mid-2023.
In Jonathan’s role, he regularly advises ministers, boards and executives on how to manage, predict and prevent the threats to IoT, networks, applications, endpoints and people. Currently he is dedicated to supporting Malaysia’s cyber-resilience initiatives and the establishment of BlackBerry’s new Cybersecurity Center of Excellence. Jonathan also participates in the ASEAN Cyber Crime Task Force, facilitating public-private cyber capability.
Jonathan has been with BlackBerry for over 12 years and was the Head of Security Advisory for BlackBerry ANZ before leading a team as Director of Engineering for Asia Pacific & Japan. Prior to this, he worked for Nokia where he held a number of roles focusing on security and digital transformation.
The PQC Landscape: Protocols and Standards
14:00
Breakout
Abstract
Following the initial announcement of three PQC standards by NIST in 2024, and the subsequent announcement of a fourth more recently and a fifth on the way, a global game of catch up has started among standards bodies to lift the protocols and algorithm applications out of the classical era into PQC. The presentation will look at the current state of standards efforts in regards to protocols and applications and provide some thoughts on how things are evolving and why,
Speakers
David Hook
VP Software Engineering at Keyfactor
David has been working on Cryptography APIs and secure protocols since the mid-1990s and in IT and open-source since the mid-1980s. He is a founder and still active committer of the Legion of the Bouncy Castle Cryptography project which began in the year 2000 and provides APIs in Java, C#, and Kotlin. David founded Crypto Workshop, now part of Keyfactor, in 2012 in order to better support the Bouncy Castle APIs and its user community. Shortly after, he led the work on the FIPS certification of the Bouncy Castle APIs, resulting in their first certifications in 2016. His deep interest is in providing tools to simplify the development of solutions that make use of cryptography and secure protocols, with an emphasis on standards-based approaches. He is based in Melbourne, Australia.
A structured approach to the quantum-safe transformation
14:30
Plenary
Abstract
As the risk increases for a ‘cryptographically relevant quantum computer’ to appear, the high level of complexity, required time, and the required cost of a migration to adopt quantum-safe cryptography become apparent. Priorities for the quantum-safe migration need to become therefore clear and an organization-wide migration program needs to be set-up. This presentation will describe an approach to migrating to quantum-safe cryptography, drawing on real customer examples from different industries. It will explore the challenges of each stage and discuss some concrete steps taken in both strategic and technical dimensions. This presentation will describe a phased approach, starting with establishing awareness and understanding of the quantum-impact on an organization, as well as the establishment of a structured model for an efficient transformation. It will also focus on where cryptographic monitoring and cryptographic agility elements fit into this journey.
Speakers
E
Efstathia Katsigianni
IBM Quantum Safe Project Executive at IBM Research & Development
Dr. Efstathia Katsigianni works as an IBM Quantum Safe Project Executive in Berlin, Germany. She is also an IBM Quantum Ambassador and holds a doctoral degree in mathematics. Efstathia has 7 years of experience working in Cybersecurity with focus on cryptography, quantum-safe cryptography, public key infrastructures and automotive security as well as cryptographic key management solutions. In her current role, she works as part of IBM Research on innovative solutions and is responsible for their implementation for customers.
Turning Quantum Threats into Opportunities: Modernizing WebPKI with QUIC and Metrics-Driven Insights
14:30
Breakout
Abstract
“As the web accelerates toward Post-Quantum Cryptography (PQC), many discussions focus on key exchange and signature upgrades in TLS. This session takes a metrics-driven technical lens to argue and accelerate PQC migration and a catalyst for a necessary transformation of the WebPKI HTTPS/TLS stack with QUIC.
We will present a comprehensive analysis of the performance, latency, and security implications of PQC along with recent and upcoming changes to WebPKI in the context of QUIC and HTTP/3, including:
Latency Benchmarks: Comparing TLS 1.3 over TCP vs QUIC, 0-RTT and session resumption and security posture shifts.
Early results from hybrid PQC handshakes (e.g., X25519 + Kyber) over QUIC, with handshake size, CPU & memory footprint,Impact of short-lived certificates and ACME automation on revocation, incident response, and operational risk.
Protocol Layer Efficiency: Analysis of QUIC, multi-stream behavior, and WebPKI’s role in seamless multi-origin TLS”
Speakers
Muralidharan Palanisamy
CSO at AppViewX Inc
Muralidharan Palanisamy is the Co-Founder and Chief Solutions Officer at AppViewX, where he leads enterprise solutions focused on scalable security automation, certificate lifecycle management, and crypto-agility. With over 20 years of experience in designing and delivering high-performance workload management systems for web-scale online banking and financial platforms, he brings a unique blend of practical systems engineering and forward-looking cryptographic strategy.
His background includes building resilient infrastructure for high-availability, low-latency environments that demand airtight security and compliance. Muralidharan has led transformative initiatives across PKI modernization, TLS automation, and DNS-based trust models—working closely with Fortune 500 institutions navigating zero-trust, crypto-diversity, and now post-quantum readiness.
As quantum computing accelerates, he advocates for a holistic approach to crypto transformation—where post-quantum migration intersects with operational resilience, automation, and real-world workload demands. He is a regular contributor to industry thought leadership and a passionate voice for secure, scalable, and agile trust frameworks in the post-quantum era.
PQC in Action: From Global Standards to Secure Deployments
15:00
Plenary
Abstract
This session delivers the latest insights into Post Quantum Cryptography (PQC), beginning with an update on current standards, regulatory developments, and emerging technologies. It continues by connecting these advancements to real-world customer projects, illustrating how PQC is being applied across industries. As PQC moves from theory to deployment, attendees will explore how organizations are securing digital communications, implementing hybrid encryption, and enabling secure firmware updates. The session offers practical knowledge and implementation strategies — providing a clear view of the current state of PQC standardization, industry adoption, and the technical challenges of real-world integration.
Speakers
Nils Gerhardt
Chief Technology Officer at Utimaco
Nils Gerhardt has 20 years’ experience in the cyber security industry. In his current role, Nils is the Chief Technology Officer for Utimaco, a leading provider of cyber security solutions, and supervisory board member of ISITS AG. Before joining Utimaco, Nils worked at Giesecke + Devrient in various executive management roles with regional and global responsibilities in Germany, Canada, and the USA. As Chairman of the Board of GlobalPlatform, a global industry organization, Nils brought major companies together to define the standards for secure digital services and devices.
Real-World Readiness for PQC: Gaps, Gains, and Groundwork
15:00
Breakout
Abstract
The migration to quantum safe algorithms have started. Many of the pieces needed to migrate are now there and can be used in practice, but there are still gaps so an organization’s full use of PKI is not yet possible to migrate. The depth and width of this algorithmic migration is so vast that it will be continuous work for years to come filling in gaps as we go. This presentation will take a look at a number of practical use cases that has been tested and proven to work, as well as use cases where it is currently not possible to migrate. Standards, software, hardware and other components will be judged depending on their readiness or not, and of course some performance tests. Are you ready to get your hands dirty?
Speakers
Tomas Gustavsson
Chief PKI Officer at Keyfactor
Tomas Gustavsson is the chief public key infrastructure (PKI) officer at Keyfactor. He pioneered open-source public key infrastructure with EJBCA, now embraced by thousands of organizations. With a background in computer science, Tomas established EJBCA to fortify trusted digital identities globally. He advocates for cybersecurity through innovation, collaboration, and open-source principles.
Get Fit For The Qubit: The Dutch approach to a Quantum Secure Society
16:00
Plenary
Abstract
This presentation gives a thorough overview of the Dutch Roadmap and Ambitions concerning a Quantum Safe Society. This roadmap has been established in 2023, but went through various changes as the attention towards the subject of Quantum Computing grew. Besides the involvement of the central government, also knowledge institutions helped in developing the roadmap. The presentation will cover how the roadmap came to be, the various challenges it met along the way and how those challenges were met. The presentation will also include a forecast towards 2026 and beyond, on what the Dutch Government aims to achieve on the national level, not only on the Governmental level, but also for Vital Industries. And how will the European Commissions’ Coordinated Implementation Roadmap for the Transition to Post-Quantum Cryptography Influence the current Dutch efforts? I’ll address all this during this presentation!
Speakers
Pieter Schneider
Program Manager Quantum Secure Cryptography at Dutch Ministry of the Interior & Kingdom Relations
Pieter Schneider works as Program Manager Quantum Secure Cryptography NL (QvC-NL) at CIO Rijk of the Ministry of the Interior & Kingdom Relations. Pieter has a broad background in the security domain and cybersecurity. In his current role, he manages the QvC-NL program, which aims to help the Netherlands manage the risks of quantum technology on cryptography in time.
Working on Quantum-Safe Encrypted Emails
16:00
Breakout
Abstract
In the presentation, we will share how we implemented PQC encryption of emails which can inter-operate between Microsoft Office365 and Google Gmail. We will describe the motivation, requirements, design and architecture of how email encryption can be achieved, and how key management is carried out seamlessly. The outcome is that we can start to protect emails against harvest-now-decrypt-later attacks.
Speakers
Tan Teik Guan
CEO at pQCee
Dr. Tan Teik Guan is the CEO and Co-founder of pQCee, a startup dedicated to helping organizations achieve post-quantum cryptographic readiness. A specialist in cryptographic security design and integration, he has led the implementation of secure systems for financial institutions, government agencies, and enterprises across Asia.
Before founding pQCee, Dr. Tan spent over a decade at the helm of DS3, a multi-factor authentication solutions provider, which he led to a successful acquisition. His work bridges theoretical cryptography and real-world applications, earning him a trusted reputation in the field.
He holds a BSc and MSc in Computer Science from the National University of Singapore and a PhD in Information Systems from the Singapore University of Technology and Design. He continues to be active in cybersecurity standards and policy development, with a strong interest in advancing quantum-resilient infrastructures.
To be announced shortly
16:30
Plenary
Abstract
The speaker(s) for this session will be announced soon!
Speakers
To be announced shortly
16:30
Breakout
Abstract
The speaker(s) for this session will be announced soon!
Speakers
Closing remarks for day 2
17:00
Plenary
Speakers
Paul van Brouwershaven
Chair PKI Consortium and Director of Technology at SSL.com
Paul van Brouwershaven is a distinguished leader in cybersecurity with over two decades of experience specializing in Public Key Infrastructure (PKI). He currently serves as the Director of Technology at SSL.com. In addition to his role, Paul chairs the PKI Consortium and also leads its PQC Working Group. Prior to his current roles, Paul held the position of Director Technology Compliance at Entrust and was the Technology Solutions Director at GlobalSign.
Beyond his leadership roles, Paul is also the Owner of Digitorus, a specialized software development and consultancy company he founded in 2016. Digitorus focuses on PKI, Digital Signatures, and Trustworthy Systems. His extensive expertise in PKI is further highlighted by his past role as Vice Chair of the CA/Browser Forum, where he contributed to defining industry standards for digital certificates.
Albert de Ruiter
Vice Chair PKI Consortium and Policy Authority PKI Dutch Government (Logius)
Albert de Ruiter operates the Policy Authority at Logius, the digital government service organization of the Netherlands. He is also a member of the QvC (Quantum Secure Cryptography) working group of the Dutch government, a board member of HAPKIDO, and a member of the PKI Consortium. Albert is known for introducing the idea of a Post-Quantum Cryptography Conference to the PKI Consortium in 2022.
8:30
Registration
9:00
Plenary
PQC Integration in HSMs: From Standards to Strategy
Bruno Couillard
Co-Founder & CEO at Crypto4A
Giuseppe Damiano
Vice President of Product Management for the HSM product offering at Entrust
Blair Canavan
Director, Alliances at Thales
Nils Gerhardt
Chief Technology Officer at Utimaco
Zsolt Rózsahegyi
CEO at i4p informatics
John BuselliModerator
Offering Manager at IBM Quantum
With the release of NIST’s first set of post-quantum cryptographic standards, the conversation around quantum readiness has moved from research into execution. For organizations relying on hardware-based trust anchors, this shift raises immediate strategic and operational questions: What do these new standards mean for existing HSM deployments? How do performance, certification, and lifecycle planning change in a post-quantum world?
This panel brings together senior leaders from major HSM vendors and PQC experts to provide a clear, business-relevant update on the state of post-quantum integration in hardware cryptographic modules. Building on insights from previous sessions in Austin and Amsterdam, the panel will outline how vendors are approaching the integration of PQC algorithms, what early performance benchmarks indicate, and where the roadblocks lie in certification, customer adoption, and operational interoperability.
Attendees will gain a practical understanding of the timelines, trade-offs, and architectural considerations shaping the next generation of secure hardware, across both on-premises and cloud HSM landscapes. The discussion will also address how to prepare governance and procurement processes to accommodate cryptographic agility and ensure continuity of trust in regulated and high-assurance environments.
This session is essential for CISOs, CTOs, compliance leaders, and architects looking to align their cryptographic infrastructure with emerging quantum-safe mandates, without compromising on performance, reliability, or compliance.
This panel discussion runs for 55 minutes and continues in the next session block.
Breakout
Advancing Cryptographic Transparency: CBOM Standardization in CycloneDX
Basil Hess
Senior Research Engineer at IBM Research
As quantum-safe migration and supply chain security become critical priorities, the Cryptography Bill of Materials (CBOM) is emerging as a foundational concept and standard for cryptographic visibility and assurance. This session explores the standardization of CBOM within OWASP’s CycloneDX 1.6, highlighting its role in cataloging cryptographic assets and their dependencies, including PQC primitives and hybrids. It will also preview upcoming enhancements in CycloneDX 1.7, including standardized algorithm naming and improved interoperability for certificates and keys, both essential for quantum readiness and cryptographic agility. The talk will show how CBOM integrates into the broader xBOM ecosystem - spanning Software, Hardware, SaaS, AI, and Operations - to support unified cryptographic governance across complex environments.
9:30
Plenary
Continuation: PQC Integration in HSMs: From Standards to Strategy
This session continues the panel discussion on PQC integration in HSMs, focusing on the evolving landscape from standardization efforts to real-world deployment strategies.
10:00
Plenary
To be announced shortly
The speaker(s) for this session will be announced soon!
Breakout
PQC Formal VErification: Challenges and Tools for Formal Verification of Post-Quantum Cryptography
R
Reza Azarderakhsh
CTO at PQSecure and FAU
As post-quantum cryptography advances toward deployment, formal verification becomes essential for ensuring trust in both hardware and software implementations. Each PQC algorithm—such as ML-KEM, ML-DSA, and SLH-DSA—presents unique challenges, and while tools like Cryptol, SAW, and Coq offer valuable support, no single framework offers a complete solution. In this talk, we introduce an effort focused on practical formal assurance for PQC. We will demonstrate how Cryptol and SAW can verify key properties of ML-KEM and ML-DSA components. We also highlight the growing role of Rust in cryptographic implementations and discuss the importance of verifying PQC libraries in memory-safe languages. Our goal is to promote scalable, implementation-aware formal methods to ensure secure and verifiable PQC adoption.
10:30
Break
11:00
Plenary
The ABCs (Accelerated, Better and Cheaper) to Cryptographic Resilience
Sudha Iyer
Head Cybersecurity Architect at Citi
The session covers practical priorities in the quantum readiness Journey for financial industry.
This session provides a focused update for C-level leaders on the financial sector’s preparedness for post-quantum cryptography. It covers recent developments across NIST, IETF, PCI DSS, and other regulatory bodies, highlighting their impact on existing architectures and risk postures.
We will examine sector-specific challenges, current sandbox and testing efforts, and practical collaboration options available to institutions. The session concludes with a tactical roadmap that CISOs and senior executives can use to align with upcoming mandates and reduce transition risk.
Breakout
Hybrid Quantum-Safe Cryptography for Electric Vehicle Charging Infrastructure
Alessandro Amadori
Cryptographer at TNO
Europe is advancing in EV adoption to combat climate change and support renewable energy. This shift requires redesigning the energy infrastructure for charging demands. The DITM project aims to create a digital infrastructure for automated transport, enhancing safety, efficiency, and sustainability. The EnergyPod, part of DITM, optimizes EV charging and manages grid interaction. To secure against future quantum threats, TNO, NXP, and Infiniot upgraded OCPP with hybrid quantum-safe cryptography (TLS handshake and X.509 certificates). This protocol was tested on the NXP “i.MX 8” board, similar to those in real charging stations, and will be used in the EnergyPod. Various migration scenarios were tested, and a dashboard was developed to monitor real-time quantum-safe communication. In this talk, I will discuss the setup, process, challenges, and key takeaways from migrating a high-level protocol to hybrid PQC.
11:30
Plenary
Overcoming Challenges in Post-Quantum Cryptography Adoption
F
Frank Michaud
Principal Enginer Tech Lead for Cisco Crypo Services at Cisco
With the release of standards for Post-Quantum Cryptography (PQC) algorithms, the cryptographic community faces a paradigm shift. Unlike RSA, ECC, and DH, which were often regarded as “silver bullets” due to their efficiency in key size, signature size, and performance, current PQC algorithms introduce significant challenges.
This session will explore the practical obstacles of integrating PQC algorithms into existing products and services. Topics include the use of embedded systems that leverage LMS or ML-DSA signatures to verify component integrity, and the implications for services delivering image signature solutions, particularly with regard to backend HSM operations and compliance with CNSA 2.0. Finally, we examine how open-source PKI management tools, purpose-built for PQC, can help meet these challenges by providing scalable and adaptable infrastructures for orchestrating post-quantum cryptographic operations.
12:00
Plenary
From Inventory to Action: Navigating the Next Phase of PQC Transition
Bruno Couillard
Co-Founder & CEO at Crypto4A
Over the past few years, cybersecurity professionals worldwide have been urged—by security agencies and consultants alike—to kickstart their post-quantum cryptographic transition with a cryptographic inventory. Many have taken that advice to heart, amassing vast amounts of cryptographic data. Now, organizations face the critical question: how do we turn this information into action?
This presentation explores that very question. We’ll examine the next critical steps in the PQC transition from multiple perspectives—technical, strategic, and operational—and offer actionable guidance including prioritizing frameworks, risk-based approaches, and implementation timelines to help organizations turn insight into meaningful progress.
Breakout
Beyond the Quantum Threat: Demonstrating Real-World Blockchain Resilience
A
Andrew Cheung
President & CEO at 01 Communique Laboratory Inc.
Cryptocurrencies rely on PKI to ensure the authenticity and integrity of transactions through digital signatures. At the heart of this trust model is Public Key Infrastructure (PKI), which underpins the authenticity and integrity of every transaction within a blockchain network. PKI ensures that digital signatures—whether from payers initiating cryptocurrency transfers or validators confirming blocks—are verifiable and tamper-proof. RSA and ECC have long secured this ecosystem, but quantum computing threatens to break these algorithms via Shor’s algorithm, enabling private key recovery. An existing cryptocurrency network has been successfully transitioned to quantum-safety by using NIST finalist post-quantum algorithms, preserving performance, interoperability, and trust. This work demonstrates not only the feasibility but also the urgency of adapting PKI for a secure, post-quantum blockchain future.
12:30
Plenary
To be announced shortly
The speaker(s) for this session will be announced soon!
Breakout
To be announced shortly
The speaker(s) for this session will be announced soon!
13:00
Lunch
14:00
Plenary
Crypto-Agility: How it’s both a Critical Component and a Complex Challenge
Greg Wetmore
VP Software Development at Entrust
The time to prepare for the quantum threat is upon us, and the move from traditional crypto to PQC will touch just about every cryptographic system and piece of infrastructure. To make the transition, organizations need visibility into their cryptographic estate (hardware, software, keys, certificates, secrets, etc.) and ensure they have built in crypto-agility. How does one achieve a mature crypto-agile security practice? By defining crypto-agility and understanding what it looks like for your organization. But crypto-agility is much more than moving from one system or algorithm to another. It’s about people, processes and technology. It’s about visualizing your cryptographic assets, implementing policy, driving compliance and more. In this session, we’ll discuss in detail the necessary elements to achieve a mature crypto-agile security practice, and how to overcome the challenges to get there.
Breakout
Crypto Agility by Design: Securing PQC with Updatable HW/FW Co-design
Octavian Maciu
Hardware Product Manager at PQShield
Hardware/firmware co-design provides a critical advantage in post-quantum cryptographic deployments by enabling agility against evolving threats. Unlike immutable hardware-only roots of trust-potentially vulnerable to future side-channel attacks and costly remediation-co-designed systems allow field updates to mitigate emerging vulnerabilities. Real-world incidents like Checkm8 highlight the risk of static hardware. In contrast, updateable firmware enables proactive responses, including SCA patching, parameter updates, and crypto migration. This talk explores how co-design enhances security lifecycle resilience, accelerates secure development, and supports crypto agility-vital for PQC in constrained, real-world environments.
14:30
Plenary
To be announced shortly
The speaker(s) for this session will be announced soon!
Breakout
Post-Quantum Firmware Signing in IoT: Practical PQC-FOTA Implementation
T
Tan Wai Kaey
IoT & Cybersecurity Engineer
As quantum computing advances, the cryptographic integrity of long-lived IoT devices is increasingly at risk. This presentation demonstrates a practical approach to securing Firmware Over-the-Air (FOTA) updates on ESP32-based IoT devices using Post-Quantum Cryptography (PQC).
We explore how NIST-standardized digital signature algorithms-ML-DSA (FIPS 204, formerly CRYSTALS-Dilithium) and SLH-DSA (FIPS 205, formerly SPHINCS+)-can be integrated into the ESP32 secure boot process to replace classical RSA/ECDSA schemes. Using the Open Quantum Safe (OQS) library, we implement PQC signing on resource-constrained hardware and evaluate the trade-offs in performance, code size, and interoperability.
The presentation features real-world deployment on ESP32 hardware, and includes practical guidance on hybrid signing approaches (e.g., ECDSA + ML-DSA) for maintaining backward compatibility. Tools such as ESP-IDF, PlatformIO, and custom signing scripts are used throughout.
15:00
Plenary
PQC in Practice: Why This, Not That?
Sven RajalaModerator
International PKI Man of Mystery at Keyfactor
Sudha Iyer
Head Cybersecurity Architect at Citi
Corey Bonnell
Industry Technology Strategist
Tadahiko Ito
Senior Researcher
As the industry accelerates preparations for the post-quantum era, a growing number of organizations are grappling with a practical question: Which PQC deployment strategy is right for us? Should we adopt hybrid certificates, go pure post-quantum, use composite keys, or run dual cryptographic infrastructures? Each approach offers different trade-offs in terms of risk, interoperability, compliance, and operational complexity.
This panel brings together leading experts and implementers to explore real-world use cases, deployment decisions, and the rationale behind them. Panelists will share insights into how organizations are evaluating the threat landscape, aligning cryptographic agility with business needs, and choosing between strategies.
This session is designed for architects, security engineers, and decision-makers who need to answer the increasingly common question: What should we do, and why?
Breakout
Authenticity Guaranteed: Verifying Video Integrity on Consumer Devices with Post-Quantum Signatures
Ronny Döring
R&D System Engineer at Deutsche Telekom AG
As AI-generated video content becomes increasingly convincing, ensuring the authenticity of video material is more critical than ever. This session presents a novel method for verifying the integrity of video streams or files using post-quantum digital signatures. Designed for deployment on consumer devices, the approach safeguards against tampering and deepfake manipulation, even in a future where quantum computing threatens classical cryptographic schemes. Join us to explore the architecture, implementation, and real-world applications of this quantum-resistant solution for trusted video authentication.
15:30
Break
16:00
Plenary
Crypto-Agile PKI: A Strategic Blueprint for Post-Quantum Trust
Ganesh Mallaya
at AppViewX Inc
“Quantum computing is reshaping the foundations of digital trust, and PKI must be the first to adapt. While NIST-standard algorithms like ML-KEM and ML-DSA progress toward adoption, organizations face a deeper challenge: evolving legacy PKI into a crypto-agile, automated, and future-ready infrastructure. This session presents a concise 20-minute blueprint for enabling that transition, without starting from scratch.
We’ll explore three strategic priorities:
Assess cryptographic exposure across TLS, S/MIME, code signing, and device identity.
Embed crypto-agility and automation into certificate lifecycles using hybrid certs (draft-ietf-lamps-x509-slhdsa-09), short-lived certificates, and ACME-based issuance models.
Align PKI governance with emerging standards from NIST(1800-38B), ETSI, CAB Forum, and IETF.”
Breakout
Implementing Hybrid TLS with ML-KEM-768 for Post-Quantum Security in Mobile IIoT Deployments
D
Danny Setyowati
Student at Republic of Indonesia Defense University
This study integrates post-quantum cryptography into mobile IIoT via Cisco Packet Tracer models of Mobile Manufacturing Trucks and a centralized Security Operations Center. Trucks deploy sensors, routers and Quantum Shieldz AX200 modules and the SOC uses AX300DS and AXMS100DS. Hybrid TLS merges ECDHE with the ML-KEM-768 key-encapsulation mechanism (as standardized in NIST FIPS 203) . Node-RED and MQTT simulate real-time sensor streams over channels secured by SHA-3 integrity checks and QRNG keys. Tests show a 1.3× handshake-latency increase, under 300 ms responsiveness and anomaly detection under 1.5 s, meeting IEC 62443. Simulated MITM, DoS and outages yield seamless failover and state restoration. These findings confirm PQC feasibility in resource-constrained mobile IIoT and highlight the need for quantum-safe strategies. Future work will explore AI anomaly prediction, lattice signatures and hardware attestation.
16:30
Plenary
To be announced shortly
The speaker(s) for this session will be announced soon!
Breakout
Evaluating the Practical Capabilities of Contemporary Quantum Processors in Breaking AES Encryption
Somrak Petchartee
Research Operations Manager, NT Telecom Public Company Limited
As quantum computing advances, assessing the potential of current architectures to threaten AES encryption is essential. This study evaluates leading quantum processors, IBM, Google, Zuchongzhi 2, Microsoft, Rigetti, IonQ, and Honeywell, focusing on quantum gate complexity, qubit coherence time, and scalability trade-offs. It demonstrates how these systems, when scaled to thousands of qubits with error correction, could compromise AES security. The findings offer clearer insight into the timeline of quantum threats, aiding in strategic planning for mitigation and PQC migration. Enhancing AES robustness through longer key sizes and hybrid models is also explored to strengthen cryptographic readiness.
17:00
Plenary
Closing remarks
Paul van Brouwershaven
Chair PKI Consortium and Director of Technology at SSL.com
Albert de Ruiter
Vice Chair PKI Consortium and Policy Authority PKI Dutch Government (Logius)
17:00
End of Day Three
8:30
Registration
9:00
PQC Integration in HSMs: From Standards to Strategy
Bruno Couillard
Co-Founder & CEO at Crypto4A
Giuseppe Damiano
Vice President of Product Management for the HSM product offering at Entrust
Blair Canavan
Director, Alliances at Thales
Nils Gerhardt
Chief Technology Officer at Utimaco
Zsolt Rózsahegyi
CEO at i4p informatics
John BuselliModerator
Offering Manager at IBM Quantum
With the release of NIST’s first set of post-quantum cryptographic standards, the conversation around quantum readiness has moved from research into execution. For organizations relying on hardware-based trust anchors, this shift raises immediate strategic and operational questions: What do these new standards mean for existing HSM deployments? How do performance, certification, and lifecycle planning change in a post-quantum world?
This panel brings together senior leaders from major HSM vendors and PQC experts to provide a clear, business-relevant update on the state of post-quantum integration in hardware cryptographic modules. Building on insights from previous sessions in Austin and Amsterdam, the panel will outline how vendors are approaching the integration of PQC algorithms, what early performance benchmarks indicate, and where the roadblocks lie in certification, customer adoption, and operational interoperability.
Attendees will gain a practical understanding of the timelines, trade-offs, and architectural considerations shaping the next generation of secure hardware, across both on-premises and cloud HSM landscapes. The discussion will also address how to prepare governance and procurement processes to accommodate cryptographic agility and ensure continuity of trust in regulated and high-assurance environments.
This session is essential for CISOs, CTOs, compliance leaders, and architects looking to align their cryptographic infrastructure with emerging quantum-safe mandates, without compromising on performance, reliability, or compliance.
This panel discussion runs for 55 minutes and continues in the next session block.
Advancing Cryptographic Transparency: CBOM Standardization in CycloneDX
Basil Hess
Senior Research Engineer at IBM Research
As quantum-safe migration and supply chain security become critical priorities, the Cryptography Bill of Materials (CBOM) is emerging as a foundational concept and standard for cryptographic visibility and assurance. This session explores the standardization of CBOM within OWASP’s CycloneDX 1.6, highlighting its role in cataloging cryptographic assets and their dependencies, including PQC primitives and hybrids. It will also preview upcoming enhancements in CycloneDX 1.7, including standardized algorithm naming and improved interoperability for certificates and keys, both essential for quantum readiness and cryptographic agility. The talk will show how CBOM integrates into the broader xBOM ecosystem - spanning Software, Hardware, SaaS, AI, and Operations - to support unified cryptographic governance across complex environments.
9:30
Continuation: PQC Integration in HSMs: From Standards to Strategy
This session continues the panel discussion on PQC integration in HSMs, focusing on the evolving landscape from standardization efforts to real-world deployment strategies.
10:00
To be announced shortly
The speaker(s) for this session will be announced soon!
PQC Formal VErification: Challenges and Tools for Formal Verification of Post-Quantum Cryptography
R
Reza Azarderakhsh
CTO at PQSecure and FAU
As post-quantum cryptography advances toward deployment, formal verification becomes essential for ensuring trust in both hardware and software implementations. Each PQC algorithm—such as ML-KEM, ML-DSA, and SLH-DSA—presents unique challenges, and while tools like Cryptol, SAW, and Coq offer valuable support, no single framework offers a complete solution. In this talk, we introduce an effort focused on practical formal assurance for PQC. We will demonstrate how Cryptol and SAW can verify key properties of ML-KEM and ML-DSA components. We also highlight the growing role of Rust in cryptographic implementations and discuss the importance of verifying PQC libraries in memory-safe languages. Our goal is to promote scalable, implementation-aware formal methods to ensure secure and verifiable PQC adoption.
10:30
Break
11:00
The ABCs (Accelerated, Better and Cheaper) to Cryptographic Resilience
Sudha Iyer
Head Cybersecurity Architect at Citi
The session covers practical priorities in the quantum readiness Journey for financial industry.
This session provides a focused update for C-level leaders on the financial sector’s preparedness for post-quantum cryptography. It covers recent developments across NIST, IETF, PCI DSS, and other regulatory bodies, highlighting their impact on existing architectures and risk postures.
We will examine sector-specific challenges, current sandbox and testing efforts, and practical collaboration options available to institutions. The session concludes with a tactical roadmap that CISOs and senior executives can use to align with upcoming mandates and reduce transition risk.
Hybrid Quantum-Safe Cryptography for Electric Vehicle Charging Infrastructure
Alessandro Amadori
Cryptographer at TNO
Europe is advancing in EV adoption to combat climate change and support renewable energy. This shift requires redesigning the energy infrastructure for charging demands. The DITM project aims to create a digital infrastructure for automated transport, enhancing safety, efficiency, and sustainability. The EnergyPod, part of DITM, optimizes EV charging and manages grid interaction. To secure against future quantum threats, TNO, NXP, and Infiniot upgraded OCPP with hybrid quantum-safe cryptography (TLS handshake and X.509 certificates). This protocol was tested on the NXP “i.MX 8” board, similar to those in real charging stations, and will be used in the EnergyPod. Various migration scenarios were tested, and a dashboard was developed to monitor real-time quantum-safe communication. In this talk, I will discuss the setup, process, challenges, and key takeaways from migrating a high-level protocol to hybrid PQC.
11:30
Overcoming Challenges in Post-Quantum Cryptography Adoption
F
Frank Michaud
Principal Enginer Tech Lead for Cisco Crypo Services at Cisco
With the release of standards for Post-Quantum Cryptography (PQC) algorithms, the cryptographic community faces a paradigm shift. Unlike RSA, ECC, and DH, which were often regarded as “silver bullets” due to their efficiency in key size, signature size, and performance, current PQC algorithms introduce significant challenges.
This session will explore the practical obstacles of integrating PQC algorithms into existing products and services. Topics include the use of embedded systems that leverage LMS or ML-DSA signatures to verify component integrity, and the implications for services delivering image signature solutions, particularly with regard to backend HSM operations and compliance with CNSA 2.0. Finally, we examine how open-source PKI management tools, purpose-built for PQC, can help meet these challenges by providing scalable and adaptable infrastructures for orchestrating post-quantum cryptographic operations.
12:00
From Inventory to Action: Navigating the Next Phase of PQC Transition
Bruno Couillard
Co-Founder & CEO at Crypto4A
Over the past few years, cybersecurity professionals worldwide have been urged—by security agencies and consultants alike—to kickstart their post-quantum cryptographic transition with a cryptographic inventory. Many have taken that advice to heart, amassing vast amounts of cryptographic data. Now, organizations face the critical question: how do we turn this information into action?
This presentation explores that very question. We’ll examine the next critical steps in the PQC transition from multiple perspectives—technical, strategic, and operational—and offer actionable guidance including prioritizing frameworks, risk-based approaches, and implementation timelines to help organizations turn insight into meaningful progress.
Beyond the Quantum Threat: Demonstrating Real-World Blockchain Resilience
A
Andrew Cheung
President & CEO at 01 Communique Laboratory Inc.
Cryptocurrencies rely on PKI to ensure the authenticity and integrity of transactions through digital signatures. At the heart of this trust model is Public Key Infrastructure (PKI), which underpins the authenticity and integrity of every transaction within a blockchain network. PKI ensures that digital signatures—whether from payers initiating cryptocurrency transfers or validators confirming blocks—are verifiable and tamper-proof. RSA and ECC have long secured this ecosystem, but quantum computing threatens to break these algorithms via Shor’s algorithm, enabling private key recovery. An existing cryptocurrency network has been successfully transitioned to quantum-safety by using NIST finalist post-quantum algorithms, preserving performance, interoperability, and trust. This work demonstrates not only the feasibility but also the urgency of adapting PKI for a secure, post-quantum blockchain future.
12:30
To be announced shortly
The speaker(s) for this session will be announced soon!
To be announced shortly
The speaker(s) for this session will be announced soon!
13:00
Lunch
14:00
Crypto-Agility: How it’s both a Critical Component and a Complex Challenge
Greg Wetmore
VP Software Development at Entrust
The time to prepare for the quantum threat is upon us, and the move from traditional crypto to PQC will touch just about every cryptographic system and piece of infrastructure. To make the transition, organizations need visibility into their cryptographic estate (hardware, software, keys, certificates, secrets, etc.) and ensure they have built in crypto-agility. How does one achieve a mature crypto-agile security practice? By defining crypto-agility and understanding what it looks like for your organization. But crypto-agility is much more than moving from one system or algorithm to another. It’s about people, processes and technology. It’s about visualizing your cryptographic assets, implementing policy, driving compliance and more. In this session, we’ll discuss in detail the necessary elements to achieve a mature crypto-agile security practice, and how to overcome the challenges to get there.
Crypto Agility by Design: Securing PQC with Updatable HW/FW Co-design
Octavian Maciu
Hardware Product Manager at PQShield
Hardware/firmware co-design provides a critical advantage in post-quantum cryptographic deployments by enabling agility against evolving threats. Unlike immutable hardware-only roots of trust-potentially vulnerable to future side-channel attacks and costly remediation-co-designed systems allow field updates to mitigate emerging vulnerabilities. Real-world incidents like Checkm8 highlight the risk of static hardware. In contrast, updateable firmware enables proactive responses, including SCA patching, parameter updates, and crypto migration. This talk explores how co-design enhances security lifecycle resilience, accelerates secure development, and supports crypto agility-vital for PQC in constrained, real-world environments.
14:30
To be announced shortly
The speaker(s) for this session will be announced soon!
Post-Quantum Firmware Signing in IoT: Practical PQC-FOTA Implementation
T
Tan Wai Kaey
IoT & Cybersecurity Engineer
As quantum computing advances, the cryptographic integrity of long-lived IoT devices is increasingly at risk. This presentation demonstrates a practical approach to securing Firmware Over-the-Air (FOTA) updates on ESP32-based IoT devices using Post-Quantum Cryptography (PQC).
We explore how NIST-standardized digital signature algorithms-ML-DSA (FIPS 204, formerly CRYSTALS-Dilithium) and SLH-DSA (FIPS 205, formerly SPHINCS+)-can be integrated into the ESP32 secure boot process to replace classical RSA/ECDSA schemes. Using the Open Quantum Safe (OQS) library, we implement PQC signing on resource-constrained hardware and evaluate the trade-offs in performance, code size, and interoperability.
The presentation features real-world deployment on ESP32 hardware, and includes practical guidance on hybrid signing approaches (e.g., ECDSA + ML-DSA) for maintaining backward compatibility. Tools such as ESP-IDF, PlatformIO, and custom signing scripts are used throughout.
15:00
PQC in Practice: Why This, Not That?
Sven RajalaModerator
International PKI Man of Mystery at Keyfactor
Sudha Iyer
Head Cybersecurity Architect at Citi
Corey Bonnell
Industry Technology Strategist
Tadahiko Ito
Senior Researcher
As the industry accelerates preparations for the post-quantum era, a growing number of organizations are grappling with a practical question: Which PQC deployment strategy is right for us? Should we adopt hybrid certificates, go pure post-quantum, use composite keys, or run dual cryptographic infrastructures? Each approach offers different trade-offs in terms of risk, interoperability, compliance, and operational complexity.
This panel brings together leading experts and implementers to explore real-world use cases, deployment decisions, and the rationale behind them. Panelists will share insights into how organizations are evaluating the threat landscape, aligning cryptographic agility with business needs, and choosing between strategies.
This session is designed for architects, security engineers, and decision-makers who need to answer the increasingly common question: What should we do, and why?
Authenticity Guaranteed: Verifying Video Integrity on Consumer Devices with Post-Quantum Signatures
Ronny Döring
R&D System Engineer at Deutsche Telekom AG
As AI-generated video content becomes increasingly convincing, ensuring the authenticity of video material is more critical than ever. This session presents a novel method for verifying the integrity of video streams or files using post-quantum digital signatures. Designed for deployment on consumer devices, the approach safeguards against tampering and deepfake manipulation, even in a future where quantum computing threatens classical cryptographic schemes. Join us to explore the architecture, implementation, and real-world applications of this quantum-resistant solution for trusted video authentication.
15:30
Break
16:00
Crypto-Agile PKI: A Strategic Blueprint for Post-Quantum Trust
Ganesh Mallaya
at AppViewX Inc
“Quantum computing is reshaping the foundations of digital trust, and PKI must be the first to adapt. While NIST-standard algorithms like ML-KEM and ML-DSA progress toward adoption, organizations face a deeper challenge: evolving legacy PKI into a crypto-agile, automated, and future-ready infrastructure. This session presents a concise 20-minute blueprint for enabling that transition, without starting from scratch.
We’ll explore three strategic priorities:
Assess cryptographic exposure across TLS, S/MIME, code signing, and device identity.
Embed crypto-agility and automation into certificate lifecycles using hybrid certs (draft-ietf-lamps-x509-slhdsa-09), short-lived certificates, and ACME-based issuance models.
Align PKI governance with emerging standards from NIST(1800-38B), ETSI, CAB Forum, and IETF.”
Implementing Hybrid TLS with ML-KEM-768 for Post-Quantum Security in Mobile IIoT Deployments
D
Danny Setyowati
Student at Republic of Indonesia Defense University
This study integrates post-quantum cryptography into mobile IIoT via Cisco Packet Tracer models of Mobile Manufacturing Trucks and a centralized Security Operations Center. Trucks deploy sensors, routers and Quantum Shieldz AX200 modules and the SOC uses AX300DS and AXMS100DS. Hybrid TLS merges ECDHE with the ML-KEM-768 key-encapsulation mechanism (as standardized in NIST FIPS 203) . Node-RED and MQTT simulate real-time sensor streams over channels secured by SHA-3 integrity checks and QRNG keys. Tests show a 1.3× handshake-latency increase, under 300 ms responsiveness and anomaly detection under 1.5 s, meeting IEC 62443. Simulated MITM, DoS and outages yield seamless failover and state restoration. These findings confirm PQC feasibility in resource-constrained mobile IIoT and highlight the need for quantum-safe strategies. Future work will explore AI anomaly prediction, lattice signatures and hardware attestation.
16:30
To be announced shortly
The speaker(s) for this session will be announced soon!
Evaluating the Practical Capabilities of Contemporary Quantum Processors in Breaking AES Encryption
Somrak Petchartee
Research Operations Manager, NT Telecom Public Company Limited
As quantum computing advances, assessing the potential of current architectures to threaten AES encryption is essential. This study evaluates leading quantum processors, IBM, Google, Zuchongzhi 2, Microsoft, Rigetti, IonQ, and Honeywell, focusing on quantum gate complexity, qubit coherence time, and scalability trade-offs. It demonstrates how these systems, when scaled to thousands of qubits with error correction, could compromise AES security. The findings offer clearer insight into the timeline of quantum threats, aiding in strategic planning for mitigation and PQC migration. Enhancing AES robustness through longer key sizes and hybrid models is also explored to strengthen cryptographic readiness.
17:00
Closing remarks
Paul van Brouwershaven
Chair PKI Consortium and Director of Technology at SSL.com
Albert de Ruiter
Vice Chair PKI Consortium and Policy Authority PKI Dutch Government (Logius)
17:00
End of Day Three
PQC Integration in HSMs: From Standards to Strategy
9:00
Plenary
Abstract
With the release of NIST’s first set of post-quantum cryptographic standards, the conversation around quantum readiness has moved from research into execution. For organizations relying on hardware-based trust anchors, this shift raises immediate strategic and operational questions: What do these new standards mean for existing HSM deployments? How do performance, certification, and lifecycle planning change in a post-quantum world?
This panel brings together senior leaders from major HSM vendors and PQC experts to provide a clear, business-relevant update on the state of post-quantum integration in hardware cryptographic modules. Building on insights from previous sessions in Austin and Amsterdam, the panel will outline how vendors are approaching the integration of PQC algorithms, what early performance benchmarks indicate, and where the roadblocks lie in certification, customer adoption, and operational interoperability.
Attendees will gain a practical understanding of the timelines, trade-offs, and architectural considerations shaping the next generation of secure hardware, across both on-premises and cloud HSM landscapes. The discussion will also address how to prepare governance and procurement processes to accommodate cryptographic agility and ensure continuity of trust in regulated and high-assurance environments.
This session is essential for CISOs, CTOs, compliance leaders, and architects looking to align their cryptographic infrastructure with emerging quantum-safe mandates, without compromising on performance, reliability, or compliance.
This panel discussion runs for 55 minutes and continues in the next session block.
Speakers
Bruno Couillard
Co-Founder & CEO at Crypto4A
Bruno Couillard is the CEO and co-founder of Crypto4A Technologies Inc., where he leads the development of cutting-edge crypto-agile and post-quantum cybersecurity solutions, including the QxHSM and QxEDGE. With over 35 years of experience in cryptography, key management, and quantum-safe technology, Bruno has worked extensively in both commercial and military applications.
Previously, he co-founded Chrysalis-ITS and spearheaded the development of the Luna HSM, now a part of Thales. He also contributed to the creation of the PKCS#11 Standard. In addition to his entrepreneurial work, Bruno has served as a cryptographic evaluator for the Canadian Government and played a key role in the Canadian Cryptographic Modernization Program (CCMP).
Bruno is an active board member of Quantum Industry Canada (QIC), co-chair of the Quantum Industry Developers and Users Working Group, and a member of the Canadian National Quantum Strategy committee. Through these roles, he continues to promote and shape a quantum-safe cybersecurity ecosystem.
Giuseppe Damiano
Vice President of Product Management for the HSM product offering at Entrust
Giuseppe is currently the Vice President of Product Management for the HSM product offering at Entrust. With over 30 years of experience, he is a senior expert in developing and managing PKI solutions and infrastructures, data security, and electronic payment systems.
Blair has 30+ years of IT cybersecurity sales, channel, marketing, and business development experience. Blair continuously expanded his cybersecurity and cryptographic expertise starting with Symantec and several cyber start-ups including Chrysalis-ITS (Thales), InfoSec Global, Crypto4A and since September 2019, back with Thales’ Global Technology Alliances team, including the Quantum cryptography portfolio. Blair recently represented the Canadian Forum for Digital Infrastructure Resilience (CFDIR) to articulate the standards and Government guidance at Mobile World Congress (MWC) in 2023. He is an avid presenter, start-up consultant, and IT industry contributor. Blair holds an Hons.BA from the University of Waterloo, and Wilfrid Laurier University, Ontario, Canada.
Nils Gerhardt
Chief Technology Officer at Utimaco
Nils Gerhardt has 20 years’ experience in the cyber security industry. In his current role, Nils is the Chief Technology Officer for Utimaco, a leading provider of cyber security solutions, and supervisory board member of ISITS AG. Before joining Utimaco, Nils worked at Giesecke + Devrient in various executive management roles with regional and global responsibilities in Germany, Canada, and the USA. As Chairman of the Board of GlobalPlatform, a global industry organization, Nils brought major companies together to define the standards for secure digital services and devices.
Zsolt Rózsahegyi
CEO at i4p informatics
Zsolt Rózsahegyi is CEO and co-founder of i4p Informatics. He holds engineering degrees from the Technical University of Budapest and Carnegie Mellon University. Zsolt was previously founder and CEO of one of Europe’s first Qualified Trust Service Providers and played a key role in shaping Hungary’s electronic signature legislation. His expertise spans applied cryptography, PKI, timestamping, secure software development, and quantum-safe systems.
John BuselliModerator
Offering Manager at IBM Quantum
John Buselli is an Offering Manager for the IBM Quantum Group and is currently focused on the development and delivery of IBM’s Quantum Safe Program. In this role, he oversees product strategy, market development and customer-facing programs. Since joining IBM Research in 2015, John has focused on cyber security, confidential computing, privacy-enhancing technologies, data governance and securing AI Analytic initiatives.
He previously led a global team at IBM tasked with building an Information Governance/Compliance Practice within the IBM software organization. His career has been focused on establishing and expanding initial markets, products and operations for early-stage software firms including Verity (purchased by HP), and KVS (acquired by Symantec) Princeton Softech (purchased by IBM) as well as senior leadership roles at Seer Technologies and Texas Instruments.
Advancing Cryptographic Transparency: CBOM Standardization in CycloneDX
9:00
Breakout
Abstract
As quantum-safe migration and supply chain security become critical priorities, the Cryptography Bill of Materials (CBOM) is emerging as a foundational concept and standard for cryptographic visibility and assurance. This session explores the standardization of CBOM within OWASP’s CycloneDX 1.6, highlighting its role in cataloging cryptographic assets and their dependencies, including PQC primitives and hybrids. It will also preview upcoming enhancements in CycloneDX 1.7, including standardized algorithm naming and improved interoperability for certificates and keys, both essential for quantum readiness and cryptographic agility. The talk will show how CBOM integrates into the broader xBOM ecosystem - spanning Software, Hardware, SaaS, AI, and Operations - to support unified cryptographic governance across complex environments.
Speakers
Basil Hess
Senior Research Engineer at IBM Research
Basil is a Senior Research Engineer at IBM Research Europe - Zurich. His focus is on the implementation side of cryptography, quantum-safe cryptography and quantum-safe migration.
The projects he is involved include Open Quantum Safe - software for prototyping quantum-resistant cryptography, he’s a co-author of CycloneDX CBOM (Cryptography Bill of Materials), and two submissions to the NIST PQC Standardization for additional digital signature schemes: MAYO and SQIsign.
Basil holds a PhD in Information Systems and a MSc in Computer Science, both from ETH Zurich.
Continuation: PQC Integration in HSMs: From Standards to Strategy
9:30
Plenary
Abstract
This session continues the panel discussion on PQC integration in HSMs, focusing on the evolving landscape from standardization efforts to real-world deployment strategies.
To be announced shortly
10:00
Plenary
Abstract
The speaker(s) for this session will be announced soon!
Speakers
PQC Formal VErification: Challenges and Tools for Formal Verification of Post-Quantum Cryptography
10:00
Breakout
Abstract
As post-quantum cryptography advances toward deployment, formal verification becomes essential for ensuring trust in both hardware and software implementations. Each PQC algorithm—such as ML-KEM, ML-DSA, and SLH-DSA—presents unique challenges, and while tools like Cryptol, SAW, and Coq offer valuable support, no single framework offers a complete solution. In this talk, we introduce an effort focused on practical formal assurance for PQC. We will demonstrate how Cryptol and SAW can verify key properties of ML-KEM and ML-DSA components. We also highlight the growing role of Rust in cryptographic implementations and discuss the importance of verifying PQC libraries in memory-safe languages. Our goal is to promote scalable, implementation-aware formal methods to ensure secure and verifiable PQC adoption.
Speakers
R
Reza Azarderakhsh
CTO at PQSecure and FAU
Dr. Reza Azarderakhsh is a Professor at Florida Atlantic University and the CEO of PQSecure Technologies. He is a leading expert in post-quantum cryptographic engineering, specializing in secure hardware/software co-design, side-channel protections, and formal verification. Dr. Azarderakhsh has published over 140 papers in top-tier conferences and journals related to post-quantum cryptography, contributing significantly to national and international efforts in quantum-safe security for embedded and constrained systems.
The ABCs (Accelerated, Better and Cheaper) to Cryptographic Resilience
11:00
Plenary
Abstract
The session covers practical priorities in the quantum readiness Journey for financial industry.
This session provides a focused update for C-level leaders on the financial sector’s preparedness for post-quantum cryptography. It covers recent developments across NIST, IETF, PCI DSS, and other regulatory bodies, highlighting their impact on existing architectures and risk postures.
We will examine sector-specific challenges, current sandbox and testing efforts, and practical collaboration options available to institutions. The session concludes with a tactical roadmap that CISOs and senior executives can use to align with upcoming mandates and reduce transition risk.
Speakers
Sudha Iyer
Head Cybersecurity Architect at Citi
Sudha Iyer is Head Cybersecurity Architect at Citi, a founding member of the FS-ISAC PQC group, and an international project leader at ISO for blockchain and smart contract security. She has 23 years of experience in cryptographic architecture and is deeply engaged in cross-sector cybersecurity forums and leads several cryptographic and data security standards efforts.
Hybrid Quantum-Safe Cryptography for Electric Vehicle Charging Infrastructure
11:00
Breakout
Abstract
Europe is advancing in EV adoption to combat climate change and support renewable energy. This shift requires redesigning the energy infrastructure for charging demands. The DITM project aims to create a digital infrastructure for automated transport, enhancing safety, efficiency, and sustainability. The EnergyPod, part of DITM, optimizes EV charging and manages grid interaction. To secure against future quantum threats, TNO, NXP, and Infiniot upgraded OCPP with hybrid quantum-safe cryptography (TLS handshake and X.509 certificates). This protocol was tested on the NXP “i.MX 8” board, similar to those in real charging stations, and will be used in the EnergyPod. Various migration scenarios were tested, and a dashboard was developed to monitor real-time quantum-safe communication. In this talk, I will discuss the setup, process, challenges, and key takeaways from migrating a high-level protocol to hybrid PQC.
Speakers
Alessandro Amadori
Cryptographer at TNO
Alessandro Amadori is a cryptographer at TNO focusing on the migration to Post-quantum Cryptography. He holds a PhD from Eindhoven University of Technology in cryptographic implementations. He has contributed in several PQC migration projects like HAPKIDO, and is one a co-author of the second edition of the PQC migration handbook.
Overcoming Challenges in Post-Quantum Cryptography Adoption
11:30
Plenary
Abstract
With the release of standards for Post-Quantum Cryptography (PQC) algorithms, the cryptographic community faces a paradigm shift. Unlike RSA, ECC, and DH, which were often regarded as “silver bullets” due to their efficiency in key size, signature size, and performance, current PQC algorithms introduce significant challenges.
This session will explore the practical obstacles of integrating PQC algorithms into existing products and services. Topics include the use of embedded systems that leverage LMS or ML-DSA signatures to verify component integrity, and the implications for services delivering image signature solutions, particularly with regard to backend HSM operations and compliance with CNSA 2.0. Finally, we examine how open-source PKI management tools, purpose-built for PQC, can help meet these challenges by providing scalable and adaptable infrastructures for orchestrating post-quantum cryptographic operations.
Speakers
F
Frank Michaud
Principal Enginer Tech Lead for Cisco Crypo Services at Cisco
Frank Michaud has been the technical leader of Cisco Cryptographic Services (CS) since October 2022, playing a pivotal role within the Senior Tech Talent of the Cisco Security & Trust organization. He leads the Post-Quantum Cryptography (PQC) transition for CS, provides critical security guidance to Cisco Business Units, and pioneers innovative Public Key Infrastructure (PKI) solutions. Frank is widely recognized as a leading technical expert in the identity domain across the industry and serves as a technology advisor to Cisco’s Security CTO.
Since joining Cisco in 2016, Frank has been instrumental in driving innovation across IoT security, edge computing, identity management, authentication, and software security. His career, which began in 2000, includes significant contributions at leading security companies such as Kudelski Nagravision and NXP Semiconductors, where he developed foundational software solutions, hardware designs, and security architectures for highly sensitive domains.
Frank has actively contributed to several standards bodies and consortia, including GlobalPlatform and IEEE. Over the course of his career, he has been the driving force behind 15 patents, demonstrating his sustained commitment to advancing security technologies and solutions. He has also presented at the RSA Conference (RSAC), where he addressed topics related to PQC.
From Inventory to Action: Navigating the Next Phase of PQC Transition
12:00
Plenary
Abstract
Over the past few years, cybersecurity professionals worldwide have been urged—by security agencies and consultants alike—to kickstart their post-quantum cryptographic transition with a cryptographic inventory. Many have taken that advice to heart, amassing vast amounts of cryptographic data. Now, organizations face the critical question: how do we turn this information into action?
This presentation explores that very question. We’ll examine the next critical steps in the PQC transition from multiple perspectives—technical, strategic, and operational—and offer actionable guidance including prioritizing frameworks, risk-based approaches, and implementation timelines to help organizations turn insight into meaningful progress.
Speakers
Bruno Couillard
Co-Founder & CEO at Crypto4A
Bruno Couillard is the CEO and co-founder of Crypto4A Technologies Inc., where he leads the development of cutting-edge crypto-agile and post-quantum cybersecurity solutions, including the QxHSM and QxEDGE. With over 35 years of experience in cryptography, key management, and quantum-safe technology, Bruno has worked extensively in both commercial and military applications.
Previously, he co-founded Chrysalis-ITS and spearheaded the development of the Luna HSM, now a part of Thales. He also contributed to the creation of the PKCS#11 Standard. In addition to his entrepreneurial work, Bruno has served as a cryptographic evaluator for the Canadian Government and played a key role in the Canadian Cryptographic Modernization Program (CCMP).
Bruno is an active board member of Quantum Industry Canada (QIC), co-chair of the Quantum Industry Developers and Users Working Group, and a member of the Canadian National Quantum Strategy committee. Through these roles, he continues to promote and shape a quantum-safe cybersecurity ecosystem.
Beyond the Quantum Threat: Demonstrating Real-World Blockchain Resilience
12:00
Breakout
Abstract
Cryptocurrencies rely on PKI to ensure the authenticity and integrity of transactions through digital signatures. At the heart of this trust model is Public Key Infrastructure (PKI), which underpins the authenticity and integrity of every transaction within a blockchain network. PKI ensures that digital signatures—whether from payers initiating cryptocurrency transfers or validators confirming blocks—are verifiable and tamper-proof. RSA and ECC have long secured this ecosystem, but quantum computing threatens to break these algorithms via Shor’s algorithm, enabling private key recovery. An existing cryptocurrency network has been successfully transitioned to quantum-safety by using NIST finalist post-quantum algorithms, preserving performance, interoperability, and trust. This work demonstrates not only the feasibility but also the urgency of adapting PKI for a secure, post-quantum blockchain future.
Speakers
A
Andrew Cheung
President & CEO at 01 Communique Laboratory Inc.
Mr. Cheung boasts over 25 years of invaluable experience as a Chief Executive Officer and Chief Technology Officer. Throughout his illustrious career, he has consistently spearheaded cutting-edge innovations, and driven product
development, resulting in a portfolio of 9 patents within the computer software industry. Notably, his outstanding contributions were recognized with a nomination for the prestigious Ernst and Young Entrepreneur-Of-The-Year award in 2001.
Since founding his company in 1992, Andrew has positioned himself as a technology pioneer in Post-Quantum Cybersecurity and Remote Access technologies. With over 15 years of hands-on experience and extensive expertise in patent application, prosecution, and litigation processes, he has established himself as a formidable force in the field.
He remains at the forefront of technological advancements, with his latest innovation focusing on cybersecurity. His groundbreaking work in Post-Quantum Cryptography (PQC), leveraging NIST-approved quantum-resistant algorithms, is a testament to his forward-thinking approach. By combining his PQC engine with patent-protected measures into a wide array of applications, including cryptocurrencies, emails, and AI machine learning systems. This proactive approach ensures robust protection against potential cyber threats posed by quantum computers, thereby safeguarding the integrity of classical computer systems as we know them today.
To be announced shortly
12:30
Plenary
Abstract
The speaker(s) for this session will be announced soon!
Speakers
To be announced shortly
12:30
Breakout
Abstract
The speaker(s) for this session will be announced soon!
Speakers
Crypto-Agility: How it’s both a Critical Component and a Complex Challenge
14:00
Plenary
Abstract
The time to prepare for the quantum threat is upon us, and the move from traditional crypto to PQC will touch just about every cryptographic system and piece of infrastructure. To make the transition, organizations need visibility into their cryptographic estate (hardware, software, keys, certificates, secrets, etc.) and ensure they have built in crypto-agility. How does one achieve a mature crypto-agile security practice? By defining crypto-agility and understanding what it looks like for your organization. But crypto-agility is much more than moving from one system or algorithm to another. It’s about people, processes and technology. It’s about visualizing your cryptographic assets, implementing policy, driving compliance and more. In this session, we’ll discuss in detail the necessary elements to achieve a mature crypto-agile security practice, and how to overcome the challenges to get there.
Speakers
Greg Wetmore
VP Software Development at Entrust
Greg Wetmore leads the global team responsible for building and enhancing the digital security product portfolio at Entrust, such as the Identity, Data Security, and Critical Infrastructure solutions. Greg joined Entrust in 2000 and has held a number of leadership positions on the engineering team over that period. Greg is a key industry advisor and speaks regularly on topics like digital identity, IoT, Zero Trust and post-quantum security. Greg holds an Engineering degree from Queen’s University Kingston, Ontario, Canada.
Crypto Agility by Design: Securing PQC with Updatable HW/FW Co-design
14:00
Breakout
Abstract
Hardware/firmware co-design provides a critical advantage in post-quantum cryptographic deployments by enabling agility against evolving threats. Unlike immutable hardware-only roots of trust-potentially vulnerable to future side-channel attacks and costly remediation-co-designed systems allow field updates to mitigate emerging vulnerabilities. Real-world incidents like Checkm8 highlight the risk of static hardware. In contrast, updateable firmware enables proactive responses, including SCA patching, parameter updates, and crypto migration. This talk explores how co-design enhances security lifecycle resilience, accelerates secure development, and supports crypto agility-vital for PQC in constrained, real-world environments.
Speakers
Octavian Maciu
Hardware Product Manager at PQShield
Octavian Maciu is a Hardware Product Manager at PQShield, where he contributes to the development and evolution of the company’s hardware offerings during a pivotal time for Post-Quantum Cryptography (PQC). With a background in hardware design, he brings a blend of technical expertise and product insight to the role.
Before joining PQShield, Octavian worked on advanced semiconductor and hardware technologies at Qualcomm, and conducted research at the French National Centre for Scientific Research (CNRS). He holds a Master of Science in Micro and Nanoelectronics from the University of Strasbourg.
At PQShield, his work focuses on enabling secure, efficient hardware implementations that meet the demands of quantum-resilient cryptographic standards.
To be announced shortly
14:30
Plenary
Abstract
The speaker(s) for this session will be announced soon!
Speakers
Post-Quantum Firmware Signing in IoT: Practical PQC-FOTA Implementation
14:30
Breakout
Abstract
As quantum computing advances, the cryptographic integrity of long-lived IoT devices is increasingly at risk. This presentation demonstrates a practical approach to securing Firmware Over-the-Air (FOTA) updates on ESP32-based IoT devices using Post-Quantum Cryptography (PQC).
We explore how NIST-standardized digital signature algorithms-ML-DSA (FIPS 204, formerly CRYSTALS-Dilithium) and SLH-DSA (FIPS 205, formerly SPHINCS+)-can be integrated into the ESP32 secure boot process to replace classical RSA/ECDSA schemes. Using the Open Quantum Safe (OQS) library, we implement PQC signing on resource-constrained hardware and evaluate the trade-offs in performance, code size, and interoperability.
The presentation features real-world deployment on ESP32 hardware, and includes practical guidance on hybrid signing approaches (e.g., ECDSA + ML-DSA) for maintaining backward compatibility. Tools such as ESP-IDF, PlatformIO, and custom signing scripts are used throughout.
Speakers
T
Tan Wai Kaey
IoT & Cybersecurity Engineer
Tan Wai Kaey is an IoT and Cybersecurity Engineer with a strong academic foundation and professional certifications, including CEH (Certified Ethical Hacker), CC (Certified in Cybersecurity), and CCNA (Cisco Certified Network Associate). Her expertise includes penetration testing, vulnerability assessment, secure software development, and cryptography. She has contributed to projects involving secure web applications, database management, and lightweight post-quantum cryptographic solutions. As the former cybersecurity lead for the Google Developer Student Club (GDSC), she led workshops and initiatives to enhance technical skills and promote cybersecurity awareness.
PQC in Practice: Why This, Not That?
15:00
Plenary
Abstract
As the industry accelerates preparations for the post-quantum era, a growing number of organizations are grappling with a practical question: Which PQC deployment strategy is right for us? Should we adopt hybrid certificates, go pure post-quantum, use composite keys, or run dual cryptographic infrastructures? Each approach offers different trade-offs in terms of risk, interoperability, compliance, and operational complexity.
This panel brings together leading experts and implementers to explore real-world use cases, deployment decisions, and the rationale behind them. Panelists will share insights into how organizations are evaluating the threat landscape, aligning cryptographic agility with business needs, and choosing between strategies.
This session is designed for architects, security engineers, and decision-makers who need to answer the increasingly common question: What should we do, and why?
Speakers
Sven RajalaModerator
International PKI Man of Mystery at Keyfactor
An award winning seasoned cyber-security consultant with extensive subject matter expertise on PKI, automation of PKI/Signing Solutions, and containers. I have over 18 years of experience working in both the private sector and with federal government departments and agencies. I am frequently called upon to participate in client discussions, presentations, and seminars on topics including PKI, EJBCA, and PKI Devsecops. I also host the Key Master series by Keyfactor found on the YouTube Keyfactor Developers channel.
Sudha Iyer
Head Cybersecurity Architect at Citi
Sudha Iyer is Head Cybersecurity Architect at Citi, a founding member of the FS-ISAC PQC group, and an international project leader at ISO for blockchain and smart contract security. She has 23 years of experience in cryptographic architecture and is deeply engaged in cross-sector cybersecurity forums and leads several cryptographic and data security standards efforts.
Corey Bonnell
Industry Technology Strategist
Corey Bonnell is a Technology Strategist at DigiCert. He has over 15 years of engineering experience in several domains with a deep focus on Public Key Infrastructure. Corey represents DigiCert in several standards organizations, such as the CA/Browser Forum, ETSI, and IETF. He has been involved in the standardization process of emerging standards relating to post-quantum cryptography and is a frequent participant in IETF post-quantum cryptography hackathons.
Tadahiko Ito
Senior Researcher
Tadahiko Ito is a Senior Researcher at Intelligent Systems Laboratory, SECOM CO., LTD. His research at SECOM includes cryptographic protocols, policy management, cryptographic key management, and planning for PQC transitions. He is a member of the CRYPTREC (Cryptographic Technology Research Working Group) PQC Research Working Group. Since 2017, he has represented SECOM Trust Systems at the CA/B Forum. He has co-authored several IETF RFCs, including RFC 8813, RFC 9295, and RFC 9336, among other publications.
Authenticity Guaranteed: Verifying Video Integrity on Consumer Devices with Post-Quantum Signatures
15:00
Breakout
Abstract
As AI-generated video content becomes increasingly convincing, ensuring the authenticity of video material is more critical than ever. This session presents a novel method for verifying the integrity of video streams or files using post-quantum digital signatures. Designed for deployment on consumer devices, the approach safeguards against tampering and deepfake manipulation, even in a future where quantum computing threatens classical cryptographic schemes. Join us to explore the architecture, implementation, and real-world applications of this quantum-resistant solution for trusted video authentication.
Speakers
Ronny Döring
R&D System Engineer at Deutsche Telekom AG
Ronny Döring is an R&D System Engineer at Deutsche Telekom AG, T-Labs, with a focus on post-quantum cryptography and secure communication protocols. He coordinates experimental work in the T-Labs Quantum Lab and explores the practical integration of advanced cryptographic technologies.
As part of the EU project OpenQKD, Ronny has demonstrated how quantum key distribution (QKD) and post-quantum cryptography (PQC) can be integrated into core network infrastructures, enhancing the resilience and future-readiness of digital communication systems. His research and implementation efforts aim to build a secure communications framework that combines both quantum and classical technologies to meet the challenges of tomorrow’s digital landscape.
Crypto-Agile PKI: A Strategic Blueprint for Post-Quantum Trust
16:00
Plenary
Abstract
“Quantum computing is reshaping the foundations of digital trust, and PKI must be the first to adapt. While NIST-standard algorithms like ML-KEM and ML-DSA progress toward adoption, organizations face a deeper challenge: evolving legacy PKI into a crypto-agile, automated, and future-ready infrastructure. This session presents a concise 20-minute blueprint for enabling that transition, without starting from scratch.
We’ll explore three strategic priorities:
Assess cryptographic exposure across TLS, S/MIME, code signing, and device identity.
Embed crypto-agility and automation into certificate lifecycles using hybrid certs (draft-ietf-lamps-x509-slhdsa-09), short-lived certificates, and ACME-based issuance models.
Align PKI governance with emerging standards from NIST(1800-38B), ETSI, CAB Forum, and IETF.”
Speakers
Ganesh Mallaya
at AppViewX Inc
Ganesh Mallaya is a Distinguished Architect at AppViewX, where he has helped revolutionize certificate lifecycle management (CLM) and PKI solutions for global enterprises. A member of the CA/Browser Forum and a Harvard-certified cybersecurity strategist, he serves as a trusted advisor to organizations on post-quantum cryptography (PQC), digital trust infrastructure, and CLM modernization across complex, regulated environments
Implementing Hybrid TLS with ML-KEM-768 for Post-Quantum Security in Mobile IIoT Deployments
16:00
Breakout
Abstract
This study integrates post-quantum cryptography into mobile IIoT via Cisco Packet Tracer models of Mobile Manufacturing Trucks and a centralized Security Operations Center. Trucks deploy sensors, routers and Quantum Shieldz AX200 modules and the SOC uses AX300DS and AXMS100DS. Hybrid TLS merges ECDHE with the ML-KEM-768 key-encapsulation mechanism (as standardized in NIST FIPS 203) . Node-RED and MQTT simulate real-time sensor streams over channels secured by SHA-3 integrity checks and QRNG keys. Tests show a 1.3× handshake-latency increase, under 300 ms responsiveness and anomaly detection under 1.5 s, meeting IEC 62443. Simulated MITM, DoS and outages yield seamless failover and state restoration. These findings confirm PQC feasibility in resource-constrained mobile IIoT and highlight the need for quantum-safe strategies. Future work will explore AI anomaly prediction, lattice signatures and hardware attestation.
Speakers
D
Danny Setyowati
Student at Republic of Indonesia Defense University
Cyber Defense Engineering Student from Republic of Indonesia Defense University
To be announced shortly
16:30
Plenary
Abstract
The speaker(s) for this session will be announced soon!
Speakers
Evaluating the Practical Capabilities of Contemporary Quantum Processors in Breaking AES Encryption
16:30
Breakout
Abstract
As quantum computing advances, assessing the potential of current architectures to threaten AES encryption is essential. This study evaluates leading quantum processors, IBM, Google, Zuchongzhi 2, Microsoft, Rigetti, IonQ, and Honeywell, focusing on quantum gate complexity, qubit coherence time, and scalability trade-offs. It demonstrates how these systems, when scaled to thousands of qubits with error correction, could compromise AES security. The findings offer clearer insight into the timeline of quantum threats, aiding in strategic planning for mitigation and PQC migration. Enhancing AES robustness through longer key sizes and hybrid models is also explored to strengthen cryptographic readiness.
Speakers
Somrak Petchartee
Research Operations Manager, NT Telecom Public Company Limited
Dr.-Ing. Somrak Petchartee is a seasoned researcher and engineer with over 30 years of multidisciplinary experience encompassing radio frequency (RF) design, high-performance computing with FPGA, robotics, embedded systems, sensor technology, and post-quantum cryptography. He earned his Doctor of Engineering from the University of the Federal Armed Forces, Munich, where his doctoral research addressed tactile sensing for object manipulation. He also holds a Master of Engineering in Computer Science from the Asian Institute of Technology and a Bachelor of Engineering in Telecommunications (First-Class Honors) from King Mongkut’s Institute of Technology Ladkrabang.
Dr. Petchartee has held pivotal roles across academia, defense, and industry, leading advanced research initiatives at NT Telecom and contributing to collaborative projects in quantum sensing and Single Proton Detector in partnership with Thammasat University. His scholarly contributions span numerous publications in tactile sensing, intelligent systems, and quantum technologies. He is also a regular invited speaker at prominent technology and innovation forums across Asia.
His work has been recognized with several prestigious awards, including the SEPO Thailand Innovation Award, the Best Paper Award from the Journal of Computers for his research on polynomial dynamic time wraping (DTW), and the Emerald Literati Award for Excellence. Dr. Petchartee remains committed to advancing secure and intelligent systems through interdisciplinary research and applied innovation.
Closing remarks
17:00
Plenary
Speakers
Paul van Brouwershaven
Chair PKI Consortium and Director of Technology at SSL.com
Paul van Brouwershaven is a distinguished leader in cybersecurity with over two decades of experience specializing in Public Key Infrastructure (PKI). He currently serves as the Director of Technology at SSL.com. In addition to his role, Paul chairs the PKI Consortium and also leads its PQC Working Group. Prior to his current roles, Paul held the position of Director Technology Compliance at Entrust and was the Technology Solutions Director at GlobalSign.
Beyond his leadership roles, Paul is also the Owner of Digitorus, a specialized software development and consultancy company he founded in 2016. Digitorus focuses on PKI, Digital Signatures, and Trustworthy Systems. His extensive expertise in PKI is further highlighted by his past role as Vice Chair of the CA/Browser Forum, where he contributed to defining industry standards for digital certificates.
Albert de Ruiter
Vice Chair PKI Consortium and Policy Authority PKI Dutch Government (Logius)
Albert de Ruiter operates the Policy Authority at Logius, the digital government service organization of the Netherlands. He is also a member of the QvC (Quantum Secure Cryptography) working group of the Dutch government, a board member of HAPKIDO, and a member of the PKI Consortium. Albert is known for introducing the idea of a Post-Quantum Cryptography Conference to the PKI Consortium in 2022.
Please note that speakers are not permitted to promote products or services during their presentations. While commercials, workshops, and pitches included commercial information, the primary focus of the conference remains on educational content.
This conference is made possible through the support of the Post-Quantum Cryptography Working Group and the following organizations:
For more information about the conference, please contact the PKI Consortium at [email protected].
Participate in our community discussions and/or join the consortium