NTH GENERATION’S
IT & CYBERSECURITY SYMPOSIUM
09.19.24
JW Marriott | Anaheim
_____________________________________________________________________
HOT TOPIC ALERT!
Is it possible to resist future attacks by quantum computers?
Vulnerability of Current Encryption
Quantum computers are expected to break encryption with relative
ease and vast speed, rendering current encryption obsolete.
Data Security Risk
Sensitive data like medical records, intellectual property, financial transactions, government secrets, personal information, and other sensitive data could be compromised. This could lead to massive data breaches, identity theft, and high recovery costs.
"Harvest Now, Decrypt Later" Attacks
Criminal organizations and individual bad actors can already intercept and store encrypted data NOW, waiting for the development of powerful quantum computers to decrypt it later — this poses a significant long-term threat.
_____________________________________________________________________
HOT OFF THE PRESS!
On August 13, 2024, the National Institute of Standards and Technology (NIST, part of the US Department of Commerce) approved three Federal Information Processing Standards (FIPS) for post-quantum cryptography.
These standards specify key establishment and digital signature schemes that are designed to resist future attacks by quantum computers, which threaten the security of current standards. CLICK HERE
They secure a wide range of electronic information, from confidential email messages, to government communications, to e-commerce transactions that propel the modern economy.
Protect your organization sooner than later.
NIST is encouraging computer system administrators to begin
transitioning to the new standards as soon as possible.
_____________________________________________________________________
HEAR FROM SUBJECT MATTER EXPERTS
Nth has partnered with a leading Quantum Encryption Defense technology provider to help you implement NIST-published post-quantum cryptography
FIPS standards as soon as possible.
José R. Rosas-Bustos
Chief Science Officer
Quantum Encryption Defense
José R. Rosas-Bustos, an innovative leader in decentralized technologies, quantum computing (QC), and cybersecurity, has over two decades of experience in IT. He specializes in National Security and Defense while holding significant IT and Quantum Computing Intellectual Property, including patents and industrial secrets.
Currently pursuing a Ph.D. in Post-Quantum Cryptography and QC at the University of Waterloo, Canada, he actively contributes to projects such as QRNG Networks, Decentralized Quantum Networks (DQN), and Quantum Adaptive Multifrequency Defense Systems (QAMDS).
_____________________________________________________________________
OVERALL EVENT AGENDA
All times are PT and subject to change.
7:15 AM – 8:15 AM
Event Check-In & Continental Breakfast
8:15 AM – 12:25 PM
General Session
Quantum Encryption Defense will be speaking here approx. 10:45 am
See online schedule.
12:25 PM – 2:00 PM
Lunch & Demo Hall
2:00 PM – 5:00 PM
Rapid Presentation & Workshop Sessions
5:00 PM – 7:00 PM
Cocktail Reception & Demo Hall
_____________________________________________________________________
Partnering Technologies
Comentários