Sessions
Please note that this is a live broadcast and that times specified below may vary slightly due to that.
Workshops
The PrimeKey workshops are already available for you to watch. You find them at the bottom of the page, or filter on "Workshops" below.
Welcome to PrimeKey Tech Days!
Admir Abdurahmanovic, Tomas Gustavsson
Wednesday September 16, 2020 10:00 - 10:05
Seminars
Greetings from our moderator Admir and Tomas!
A word from the CEO
Magnus Svenningson
Wednesday September 16, 2020 10:05 - 10:10
Seminars
Welcome greeting from PrimeKey CEO Magnus Sveningsson.
Hardcore PKI
Tomas Gustavsson
Wednesday September 16, 2020 10:10 - 10:30
Seminars
Future (Agile Crypto / Agile PKI)
Muralidharan Palanisamy
Wednesday September 16, 2020 10:31 - 10:59
Seminars
Business agility has been a common organizational goal since the turn of the millennium – practices like agile methodologies, accelerated DevOps, and digital transformation are all, in one way or another, geared towards achieving that overarching goal. Fatema's presentation will look into the strategic goal of digitally enabling an agile business model while remembering that an organization’s security architecture must be engineered to scale along with the rest of the business, and is expected to be just as agile as the processes it secures. However, cryptography – which forms the cornerstone of security in the digital era – has historically been a slow, antiquated practice, with tasks as simple as replacing a digital certificate on a server taking an hour to execute and test. The principle of enterprise crypto-agility is designed to eliminate that particular weak link, and thus empower cryptography to be on the same footing as other IT processes. The looming threat of quantum computing has brought this subject to the forefront of the security space in modern times.
OpenSource is all around us but how is it commercialised?
Amanda Brock
Wednesday September 16, 2020 11:09 - 11:37
Seminars
Many people, even those responsible for technology, have been unaware of the levels of open source supporting their business. As all companies move to being technology companies they are by default becoming open source.
How is that infrastructure developed and paid for? And where does open source fit in our future platform economy?
Artificial Intelligence based user identification in the eIDAS world
Clemens Wanko, Kalev Pihl
Wednesday September 16, 2020 11:38 - 12:03
Seminars
A reliable user Identification is crucial for Qualified Trust Service under eIDAS. That typically involved human interaction in the past. Now, at first time, a AI based approach with no human involvement has been certified under eIDAS. We are going to present that new identification process and the hurdles taken to achieve eIDAS conformity and a corresponding certification.
Tech update on EJBCA
PrimeKey EJBCA, Mike Agrenius Kushner
Wednesday September 16, 2020 12:04 - 12:10
Seminars
Tech update on SignServer
PrimeKey SignServer, Markus Kilås
Wednesday September 16, 2020 12:11 - 12:20
Seminars
Structured crypto to keep society running
Sini Ruohomaa
Wednesday September 16, 2020 13:30 - 13:53
Seminars
Sini Ruohomaa, Senior Specialist at Ericsson in the Network Security group, will speak at PrimeKey Tech Days 2020 about how to live with cryptography and avoid broken-off handshakes and acute system malfunction syndrome. Her presentation looks at using cryptography in the context of critical infrastructure, contrasting the stereotypical viewpoint of crypto as it appears in the World Wide Web transport layer security. Her presentation is perfect for those interested in cryptography for different demanding application areas and aims at softening the bumps that lurk in the second half of the proverbial hype curve - may they all be flattened.
Identity Authority Manager - Experiences from the pilot projects
PrimeKey Identity Authority Manager, Martin Rauch
Wednesday September 16, 2020 13:54 - 14:24
Seminars
More and more Siemens devices are provided with Manufacturer Device Certificates or so-called IDevIDs. For the enrollment of the Manufacturer Device Certificates a (Local) Registration Authority in the production environment is needed. The challenges are the different operational environments, production processes and the capabilities of the devices. This requires a very flexible solution, deployed at the production line, easily adaptable to the requirements of the production and offering highest security. Together with Siemens, PrimeKey started a project for the development of such a new product. This presentation reports on the experiences made in Siemens factories during piloting.
Hardcore Crypto
David Hook
Wednesday September 16, 2020 14:25 - 14:44
Seminars
eIDAS compliant Remote Signing Service
Jack Piekarski, Roman Cinkais
Wednesday September 16, 2020 14:45 - 15:19
Seminars
Under eIDAS, an electronic signature is considered to be advanced if it has met several requirements, including:It uniquely identifies and links to its signatoryThe private key used to create the electronic signature is under the sole control of the signatoryIf the data is tampered with after the message has been signed, the signature must identify that this has
happenedInvalidating the signature in the event its accompanying data has changedPrimeKey® SignServer was designed to provide a central and API centric signature and sealing services. The key element to enable SignServer for the eIDAS domain is strong authentication of the user to invoke the signature process and retaining sole control of their signing key. Learn more about compliant remote signing at PrimeKey Tech Days 2020.
Trust Services - new compliance approach
Jerome Bordier
Wednesday September 16, 2020 15:30 - 15:57
Seminars
The Connected Car: PKI’s Role in Securing Next-Generation Vehicles
Ted Shorter
Wednesday September 16, 2020 15:58 - 16:24
Seminars
From a security standpoint, early editions of connected vehicles had a rough start. Securing automobiles is hard – perhaps harder than just about any other device. This session will outline the unique security challenges that engineers face when securing automobiles, address the role that digital certificates and PKI play in securing them – and how the same principles can improve security for other connected products where high assurance and scalability are a must.
PrimeKey Product Portfolio
Martin Oczko
Wednesday September 16, 2020 16:25 - 16:34
Seminars
EU Cybersecurity Act
Slawomir Gorniak
Wednesday September 16, 2020 16:34 - 17:00
Seminars
The EU Cybersecurity Act, which entered into force last year, starts reaching its maturity. The EU Agency for Cybersecurity (ENISA) has assumed its new tasks and is reorienting its internal structure accordingly. The EU framework for cybersecurity certification is now implemented, following the creation of all advisory groups and launch of the elaboration of the first draft candidate certification schemes.
We have some really exciting news to share with you! This is about a new PrimeKey offering: EJBCA as a Service.
Check in and view the workshop below to be the first to know, to hear the very first announcement and to see a demo of the new product, which will be launched later during the year.
This workshop will cover the whole certificate issuance process at the production line. Andreas Philipp will show you how to create and configure a certificate issuance process within the Identity Authority Manager and how to model the necessary individual workflows. You will learn how efficiently it is possible with the IdAM to develop individual workflow processes in the shortest possible time, in order to establish a continuous chain of trust.
The PrimeKey Identity Authority Manager Workshop will cover:How Digital Identities are issued during the production processThe requirements and challenges around issuing birth certificatesHow Identity Authority Manager brings the CA Service to the manufacturing warehouseHands-on training to adapt the processes for issuing certificates
The SEE is a FIPS 140-2 Level 3 certified hardware platform which allows you to seamlessly create a safe haven for any given application that you consider requires this level of protection. Be it protecting your IP from industrial espionage, achieving compliance, or just because of the fact that you can't trust the environment in which your application has to be deployed.
The PrimeKey SEE Workshop will cover:The general concept of the SEE and a brief discussion of use cases for the SEEIntroduction to the operation and security features of the SEE, including the Random Number GeneratorInstallation of an application within a Virtual Machine and then installation of the Virtual Machine on the SEEIntroduction to the operational states of the SEEUsing the Web based User Interface to monitor, configure and manage virtual machines