Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Artwork

Content provided by Cath Firmin. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Cath Firmin or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.
Player FM - Podcast App
Go offline with the Player FM app!

HSMs and PQC Migration: Are We There Yet?

43:35
 
Share
 

Manage episode 483136319 series 3652091
Content provided by Cath Firmin. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Cath Firmin or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.
The time to modernize cryptographic infrastructure has arrived. In this episode, recorded live at RSA Conference 2025, host Johannes Lintzen moderates a conversation with four HSM industry leaders: Greg Wetmore (Entrust), John Ray (Thales), David Close (Futurex), and Kevin McKeogh (Utimaco). Together, they explore the evolution of Hardware Security Modules as the foundational building blocks for secure, post-quantum infrastructure.
Learn how HSMs are enabling cryptographic agility, supporting new NIST and CNSA 2.0 algorithms, and offering in-field firmware and FPGA updates, without requiring a full rip-and-replace. The panel dives into compliance frameworks, performance trade-offs, hybrid environments, and supply chain integrity, offering a rare behind-the-scenes view into how top HSM vendors are solving quantum migration at scale.
What You’ll Learn:

  • Why HSMs are essential to post-quantum cryptographic trust
  • How cryptographic agility is enabled through firmware, FPGA, and SDK updates
  • Why CNSA 2.0 and FIPS 203/204/205 are now critical to compliance
  • How to deploy PQC without replacing your entire infrastructure
  • The real-world performance and interoperability implications of PQC
  • How leading organizations are already securing TLS with hybrid algorithms
  • Why PQC readiness requires standards-aligned APIs and driver updates
  • What’s next for HSMs and how vendors are building for an agile crypto future
Greg Wetmore is VP, Software Development at Entrust. He leads Entrust's cryptographic engineering, focusing on post-quantum crypto implementation and HSM innovation.
David Close is Chief Solutions Architect at Futurex. He is an expert in hardware crypto infrastructure, compliance (FIPS, CNSA), and real-world PQC implementation.
John Ray is Director of HSM Product Management at Thales. He oversees quantum readiness and crypto-agility strategy for Thales HSM product lines.
Kevin McKeogh is Senior Director, Product Management at Ultimaco. He leads crypto innovation at Utimaco with a focus on hybrid deployments, SDK flexibility, and international standards alignment.
Your Roadmap to Post-Quantum HSM Readiness:

[00:52] Step 1: Accept That Crypto Agility Is Now Essential
The next 20 years of cryptography will be far more dynamic than the past 30. Entrust explains how layering cryptography across FPGA, firmware, and trusted code environments allows you to adopt new algorithms fast, without compromising security or waiting on long certification cycles.
Key Question: Is your organization building cryptographic agility into your hardware lifecycle?

[04:42] Step 2: Plan for Firmware, Not Rip-and-Replace
Post-quantum HSM adoption doesn’t mean starting from scratch. Vendors like Utimaco and Futurex reveal how firmware and SDK updates can retrofit existing infrastructure.
Key Question: Can your current HSM be upgraded for PQC, or are you locked into legacy limitations?
[08:40] Step 3: Align with CNSA 2.0 and FIPS Standards
PQC readiness is no longer optional. With new standards like CNSA 2.0 and FIPS 203–205, organizations must ensure their HSMs meet certification requirements and cryptographic benchmarks.
Key Question: Are your cryptographic modules validated for CNSA 2.0 and emerging FIPS requirements?
[13:52] Step 4: Test Hybrid Environments Early
TLS is already using PQC—many organizations just don’t realize it. Futurex reveals real-world deployments combining classical and quantum-safe algorithms in production environments.
Key Question: Are you piloting hybrid PQC deployments in real use cases like TLS or email security?
[20:25] Step 5: Upgrade Your API Ecosystem
PQC implementation isn’t just about HSMs—it’s about the ecosystem. CNG, PKCS#11, and OpenSSL must all support new algorithms. Vendors describe how they’re updating drivers and working with partners to enable seamless transitions.
Key Question: Have you validated that your entire crypto stack - APIs, libraries, and middleware - supports PQC?

[28:48] Step 6: Build Interoperability into Your PQC Strategy
HSM vendors emphasize cross-vendor cooperation and standards adherence. Migration success depends on interoperability and standards—not just product capabilities.
Key Question: Is your PQC deployment plan designed to interoperate across tools, vendors, and geographies?
Episode Resources:


Want exclusive insights on post-quantum security? Stay ahead of the curve—subscribe to Shielded: The Last Line of Cyber Defense on Apple Podcasts, Spotify, and YouTube Podcasts.

✔ Get insider knowledge from leading cybersecurity experts.
✔ Learn practical steps to future-proof your organization.
✔ Stay updated on regulatory changes and industry trends.
Need help subscribing? Click here for step-by-step instructions.

  continue reading

7 episodes

Artwork
iconShare
 
Manage episode 483136319 series 3652091
Content provided by Cath Firmin. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Cath Firmin or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.
The time to modernize cryptographic infrastructure has arrived. In this episode, recorded live at RSA Conference 2025, host Johannes Lintzen moderates a conversation with four HSM industry leaders: Greg Wetmore (Entrust), John Ray (Thales), David Close (Futurex), and Kevin McKeogh (Utimaco). Together, they explore the evolution of Hardware Security Modules as the foundational building blocks for secure, post-quantum infrastructure.
Learn how HSMs are enabling cryptographic agility, supporting new NIST and CNSA 2.0 algorithms, and offering in-field firmware and FPGA updates, without requiring a full rip-and-replace. The panel dives into compliance frameworks, performance trade-offs, hybrid environments, and supply chain integrity, offering a rare behind-the-scenes view into how top HSM vendors are solving quantum migration at scale.
What You’ll Learn:

  • Why HSMs are essential to post-quantum cryptographic trust
  • How cryptographic agility is enabled through firmware, FPGA, and SDK updates
  • Why CNSA 2.0 and FIPS 203/204/205 are now critical to compliance
  • How to deploy PQC without replacing your entire infrastructure
  • The real-world performance and interoperability implications of PQC
  • How leading organizations are already securing TLS with hybrid algorithms
  • Why PQC readiness requires standards-aligned APIs and driver updates
  • What’s next for HSMs and how vendors are building for an agile crypto future
Greg Wetmore is VP, Software Development at Entrust. He leads Entrust's cryptographic engineering, focusing on post-quantum crypto implementation and HSM innovation.
David Close is Chief Solutions Architect at Futurex. He is an expert in hardware crypto infrastructure, compliance (FIPS, CNSA), and real-world PQC implementation.
John Ray is Director of HSM Product Management at Thales. He oversees quantum readiness and crypto-agility strategy for Thales HSM product lines.
Kevin McKeogh is Senior Director, Product Management at Ultimaco. He leads crypto innovation at Utimaco with a focus on hybrid deployments, SDK flexibility, and international standards alignment.
Your Roadmap to Post-Quantum HSM Readiness:

[00:52] Step 1: Accept That Crypto Agility Is Now Essential
The next 20 years of cryptography will be far more dynamic than the past 30. Entrust explains how layering cryptography across FPGA, firmware, and trusted code environments allows you to adopt new algorithms fast, without compromising security or waiting on long certification cycles.
Key Question: Is your organization building cryptographic agility into your hardware lifecycle?

[04:42] Step 2: Plan for Firmware, Not Rip-and-Replace
Post-quantum HSM adoption doesn’t mean starting from scratch. Vendors like Utimaco and Futurex reveal how firmware and SDK updates can retrofit existing infrastructure.
Key Question: Can your current HSM be upgraded for PQC, or are you locked into legacy limitations?
[08:40] Step 3: Align with CNSA 2.0 and FIPS Standards
PQC readiness is no longer optional. With new standards like CNSA 2.0 and FIPS 203–205, organizations must ensure their HSMs meet certification requirements and cryptographic benchmarks.
Key Question: Are your cryptographic modules validated for CNSA 2.0 and emerging FIPS requirements?
[13:52] Step 4: Test Hybrid Environments Early
TLS is already using PQC—many organizations just don’t realize it. Futurex reveals real-world deployments combining classical and quantum-safe algorithms in production environments.
Key Question: Are you piloting hybrid PQC deployments in real use cases like TLS or email security?
[20:25] Step 5: Upgrade Your API Ecosystem
PQC implementation isn’t just about HSMs—it’s about the ecosystem. CNG, PKCS#11, and OpenSSL must all support new algorithms. Vendors describe how they’re updating drivers and working with partners to enable seamless transitions.
Key Question: Have you validated that your entire crypto stack - APIs, libraries, and middleware - supports PQC?

[28:48] Step 6: Build Interoperability into Your PQC Strategy
HSM vendors emphasize cross-vendor cooperation and standards adherence. Migration success depends on interoperability and standards—not just product capabilities.
Key Question: Is your PQC deployment plan designed to interoperate across tools, vendors, and geographies?
Episode Resources:


Want exclusive insights on post-quantum security? Stay ahead of the curve—subscribe to Shielded: The Last Line of Cyber Defense on Apple Podcasts, Spotify, and YouTube Podcasts.

✔ Get insider knowledge from leading cybersecurity experts.
✔ Learn practical steps to future-proof your organization.
✔ Stay updated on regulatory changes and industry trends.
Need help subscribing? Click here for step-by-step instructions.

  continue reading

7 episodes

כל הפרקים

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Listen to this show while you explore
Play