The Public Key Infrastructure (PKI) is used to establish a chain of trust. This is done by means of certificates, which a PKI creates, manages, distributes, but can also revoke. A certificate contains the public key; the associated private key must be kept secure and secret. It must be stored in a hardware security module (HSM).
Public Key Infrastructure is a well-known term in the cybersecurity industry, but the proven system also comes with many challenges.
In this webinar you will get to know:
REGISTER HERE FOR THE WEBINAR.
THURSDAY - December 15, 2022
The zoom link will follow 24 hours before the webinar via Email.