Time: 9:25-10:15
Location: Room E/F
Speaker:
Dr. Chris Wood
Lockheed Martin
Abstract:
In this presentation I will provide you with a current update on the progress of the “post quantum cryptography”(PQC) race to protect our sensitive information and other intellectual property using “quantum-resistant cryptography. I will briefly discuss the barriers to getting certified cryptographic modules and systems processed through the validation, the certification process, and then into the supply chain.
The demand to have these modules and systems certified for use today the higher-level systems relying on those cryptographic modules is growing because of the mandates to reduce vulnerabilities and increase the security strength of the compute infrastructure in the face of the ever-increasing abilities demonstrated by local, regional, and international threat actors. I will briefly discuss the current PQC program’s progress to provide a foundational understanding for engineers working in the software/systems development environment. I will talk about the confluence of factors that have created this problem, and what we can possibly do to successfully manage to meet the challenge to our industries; to deliver the products and services that are created using systems that require or heavily rely on cryptographic modules. I will discuss the reasons why it is vital that the using communities of these cryptographic modules and systems need to be aware of the process, how it works at a high level, and what they need to know and request when soliciting solicitations to buy these items. Finally, I will offer a few important points to remember and why I believe that we can get there sooner than we might suspect.
Speaker Bio:
Dr. Chris Wood CISSP is currently a Technical Fellow in the areas of cybersecurity, post quantum computing, and software development for Lockheed Martin. Dr. Wood has spent the last 20+ years working to establish computing environments that are maximally secure by design from the ground up for both new and existing projects for our Customers. This requires conformance not only to the contractual requirements but also integrating the “Best Practices” learned from previous projects. This work also requires the ability to strategically architect solutions that include future technologies, and threats, or weaknesses stemming from these and other potential technologies that may arise during the lifetime of the project.