October 7-9, 2025
October 7-9, 2025
REGISTER
NOW
BECOME A
SPONSOR
SPEAKERS
OUR MISSION
“We believe everyone should have access to security and privacy tools, whoever they are, wherever they are or whatever their personal beliefs are, as a fundamental human right.”
OUR MISSION
“We believe everyone should have access to security and privacy tools, whoever they are, wherever they are or whatever their personal beliefs are, as a fundamental human right.”


Beyond the Filesystem: A Robust Approach to Key Storage

In the age of zero-trust architectures and increasingly complex cloud environments, securing TLS authentication keys and data encryption keys has become a critical challenge. These cryptographic assets are the cornerstones of Zero Trust Architecture (ZTA), as their integrity and protection are essential to maintaining secure communications and data confidentiality. This talk will examine the limitations of traditional key management approaches and introduce a robust, resilient solution for securing cryptographic keys in high-availability environments. We will explore the essential components of a modern key management system, including secure key distribution, lifecycle management from creation to destruction, and mechanisms to ensure encryption key security throughout. Additionally, the session will address compliance and performance considerations and highlight control points for managing security incidents involving key-consuming components.

Date: 09.10.2025
Time: 9:00 AM
Location: Belvedere IV
Track: Community, Contribution & the Future