ONEKEY invites you to their event

Post-Quantum Cryptography: Assessing Your PQC Readiness with ONEKEY

About this event

With the rapid advancement of quantum computing, widely used cryptographic algorithms such as RSA (Rivest–Shamir–Adleman) and ECC (Elliptic Curve Cryptography) are expected to become vulnerable in the foreseeable future. Organizations must begin preparing today to ensure their products and systems remain secure in a post-quantum world.

Post-Quantum Cryptography (PQC) introduces new cryptographic algorithms designed to withstand attacks from quantum computers. However, one of the biggest challenges for organizations is understanding where and how current cryptography is used across their products, firmware, and software components.

Without this visibility, companies face significant risks: hidden cryptographic dependencies, delayed migration efforts, and potential security and compliance gaps in the future.

In this 45-minute webinar, we provide a practical introduction to Post-Quantum Cryptography and demonstrate how organizations can assess their PQC readiness using the ONEKEY Platform.

To make this topic tangible, we will first introduce the fundamentals of Post-Quantum Cryptography and its relevance for product security, then explain how to identify cryptographic components within firmware, and finally show how ONEKEY helps uncover cryptographic libraries and evaluate potential risks.

You will learn:

  • What Post-Quantum Cryptography is and why it matters: Understand the impact of quantum computing on current cryptographic standards and why organizations must act now.
  • How to assess your PQC readiness: Learn how to gain visibility into the cryptographic components used in your products and identify potential risks.
  • How to identify cryptographic libraries in firmware and software: Discover how hidden dependencies on cryptographic libraries can be uncovered and analyzed.
  • How the ONEKEY Platform supports PQC readiness: See how automated analysis helps detect cryptographic implementations and supports future-proof security strategies.
  • How to take the first steps towards PQC migration: Gain practical guidance on how to prioritize actions and prepare your organization for the transition.

This webinar is designed for professionals working in product security, embedded systems, IoT security, cybersecurity, and compliance, who need to understand and prepare for the impact of Post-Quantum Cryptography.


Don’t miss your chance to gain early visibility into your PQC readiness and learn how to prepare your products for the post-quantum era.

Can’t join live? No problem — register now, and you’ll receive the on-demand recording after the webinar.

Hosted by

  • Team member
    T
    Jen-Chih Lo Sales Manager @ ONEKEY GMBH

    Jen-Chih has years of experience with customers within semi-conductor industry and industrial automation specifically in East Asia. His expertise helps customer understanding how to increase ROI by reducing repetitive monitoring tasks.

ONEKEY

We automate software security & compliance of connected products at scale.

ONEKEY is a specialist for Product Cybersecurity for IoT & OT. Using automatically generated "Digital Twins" and "Software Bill of Materials" of devices, ONEKEY analyzes firmware for security vulnerabilities & compliance violations, without source code, device, or network access.