

Mar 7, 2024 00:00:00
Days43
Hours09
Minutes33
Seconds41
Die Ära des Quantencomputings stellt bewährte Sicherheitsstandards vor neue Herausforderungen. Wie kann Ihr Unternehmen seine Daten schon heute zukunftssicher machen?
Accenture Security, Thales und Keyfactor laden Sie herzlich ein, sich mit führenden Expertinnen und Experten über aktuelle Entwicklungen, Best Practices und konkrete Strategien rund um Quantensicherheit auszutauschen.
Die Veranstaltungen richten sich speziell an Verantwortliche in Unternehmen, die sich mit der Quantensicherheit und Krypto-Strategie befassen.
Datum: 26. Februar 2026
Veranstaltungsort: Accenture Innovation Center, Balanstraße 73/Gebäude 17, 81541 München
Bitte registrieren Sie sich, da die Anzahl der Plätze begrenzt ist.
Mit dem Ausfüllen des untenstehenden Formulars stimmen Sie zu, dass Ihre Daten von Thales, Accenture und Keyfactor im Zusammenhang mit der Organisation sowie für eventuelle Rückfragen und Informationen rund um die Veranstaltung verwendet werden.

Thales is a Gold Sponsor at MoneyLive Summit 2024. During the summit, we'll share advanced identity technology, market trends, customer success stories, and showcase how Thales Identity can help banks and fintech organizations protect the identities of every individual and redefine their access.
Join us at Stage 4 (Technology Forum - Resilience and Security) on 6 March at 12.10 PM where Thales subject matter expert will talk about how you can accelerate your business in achieving greater digital transformation.
Listen to Sebastien Cano, SVP, Thales Cloud Protection & Licensing, as he shares exclusive insights into the added benefits Thales can offer you.
BOOK A MEETINGListen to Sebastien Cano, SVP, Thales Cloud Protection & Licensing, as he shares exclusive insights into the added benefits Thales can offer you.
BOOK A MEETINGListen to Sebastien Cano, SVP, Thales Cloud Protection & Licensing, as he shares exclusive insights into the added benefits Thales can offer you.
BOOK A MEETINGListen to Sebastien Cano, SVP, Thales Cloud Protection & Licensing, as he shares exclusive insights into the added benefits Thales can offer you.
BOOK A MEETING| Time | Topic |
|---|---|
| 14:00 Uhr | Registrierung |
| 14:30 |
Vom Risiko zur Roadmap – Notwendigkeit und Transformationspfad zur Erreichung der Quantensicherheit
Accenture bietet einen fundierten Einblick in die Risiken, die durch Quantencomputer entstehen, beleuchtet regulatorische Anforderungen und erläutert die Post-Quantum-Migration. Es wird dargelegt, warum sich Organisationen bereits heute mit dem Umstieg auseinandersetzen sollten. Anhand von Kundenprojekten werden die einzelnen Schritte der Transition sowie Erfolgsfaktoren für eine gelungene Umsetzung aufgezeigt. Im Mittelpunkt stehen dabei Themen wie Quantum-Risikoanalysen, die Inventarisierung kryptografischer Objekte sowie Herausforderungen und Lösungsansätze bei der Migration.
Sprecher: Dr. Denise Demirel, Accenture |
| 15:10 |
HSMs und Key Manager – Die sicheren Grundpfeiler Ihrer PQC Readiness
Thales vertieft die technische Perspektive und zeigt, warum HSMs für die sichere Generierung, Speicherung und Nutzung von Schlüsseln in der Post Quanten Ära unverzichtbar sind und wie Krypto Agilität erreicht wird. Anhand typischer Praxisbeispiele mit Thales Luna und payShield HSMs wird die Umsetzung dargestellt. Ergänzend beleuchten wir, welche Rolle Key Management Systeme im PQC Zeitalter spielen und welchen Weg der Thales CipherTrust Manager als zentrales Schlüssel- und Policy-Management beschreitet. Sprecher: Peter Holzer, Thales |
| 15:50 | Kaffeepause |
| 16:20 |
Krypto Inventory und PKI Modernisierung – Sichtbarkeit schaffen, Risiken senken, Migration steuern
Keyfactor zeigt, wie seine erweiterten Krypto-Inventory-Funktionen automatisch kryptografische Assets in lokalen Rechenzentren, in der Cloud und am Edge finden, einordnen und auswerten.
Auf Grundlage dieser umfassenden Sichtbarkeit modernisiert Keyfactor die PKI und den gesamten Zertifikats-Lebenszyklus. Außerdem automatisiert die Plattform den Wechsel zu neuen Algorithmen und die Einhaltung von Richtlinien, integriert sich reibungslos mit HSMs und Schlüsselmanagern und unterstützt Unternehmen dabei, Risiken sinnvoll zu priorisieren und den Umstieg auf Post-Quantum-Kryptografie kontrolliert zu planen – selbst in großen und komplexen IT-Umgebungen. Sprecher: Michael Evola und Alexander Nicklas, Keyfactor
|
| 17:00 | Podiumsdiskussion - Von der Vision zur Umsetzung – Ihre PQC Roadmap in der Praxis Vertreter von Accenture, Thales und Keyfactor bringen ihre Sicht aus Business, Technik und Betrieb zusammen, um ein vollständiges Bild von Post-Quantum-Kryptografie (PQC) zu geben. Im Gespräch geht es darum, wann der richtige Zeitpunkt für den Umstieg ist – im Zusammenhang mit Standards wie NIST, ETSI und BSI – und welche hybriden Übergangsstrategien sinnvoll sind |
| 17:30 | Im Anschluss besteht die Gelegenheit zur Diskussion und Networking bei einem Apéro und Snacks |
The Queen Elizabeth II Centre (QEII Centre) is a conference facility located in the City of Westminster, London, close to the Houses of Parliament, Westminster Abbey, Central Hall Westminster and Parliament Square.
Address: Broad Sanctuary, London SW1P 3EE, United Kingdom
2024 holds promise and a lot of action, and we’re excited to show you what we have in store. Here’s to an exciting journey ahead, as we continue to build frictionless, secure and trusted digital journeys. Together, we shape a future we can all trust.
We protect modern and hybrid applications against advanced and multi-vector attacks regardless of where they are running.
We redefine how sensitive data is secured from knowing where it is, who has access to it, and when abuse occurs in real-time, to protecting it in all environments whether at rest, in motion, or in use.
Seamless, secure and trusted access online for customers, employees and partners.
We protect modern and hybrid applications against advanced and multi-vector attacks regardless of where they are running.
BOOK A MEETINGWe redefine how sensitive data is secured from knowing where it is, who has access to it, and when abuse occurs in real-time, to protecting it in all environments whether at rest, in motion, or in use.
BOOK A MEETINGSeamless, secure and trusted access online for customers, employees and partners.
BOOK A MEETINGWe protect modern and hybrid applications against advanced and multi-vector attacks regardless of where they are running.
BOOK A MEETINGWe redefine how sensitive data is secured from knowing where it is, who has access to it, and when abuse occurs in real-time, to protecting it in all environments whether at rest, in motion, or in use.
BOOK A MEETINGSeamless, secure and trusted access online for customers, employees and partners.
BOOK A MEETINGWe protect modern and hybrid applications against advanced and multi-vector attacks regardless of where they are running.
BOOK A MEETINGWe redefine how sensitive data is secured from knowing where it is, who has access to it, and when abuse occurs in real-time, to protecting it in all environments whether at rest, in motion, or in use.
BOOK A MEETINGSeamless, secure and trusted access online for customers, employees and partners.
BOOK A MEETINGWe protect modern and hybrid applications against advanced and multi-vector attacks regardless of where they are running.
BOOK A MEETINGWe redefine how sensitive data is secured from knowing where it is, who has access to it, and when abuse occurs in real-time, to protecting it in all environments whether at rest, in motion, or in use.
BOOK A MEETINGSeamless, secure and trusted access online for customers, employees and partners.
BOOK A MEETINGWe protect modern and hybrid applications against advanced and multi-vector attacks regardless of where they are running.
BOOK A MEETINGWe redefine how sensitive data is secured from knowing where it is, who has access to it, and when abuse occurs in real-time, to protecting it in all environments whether at rest, in motion, or in use.
BOOK A MEETINGSeamless, secure and trusted access online for customers, employees and partners.
BOOK A MEETINGWe redefine how sensitive data is secured from knowing where it is, who has access to it, and when abuse occurs in real-time, to protecting it in all environments whether at rest, in motion, or in use.
BOOK A MEETINGEnsure online users are who they claim to be, and protect against identity fraud.
BOOK A MEETINGSeamless, secure and trusted access online for customers, employees and partners.
BOOK A MEETINGWe redefine how sensitive data is secured from knowing where it is, who has access to it, and when abuse occurs in real-time, to protecting it in all environments whether at rest, in motion, or in use.
BOOK A MEETINGWe redefine how sensitive data is secured from knowing where it is, who has access to it, and when abuse occurs in real-time, to protecting it in all environments whether at rest, in motion, or in use.
BOOK A MEETINGEnsure online users are who they claim to be, and protect against identity fraud.
BOOK A MEETINGSeamless, secure and trusted access online for customers, employees and partners.
BOOK A MEETINGWe redefine how sensitive data is secured from knowing where it is, who has access to it, and when abuse occurs in real-time, to protecting it in all environments whether at rest, in motion, or in use.
BOOK A MEETINGWe redefine how sensitive data is secured from knowing where it is, who has access to it, and when abuse occurs in real-time, to protecting it in all environments whether at rest, in motion, or in use.
BOOK A MEETINGWe redefine how sensitive data is secured from knowing where it is, who has access to it, and when abuse occurs in real-time, to protecting it in all environments whether at rest, in motion, or in use.
BOOK A MEETINGWe redefine how sensitive data is secured from knowing where it is, who has access to it, and when abuse occurs in real-time, to protecting it in all environments whether at rest, in motion, or in use.
BOOK A MEETINGWe redefine how sensitive data is secured from knowing where it is, who has access to it, and when abuse occurs in real-time, to protecting it in all environments whether at rest, in motion, or in use.
BOOK A MEETINGWe redefine how sensitive data is secured from knowing where it is, who has access to it, and when abuse occurs in real-time, to protecting it in all environments whether at rest, in motion, or in use.
BOOK A MEETINGWe redefine how sensitive data is secured from knowing where it is, who has access to it, and when abuse occurs in real-time, to protecting it in all environments whether at rest, in motion, or in use.
BOOK A MEETINGWe redefine how sensitive data is secured from knowing where it is, who has access to it, and when abuse occurs in real-time, to protecting it in all environments whether at rest, in motion, or in use.
BOOK A MEETINGWe redefine how sensitive data is secured from knowing where it is, who has access to it, and when abuse occurs in real-time, to protecting it in all environments whether at rest, in motion, or in use.
BOOK A MEETINGWe redefine how sensitive data is secured from knowing where it is, who has access to it, and when abuse occurs in real-time, to protecting it in all environments whether at rest, in motion, or in use.
BOOK A MEETING
People rely on Thales to manage their digital identities
Customers worldwide are being protected by Thales
Engineers are innovating and enhancing our product offerings
A good and solid solution in constant evolution: We’ve been using the Thales OneWelcome Identity Platform to offer 1.3 million customers a simple and secure connection to our websites and mobile application since December 2020."
—Our customer at Gartner®
This year was a testament to our commitment to innovation, resilience and redefining what’s possible. Not only did we expand our product offerings to reach a truly global market, we also continued to explore and embrace the challenge of simplifying digital complexities and streamlining user journeys.
Explore the exciting new technologies that enable a seamless convergence of today's and tomorrow’s digital and physical identities. Discover how the highly customizable OneWelcome CIAM solutions accelerate your
organization into the identity-first era.
Join our discussion led by Marco Venuti, Thales IAM Business Acceleration Director on March 5th on “The Best Practices of B2B IAM to Streamline 3rd Party Interactions.” Together we will explore the confluence of real-world scenarios and current market solutions in B2B-IAM.
Learn from actionable examples demonstrating how access and delegation management can be smoothly implemented for third-party users.
Schedule a one-on-one with one of our identity experts at the summit to gain insights into the Thales OneWelcome Identity Platform and learn how it can support your identity journey.
Our consolidated offering covers the entire spectrum of your data security needs, including:
Our consolidated offering covers the entire spectrum of your data security needs, including:
Our consolidated offering covers the entire spectrum of your data security needs, including:
Our consolidated offering covers the entire spectrum of your data security needs, including:

Quote, Lorem ipsum dolor sit amet, consectetur adipiscing elit. Vestibulum sed lectus et nunc."
—Full Name and Job Title

Experience quick deployment in just a few weeks. Our purpose-built, cloud-based B2B IAM solution caters to all your B2B user groups, delivering unmatched security, scalability, and ease of use for seamless collaboration across your B2B ecosystem
The only true B2B IAM solution to streamline collaboration and enhance security
Access the InsightsEstablish seamless collaboration and a scalable B2B ecosystem
Get the ebookEnd-to-end delegated user management for any B2B use case
Get the solution briefDiscover a new approach to addressing modern B2B and B2B2C IAM challenges
Watch on-demandLogrando privacidad y protección de propiedad intelectual mientras se acelera la innovación.
Access the InsightsAborda las brechas en la seguridad de dispositivos médicos, reduce riesgos y crea una ventaja competitiva usando Módulos de Seguridad de Hardware (HSM).
Get the ebookDescubre cómo las empresas biotecnológicas pueden proteger los dispositivos IoMT y encontrar el equilibrio perfecto entre agilidad, resiliencia y seguridad.
Get the solution briefCómo asegurar la agilidad criptográfica en la era post-cuántica.
Watch on-demand