Workshop Description
Addresses the quantum threat to supply chain cryptography, including encrypted communications between suppliers, ERP-to-ERP data exchanges, and digital twin integrity. Covers post-quantum cryptography migration priorities specific to manufacturing and industrial OT environments.
Supply chain cryptographic failure is not a single-point risk. When an ERP gateway's TLS session uses RSA-2048 key exchange, every purchase order, invoice, and design file transiting that connection is exposed to harvest-now-decrypt-later capture. When a digital twin synchronises component state over OPC UA with ECDSA P-256 certificates, the integrity of that twin degrades the moment those certificates become quantum-vulnerable. NIS2 Article 21 now explicitly requires supply chain security measures, and the EU Cyber Resilience Act extends product security obligations across the chain. Participants map their own supplier integration cryptography, classify partners by PQC readiness tier, and leave with a phased migration plan covering ERP gateways, SBOM signing infrastructure, and contractual language for embedding cryptographic requirements into supplier agreements.
What participants cover
- ERP-to-ERP cryptographic exposure mapping across SAP RFC, Oracle B2B Gateway, and EDI/AS2 integrations
- Digital twin integrity assessment: OPC UA and MQTT broker certificate chains spanning supplier boundaries
- SBOM and CBOM code-signing migration from RSA/ECDSA to ML-DSA-65 and SLH-DSA
- NIS2 Article 21 and EU Cyber Resilience Act supply chain due diligence obligations
- Hybrid TLS 1.3 deployment planning for B2B gateways using ML-KEM-768 + X25519
- Supplier readiness tiering: classifying partners by cryptographic maturity and negotiating migration timelines