Zero to PQC: Step Zero
Cryptographic Inventory Table Top Exercise
Cryptographic Inventory Table Top Exercise: Pre‑inventory consulting workshop for Security, Risk, and IT.
Delivery: Virtual (included). Onsite available as an add‑on (additional fees apply)
Duration: 1 full day or 2 half‑day sessions
QryptoCyber understands that conducting a cryptographic inventory is daunting and overwhelming. Every enterprise is unique.
This table top exercise gives your team the opportunity to collaborate with our experts on your specific needs and requirements so you can develop a comprehensive plan for how to conduct your inventory.
We are here to help with best practices and expert knowledge. Even experienced security professionals find enterprise crypto inventory challenging.
Our team brings the depth and breadth of hard‑won experience so you know what to expect before you begin.
You will leave this workshop with a clear plan
Understanding where cryptography is found and what to expect
Decision Framing
Decision framing for inventory and the path that follows. During the workshop we will help your team think through the decisions that shape how the inventory will be executed and how findings will be handled afterward. These are discussion topics, not a roadmap.
- Will you complete the inventory internally or with external services
- If contracting services, which service vendors are available to you
- What PQC tools and approaches are currently available to assist after the inventory is complete
Finally, we recommend gathering the right teams and committees so everyone understands how inventories will work and the security requirements that apply to each process.
CISO and deputies
Security architecture
PKI and IAM owners
Network and cloud engineering
Database and storage
Application security
DevOps and platform
Compliance
Risk
Legal
Who Should Join This Table Top Exercise
The Cryptographic Inventory Table Top Exercise is designed for a cross-functional group that includes security, risk, IT operations, cloud and network engineering, application security, PKI and IAM owners, and representatives from compliance and legal. You do not need the entire organization present. The right mix is a small, empowered team that understands where cryptography lives and how work gets done.
Participation is flexible. We can segment the exercise into focused modules that fit schedules and responsibilities. For example, network and cloud teams can join the external and internal discovery modules, application and DevOps teams can join the code and pipelines module, and PKI and IAM owners can join the identities and certificates module.
Attendees gain shared vocabulary, practical methods, and a clear view of roles and decision rights. By working through real scenarios together, teams build trust and alignment on how evidence will be collected, how quality will be measured, and how decisions will be documented. The result is a stronger working relationship across Security, Risk, and IT.
Everyone who joins leaves with practical experience and concrete planning artifacts. Attendees learn how to select pillar-specific techniques, define coverage and sampling, configure tools and APIs, and use correlation charts and evidence templates. Even if only a subset attends, the group will be equipped to brief others and lead the inventory with confidence.
Schedule your table top exercise today
Prepare your cryptographic inventory with clarity and confidence. Contact QryptoCyber to book your virtual workshop and receive the planning guidance your team needs to begin.
Included
Prepare your cryptographic inventory with confidence
- Virtual facilitation and working sessions
- Planning artifacts described above: methods, tool configuration guidance, API usage guidance, sample correlation charts
- Up to 20 participants
Not Included
Additional Options Available for Purchase
- Onsite delivery (available as an add‑on; additional fees apply)
- Partial scanning, code review, or asset discovery
- Partial CBOM creation
- Post‑inventory remediation roadmap