Skip to main content
Zero to PQC: Step Zero

Cryptographic Inventory Table Top Exercise

Cryptographic Inventory Table Top Exercise: Pre‑inventory consulting workshop for Security, Risk, and IT.
Delivery: Virtual (included). Onsite available as an add‑on (additional fees apply)
Duration: 1 full day or 2 half‑day sessions

Cryptography Information Gathering Strategy

You will leave this workshop with a clear plan

Understanding where cryptography is found and what to expect

Collaborative problem-solving

Work through environment complexities while aligning stakeholders and terminology.

Risk awareness

Establish baseline crypto risk drivers, define mitigation during inventory execution, and identify quick-win actions.

Tool configuration & APIs

Provide recommendations, tool and API configurations, processes, and example queries and checklists.

Process alignment

Integrate with change workflows to align processes and detection from day one and set clear evidence steps.

Methods for gathering information

Choose pillar-specific techniques and cloud, and define coverage, sampling, and quality gates.

Sample correlation charts

Map certificates, keys, and services to owners using sample correlation charts, and provide evidence templates.

Decision Framing

Decision framing for inventory and the path that follows. During the workshop we will help your team think through the decisions that shape how the inventory will be executed and how findings will be handled afterward. These are discussion topics, not a roadmap.

  • Will you complete the inventory internally or with external services
  • If contracting services, which service vendors are available to you
  • What PQC tools and approaches are currently available to assist after the inventory is complete

Finally, we recommend gathering the right teams and committees so everyone understands how inventories will work and the security requirements that apply to each process.

CISO and deputies
Security architecture
PKI and IAM owners
Network and cloud engineering
Database and storage
Application security
DevOps and platform
Compliance
Risk
Legal

Who Should Join This Table Top Exercise

The Cryptographic Inventory Table Top Exercise is designed for a cross-functional group that includes security, risk, IT operations, cloud and network engineering, application security, PKI and IAM owners, and representatives from compliance and legal. You do not need the entire organization present. The right mix is a small, empowered team that understands where cryptography lives and how work gets done.

Participation is flexible. We can segment the exercise into focused modules that fit schedules and responsibilities. For example, network and cloud teams can join the external and internal discovery modules, application and DevOps teams can join the code and pipelines module, and PKI and IAM owners can join the identities and certificates module.

Attendees gain shared vocabulary, practical methods, and a clear view of roles and decision rights. By working through real scenarios together, teams build trust and alignment on how evidence will be collected, how quality will be measured, and how decisions will be documented. The result is a stronger working relationship across Security, Risk, and IT.

Everyone who joins leaves with practical experience and concrete planning artifacts. Attendees learn how to select pillar-specific techniques, define coverage and sampling, configure tools and APIs, and use correlation charts and evidence templates. Even if only a subset attends, the group will be equipped to brief others and lead the inventory with confidence.

Schedule your table top exercise today

Prepare your cryptographic inventory with clarity and confidence. Contact QryptoCyber to book your virtual workshop and receive the planning guidance your team needs to begin.

Included

Prepare your cryptographic inventory with confidence

  • Virtual facilitation and working sessions
  • Planning artifacts described above: methods, tool configuration guidance, API usage guidance, sample correlation charts
  • Up to 20 participants
Not Included

Additional Options Available for Purchase

  • Onsite delivery (available as an add‑on; additional fees apply)
  • Partial scanning, code review, or asset discovery
  • Partial CBOM creation
  • Post‑inventory remediation roadmap