Topics:

1. Introduction

2. CKMS Framework Basics

3. Goals

4. Security Policies

5. Roles and Responsibilities

6. Cryptographic Keys and Metadata

7. Interoperability and Transitioning

8. Security Controls
9. Testing and System Assurances

10. Disaster Recovery

11. Security Assessment

12. Technological Challenges

Each topic is covered in a two-hour meeting for a total of 24 hours.