Most organizations don’t know what cryptographic assets they have, where they’re being used, or how strong (or weak) they are ...