Watch this video on YouTube
What is the main reason for deploying a public key infrastructure (PKI) when implementing an information security program?