Robert Field https://www.linkedin.com/in/robertmfield/
Guests:
J. Nathaniel Ader https://www.linkedin.com/in/nathanielader/
Greg Bellotti https://www.linkedin.com/in/gregorybellotti/
Sara Ricci https://www.linkedin.com/in/ricci-sara/
[00:00] Intro
[01:10] Quantum Computing and Immediate Cybersecurity Risks
[05:09] Acceleration of Threats and Regulatory Pressures
[08:12] Data at Risk: Whatโs Vulnerable and Why
[14:26] Communicating Quantum Risk and Board Engagement
[16:01] Practical Steps for Post-Quantum Readiness
[20:42] Accountability: Vendor Reliance vs Organizational Responsibility
[24:45] Solutions for Small and Mid-Sized Organizations
[33:44] Quantum Readiness: Insurance, Compliance, and Board Reporting
[39:28] The Role of AI in Quantum Risk and Organizational Priorities
[45:52] Key Takeaways and Communicating with Executives
This event focused on the growing urgency and complexity of cybersecurity in the face of quantum computing. Leaders joined the discussion to address why post-quantum cybersecurity is a near-term, enterprise-wide risk, and to offer practical guidance for organizations grappling with cloud, AI, and quantum priorities. Attendees saw examples of real-world vulnerabilities and heard recommendations for strategic and operational readiness.
See how Qtonic Quantum helps enterprises find cryptographic risk before attackers do, and claim your free Cryptographic Risk Snapshot here: https://qtonicquantum.com/lde
๐ ๐๐ฒ๐ ๐๐ป๐๐ถ๐ด๐ต๐๐
โณ ๐๐ฐ๐ฐ๐ฒ๐น๐ฒ๐ฟ๐ฎ๐๐ฒ๐ฑ ๐ค๐๐ฎ๐ป๐๐๐บ ๐ง๐ต๐ฟ๐ฒ๐ฎ๐๐: Quantum computingโs rapid progress has dramatically compressed timelines for when traditional encryption could be broken. Industry deadlines for quantum readiness, once seen as distant, are now being brought forward, raising the stakes for every sector.
๐ ๐๐ป๐๐ฒ๐ป๐๐ผ๐ฟ๐ ๐ฎ๐ป๐ฑ ๐๐๐ฑ๐ถ๐ ๐ฎ๐ฟ๐ฒ ๐๐ฟ๐ถ๐๐ถ๐ฐ๐ฎ๐น: Success depends on beginning with a detailed audit of cryptographic assets. Many large enterprises discovered significant gaps in what they actually know about their own environments, with nearly a third of cryptographic elements unaccounted for, increasing operational risk.
๐ผ ๐ฉ๐ฒ๐ป๐ฑ๐ผ๐ฟ ๐ฎ๐ป๐ฑ ๐ฆ๐๐ฝ๐ฝ๐น๐ ๐๐ต๐ฎ๐ถ๐ป Accountability: Reliance on vendors alone is insufficient. Organizations remain accountable for cryptographic hygiene throughout their environment, including third-party dependencies and custom applications.
โฉ ๐ง๐ต๐ฒ ๐๐ฎ๐๐ฎ โ๐๐ฎ๐ฟ๐๐ฒ๐๐ ๐ก๐ผ๐, ๐๐ฒ๐ฐ๐ฟ๐๐ฝ๐ ๐๐ฎ๐๐ฒ๐ฟโ ๐ฅ๐ถ๐๐ธ: Adversaries are storing encrypted data today with plans to decrypt it as soon as quantum capability catches up. Sensitive long-lived data, such as healthcare, financial, or research files, is especially exposed.
โ๏ธ ๐ค๐๐ฎ๐ป๐๐๐บ ๐ฅ๐ฒ๐ฎ๐ฑ๐ถ๐ป๐ฒ๐๐ ๐ฎ๐ ๐ฎ ๐๐ผ๐๐ฟ๐ป๐ฒ๐: Migration toward quantum-safe standards is a multi-year journey requiring strategic prioritization, significant budget, and coordinated stakeholder action. Waiting not only increases risk but also makes eventual mitigation more costly.
๐ ๐๐๐ป ๐๐ฎ๐ฐ๐: ๐บ
A professional sports team commissioned a quantum risk assessment, only to discover their player biometric dataโtransferred over fiberโwas at risk from โharvest now, decrypt laterโ vulnerabilities. This demonstrated that quantum threat exposure spans unexpected areas beyond traditional sectors.
๐ก๐๐ ๐ฝ๐ฒ๐ฟ๐ ๐๐ฑ๐๐ถ๐ฐ๐ฒ
โณ Nate underlined the reality that adversaries were already collecting encrypted data, so organizations had to act now rather than wait, or face higher costs and risks later. Nate explained that boards and executives needed to understand the urgency, acknowledge the regulator-set deadlines, and proactively control their organization's preparedness.
๐ Sara emphasized that organizations needed to urgently assess their cryptographic landscape, begin transitioning away from vulnerable algorithms, and educate executive leaders using clear, non-technical language about quantum risks. Sara also reminded listeners that data with long lifespans was already at risk, so they should act immediately to mitigate future exposure.
๐ ๏ธ Greg encouraged a focus on core fundamentals by inventorying assets, understanding core applications, and prioritizing risk mitigation efforts based on business impact. Greg advised that risk conversations with the board should be tailored to resonate with their concerns and that clear, relatable communication was essential.
๐ค Rob reinforced the value of the discussion as a catalyst for leaders to start addressing quantum cybersecurity, stressing it was time to move beyond awareness to real action. Robert also highlighted the importance of tailored leadership and strategic prioritization to navigate the challenges of quantum risk management.
๐ ๐ช๐ฎ๐๐ฐ๐ต ๐๐ต๐ฒ ๐ฅ๐ฒ๐ฝ๐น๐ฎ๐!
View the replay and gain actionable strategies for cryptographic migration, learn how to communicate complex risk to your board, and hear real-world examples that will clarify why quantum readiness is a business, not just technical, responsibility.
๐๐ฎ๐๐ฒ ๐บ๐ถ๐๐๐ถ๐ป๐ด ๐๐ต๐ฒ ๐น๐ถ๐๐ฒ ๐๐ต๐ผ๐?
Subscribe to the LinkedIn Institute Live Briefing newsletter.
https://idt.fyi/LiveBriefing

