Round Table Discussion

Decoding the Future: Securing the Quantum Leap in Cybersecurity

 

Join the conversation as we delve into the complexities of navigating the quantum shift.

The world is on the cusp of a technological revolution with the rise of quantum computing. While it holds immense promise for innovation in various fields, it also presents a significant cybersecurity threat. Current encryption standards, like the widely used AES 256, will be vulnerable to attacks by powerful quantum computers, potentially jeopardizing sensitive data and critical infrastructure.

This thought leadership panel delves into the complexities of navigating this quantum shift. We'll explore the concept of post-quantum cryptography and the new algorithms designed to withstand this future threat. Experts will discuss organizations' challenges in taking stock of their cryptographic assets and implementing a smooth migration to post-quantum solutions.

The panel will also address the growing sophistication of state-sponsored cybercrime and their potential access to quantum computing resources. This raises the urgency for proactive measures, as attackers could potentially steal and store encrypted data now, decrypting it later when quantum computers become more powerful.

Furthermore, the discussion will explore the ongoing quest for efficient and low-power consumption encryption algorithms, particularly in the realm of symmetric block encryption. Balancing security with resource optimization will be crucial as we design for a future powered by the Internet of Things (IoT) and edge computing.

This panel aims to equip organizations with the knowledge and strategies needed to stay ahead of the curve and ensure a secure digital future by bringing together leading voices in cryptography, cybersecurity, and quantum computing.


Audience Takeaways:

Understanding the Quantum Threat:

  • The critical threat quantum computing poses to current encryption standards like AES 256.
  • The urgency of taking proactive measures to safeguard sensitive data before attackers exploit this vulnerability.

Post-Quantum Solutions:

  • The concept of post-quantum cryptography and its role in securing data in the quantum age.
  • The challenges organizations face in migrating to post-quantum solutions, including asset inventory and implementation complexities.


The Evolving Threat Landscape:

  • The growing sophistication of state-sponsored cybercrime and their potential access to quantum computing resources.
  • The importance of staying ahead of the curve by adopting robust cybersecurity practices.

Balancing Security and Efficiency:

  • The need for efficient and low-power consumption encryption algorithms, especially for resource-constrained devices in the IoT.
  • Understanding the ongoing research and development in this area.

Global Impact and Broader Considerations:

  • The global implications of quantum computing on cybersecurity and the need for international collaboration.
  • The social and ethical considerations surrounding the development and use of quantum computing, including potential privacy concerns.

Date

10 July 2024

Time

9:00 AM PST

12:00 PM EST

Sessions

Round Table

Topics

Cyber Security

Share this event

4102573_applications_facebook_media_social_icon (png)
4102586_applications_linkedin_social_social media_icon (png)
email-sharing-icon (png)