
Sign up to save your podcasts
Or


Nation-states are already harvesting your encrypted data, betting they'll crack it when quantum computers mature. It's happening now.
In CXOTalk episode 904, Anand Oswal, Executive Vice President of Network Security at Palo Alto Networks, explains what business leaders need to understand about quantum security and how to address it. The impact of quantum computing on cybersecurity will be huge.Key timelines discussed:-- Cryptographically relevant quantum computers expected by end of this decade-- RSA and ECC algorithms deprecated by 2030, disallowed by 2035-- Enterprise cryptographic migrations typically take 5-10 yearsđ· Show notes: https://www.cxotalk.com/episode/cybersecurity-and-quantum-computing-a-readiness-guideđ· Newsletter: www.cxotalk.com/subscribeđ· LinkedIn: www.linkedin.com/company/cxotalkđ· Twitter: twitter.com/cxotalkChapters:00:00 Introduction00:36 What is quantum computing?01:17 The core security threat02:29 Customer awareness of quantum risk02:57 Timeline: When will quantum arrive?03:53 Implications for security leaders05:35 Compliance timelines06:24 Business risk explained07:52 How encryption works today09:22 Harvest now, decrypt later attacks09:57 How the industry is preparing12:27 Pillar 1: Discovery and visibility14:26 Pillar 2: Protect16:29 Pillar 3: Accelerate17:40 The role of AI18:10 Talent and skills19:31 Practical steps for quantum readiness20:43 What leaders should do now
By Michael Krigsman4.8
3737 ratings
Nation-states are already harvesting your encrypted data, betting they'll crack it when quantum computers mature. It's happening now.
In CXOTalk episode 904, Anand Oswal, Executive Vice President of Network Security at Palo Alto Networks, explains what business leaders need to understand about quantum security and how to address it. The impact of quantum computing on cybersecurity will be huge.Key timelines discussed:-- Cryptographically relevant quantum computers expected by end of this decade-- RSA and ECC algorithms deprecated by 2030, disallowed by 2035-- Enterprise cryptographic migrations typically take 5-10 yearsđ· Show notes: https://www.cxotalk.com/episode/cybersecurity-and-quantum-computing-a-readiness-guideđ· Newsletter: www.cxotalk.com/subscribeđ· LinkedIn: www.linkedin.com/company/cxotalkđ· Twitter: twitter.com/cxotalkChapters:00:00 Introduction00:36 What is quantum computing?01:17 The core security threat02:29 Customer awareness of quantum risk02:57 Timeline: When will quantum arrive?03:53 Implications for security leaders05:35 Compliance timelines06:24 Business risk explained07:52 How encryption works today09:22 Harvest now, decrypt later attacks09:57 How the industry is preparing12:27 Pillar 1: Discovery and visibility14:26 Pillar 2: Protect16:29 Pillar 3: Accelerate17:40 The role of AI18:10 Talent and skills19:31 Practical steps for quantum readiness20:43 What leaders should do now

1,287 Listeners

1,090 Listeners

624 Listeners

171 Listeners

109 Listeners

347 Listeners

200 Listeners

196 Listeners

507 Listeners

643 Listeners

33 Listeners

146 Listeners

21 Listeners

41 Listeners

23 Listeners