
Sign up to save your podcasts
Or


Nation-states are already harvesting your encrypted data, betting they'll crack it when quantum computers mature. It's happening now.
In CXOTalk episode 904, Anand Oswal, Executive Vice President of Network Security at Palo Alto Networks, explains what business leaders need to understand about quantum security and how to address it. The impact of quantum computing on cybersecurity will be huge.
Key timelines discussed:
-- Cryptographically relevant quantum computers expected by end of this decade
-- RSA and ECC algorithms deprecated by 2030, disallowed by 2035
-- Enterprise cryptographic migrations typically take 5-10 years
đ· Show notes: https://www.cxotalk.com/episode/cybersecurity-and-quantum-computing-a-readiness-guide
đ· Newsletter: www.cxotalk.com/subscribe
đ· LinkedIn: www.linkedin.com/company/cxotalkđ· Twitter: twitter.com/cxotalk
Chapters:
00:00 Introduction
00:36 What is quantum computing?
01:17 The core security threat
02:29 Customer awareness of quantum risk
02:57 Timeline: When will quantum arrive?
03:53 Implications for security leaders
05:35 Compliance timelines
06:24 Business risk explained
07:52 How encryption works today
09:22 Harvest now, decrypt later attacks
09:57 How the industry is preparing
12:27 Pillar 1: Discovery and visibility
14:26 Pillar 2: Protect
16:29 Pillar 3: Accelerate
17:40 The role of AI18:10 Talent and skills
19:31 Practical steps for quantum readiness
20:43 What leaders should do now
By Michael Krigsman4.8
3737 ratings
Nation-states are already harvesting your encrypted data, betting they'll crack it when quantum computers mature. It's happening now.
In CXOTalk episode 904, Anand Oswal, Executive Vice President of Network Security at Palo Alto Networks, explains what business leaders need to understand about quantum security and how to address it. The impact of quantum computing on cybersecurity will be huge.
Key timelines discussed:
-- Cryptographically relevant quantum computers expected by end of this decade
-- RSA and ECC algorithms deprecated by 2030, disallowed by 2035
-- Enterprise cryptographic migrations typically take 5-10 years
đ· Show notes: https://www.cxotalk.com/episode/cybersecurity-and-quantum-computing-a-readiness-guide
đ· Newsletter: www.cxotalk.com/subscribe
đ· LinkedIn: www.linkedin.com/company/cxotalkđ· Twitter: twitter.com/cxotalk
Chapters:
00:00 Introduction
00:36 What is quantum computing?
01:17 The core security threat
02:29 Customer awareness of quantum risk
02:57 Timeline: When will quantum arrive?
03:53 Implications for security leaders
05:35 Compliance timelines
06:24 Business risk explained
07:52 How encryption works today
09:22 Harvest now, decrypt later attacks
09:57 How the industry is preparing
12:27 Pillar 1: Discovery and visibility
14:26 Pillar 2: Protect
16:29 Pillar 3: Accelerate
17:40 The role of AI18:10 Talent and skills
19:31 Practical steps for quantum readiness
20:43 What leaders should do now

1,296 Listeners

1,105 Listeners

626 Listeners

166 Listeners

110 Listeners

343 Listeners

212 Listeners

193 Listeners

512 Listeners

688 Listeners

34 Listeners

149 Listeners

21 Listeners

39 Listeners

21 Listeners