{"id":177231,"date":"2025-09-29T09:43:07","date_gmt":"2025-09-29T09:43:07","guid":{"rendered":"https:\/\/www.newsbeep.com\/au\/177231\/"},"modified":"2025-09-29T09:43:07","modified_gmt":"2025-09-29T09:43:07","slug":"why-security-leaders-must-prepare-now-for-the-quantum-threat","status":"publish","type":"post","link":"https:\/\/www.newsbeep.com\/au\/177231\/","title":{"rendered":"Why security leaders must prepare now for the quantum threat"},"content":{"rendered":"<p>Many businesses face being exposed to serious cyber threats because quantum computing is set to arrive far more quickly than expected.<\/p>\n<p>The threat quantum computers pose to asymmetric encryption has been known about since 1994 when Peter Shor developed Shor\u2019s algorithm.<\/p>\n<p>But given the immense compute power required, it\u2019s long been seen as a challenge for another day.<\/p>\n<p>Fast forward thirty years, and the age of quantum computing is approaching fast.<\/p>\n<p>With first-movers already actively experimenting, PwC estimates it could be as little as five years before adoption begins to ramp up more broadly.<a href=\"#_ftn1\" id=\"_ftnref1\">[1]<\/a><\/p>\n<p>However, with quantum processing power potentially quadrupling every year, the timeline for quantum rollout could shrink further.<a href=\"#_ftn2\" id=\"_ftnref2\">[2]<\/a><\/p>\n<p>Anton Tkachov, Managing Director and Cybersecurity Transformation Lead at PwC UK, states: \u201cWe once believed the post-quantum era was a generation away. Today, it\u2019s five years off; it may be even closer next year.\u201d<\/p>\n<p>The quantum encryption threat<\/p>\n<p>As quantum computing advances, today\u2019s asymmetric encryption will in time become obsolete and cannot be protected by just continuing to increase the key length.<\/p>\n<p>Since\u00a0cryptography underpins much of today\u2019s digital infrastructure, this shift poses a serious threat.<\/p>\n<p>\u201cCryptography underpins both \u2013 security of data at rest and authentication,\u201d says Tkachov. \u201cIn the post-quantum era, both will be vulnerable.\u201d<\/p>\n<p>It\u2019s not just future breaches that organisations need to worry about.<\/p>\n<p>\u201cEncrypted data stolen today is still safe\u2014for now,\u201d warns Tkachov. \u201cBut once quantum machines arrive, attackers will be able to crack that encryption, exposing sensitive information, intellectual property, and eroding customer trust.\u201d<\/p>\n<p>Data, such as mortgage approvals and medical records still hold huge value to bad actors, even years after it was first collected.<\/p>\n<p>Knowing this, threat actors can stockpile stolen data and plan to unlock it the moment quantum technology catches up.<\/p>\n<p>Barriers to modernising cryptography<\/p>\n<p>In the face of this threat, organisations must start transforming their approach to cryptography.<\/p>\n<p>\u201cWe know cryptography modernisation takes time,\u201d explains Clinton Firth, Partner, Cybersecurity, PwC Middle East. \u201cWhen the Data Encryption Standard (DES) was broken in 1997, it took many businesses nearly a decade to fully transition to the Advanced Encryption Standard (AES). This time, they don\u2019t have such time to spare.\u201d<\/p>\n<p>Organisations face several critical challenges in preparing for the post-quantum era.<\/p>\n<p>For example, recruiting talent is difficult due to the skillset required while implementing quantum-safe technologies. Having to rely on multiple vendors for quantum-ready technologies is another complicating factor.<\/p>\n<p>Building quantum resilience<\/p>\n<p>According to PwC, raising awareness of the quantum threat is the first step towards remediation.<\/p>\n<p>\u201cCISOs need to recognise that this is a real and immediate risk\u2014not a problem for tomorrow. This needs to be clearly understood, elevated to the risk management function, and placed on the board\u2019s radar and the organisation\u2019s risk register,\u201d says Firth.<\/p>\n<p>From there, PwC recommends that organisations take the following actions:<\/p>\n<p>Appoint a quantum resilience officer to lead the post-quantum transformation. This role should drive capability development, engage with regulators, and champion the organisation\u2019s encryption strategy.<\/p>\n<p>Revamp procurement processes to clearly define encryption requirements for all third-party vendors and partners.<\/p>\n<p>Develop a cryptographic inventory to map out the types, volumes, and locations of cryptographic algorithms in use. This baseline is essential for assessing risk and building a strategic transition roadmap.<\/p>\n<p>Analyse historical data loss to evaluate the potential future risk posed by compromised datasets in a post-quantum world.<\/p>\n<p>These immediate priorities will help organisations build a foundation for the post-quantum world, with agility at its core. \u00a0<\/p>\n<p>Tkachov explains: \u201cIn the age of quantum computing, <a href=\"https:\/\/www.pwc.com\/us\/en\/tech-effect\/emerging-tech\/quantum-organizations.html\" target=\"_blank\" rel=\"sponsored nofollow noopener\">enterprises must be ready<\/a> for a landscape where cryptographic algorithms may be broken repeatedly. The goal should be crypto agility\u2014the ability to quickly adapt and transition to new encryption methods as threats evolve and standards emerge.\u201d<\/p>\n<p>To learn more about how organisations can prepare for the post-quantum world, register for PwC\u2019s new webinar <a href=\"https:\/\/global.resources.cio.com\/resources\/why-post-quantum-cryptography-must-be-a-key-security-priority\/\" target=\"_blank\" rel=\"sponsored nofollow noopener\">here<\/a>. <\/p>\n<p>To find out more about Clinton Firth, click <a href=\"https:\/\/www.linkedin.com\/in\/cybermiddleeastclintonfirth\/\" target=\"_blank\" rel=\"sponsored nofollow noopener\">here<\/a>.<\/p>\n<p>To find out more about Anton Tkachov, click <a href=\"https:\/\/www.linkedin.com\/in\/tkachov\/\" target=\"_blank\" rel=\"sponsored nofollow noopener\">here<\/a>. <\/p>\n<p>To learn more visit us <a href=\"https:\/\/www.pwc.com\/us\/en\/services\/consulting\/cybersecurity-risk-regulatory\/library\/quantum-computing-cybersecurity-risk.html\" rel=\"sponsored nofollow noopener\" target=\"_blank\">here<\/a><\/p>\n<p>This is for general information purposes only.<\/p>\n<p>2025 PwC. All rights reserved<\/p>\n<p><a href=\"#_ftnref1\" id=\"_ftn1\">[1]<\/a> PwC, \u201cQuantum computing: is our data still safe?\u201d January 2025 <a href=\"https:\/\/www.pwc.nl\/en\/topics\/blogs\/quantum-computing-is-our-data-still-safe.html\" target=\"_blank\" rel=\"sponsored nofollow noopener\">https:\/\/www.pwc.nl\/en\/topics\/blogs\/quantum-computing-is-our-data-still-safe.html<\/a><\/p>\n<p><a href=\"#_ftnref2\" id=\"_ftn2\">[2]<\/a> Neven\u2019s Law suggests that quantum computers are improving at a \u201cdoubly exponential\u201d rate relative to classical computers. See: \u201c<a href=\"https:\/\/www.quantamagazine.org\/does-nevens-law-describe-quantum-computings-rise-20190618\/#:~:text=Neven&#039;s%20law%20states%20that%20quantum,Google&#039;s%20%E2%80%9CFoxtail%E2%80%9D%20quantum%20processor.\" target=\"_blank\" rel=\"sponsored nofollow noopener\">A New Law to Describe Quantum Computing\u2019s Rise<\/a>?\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"Many businesses face being exposed to serious cyber threats because quantum computing is set to arrive far more&hellip;\n","protected":false},"author":2,"featured_media":177232,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21],"tags":[64,63,257,105],"class_list":{"0":"post-177231","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-computing","8":"tag-au","9":"tag-australia","10":"tag-computing","11":"tag-technology"},"_links":{"self":[{"href":"https:\/\/www.newsbeep.com\/au\/wp-json\/wp\/v2\/posts\/177231","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.newsbeep.com\/au\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.newsbeep.com\/au\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/au\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/au\/wp-json\/wp\/v2\/comments?post=177231"}],"version-history":[{"count":0,"href":"https:\/\/www.newsbeep.com\/au\/wp-json\/wp\/v2\/posts\/177231\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/au\/wp-json\/wp\/v2\/media\/177232"}],"wp:attachment":[{"href":"https:\/\/www.newsbeep.com\/au\/wp-json\/wp\/v2\/media?parent=177231"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.newsbeep.com\/au\/wp-json\/wp\/v2\/categories?post=177231"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.newsbeep.com\/au\/wp-json\/wp\/v2\/tags?post=177231"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}