This complimentary webcast is designed for banking security leaders who need a clear, no‑nonsense understanding of the quantum threat – and what to do about it now. The session avoids generic “PQC 101” and goes straight to what makes banking different: institutional identity and long‑lived evidence are the real blast radius.
In a bank, cryptography isn’t just protecting data in transit – it is the foundation of trust at scale: CA hierarchies, enterprise PKI, service‑to‑service mTLS, customer and workforce authentication, signed tokens (e.g., OAuth/JWT ecosystems), document and transaction signing, code‑signing in CI/CD, and the regulated archives that prove what happened, when, and under which authorization. The uncomfortable banking‑specific reality is that “confidentiality later” is only half the story: if signatures and PKI trust anchors become forgeable in the future, the bank’s ability to prove integrity, provenance, and non‑repudiation comes under pressure.
This is also why the industry drivers are accelerating. The G7 Cyber Expert Group released a roadmap specifically to coordinate the transition to post‑quantum cryptography in the financial sector, explicitly positioning PQC as a systemic resilience issue (not an isolated technical upgrade).  FS‑ISAC has likewise urged global coordination and milestones for financial services migration, framing the transition as an interdependency problem that can’t be solved bank‑by‑bank in isolation. 
On the regulatory side, the EU’s DORA technical standards don’t mention “PQC” by name – but they effectively force the behavior you need for it: a documented encryption/cryptographic controls policy, provisions to update cryptographic technology based on developments in cryptanalysis, and (critically for banks) stronger discipline around certificate and key lifecycle management, including maintaining a certificate register for critical systems. And while NIS2 raises governance expectations for “banking” as a highly critical sector, many banks will experience DORA as the sharper operational driver in practice (and the directives explicitly acknowledge that overlap). 
The session is intentionally practical: how to start with “trust anchors first,” how to sequence changes without detonating production dependencies, and how to pressure‑test vendor roadmaps so “PQC‑ready” becomes a measurable engineering claim rather than marketing.
Format: Free live webcast (multiple sessions available)
Duration: Awareness-level briefing – 1.5 hours
Cost: Free
CISOs, CISO‑1 cyber leaders, PKI and IAM owners, platform security leads, crypto engineering teams, cloud/KMS/HSM owners, and third‑party / outsourcing risk leaders in banks and banking service providers.
General familiarity with quantum security concepts, PQC, and large‑scale migration challenges is helpful – but not required. If you want a fast, executive‑level refresher before attending, you can optionally join Applied Quantum’s free “Quantum Security Awareness for Executives” briefing. See Applied Quantum Events.
All events in the series: Quantum Security Awareness – Industry Editions
Registration is free. RSVP Below.
Please register below using your email address. Within minutes, you will receive a confirmation email containing a calendar invite and the unique Zoom link for the day. If the email does not arrive shortly, please check your junk or spam folder, or contact us at admin@appliedquantum.com.
No fluff. No jargon. Just the clarity and next steps security leaders need. For questions or group registrations, contact Applied Quantum.