This complimentary webcast is designed for utility and grid security leaders who need a clear, no‑nonsense understanding of the quantum threat – and what to do about it now, without hand‑waving. The session is built around the operational reality of electricity: safety and stability are non‑negotiable, outage windows are precious, and many OT assets are expected to run for decades. That combination makes “we’ll upgrade the crypto later” an unsafe assumption.
Electricity providers face a quantum readiness problem that is OT‑dominant and integrity‑dominant. Confidentiality matters – but for grid operations, the sharper edge is often Trust Now, Forge Later (TNFL): if signatures and certificates that underpin trusted firmware, trusted configs, and trusted device identities become forgeable in the future, attackers don’t just read traffic – they can introduce changes that look legitimate in environments where patching is slow, device refresh is rare, and “roll back” may not exist. This is why electricity quantum readiness tends to start with trust anchors (signing roots, identity, remote access control points) rather than a generic “PQC everywhere” plan.
The standards and regulatory envelope matters here, because it shapes where security controls can realistically live. In North America, NERC CIP‑005‑7 is explicitly about managing electronic access via a controlled Electronic Security Perimeter – it pushes attention to access paths, electronic access points, and monitoring/control mechanisms. Globally, IEC 62351 focuses on security for power system control operations and the IEC TC57 protocol families (e.g., IEC 60870‑5/‑6, IEC 61850, IEC 61970/61968), which strongly influences what “secure-by-standard” looks like in grid protocol stacks. In the EU, NIS2 puts electricity squarely in the “high criticality” bucket and explicitly scopes multiple electricity entity types, reinforcing governance and accountability expectations around resilience.
This session is intentionally practical and engineering‑grounded: we’ll focus on where crypto actually sits in utility OT, what breaks first when you try to modernize it, and why corridor‑first + boundary overlays are often the fastest, least disruptive way to start reducing quantum exposure while staying inside operational constraints.
Format: Free live webcast (multiple sessions available)
Duration: Awareness-level briefing – 1.5 hours
Cost: Free
Utility CISOs, OT security leads, grid/SCADA security architects, substation communications/security owners, and vendor / supply‑chain risk owners supporting generation, transmission, and distribution operations.
General familiarity with quantum security concepts, PQC, and large‑scale migration challenges is helpful – but not required. If you want a fast, executive‑level refresher before attending, you can optionally join Applied Quantum’s free “Quantum Security Awareness for Executives” briefing. See Applied Quantum Events.
All events in the series: Quantum Security Awareness – Industry Editions
Registration is free. RSVP Below.
Please register below using your email address. Within minutes, you will receive a confirmation email containing a calendar invite and the unique Zoom link for the day. If the email does not arrive shortly, please check your junk or spam folder, or contact us at admin@appliedquantum.com.
No fluff. No jargon. Just the clarity and next steps security leaders need. For questions or group registrations, contact Applied Quantum.