Loading Events

« All Events

Virtual Event

Quantum Security Awareness (Electricity Edition): Quantum-Safe Grid Operations – OT Trust Anchors, Safety, and Decades-Long Lifecycles

May 6 @ 7:00 am - 8:30 am CEST
Virtual Event
Free
Quantum Security Industry Webinars - Electricity

About This Event

This complimentary webcast is designed for utility and grid security leaders who need a clear, no‑nonsense understanding of the quantum threat – and what to do about it now, without hand‑waving. The session is built around the operational reality of electricity: safety and stability are non‑negotiable, outage windows are precious, and many OT assets are expected to run for decades. That combination makes “we’ll upgrade the crypto later” an unsafe assumption.

Electricity providers face a quantum readiness problem that is OT‑dominant and integrity‑dominant. Confidentiality matters – but for grid operations, the sharper edge is often Trust Now, Forge Later (TNFL): if signatures and certificates that underpin trusted firmware, trusted configs, and trusted device identities become forgeable in the future, attackers don’t just read traffic – they can introduce changes that look legitimate in environments where patching is slow, device refresh is rare, and “roll back” may not exist. This is why electricity quantum readiness tends to start with trust anchors (signing roots, identity, remote access control points) rather than a generic “PQC everywhere” plan.

The standards and regulatory envelope matters here, because it shapes where security controls can realistically live. In North America, NERC CIP‑005‑7 is explicitly about managing electronic access via a controlled Electronic Security Perimeter – it pushes attention to access paths, electronic access points, and monitoring/control mechanisms. Globally, IEC 62351 focuses on security for power system control operations and the IEC TC57 protocol families (e.g., IEC 60870‑5/‑6, IEC 61850, IEC 61970/61968), which strongly influences what “secure-by-standard” looks like in grid protocol stacks. In the EU, NIS2 puts electricity squarely in the “high criticality” bucket and explicitly scopes multiple electricity entity types, reinforcing governance and accountability expectations around resilience.

This session is intentionally practical and engineering‑grounded: we’ll focus on where crypto actually sits in utility OT, what breaks first when you try to modernize it, and why corridor‑first + boundary overlays are often the fastest, least disruptive way to start reducing quantum exposure while staying inside operational constraints.

Format: Free live webcast (multiple sessions available)

Duration: Awareness-level briefing – 1.5 hours

Cost: Free


What Will You Learn

  • How to map “grid trust anchors” in real OT terms: firmware/config signing chains, device identities/cert lifecycles, remote engineering access, and control‑center ↔ substation communication paths.
  • Where TNFL hits utilities hardest: why “signed” can stop meaning “safe,” and how forgeable signatures/certs translate into malicious-but-valid-looking updates, configs, and device impersonation in hard‑to‑patch environments.
  • How the standards envelope shapes your options: what CIP‑005‑7 implies for access-path governance and control points, and what IEC 62351 implies about where security hooks exist in grid protocol stacks (and where they don’t).
  • Corridor‑first prioritization: how to pick the 1–2 operational corridors that are both high‑impact and realistically changeable (e.g., remote engineering access, control center ↔ substation gateway) without touching fragile endpoints first.
  • Boundary overlays that actually work in OT: practical patterns like gateways, brokered remote access, jump hosts, segmentation enforcement, and monitoring that reduce quantum exposure before device refresh cycles catch up.
  • How to evaluate OT vendor readiness credibly: the specific questions to ask about lifecycle support, certificate rollover, signing agility, interoperability assumptions, and upgrade paths—so “PQC-ready” becomes a measurable plan, not marketing.

Who Should Attend

Utility CISOs, OT security leads, grid/SCADA security architects, substation communications/security owners, and vendor / supply‑chain risk owners supporting generation, transmission, and distribution operations.


Prerequisites

General familiarity with quantum security concepts, PQC, and large‑scale migration challenges is helpful – but not required. If you want a fast, executive‑level refresher before attending, you can optionally join Applied Quantum’s free “Quantum Security Awareness for Executives” briefing. See Applied Quantum Events


This Session

Wednesday, 6 May 2026

  • Time: 7:00 AM CEST | 6:00 AM BST | 9:00 AM GST | 10:30 AM IST | 1:00 PM SGT | 3:00 PM AEST

All events in the series: Quantum Security Awareness – Industry Editions


Registration

Registration is free. RSVP Below.

Please register below using your email address. Within minutes, you will receive a confirmation email containing a calendar invite and the unique Zoom link for the day. If the email does not arrive shortly, please check your junk or spam folder, or contact us at admin@appliedquantum.com.


No fluff. No jargon. Just the clarity and next steps security leaders need. For questions or group registrations, contact Applied Quantum.

Details

Organizer

Quantum Security Awareness - Electricity - 6 May 2026 7:00 AM CEST

1 Going
RSVP Here

Privacy Preference Center