• Quantum Security Awareness for Practitioners – Free Technical Webcast

    Virtual Event

    This complimentary webcast is designed for security architects, engineers, and cyber defenders who need a practical, no-hype understanding of post-quantum cryptography (PQC) and quantum security and what it means for real systems. Co-hosted by SANS Institute and Applied Quantum. We’ll keep the introduction short – just enough to align on the threat model and the standards landscape - then we’ll go deeper into the parts that usually get skipped such as: Where PQC actually lands in modern enterprises (protocols, libraries, certificates, HSMs, third-party platforms); Why the migration is bigger than an algorithm swap; What breaks first (often: performance assumptions, interoperability, certificate and handshake sizes, network edge constraints); How to get traction fast using inventory + prioritization + crypto-agility patterns

  • Quantum Security Awareness (Payments Edition): Payments Are Cryptography – PQC Under Millisecond SLAs

    Quantum Security Awareness – Industry Editions
    Virtual Event

    This complimentary webcast is designed for payments security leaders who need a clear, no‑nonsense view of the quantum threat - and what to do about it now, without fluff. Co‑hosted by QSECDEF and Applied Quantum, this session cuts through generic PQC talk and focuses on what makes payments different: crypto everywhere, many independent parties, and millisecond operational envelopes that you can’t break. We focus on the real blockers in payments: interdependencies, performance budgets, and vendor/partner sequencing. Payments are unusually crypto‑dense and time‑dense: a single authorization spans parties that don’t share one change calendar, and the chain must complete inside strict timeout/retry behavior. We’ll use an interbank cryptography stack mapping as a concrete illustration of how many trust boundaries exist before you even introduce PQC - and why “just upgrade the algorithm” is not a plan. 

  • Quantum Security Awareness (Telecommunications Edition): PQC for 5G/6G and Roaming Trust – Core Latency, Secure Elements, and Standards-Led Migration

    Quantum Security Awareness – Industry Editions
    Virtual Event

    This complimentary webcast is designed for telecom security leaders who need a clear, no‑nonsense understanding of the quantum threat - and what to do about it now. The session skips generic “PQC 101” and goes straight to the telecom reality: global interoperability, five‑nines availability, tight control‑plane latency budgets, and identity anchored in secure elements at massive scale. Telecom has a uniquely hard problem because you can’t “modernize crypto” inside one domain and declare victory. Your cryptography spans multiple planes and multiple supply chains: core network service interfaces (mTLS and certificate lifecycles), management APIs, roaming and interconnect trust, lawful intercept / regulatory interfaces, and the SIM/eSIM/UICC ecosystem that anchors subscriber identity and provisioning. And unlike many enterprise environments, telecom change isn’t just “push a new library” - it’s a choreography across vendors, partners, and standards, with a continuous service obligation.

  • Quantum Security Awareness (Electricity Edition): Quantum-Safe Grid Operations – OT Trust Anchors, Safety, and Decades-Long Lifecycles

    Virtual Event

    This complimentary webcast is designed for utility and grid security leaders who need a clear, no‑nonsense understanding of the quantum threat - and what to do about it now, without hand‑waving. The session is built around the operational reality of electricity: safety and stability are non‑negotiable, outage windows are precious, and many OT assets are expected to run for decades. That combination makes “we’ll upgrade the crypto later” an unsafe assumption. Electricity providers face a quantum readiness problem that is OT‑dominant and integrity‑dominant. Confidentiality matters - but for grid operations, the sharper edge is often Trust Now, Forge Later (TNFL): if signatures and certificates that underpin trusted firmware, trusted configs, and trusted device identities become forgeable in the future, attackers don’t just read traffic - they can introduce changes that look legitimate in environments where patching is slow, device refresh is rare, and “roll back” may not exist. This is why electricity quantum readiness tends to start with trust anchors (signing roots, identity, remote access control points) rather than a generic “PQC everywhere” plan.

Privacy Preference Center