BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Applied Quantum - ECPv6.15.18//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-ORIGINAL-URL:https://appliedquantum.com
X-WR-CALDESC:Events for Applied Quantum
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:+01:00
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:+08:00
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20250309T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20251102T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20260308T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20261101T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20270314T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20271107T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:Europe/London
BEGIN:DAYLIGHT
TZOFFSETFROM:+0000
TZOFFSETTO:+0100
TZNAME:BST
DTSTART:20250330T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0100
TZOFFSETTO:+0000
TZNAME:GMT
DTSTART:20251026T010000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+0000
TZOFFSETTO:+0100
TZNAME:BST
DTSTART:20260329T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0100
TZOFFSETTO:+0000
TZNAME:GMT
DTSTART:20261025T010000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+0000
TZOFFSETTO:+0100
TZNAME:BST
DTSTART:20270328T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0100
TZOFFSETTO:+0000
TZNAME:GMT
DTSTART:20271031T010000
END:STANDARD
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:Europe/Paris
BEGIN:DAYLIGHT
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
TZNAME:CEST
DTSTART:20250330T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
TZNAME:CET
DTSTART:20251026T010000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
TZNAME:CEST
DTSTART:20260329T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
TZNAME:CET
DTSTART:20261025T010000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
TZNAME:CEST
DTSTART:20270328T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
TZNAME:CET
DTSTART:20271031T010000
END:STANDARD
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:Asia/Singapore
BEGIN:STANDARD
TZOFFSETFROM:+0800
TZOFFSETTO:+0800
TZNAME:+08
DTSTART:20250101T000000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=+01:00:20260326T170000
DTEND;TZID=+01:00:20260326T183000
DTSTAMP:20260404T135725
CREATED:20260316T100016Z
LAST-MODIFIED:20260326T020020Z
UID:10000026-1774544400-1774549800@appliedquantum.com
SUMMARY:Quantum Security Community - Online Fortnightly Update (America\, EMEA)
DESCRIPTION:***Quantum Security Community*** *is a free\, global\, practitioner-led network sharing real-world PQC insights and supporting one another through the most complex IT/OT security transformation of our time. Explore the channels at* ***[Quantum.Security](https://quantum.security)*** \n—————— \n**A weekly\, online community meetup for quantum security practitioners — focused on signal\, not hype.** \nPost-quantum cryptography (PQC)\, crypto agility\, quantum threat models\, and standards timelines are all evolving quickly. For security teams\, the challenge isn’t “finding information” — it’s deciding **what matters**\, **what changed**\, and **what to do next**. Quantum Security Weekly exists to make that easier. \nWe run the **same meetup twice each week** to cover global time zones: \n* **Session 1:** Europe / Middle East / APAC-friendly\n* **Session 2:** Europe / Americas-friendly\n(Choose the one that fits your schedule – content is aligned across both.) \n### **What happens each week** \nYou’ll get a curated update across the four categories that consistently drive real-world decisions: \n**1) Regulation & policy signals**\nNew requirements\, supervisory guidance\, national strategies\, procurement rules\, sector-specific expectations – and what they imply for timelines and planning. \n**2) Standards and “rules of the road”**\nUpdates to cryptographic standards and related ecosystems (protocols\, identity\, secure elements\, industry frameworks). We focus on what changes adoption feasibility\, interoperability\, or audit/compliance expectations. \n**3) Technical developments**\nCredible signals about quantum computing capability\, relevant cryptanalysis\, and meaningful algorithmic/security research (including “RSA-breaking” or signature-related developments) – explained in terms of security impact\, not headlines. \n**4) Practical implementation reality**\nThe stuff that makes or breaks programs: where crypto actually lives\, dependency chains\, vendor readiness\, device constraints\, performance tradeoffs\, rollout sequencing\, and “what we learned the hard way.” \n### **Speakers and community contributions** \nWe often invite a guest speaker to share practical experience (implementation lessons\, program strategy\, technical deep dives). Sometimes we’ll host short product introductions – but the default posture is educational and experience-driven\, not salesy. When there’s no guest\, we go deeper on the week’s most important developments and prioritize Q&A. \n### **Typical Agenda** \n**0:00 – 0:05 | Welcome + how to engage (fast)** \n* What this meetup is: **signal > hype**\, practical implications\, community-first\n* How to participate today: chat\, Q&A flow\, how to drop links/resources\n* Quick reminder of community channels (Forum / Slack / LinkedIn group) and how to continue the conversation after the call \n**0:05 – 0:25 | The Weekly Signal Brief (what actually changed)**\nA structured scan in four buckets\, with a “so what?” for each: \n* **Policy & regulation:** new drafts\, mandates\, enforcement signals\, procurement rules\n* **Standards & frameworks:** PQC standards movement\, protocol ecosystem changes\, guidance updates\n* **Quantum capability signals:** credible progress indicators (hardware\, error correction\, scaling)\, what to ignore\n* **Cryptography/cryptanalysis:** meaningful research developments\, “RSA/ECC breaking” signals\, security relevance \n**0:25 – 0:35 | Myth‑Busting / Reality Check (the hype audit)**\nIf something got hyped this week\, we’ll do a quick\, repeatable teardown: \n* **What happened** (one sentence)\n* **What didn’t happen** (the misconception)\n* **What it means for defenders** (real impact)\n* **What changes / what doesn’t** in PQC planning this year \n*Goal:* keep the community calibrated\, reduce panic\, and prevent misallocation of effort. \n**0:35 – 0:50 | One Topic\, Deeper (the week’s main story)**\nA focused deep dive on one theme that affects real programs\, such as: \n* crypto-agility patterns and failure modes\n* hybrid deployment realities (where it works / where it’s a trap)\n* migration sequencing and vendor dependency bottlenecks\n* what a standards change means for architects and CISOs\n* integrity-first thinking (e.g.\, signatures\, trust anchors\, long-lived evidence) \n**0:50 – 1:05 | Guest Spotlight (most weeks) OR Community Lightning Round** \n* **Guest Spotlight (preferred when available):**\n* 10–12 min: experience share / lessons learned / case study / product walkthrough (kept educational)\n* 3–5 min: moderated Q&A (“what surprised you / what broke / what you’d do differently”)\n* **If no guest:**\n* 3 lightning shares (3–4 min each): “one paper / one tool / one lesson / one vendor signal” \n**1:05 – 1:10 | Community Pulse (cross‑channel highlights)** \n* “Top 3 threads” from various community channels this week\n* Quick call-outs: members looking for feedback\, volunteer opportunities\, upcoming topics\n* How to propose a guest / suggest topics / share resources for next week \n**1:10 – 1:28 | Open Q&A / Office Hours** \n* Live questions (chat + audio)\n* “Bring your messy problem” time: inventory\, vendor claims\, timeline pressure\, governance\, metrics\n* Optional: rapid-fire “yes/no + why” on 5–8 quick questions if the room is lively \n**1:28 – 1:30 | Wrap + next week preview** \n* 3 takeaways in 30 seconds\n* What we’re tracking next week\n* Speaker/volunteer reminder (“If you’ve shipped something\, we want the story.”) \n### **Who should join** \nIf you’re responsible for security strategy\, cryptography\, identity\, platform security\, resilience\, compliance\, or product security – and quantum is on your roadmap – this is for you. \n### **What you’ll leave with** \n* Clear visibility into what changed this week\n* Better judgment on what’s noise vs. actionable signal\n* Practical framing for decisions you may need to revisit (inventory\, standards alignment\, vendor dependencies\, rollout sequencing)\n* A community you can learn from (and contribute to)
URL:https://appliedquantum.com/event/quantum-security-community-online-fortnightly-update-america-emea
LOCATION:Online event
CATEGORIES:Community
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/03/1024x576-bya3VY.jpg
GEO:-8.521147;179.1962
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=+01:00:20260326T090000
DTEND;TZID=+01:00:20260326T103000
DTSTAMP:20260404T135725
CREATED:20260316T100016Z
LAST-MODIFIED:20260326T020020Z
UID:10000025-1774515600-1774521000@appliedquantum.com
SUMMARY:Quantum Security Community - Online Fortnightly Update (EMEA\, APAC)
DESCRIPTION:***Quantum Security Community*** *is a free\, global\, practitioner-led network sharing real-world PQC insights and supporting one another through the most complex IT/OT security transformation of our time. Explore the channels at* ***[Quantum.Security](https://quantum.security)*** \n—————— \n**A weekly\, online community meetup for quantum security practitioners — focused on signal\, not hype.** \nPost-quantum cryptography (PQC)\, crypto agility\, quantum threat models\, and standards timelines are all evolving quickly. For security teams\, the challenge isn’t “finding information” — it’s deciding **what matters**\, **what changed**\, and **what to do next**. Quantum Security Weekly exists to make that easier. \nWe run the **same meetup twice each week** to cover global time zones: \n* **Session 1:** Europe / Middle East / APAC-friendly\n* **Session 2:** Europe / Americas-friendly\n(Choose the one that fits your schedule – content is aligned across both.) \n### **What happens each week** \nYou’ll get a curated update across the four categories that consistently drive real-world decisions: \n**1) Regulation & policy signals**\nNew requirements\, supervisory guidance\, national strategies\, procurement rules\, sector-specific expectations – and what they imply for timelines and planning. \n**2) Standards and “rules of the road”**\nUpdates to cryptographic standards and related ecosystems (protocols\, identity\, secure elements\, industry frameworks). We focus on what changes adoption feasibility\, interoperability\, or audit/compliance expectations. \n**3) Technical developments**\nCredible signals about quantum computing capability\, relevant cryptanalysis\, and meaningful algorithmic/security research (including “RSA-breaking” or signature-related developments) – explained in terms of security impact\, not headlines. \n**4) Practical implementation reality**\nThe stuff that makes or breaks programs: where crypto actually lives\, dependency chains\, vendor readiness\, device constraints\, performance tradeoffs\, rollout sequencing\, and “what we learned the hard way.” \n### **Speakers and community contributions** \nWe often invite a guest speaker to share practical experience (implementation lessons\, program strategy\, technical deep dives). Sometimes we’ll host short product introductions – but the default posture is educational and experience-driven\, not salesy. When there’s no guest\, we go deeper on the week’s most important developments and prioritize Q&A. \n### **Typical Agenda** \n**0:00 – 0:05 | Welcome + how to engage (fast)** \n* What this meetup is: **signal > hype**\, practical implications\, community-first\n* How to participate today: chat\, Q&A flow\, how to drop links/resources\n* Quick reminder of community channels (Forum / Slack / LinkedIn group) and how to continue the conversation after the call \n**0:05 – 0:25 | The Weekly Signal Brief (what actually changed)**\nA structured scan in four buckets\, with a “so what?” for each: \n* **Policy & regulation:** new drafts\, mandates\, enforcement signals\, procurement rules\n* **Standards & frameworks:** PQC standards movement\, protocol ecosystem changes\, guidance updates\n* **Quantum capability signals:** credible progress indicators (hardware\, error correction\, scaling)\, what to ignore\n* **Cryptography/cryptanalysis:** meaningful research developments\, “RSA/ECC breaking” signals\, security relevance \n**0:25 – 0:35 | Myth‑Busting / Reality Check (the hype audit)**\nIf something got hyped this week\, we’ll do a quick\, repeatable teardown: \n* **What happened** (one sentence)\n* **What didn’t happen** (the misconception)\n* **What it means for defenders** (real impact)\n* **What changes / what doesn’t** in PQC planning this year \n*Goal:* keep the community calibrated\, reduce panic\, and prevent misallocation of effort. \n**0:35 – 0:50 | One Topic\, Deeper (the week’s main story)**\nA focused deep dive on one theme that affects real programs\, such as: \n* crypto-agility patterns and failure modes\n* hybrid deployment realities (where it works / where it’s a trap)\n* migration sequencing and vendor dependency bottlenecks\n* what a standards change means for architects and CISOs\n* integrity-first thinking (e.g.\, signatures\, trust anchors\, long-lived evidence) \n**0:50 – 1:05 | Guest Spotlight (most weeks) OR Community Lightning Round** \n* **Guest Spotlight (preferred when available):**\n* 10–12 min: experience share / lessons learned / case study / product walkthrough (kept educational)\n* 3–5 min: moderated Q&A (“what surprised you / what broke / what you’d do differently”)\n* **If no guest:**\n* 3 lightning shares (3–4 min each): “one paper / one tool / one lesson / one vendor signal” \n**1:05 – 1:10 | Community Pulse (cross‑channel highlights)** \n* “Top 3 threads” from various community channels this week\n* Quick call-outs: members looking for feedback\, volunteer opportunities\, upcoming topics\n* How to propose a guest / suggest topics / share resources for next week \n**1:10 – 1:28 | Open Q&A / Office Hours** \n* Live questions (chat + audio)\n* “Bring your messy problem” time: inventory\, vendor claims\, timeline pressure\, governance\, metrics\n* Optional: rapid-fire “yes/no + why” on 5–8 quick questions if the room is lively \n**1:28 – 1:30 | Wrap + next week preview** \n* 3 takeaways in 30 seconds\n* What we’re tracking next week\n* Speaker/volunteer reminder (“If you’ve shipped something\, we want the story.”) \n### **Who should join** \nIf you’re responsible for security strategy\, cryptography\, identity\, platform security\, resilience\, compliance\, or product security – and quantum is on your roadmap – this is for you. \n### **What you’ll leave with** \n* Clear visibility into what changed this week\n* Better judgment on what’s noise vs. actionable signal\n* Practical framing for decisions you may need to revisit (inventory\, standards alignment\, vendor dependencies\, rollout sequencing)\n* A community you can learn from (and contribute to)
URL:https://appliedquantum.com/event/quantum-security-community-online-fortnightly-update-emea-apac
LOCATION:Online event
CATEGORIES:Community
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/03/1024x576-anROVz.jpg
GEO:-8.521147;179.1962
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=+08:00:20260319T170000
DTEND;TZID=+08:00:20260319T183000
DTSTAMP:20260404T135725
CREATED:20260215T080251Z
LAST-MODIFIED:20260319T094443Z
UID:10000003-1773939600-1773945000@appliedquantum.com
SUMMARY:Quantum Security Community - Singapore - 2026 Kickoff Event
DESCRIPTION:***Quantum Security Community*** *is a free\, global\, practitioner-led network sharing real-world PQC insights and supporting one another through the most complex IT/OT security transformation of our time. Explore the channels at* ***[Quantum.Security](https://quantum.security/)*** \n**How to Engage with the Community + Quantum Readiness Updates** \nThe global quantum-security landscape is accelerating quickly – from PQC migration and crypto-agility\, to CRQC capability forecasts\, Q-Day horizon modeling\, regulatory pressure (NIST\, ENISA\, ETSI\, ISO\, CISA)\, and lessons learned from early enterprise adopters. \nTo begin 2026\, we’re hosting the first community event to bring everything together – and to show how you can get the most value from the Quantum Security Community ecosystem. \nThis session will cover two parts: \n*** \n### **1. How to Engage With and Benefit From the Quantum Security Community** \nAn introduction to the mission\, structure\, and tools of the Quantum Security Community\, including how to use our Slack workspace\, LinkedIn Group\, upcoming Forum\, events\, newsletters\, and community resources.\nYou’ll learn how each channel fits together – and how to participate in a way that builds value for you and for the wider community. \n*** \n### **2. Quantum Readiness Updates for 2026** \nA fast-paced\, research-driven overview of where we stand at the start of 2026\, including: \n* Latest Q-Day predictions and capability thresholds\n* Key signals from CRQC hardware progress\n* Regulatory pushes and global standards alignment (NIST\, ENISA\, ETSI\, ISO\, NCSC\, CISA\, MAS)\n* Lessons learned from early PQC migration and crypto-agility projects\n* What organizations are doing right now to become quantum-resilient\n* Emerging risks in QKD\, quantum sensing\, and quantum-secure architectures \nThis session is designed to be high-signal and vendor-neutral – suitable for security leaders\, cryptographers\, architects\, engineers\, researchers\, and policymakers. \n*** \n## **📅 Date & Time** \n**Thursday\, 19 March 2026**\n**17:00-18:30** \n*** \n## **📍 Location** \n**Online Event (Zoom)**\nLink will be provided upon RSVP. \n*** \n## **🌐 About the Quantum Security Community** \nThe Quantum Security Community ([Quantum.Security](https://quantum.security)) brings together practitioners\, researchers\, engineers\, architects\, and policymakers working across PQC migration\, crypto-agility\, Q-Day readiness\, CRQC capability analysis\, quantum communications\, sensing security\, and emerging global standards. \nOur community hub: **[https://quantum.security](https://quantum.security)** \nFrom there you can join: \n* Slack (real-time technical discussions)\n* LinkedIn Group (professional community)\n* YouTube + Podcast (coming soon)\n* Meetups & events\n* Quantum Security Community Digest\n* Learning resources & tools \n*** \n## **💬 Join the Discussion** \nWe’ll continue the conversation after the event on Slack.\nJoin here: **[https://slack.quantum.security](https://slack.quantum.security)**
URL:https://appliedquantum.com/event/quantum-security-community-singapore-2026-kickoff-event
LOCATION:Online event
CATEGORIES:Community
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/03/1024x576-GapRq5.jpg
GEO:-8.521147;179.1962
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=+01:00:20260319T160000
DTEND;TZID=+01:00:20260319T173000
DTSTAMP:20260404T135725
CREATED:20260219T122300Z
LAST-MODIFIED:20260319T102917Z
UID:10000020-1773936000-1773941400@appliedquantum.com
SUMMARY:Quantum Security Community - 2026 Kickoff Event
DESCRIPTION:***Quantum Security Community*** *is a free\, global\, practitioner-led network sharing real-world PQC insights and supporting one another through the most complex IT/OT security transformation of our time. Explore the channels at* ***[Quantum.Security](https://quantum.security)*** \n**How to Engage with the Community + Quantum Readiness Updates** \nThe global quantum-security landscape is accelerating quickly – from PQC migration and crypto-agility\, to CRQC capability forecasts\, Q-Day horizon modeling\, regulatory pressure (NIST\, ENISA\, ETSI\, ISO\, CISA)\, and lessons learned from early enterprise adopters. \nTo begin 2026\, we’re hosting the first community event to bring everything together – and to show how you can get the most value from the Quantum Security Community ecosystem. \nThis session will cover two parts: \n*** \n### **1. How to Engage With and Benefit From the Quantum Security Community** \nAn introduction to the mission\, structure\, and tools of the Quantum Security Community\, including how to use our Slack workspace\, LinkedIn Group\, upcoming Forum\, events\, newsletters\, and community resources.\nYou’ll learn how each channel fits together – and how to participate in a way that builds value for you and for the wider community. \n*** \n### **2. Quantum Readiness Updates for 2026** \nA fast-paced\, research-driven overview of where we stand at the start of 2026\, including: \n* Latest Q-Day predictions and capability thresholds\n* Key signals from CRQC hardware progress\n* Regulatory pushes and global standards alignment (NIST\, ENISA\, ETSI\, ISO\, NCSC\, CISA\, MAS)\n* Lessons learned from early PQC migration and crypto-agility projects\n* What organizations are doing right now to become quantum-resilient\n* Emerging risks in QKD\, quantum sensing\, and quantum-secure architectures \nThis session is designed to be high-signal and vendor-neutral – suitable for security leaders\, cryptographers\, architects\, engineers\, researchers\, and policymakers. \n*** \n## **📅 Date & Time** \n**Thursday\, 19 March 2026**\n**16:00 CET / 15:00 GMT / 11:00 EDT / 23:00 SGT** \n*** \n## **📍 Location** \n**Online Event (Zoom)**\nLink will be provided upon RSVP. \n*** \n## **🌐 About the Quantum Security Community** \nThe Quantum Security Community ([Quantum.Security](https://quantum.security)) brings together practitioners\, researchers\, engineers\, architects\, and policymakers working across PQC migration\, crypto-agility\, Q-Day readiness\, CRQC capability analysis\, quantum communications\, sensing security\, and emerging global standards. \nOur community hub: https://quantum.security[https://quantum.security%5D(https://quantum.security) \nFrom there you can join: \n* Slack (real-time technical discussions)\n* LinkedIn Group (professional community)\n* YouTube + Podcast (coming soon)\n* Meetups & events\n* Quantum Security Community Digest\n* Learning resources & tools \n*** \n## **💬 Join the Discussion** \nWe’ll continue the conversation after the event on Slack.\nJoin here: **[https://slack.quantum.security ](https://slack.quantum.security)**
URL:https://appliedquantum.com/event/quantum-security-community-2026-kickoff-event
LOCATION:Online event
CATEGORIES:Community
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/03/1024x576-4y7xYX.jpg
GEO:-8.521147;179.1962
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260318T083000
DTEND;TZID=America/New_York:20260318T170000
DTSTAMP:20260404T135725
CREATED:20260215T122450Z
LAST-MODIFIED:20260215T205107Z
UID:10000005-1773822600-1773853200@appliedquantum.com
SUMMARY:SEC529: Quantum Security Readiness for Executives - SANS Institute Course
DESCRIPTION:A one-day executive training course designed to help CISOs and security leaders build a practical quantum-safe roadmap before regulatory deadlines hit. \n\nAbout This Course\nSEC529 is a one-day\, instructor-led course offered by SANS Institute\, the global leader in cybersecurity training. It gives security executives the frameworks\, threat models\, and strategic tools needed to assess quantum risk and lead their organizations toward quantum resilience – without getting lost in the physics. \nWith many regulators expecting critical infrastructure to be quantum-safe by 2030\, this course addresses the narrow window security leaders have to build their strategy before regulatory and adversarial pressures converge. \nCourse Authors: Marin Ivezic & Dr. Kawin Boonyapredee \n\nWhat You Will Learn\nThe course covers the essential knowledge areas for executive-level quantum readiness: \n\nForecasting the threat: Apply structured models to estimate when cryptographically relevant quantum computers (CRQCs) will break current encryption – and what that timeline means for your data today.\nQuantifying HNDL exposure: Identify which encrypted assets are already at risk from Harvest Now\, Decrypt Later attacks and learn to prioritize accordingly.\nCryptographic inventory at the executive level: Map cryptographic dependencies across applications\, infrastructure\, and vendors using executive-level frameworks.\nNavigating compliance: Understand NIST PQC standards\, CNSA 2.0 requirements\, and EU mandates to build an audit-ready migration timeline.\nBuilding the roadmap: Construct a phased Quantum-Safe Migration Plan aligned with budget cycles\, business priorities\, and regulatory deadlines.\nWinning the boardroom: Translate quantum risk into business terms with metrics\, cost models\, and narratives that secure executive buy-in.\n\n\nHands-On Labs\nThe course includes three practical exercises: \n\nQ-Day Estimator – Model realistic timelines for when quantum computers could threaten current cryptography.\nQuantum-Readiness Self-Assessment – Evaluate your organization’s current posture against quantum threats.\nDrafting a Roadmap Briefing for the Board – Build the executive communication materials needed to drive action.\n\n\nWho Should Attend\nThis course is designed for CISOs\, senior security leaders\, technical directors\, information security officers\, and executive cyber leaders responsible for setting cybersecurity direction and managing enterprise risk. It is rated at an intermediate skill level\, with 6 CPEs awarded upon completion. \n\nThis Session\nSANS Cybersecurity Leadership Summit & Training 2026\n\nFormat: Virtual (live\, instructor-led)\nInstructor: Marin Ivezic\nPrice: $1\,315 USD (excluding local taxes)\n\nAll events in the series: SANS Institute Courses on Quantum Security & Post-Quantum Cryptography \n\nRegistration\nThis course is organized and delivered by SANS Institute. All registration is handled directly through SANS. \nRegister on the SANS website → \nFor group purchasing options or questions about the course\, please contact SANS directly. \n\nSEC529 is part of SANS Institute’s Cyber Defense curriculum. For full course details\, prerequisites\, laptop requirements\, and FAQs\, visit the official SANS course page. \n 
URL:https://appliedquantum.com/event/sec529-quantum-security-readiness-for-executives-sans-institute-course-2
CATEGORIES:Training
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/02/SANS-SEC529.jpg
LOCATION:https://appliedquantum.com/event/sec529-quantum-security-readiness-for-executives-sans-institute-course-2
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/London:20260305T083000
DTEND;TZID=Europe/London:20260305T170000
DTSTAMP:20260404T135725
CREATED:20260215T122300Z
LAST-MODIFIED:20260215T205056Z
UID:10000004-1772699400-1772730000@appliedquantum.com
SUMMARY:SEC529: Quantum Security Readiness for Executives - SANS Institute Course
DESCRIPTION:A one-day executive training course designed to help CISOs and security leaders build a practical quantum-safe roadmap before regulatory deadlines hit. \n\nAbout This Course\nSEC529 is a one-day\, instructor-led course offered by SANS Institute\, the global leader in cybersecurity training. It gives security executives the frameworks\, threat models\, and strategic tools needed to assess quantum risk and lead their organizations toward quantum resilience – without getting lost in the physics. \nWith many regulators expecting critical infrastructure to be quantum-safe by 2030\, this course addresses the narrow window security leaders have to build their strategy before regulatory and adversarial pressures converge. \nCourse Authors: Marin Ivezic & Dr. Kawin Boonyapredee \n\nWhat You Will Learn\nThe course covers the essential knowledge areas for executive-level quantum readiness: \n\nForecasting the threat: Apply structured models to estimate when cryptographically relevant quantum computers (CRQCs) will break current encryption – and what that timeline means for your data today.\nQuantifying HNDL exposure: Identify which encrypted assets are already at risk from Harvest Now\, Decrypt Later attacks and learn to prioritize accordingly.\nCryptographic inventory at the executive level: Map cryptographic dependencies across applications\, infrastructure\, and vendors using executive-level frameworks.\nNavigating compliance: Understand NIST PQC standards\, CNSA 2.0 requirements\, and EU mandates to build an audit-ready migration timeline.\nBuilding the roadmap: Construct a phased Quantum-Safe Migration Plan aligned with budget cycles\, business priorities\, and regulatory deadlines.\nWinning the boardroom: Translate quantum risk into business terms with metrics\, cost models\, and narratives that secure executive buy-in.\n\n\nHands-On Labs\nThe course includes three practical exercises: \n\nQ-Day Estimator – Model realistic timelines for when quantum computers could threaten current cryptography.\nQuantum-Readiness Self-Assessment – Evaluate your organization’s current posture against quantum threats.\nDrafting a Roadmap Briefing for the Board – Build the executive communication materials needed to drive action.\n\n\nWho Should Attend\nThis course is designed for CISOs\, senior security leaders\, technical directors\, information security officers\, and executive cyber leaders responsible for setting cybersecurity direction and managing enterprise risk. It is rated at an intermediate skill level\, with 6 CPEs awarded upon completion. \n\nThis Session\nSANS SEC529 Beta Europe Online – March 2026\n\nFormat: Virtual (live\, instructor-led)\nInstructor: Marin Ivezic\nPrice: €1\,230 EUR (excluding local taxes)\n\nAll events in the series: SANS Institute Courses on Quantum Security & Post-Quantum Cryptography \n\nRegistration\nThis course is organized and delivered by SANS Institute. All registration is handled directly through SANS. \nRegister on the SANS website → \nFor group purchasing options or questions about the course\, please contact SANS directly. \n\nSEC529 is part of SANS Institute’s Cyber Defense curriculum. For full course details\, prerequisites\, laptop requirements\, and FAQs\, visit the official SANS course page. \n 
URL:https://appliedquantum.com/event/sec529-quantum-security-readiness-for-executives-sans-institute-course
CATEGORIES:Training
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/02/SANS-SEC529.jpg
LOCATION:https://appliedquantum.com/event/sec529-quantum-security-readiness-for-executives-sans-institute-course
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Paris:20260227T160000
DTEND;TZID=Europe/Paris:20260227T173000
DTSTAMP:20260404T135725
CREATED:20260219T103124Z
LAST-MODIFIED:20260219T115207Z
UID:10000016-1772208000-1772213400@appliedquantum.com
SUMMARY:Quantum Security Awareness (Banking Edition): Trust Anchors at Bank Scale - PKI\, Signing\, and Long‑Lived Evidence
DESCRIPTION:About This Event\nThis complimentary webcast is designed for banking security leaders who need a clear\, no‑nonsense understanding of the quantum threat – and what to do about it now.  The session avoids generic “PQC 101” and goes straight to what makes banking different: institutional identity and long‑lived evidence are the real blast radius. \nIn a bank\, cryptography isn’t just protecting data in transit – it is the foundation of trust at scale: CA hierarchies\, enterprise PKI\, service‑to‑service mTLS\, customer and workforce authentication\, signed tokens (e.g.\, OAuth/JWT ecosystems)\, document and transaction signing\, code‑signing in CI/CD\, and the regulated archives that prove what happened\, when\, and under which authorization. The uncomfortable banking‑specific reality is that “confidentiality later” is only half the story: if signatures and PKI trust anchors become forgeable in the future\, the bank’s ability to prove integrity\, provenance\, and non‑repudiation comes under pressure. \nThis is also why the industry drivers are accelerating. The G7 Cyber Expert Group released a roadmap specifically to coordinate the transition to post‑quantum cryptography in the financial sector\, explicitly positioning PQC as a systemic resilience issue (not an isolated technical upgrade). ￼ FS‑ISAC has likewise urged global coordination and milestones for financial services migration\, framing the transition as an interdependency problem that can’t be solved bank‑by‑bank in isolation. ￼ \nOn the regulatory side\, the EU’s DORA technical standards don’t mention “PQC” by name – but they effectively force the behavior you need for it: a documented encryption/cryptographic controls policy\, provisions to update cryptographic technology based on developments in cryptanalysis\, and (critically for banks) stronger discipline around certificate and key lifecycle management\, including maintaining a certificate register for critical systems. And while NIS2 raises governance expectations for “banking” as a highly critical sector\, many banks will experience DORA as the sharper operational driver in practice (and the directives explicitly acknowledge that overlap). ￼ \nThe session is intentionally practical: how to start with “trust anchors first\,” how to sequence changes without detonating production dependencies\, and how to pressure‑test vendor roadmaps so “PQC‑ready” becomes a measurable engineering claim rather than marketing. \nFormat: Free live webcast (multiple sessions available) \nDuration: Awareness-level briefing – 1.5 hours \nCost: Free \n\nWhat Will You Learn\n\nA bank‑specific trust map: where quantum‑vulnerable crypto sits across PKI\, token signing\, mTLS\, signing services\, CI/CD\, and regulated archives.\nHow to translate sector signals into action: using the G7 roadmap and FS‑ISAC milestones to set internal timelines and vendor expectations. ￼\nHow to turn “DORA compliance” into quantum readiness: using required crypto policies\, cryptanalysis‑driven update expectations\, and certificate lifecycle controls as forcing functions for crypto agility. ￼\nTrust‑anchor‑first sequencing: what it means in practice (CA modernization\, certificate inventory\, signing key governance\, rollover planning\, hybrid boundaries).\nVendor and third‑party reality checks: what to ask cloud providers\, HSM/KMS vendors\, core banking platforms\, identity stacks\, and managed service partners – and how to spot hand‑wavy roadmaps.\nA pragmatic “first pilots” playbook: which banking domains are most pilotable\, how to contain blast radius\, and what success metrics to track.\n\n\nWho Should Attend\nCISOs\, CISO‑1 cyber leaders\, PKI and IAM owners\, platform security leads\, crypto engineering teams\, cloud/KMS/HSM owners\, and third‑party / outsourcing risk leaders in banks and banking service providers. \n\nPrerequisites\nGeneral familiarity with quantum security concepts\, PQC\, and large‑scale migration challenges is helpful – but not required. If you want a fast\, executive‑level refresher before attending\, you can optionally join Applied Quantum’s free “Quantum Security Awareness for Executives” briefing. See Applied Quantum Events.  \n\nThis Session\nWednesday\, 27 Feb 2026\n\nTime: 4:00 PM CET | 10:00 AM EST | 3:00 PM GMT | 7:00 PM GST | 8:30 PM IST | 11:00 PM SGT\n\nAll events in the series: Quantum Security Awareness – Industry Editions \n\nRegistration\nRegistration is free. RSVP Below. \nPlease register below using your email address. Within minutes\, you will receive a confirmation email containing a calendar invite and the unique Zoom link for the day. If the email does not arrive shortly\, please check your junk or spam folder\, or contact us at admin@appliedquantum.com. \n\nNo fluff. No jargon. Just the clarity and next steps security leaders need. For questions or group registrations\, contact Applied Quantum. \n 
URL:https://appliedquantum.com/event/quantum-security-awareness-banking-27feb2026
CATEGORIES:Webinar
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/02/Quantum-Security-Industry-Webinars-Banking-27Feb2026.jpg
LOCATION:https://us06web.zoom.us/j/84625403942
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Asia/Singapore:20260226T130000
DTEND;TZID=Asia/Singapore:20260226T153000
DTSTAMP:20260404T135725
CREATED:20260215T152627Z
LAST-MODIFIED:20260219T092351Z
UID:10000007-1772110800-1772119800@appliedquantum.com
SUMMARY:Quantum Security Awareness for Executives - Free Webcast
DESCRIPTION:A free executive briefing co-hosted by SANS Institute and Applied Quantum. Cut through the hype\, understand the risk\, and leave with actionable next steps. \n\nAbout This Event\nThis complimentary webcast is designed for security leaders who need a clear\, no-nonsense understanding of the quantum threat – and what to do about it now. Co-hosted by SANS Institute and Applied Quantum\, the session explains what’s changing in the cryptographic landscape\, why the migration to quantum-safe standards is far larger than most organizations expect\, and what practical steps you can take today. \nQuantum risk is not a future-only problem. Adversaries can harvest encrypted data today for later decryption\, while regulators and customers increasingly expect demonstrable progress now – not just plans for 2030 or 2035. \nFormat: Free live webcast (multiple sessions available) Duration: Awareness-level briefing – 2 hours Cost: Free \n\nWhat You Will Learn\nThis briefing gives security leaders: \n\nA clear map of the quantum threat landscape\, including how Harvest Now\, Decrypt Later attacks put long-life data at risk immediately – before quantum computers even arrive.\nA leadership-ready understanding of migration scope: cryptography is embedded across applications\, infrastructure\, vendors\, devices\, and identity systems – this is an enterprise-wide migration\, not a single control change.\nA concise view of what’s changing: algorithms\, certificates\, protocols\, vendor roadmaps\, and performance assumptions.\nThe compliance context: why demonstrable progress – inventories\, roadmaps\, vendor commitments\, and pilot results – is increasingly expected now\, not just by 2030/2035.\nA preview of the hard parts: cryptographic discovery\, legacy systems\, third-party dependencies\, and performance impacts.\nA practical checklist of next steps to start building an organization-wide quantum readiness plan.\nCommon narrative and terminology that reduces friction between risk owners and implementers.\n\n\nWhy “Wait and See” Is No Longer a Strategy\nThis is an enterprise-wide cryptographic migration\, not a single control. Crypto is embedded across applications\, infrastructure\, vendors\, devices\, and identity. The deadlines are only part of the story – the real challenge is inventory\, dependency mapping\, and coordinated change across teams and suppliers. \nAttackers don’t need quantum computers to start. Harvest Now\, Decrypt Later can put long-life data at risk immediately. Post-quantum changes can affect performance\, interoperability\, certificates\, and operational processes\, which means planning requires technical reality checks. \nRegulators and stakeholders increasingly expect evidence of progress – not just awareness. \n\nWho Should Attend\nThis webcast is designed for: \n\nCISOs\, CIOs\, Heads of Security\, Security Directors\nSecurity architects and enterprise architects\nGRC\, risk\, and compliance leaders who need a quantum-ready view of evidence and timelines\nIAM\, PKI\, TLS\, and VPN owners and the technical leaders who support them\nVendor assurance and procurement stakeholders involved in security requirements and roadmaps\n\n\nThis Session\nThursday\, 26 February 2026 – APAC-friendly live session\n\nTime: 1:00 PM SGT | 10:30 AM IST | 9:00 AM GST (Dubai) | 5:00 AM UTC |  6:00 AM CET\n\nAll events in the series: Quantum Security Awareness for Executives – Free Webcast Series \n\nWant to go deeper?\nThese topics are covered in much more detail in the SANS Institute and Applied Quantum course SEC529: Quantum Security Readiness for Executives. Registration now open. \n\nRegistration\nThis event is co-hosted by SANS Institute and Applied Quantum. Registration is free. RSVP Below. \nPlease register below using your email address. Within minutes\, you will receive a confirmation email containing a calendar invite and the unique Zoom link for the day. If the email does not arrive shortly\, please check your junk or spam folder\, or contact us at admin@appliedquantum.com. \n\nNo fluff. No jargon. Just the clarity and next steps security leaders need. For questions or group registrations\, contact Applied Quantum. \n 
URL:https://appliedquantum.com/event/quantum-security-readiness-for-security-leaders-free-webcast-3
CATEGORIES:Webinar
ATTACH;FMTTYPE=image/png:https://appliedquantum.com/wp-content/uploads/2026/02/Applied-Quantum-SANS-Course-Awareness.png
LOCATION:https://us06web.zoom.us/j/84898325227
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Paris:20260224T080000
DTEND;TZID=Europe/Paris:20260224T093000
DTSTAMP:20260404T135726
CREATED:20260219T073510Z
LAST-MODIFIED:20260219T091358Z
UID:10000014-1771920000-1771925400@appliedquantum.com
SUMMARY:Quantum Security Awareness (Payments Edition): Payments Are Cryptography - PQC Under Millisecond SLAs
DESCRIPTION:About This Event\nThis complimentary webcast is designed for payments security leaders who need a clear\, no‑nonsense view of the quantum threat – and what to do about it now\, without fluff. Co‑hosted by QSECDEF and Applied Quantum\, this session cuts through generic PQC talk and focuses on what makes payments different: crypto everywhere\, many independent parties\, and millisecond operational envelopes that you can’t break. We focus on the real blockers in payments: interdependencies\, performance budgets\, and vendor/partner sequencing. \nPayments are unusually crypto‑dense and time‑dense: a single authorization spans parties that don’t share one change calendar (merchant → PSP/gateway → processor → network/switch → issuer → clearing/settlement)\, and the chain must complete inside strict timeout/retry behavior. We’ll use an interbank cryptography stack mapping as a concrete illustration of how many trust boundaries exist before you even introduce PQC – and why “just upgrade the algorithm” is not a plan.  \nFig 1: Sampe Cryptographic Complexity in Interbank Payments\nIn payments\, quantum readiness is an interoperability and sequencing problem as much as a cryptography problem. That’s why governance levers matter: PCI DSS v4.0 Req. 12.3.3 (documenting and reviewing cipher suites and protocols) is a practical forcing function for building crypto inventory discipline and making “crypto agility” real rather than aspirational. \nWe’ll translate the most useful real-world lessons into payments-specific decisions – drawing on central-bank experimentation from BIS Project Leap Phase 1 (hybrid encryption for payment-message confidentiality) and Phase 2 (PQC signatures in a TARGET2 context)\, where performance\, interoperability\, crypto-agility\, and vendor dependencies were tested in practice. \nWe’ll also treat integrity as first‑class\, not an afterthought. Payments rely on long‑lived certificates\, signed artifacts\, and device identities that underpin authorization evidence and operational trust. That’s where the TNFL (“trust now\, forge later”) lens becomes operational: it helps you prioritize signature/PKI trust anchors – not only confidentiality flows. \nMost importantly\, this will be a practical\, rails‑tested discussion. We’ll cover the real engineering lessons from BIS Project Leap and Leap 2 – including what these experiments teach us about compatibility\, performance budgets\, message sizes\, and multi‑component change. \nBy the end\, you should have a clear way to identify the 1–2 most “pilotable” payment corridors for hybrid/PQC work without breaking SLAs\, and a smarter structure for vendor/partner conversations grounded in what real payment infrastructure projects encountered\, and industry drivers like PCI DSS 12.3.3\, FS‑ISAC guidance\, and G7 financial-sector coordination efforts. \nFormat: Free live webcast (multiple sessions available) \nDuration: Awareness-level briefing – 1.5 hours \nCost: Free \n\nWhat Will You Learn\n\nWhere PQC migration actually fails first in payments: latency\, retries\, MTU/message size\, HSM throughput\, and certificate-chain realities.\nHow to use BIS Project Leap Phases 1–2 as a practical benchmark for what “PQC in real rails” demands (not a lab PoC).\nHow to prioritize TNFL-sensitive trust anchors (signing keys\, PKI roots\, device identity) alongside confidentiality flows.\nWhat “crypto agility” means operationally in payment platforms—and why hybrid often requires system evolution.\nHow to turn PCI/FS‑ISAC/G7 signals into concrete partner/vendor conversations and sequencing decisions.\n\n\nWho Should Attend\nCISOs and security/crypto leads in issuers\, acquirers\, processors\, PSPs/gateways\, networks/switches\, and payments infrastructure providers. \n\nPrerequisites\nGeneral awareness of quantum security risk\, PQC basics\, and typical migration challenges is helpful – but not required. For a primer-style session\, attendees may optionally join the introductory briefings we regularly provide: see Applied Quantum Events.  \n\nThis Session\nWednesday\, 24 Feb 2026\n\nTime: 8:00 AM CET | 7:00 AM GMT | 11:00 AM GST | 12:30 PM IST | 3:00 PM SGT | 6:00 PM AEDT\n\nAll events in the series: Quantum Security Awareness – Industry Editions \n\nRegistration\nThis event is co-hosted by Applied Quantum and QSECDEF. Registration is free. RSVP Below. \nPlease register below using your email address. Within minutes\, you will receive a confirmation email containing a calendar invite and the unique Zoom link for the day. If the email does not arrive shortly\, please check your junk or spam folder\, or contact us at admin@appliedquantum.com. \n\nNo fluff. No jargon. Just the clarity and next steps security leaders need. For questions or group registrations\, contact Applied Quantum. \n 
URL:https://appliedquantum.com/event/quantum-security-awareness-payments-24feb2026
CATEGORIES:Webinar
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/02/Quantum-Security-Industry-Webinars-Payments-24-Feb.jpg
LOCATION:https://us06web.zoom.us/j/81305976994
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Paris:20260219T190000
DTEND;TZID=Europe/Paris:20260219T213000
DTSTAMP:20260404T135726
CREATED:20260215T123655Z
LAST-MODIFIED:20260219T092415Z
UID:10000006-1771527600-1771536600@appliedquantum.com
SUMMARY:Quantum Security Awareness for Executives - Free Webcast
DESCRIPTION:A free executive briefing co-hosted by SANS Institute and Applied Quantum. Cut through the hype\, understand the risk\, and leave with actionable next steps. \n\nAbout This Event\nThis complimentary webcast is designed for security leaders who need a clear\, no-nonsense understanding of the quantum threat – and what to do about it now. Co-hosted by SANS Institute and Applied Quantum\, the session explains what’s changing in the cryptographic landscape\, why the migration to quantum-safe standards is far larger than most organizations expect\, and what practical steps you can take today. \nQuantum risk is not a future-only problem. Adversaries can harvest encrypted data today for later decryption\, while regulators and customers increasingly expect demonstrable progress now – not just plans for 2030 or 2035. \nFormat: Free live webcast (multiple sessions available) Duration: Awareness-level briefing – 2 hours Cost: Free \n\nWhat You Will Learn\nThis briefing gives security leaders: \n\nA clear map of the quantum threat landscape\, including how Harvest Now\, Decrypt Later attacks put long-life data at risk immediately – before quantum computers even arrive.\nA leadership-ready understanding of migration scope: cryptography is embedded across applications\, infrastructure\, vendors\, devices\, and identity systems – this is an enterprise-wide migration\, not a single control change.\nA concise view of what’s changing: algorithms\, certificates\, protocols\, vendor roadmaps\, and performance assumptions.\nThe compliance context: why demonstrable progress – inventories\, roadmaps\, vendor commitments\, and pilot results – is increasingly expected now\, not just by 2030/2035.\nA preview of the hard parts: cryptographic discovery\, legacy systems\, third-party dependencies\, and performance impacts.\nA practical checklist of next steps to start building an organization-wide quantum readiness plan.\nCommon narrative and terminology that reduces friction between risk owners and implementers.\n\n\nWhy “Wait and See” Is No Longer a Strategy\nThis is an enterprise-wide cryptographic migration\, not a single control. Crypto is embedded across applications\, infrastructure\, vendors\, devices\, and identity. The deadlines are only part of the story – the real challenge is inventory\, dependency mapping\, and coordinated change across teams and suppliers. \nAttackers don’t need quantum computers to start. Harvest Now\, Decrypt Later can put long-life data at risk immediately. Post-quantum changes can affect performance\, interoperability\, certificates\, and operational processes\, which means planning requires technical reality checks. \nRegulators and stakeholders increasingly expect evidence of progress – not just awareness. \n\nWho Should Attend\nThis webcast is designed for: \n\nCISOs\, CIOs\, Heads of Security\, Security Directors\nSecurity architects and enterprise architects\nGRC\, risk\, and compliance leaders who need a quantum-ready view of evidence and timelines\nIAM\, PKI\, TLS\, and VPN owners and the technical leaders who support them\nVendor assurance and procurement stakeholders involved in security requirements and roadmaps\n\n\nThis Session\nThursday\, 19 February 2026 – Americas / Europe\n\nTime: 1:00 PM EST | 10:00 AM PT | 6:00 PM UTC | 7:00 PM CET\n\nAll events in the series: Quantum Security Awareness for Executives – Free Webcast Series \n\nWant to go deeper?\nThese topics are covered in much more detail in the SANS Institute and Applied Quantum course SEC529: Quantum Security Readiness for Executives. Registration now open. \n\nRegistration\nThis event is co-hosted by SANS Institute and Applied Quantum. Registration is free. RSVP Below. \nPlease register below using your email address. Within minutes\, you will receive a confirmation email containing a calendar invite and the unique Zoom link for the day. If the email does not arrive shortly\, please check your junk or spam folder\, or contact us at admin@appliedquantum.com. \n\nNo fluff. No jargon. Just the clarity and next steps security leaders need. For questions or group registrations\, contact Applied Quantum. \n 
URL:https://appliedquantum.com/event/quantum-security-readiness-free-2
CATEGORIES:Webinar
ATTACH;FMTTYPE=image/png:https://appliedquantum.com/wp-content/uploads/2026/02/Applied-Quantum-SANS-Course-Awareness.png
LOCATION:https://us06web.zoom.us/j/81477052265
END:VEVENT
END:VCALENDAR