BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Applied Quantum - ECPv6.15.18//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:Applied Quantum
X-ORIGINAL-URL:https://appliedquantum.com
X-WR-CALDESC:Events for Applied Quantum
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:+02:00
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:Europe/Paris
BEGIN:DAYLIGHT
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
TZNAME:CEST
DTSTART:20250330T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
TZNAME:CET
DTSTART:20251026T010000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
TZNAME:CEST
DTSTART:20260329T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
TZNAME:CET
DTSTART:20261025T010000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
TZNAME:CEST
DTSTART:20270328T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
TZNAME:CET
DTSTART:20271031T010000
END:STANDARD
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20250309T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20251102T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20260308T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20261101T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20270314T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20271107T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=+02:00:20260409T090000
DTEND;TZID=+02:00:20260409T103000
DTSTAMP:20260404T121324
CREATED:20260316T100017Z
LAST-MODIFIED:20260402T101407Z
UID:10000027-1775725200-1775730600@appliedquantum.com
SUMMARY:Quantum Security Community - Online Fortnightly Update (EMEA\, APAC)
DESCRIPTION:***Quantum Security Community*** *is a free\, global\, practitioner-led network sharing real-world PQC insights and supporting one another through the most complex IT/OT security transformation of our time. Explore the channels at* ***[Quantum.Security](https://quantum.security)*** \n—————— \n**A weekly\, online community meetup for quantum security practitioners — focused on signal\, not hype.** \nPost-quantum cryptography (PQC)\, crypto agility\, quantum threat models\, and standards timelines are all evolving quickly. For security teams\, the challenge isn’t “finding information” — it’s deciding **what matters**\, **what changed**\, and **what to do next**. Quantum Security Weekly exists to make that easier. \nWe run the **same meetup twice each week** to cover global time zones: \n* **Session 1:** Europe / Middle East / APAC-friendly\n* **Session 2:** Europe / Americas-friendly\n(Choose the one that fits your schedule – content is aligned across both.) \n### **What happens each week** \nYou’ll get a curated update across the four categories that consistently drive real-world decisions: \n**1) Regulation & policy signals**\nNew requirements\, supervisory guidance\, national strategies\, procurement rules\, sector-specific expectations – and what they imply for timelines and planning. \n**2) Standards and “rules of the road”**\nUpdates to cryptographic standards and related ecosystems (protocols\, identity\, secure elements\, industry frameworks). We focus on what changes adoption feasibility\, interoperability\, or audit/compliance expectations. \n**3) Technical developments**\nCredible signals about quantum computing capability\, relevant cryptanalysis\, and meaningful algorithmic/security research (including “RSA-breaking” or signature-related developments) – explained in terms of security impact\, not headlines. \n**4) Practical implementation reality**\nThe stuff that makes or breaks programs: where crypto actually lives\, dependency chains\, vendor readiness\, device constraints\, performance tradeoffs\, rollout sequencing\, and “what we learned the hard way.” \n### **Speakers and community contributions** \nWe often invite a guest speaker to share practical experience (implementation lessons\, program strategy\, technical deep dives). Sometimes we’ll host short product introductions – but the default posture is educational and experience-driven\, not salesy. When there’s no guest\, we go deeper on the week’s most important developments and prioritize Q&A. \n### **Typical Agenda** \n**0:00 – 0:05 | Welcome + how to engage (fast)** \n* What this meetup is: **signal > hype**\, practical implications\, community-first\n* How to participate today: chat\, Q&A flow\, how to drop links/resources\n* Quick reminder of community channels (Forum / Slack / LinkedIn group) and how to continue the conversation after the call \n**0:05 – 0:25 | The Weekly Signal Brief (what actually changed)**\nA structured scan in four buckets\, with a “so what?” for each: \n* **Policy & regulation:** new drafts\, mandates\, enforcement signals\, procurement rules\n* **Standards & frameworks:** PQC standards movement\, protocol ecosystem changes\, guidance updates\n* **Quantum capability signals:** credible progress indicators (hardware\, error correction\, scaling)\, what to ignore\n* **Cryptography/cryptanalysis:** meaningful research developments\, “RSA/ECC breaking” signals\, security relevance \n**0:25 – 0:35 | Myth‑Busting / Reality Check (the hype audit)**\nIf something got hyped this week\, we’ll do a quick\, repeatable teardown: \n* **What happened** (one sentence)\n* **What didn’t happen** (the misconception)\n* **What it means for defenders** (real impact)\n* **What changes / what doesn’t** in PQC planning this year \n*Goal:* keep the community calibrated\, reduce panic\, and prevent misallocation of effort. \n**0:35 – 0:50 | One Topic\, Deeper (the week’s main story)**\nA focused deep dive on one theme that affects real programs\, such as: \n* crypto-agility patterns and failure modes\n* hybrid deployment realities (where it works / where it’s a trap)\n* migration sequencing and vendor dependency bottlenecks\n* what a standards change means for architects and CISOs\n* integrity-first thinking (e.g.\, signatures\, trust anchors\, long-lived evidence) \n**0:50 – 1:05 | Guest Spotlight (most weeks) OR Community Lightning Round** \n* **Guest Spotlight (preferred when available):**\n* 10–12 min: experience share / lessons learned / case study / product walkthrough (kept educational)\n* 3–5 min: moderated Q&A (“what surprised you / what broke / what you’d do differently”)\n* **If no guest:**\n* 3 lightning shares (3–4 min each): “one paper / one tool / one lesson / one vendor signal” \n**1:05 – 1:10 | Community Pulse (cross‑channel highlights)** \n* “Top 3 threads” from various community channels this week\n* Quick call-outs: members looking for feedback\, volunteer opportunities\, upcoming topics\n* How to propose a guest / suggest topics / share resources for next week \n**1:10 – 1:28 | Open Q&A / Office Hours** \n* Live questions (chat + audio)\n* “Bring your messy problem” time: inventory\, vendor claims\, timeline pressure\, governance\, metrics\n* Optional: rapid-fire “yes/no + why” on 5–8 quick questions if the room is lively \n**1:28 – 1:30 | Wrap + next week preview** \n* 3 takeaways in 30 seconds\n* What we’re tracking next week\n* Speaker/volunteer reminder (“If you’ve shipped something\, we want the story.”) \n### **Who should join** \nIf you’re responsible for security strategy\, cryptography\, identity\, platform security\, resilience\, compliance\, or product security – and quantum is on your roadmap – this is for you. \n### **What you’ll leave with** \n* Clear visibility into what changed this week\n* Better judgment on what’s noise vs. actionable signal\n* Practical framing for decisions you may need to revisit (inventory\, standards alignment\, vendor dependencies\, rollout sequencing)\n* A community you can learn from (and contribute to)
URL:https://appliedquantum.com/event/quantum-security-community-online-fortnightly-update-emea-apac-2
LOCATION:Online event
CATEGORIES:Community
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/03/1024x576-anROVz.jpg
GEO:-8.521147;179.1962
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=+02:00:20260409T090000
DTEND;TZID=+02:00:20260409T103000
DTSTAMP:20260404T121324
CREATED:20260403T103203Z
LAST-MODIFIED:20260403T103203Z
UID:10000069-1775725200-1775730600@appliedquantum.com
SUMMARY:Quantum Security Community - Online Fortnightly Update (EMEA\, APAC)
DESCRIPTION:***Quantum Security Community*** *is a free\, global\, practitioner-led network sharing real-world PQC insights and supporting one another through the most complex IT/OT security transformation of our time. Explore the channels at* ***[Quantum.Security](https://quantum.security)*** \n—————— \n**A weekly\, online community meetup for quantum security practitioners — focused on signal\, not hype.** \nPost-quantum cryptography (PQC)\, crypto agility\, quantum threat models\, and standards timelines are all evolving quickly. For security teams\, the challenge isn’t “finding information” — it’s deciding **what matters**\, **what changed**\, and **what to do next**. Quantum Security Weekly exists to make that easier. \nWe run the **same meetup twice each week** to cover global time zones: \n* **Session 1:** Europe / Middle East / APAC-friendly\n* **Session 2:** Europe / Americas-friendly\n(Choose the one that fits your schedule – content is aligned across both.) \n### **What happens each week** \nYou’ll get a curated update across the four categories that consistently drive real-world decisions: \n**1) Regulation & policy signals**\nNew requirements\, supervisory guidance\, national strategies\, procurement rules\, sector-specific expectations – and what they imply for timelines and planning. \n**2) Standards and “rules of the road”**\nUpdates to cryptographic standards and related ecosystems (protocols\, identity\, secure elements\, industry frameworks). We focus on what changes adoption feasibility\, interoperability\, or audit/compliance expectations. \n**3) Technical developments**\nCredible signals about quantum computing capability\, relevant cryptanalysis\, and meaningful algorithmic/security research (including “RSA-breaking” or signature-related developments) – explained in terms of security impact\, not headlines. \n**4) Practical implementation reality**\nThe stuff that makes or breaks programs: where crypto actually lives\, dependency chains\, vendor readiness\, device constraints\, performance tradeoffs\, rollout sequencing\, and “what we learned the hard way.” \n### **Speakers and community contributions** \nWe often invite a guest speaker to share practical experience (implementation lessons\, program strategy\, technical deep dives). Sometimes we’ll host short product introductions – but the default posture is educational and experience-driven\, not salesy. When there’s no guest\, we go deeper on the week’s most important developments and prioritize Q&A. \n### **Typical Agenda** \n**0:00 – 0:05 | Welcome + how to engage (fast)** \n* What this meetup is: **signal > hype**\, practical implications\, community-first\n* How to participate today: chat\, Q&A flow\, how to drop links/resources\n* Quick reminder of community channels (Forum / Slack / LinkedIn group) and how to continue the conversation after the call \n**0:05 – 0:25 | The Weekly Signal Brief (what actually changed)**\nA structured scan in four buckets\, with a “so what?” for each: \n* **Policy & regulation:** new drafts\, mandates\, enforcement signals\, procurement rules\n* **Standards & frameworks:** PQC standards movement\, protocol ecosystem changes\, guidance updates\n* **Quantum capability signals:** credible progress indicators (hardware\, error correction\, scaling)\, what to ignore\n* **Cryptography/cryptanalysis:** meaningful research developments\, “RSA/ECC breaking” signals\, security relevance \n**0:25 – 0:35 | Myth‑Busting / Reality Check (the hype audit)**\nIf something got hyped this week\, we’ll do a quick\, repeatable teardown: \n* **What happened** (one sentence)\n* **What didn’t happen** (the misconception)\n* **What it means for defenders** (real impact)\n* **What changes / what doesn’t** in PQC planning this year \n*Goal:* keep the community calibrated\, reduce panic\, and prevent misallocation of effort. \n**0:35 – 0:50 | One Topic\, Deeper (the week’s main story)**\nA focused deep dive on one theme that affects real programs\, such as: \n* crypto-agility patterns and failure modes\n* hybrid deployment realities (where it works / where it’s a trap)\n* migration sequencing and vendor dependency bottlenecks\n* what a standards change means for architects and CISOs\n* integrity-first thinking (e.g.\, signatures\, trust anchors\, long-lived evidence) \n**0:50 – 1:05 | Guest Spotlight (most weeks) OR Community Lightning Round** \n* **Guest Spotlight (preferred when available):**\n* 10–12 min: experience share / lessons learned / case study / product walkthrough (kept educational)\n* 3–5 min: moderated Q&A (“what surprised you / what broke / what you’d do differently”)\n* **If no guest:**\n* 3 lightning shares (3–4 min each): “one paper / one tool / one lesson / one vendor signal” \n**1:05 – 1:10 | Community Pulse (cross‑channel highlights)** \n* “Top 3 threads” from various community channels this week\n* Quick call-outs: members looking for feedback\, volunteer opportunities\, upcoming topics\n* How to propose a guest / suggest topics / share resources for next week \n**1:10 – 1:28 | Open Q&A / Office Hours** \n* Live questions (chat + audio)\n* “Bring your messy problem” time: inventory\, vendor claims\, timeline pressure\, governance\, metrics\n* Optional: rapid-fire “yes/no + why” on 5–8 quick questions if the room is lively \n**1:28 – 1:30 | Wrap + next week preview** \n* 3 takeaways in 30 seconds\n* What we’re tracking next week\n* Speaker/volunteer reminder (“If you’ve shipped something\, we want the story.”) \n### **Who should join** \nIf you’re responsible for security strategy\, cryptography\, identity\, platform security\, resilience\, compliance\, or product security – and quantum is on your roadmap – this is for you. \n### **What you’ll leave with** \n* Clear visibility into what changed this week\n* Better judgment on what’s noise vs. actionable signal\n* Practical framing for decisions you may need to revisit (inventory\, standards alignment\, vendor dependencies\, rollout sequencing)\n* A community you can learn from (and contribute to)
URL:https://appliedquantum.com/event/quantum-security-community-online-fortnightly-update-emea-apac-22
LOCATION:Online event
CATEGORIES:Community
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/03/1024x576-anROVz.jpg
GEO:-8.521147;179.1962
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=+02:00:20260409T170000
DTEND;TZID=+02:00:20260409T183000
DTSTAMP:20260404T121324
CREATED:20260316T100017Z
LAST-MODIFIED:20260320T103012Z
UID:10000028-1775754000-1775759400@appliedquantum.com
SUMMARY:Quantum Security Community - Online Fortnightly Update (America\, EMEA)
DESCRIPTION:***Quantum Security Community*** *is a free\, global\, practitioner-led network sharing real-world PQC insights and supporting one another through the most complex IT/OT security transformation of our time. Explore the channels at* ***[Quantum.Security](https://quantum.security)*** \n—————— \n**A weekly\, online community meetup for quantum security practitioners — focused on signal\, not hype.** \nPost-quantum cryptography (PQC)\, crypto agility\, quantum threat models\, and standards timelines are all evolving quickly. For security teams\, the challenge isn’t “finding information” — it’s deciding **what matters**\, **what changed**\, and **what to do next**. Quantum Security Weekly exists to make that easier. \nWe run the **same meetup twice each week** to cover global time zones: \n* **Session 1:** Europe / Middle East / APAC-friendly\n* **Session 2:** Europe / Americas-friendly\n(Choose the one that fits your schedule – content is aligned across both.) \n### **What happens each week** \nYou’ll get a curated update across the four categories that consistently drive real-world decisions: \n**1) Regulation & policy signals**\nNew requirements\, supervisory guidance\, national strategies\, procurement rules\, sector-specific expectations – and what they imply for timelines and planning. \n**2) Standards and “rules of the road”**\nUpdates to cryptographic standards and related ecosystems (protocols\, identity\, secure elements\, industry frameworks). We focus on what changes adoption feasibility\, interoperability\, or audit/compliance expectations. \n**3) Technical developments**\nCredible signals about quantum computing capability\, relevant cryptanalysis\, and meaningful algorithmic/security research (including “RSA-breaking” or signature-related developments) – explained in terms of security impact\, not headlines. \n**4) Practical implementation reality**\nThe stuff that makes or breaks programs: where crypto actually lives\, dependency chains\, vendor readiness\, device constraints\, performance tradeoffs\, rollout sequencing\, and “what we learned the hard way.” \n### **Speakers and community contributions** \nWe often invite a guest speaker to share practical experience (implementation lessons\, program strategy\, technical deep dives). Sometimes we’ll host short product introductions – but the default posture is educational and experience-driven\, not salesy. When there’s no guest\, we go deeper on the week’s most important developments and prioritize Q&A. \n### **Typical Agenda** \n**0:00 – 0:05 | Welcome + how to engage (fast)** \n* What this meetup is: **signal > hype**\, practical implications\, community-first\n* How to participate today: chat\, Q&A flow\, how to drop links/resources\n* Quick reminder of community channels (Forum / Slack / LinkedIn group) and how to continue the conversation after the call \n**0:05 – 0:25 | The Weekly Signal Brief (what actually changed)**\nA structured scan in four buckets\, with a “so what?” for each: \n* **Policy & regulation:** new drafts\, mandates\, enforcement signals\, procurement rules\n* **Standards & frameworks:** PQC standards movement\, protocol ecosystem changes\, guidance updates\n* **Quantum capability signals:** credible progress indicators (hardware\, error correction\, scaling)\, what to ignore\n* **Cryptography/cryptanalysis:** meaningful research developments\, “RSA/ECC breaking” signals\, security relevance \n**0:25 – 0:35 | Myth‑Busting / Reality Check (the hype audit)**\nIf something got hyped this week\, we’ll do a quick\, repeatable teardown: \n* **What happened** (one sentence)\n* **What didn’t happen** (the misconception)\n* **What it means for defenders** (real impact)\n* **What changes / what doesn’t** in PQC planning this year \n*Goal:* keep the community calibrated\, reduce panic\, and prevent misallocation of effort. \n**0:35 – 0:50 | One Topic\, Deeper (the week’s main story)**\nA focused deep dive on one theme that affects real programs\, such as: \n* crypto-agility patterns and failure modes\n* hybrid deployment realities (where it works / where it’s a trap)\n* migration sequencing and vendor dependency bottlenecks\n* what a standards change means for architects and CISOs\n* integrity-first thinking (e.g.\, signatures\, trust anchors\, long-lived evidence) \n**0:50 – 1:05 | Guest Spotlight (most weeks) OR Community Lightning Round** \n* **Guest Spotlight (preferred when available):**\n* 10–12 min: experience share / lessons learned / case study / product walkthrough (kept educational)\n* 3–5 min: moderated Q&A (“what surprised you / what broke / what you’d do differently”)\n* **If no guest:**\n* 3 lightning shares (3–4 min each): “one paper / one tool / one lesson / one vendor signal” \n**1:05 – 1:10 | Community Pulse (cross‑channel highlights)** \n* “Top 3 threads” from various community channels this week\n* Quick call-outs: members looking for feedback\, volunteer opportunities\, upcoming topics\n* How to propose a guest / suggest topics / share resources for next week \n**1:10 – 1:28 | Open Q&A / Office Hours** \n* Live questions (chat + audio)\n* “Bring your messy problem” time: inventory\, vendor claims\, timeline pressure\, governance\, metrics\n* Optional: rapid-fire “yes/no + why” on 5–8 quick questions if the room is lively \n**1:28 – 1:30 | Wrap + next week preview** \n* 3 takeaways in 30 seconds\n* What we’re tracking next week\n* Speaker/volunteer reminder (“If you’ve shipped something\, we want the story.”) \n### **Who should join** \nIf you’re responsible for security strategy\, cryptography\, identity\, platform security\, resilience\, compliance\, or product security – and quantum is on your roadmap – this is for you. \n### **What you’ll leave with** \n* Clear visibility into what changed this week\n* Better judgment on what’s noise vs. actionable signal\n* Practical framing for decisions you may need to revisit (inventory\, standards alignment\, vendor dependencies\, rollout sequencing)\n* A community you can learn from (and contribute to)
URL:https://appliedquantum.com/event/quantum-security-community-online-fortnightly-update-america-emea-2
LOCATION:Online event
CATEGORIES:Community
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/03/1024x576-bya3VY.jpg
GEO:-8.521147;179.1962
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=+02:00:20260409T170000
DTEND;TZID=+02:00:20260409T183000
DTSTAMP:20260404T121324
CREATED:20260321T103113Z
LAST-MODIFIED:20260403T103203Z
UID:10000065-1775754000-1775759400@appliedquantum.com
SUMMARY:Quantum Security Community - Online Fortnightly Update (America\, EMEA)
DESCRIPTION:***Quantum Security Community*** *is a free\, global\, practitioner-led network sharing real-world PQC insights and supporting one another through the most complex IT/OT security transformation of our time. Explore the channels at* ***[Quantum.Security](https://quantum.security)*** \n—————— \n**A weekly\, online community meetup for quantum security practitioners — focused on signal\, not hype.** \nPost-quantum cryptography (PQC)\, crypto agility\, quantum threat models\, and standards timelines are all evolving quickly. For security teams\, the challenge isn’t “finding information” — it’s deciding **what matters**\, **what changed**\, and **what to do next**. Quantum Security Weekly exists to make that easier. \nWe run the **same meetup twice each week** to cover global time zones: \n* **Session 1:** Europe / Middle East / APAC-friendly\n* **Session 2:** Europe / Americas-friendly\n(Choose the one that fits your schedule – content is aligned across both.) \n### **What happens each week** \nYou’ll get a curated update across the four categories that consistently drive real-world decisions: \n**1) Regulation & policy signals**\nNew requirements\, supervisory guidance\, national strategies\, procurement rules\, sector-specific expectations – and what they imply for timelines and planning. \n**2) Standards and “rules of the road”**\nUpdates to cryptographic standards and related ecosystems (protocols\, identity\, secure elements\, industry frameworks). We focus on what changes adoption feasibility\, interoperability\, or audit/compliance expectations. \n**3) Technical developments**\nCredible signals about quantum computing capability\, relevant cryptanalysis\, and meaningful algorithmic/security research (including “RSA-breaking” or signature-related developments) – explained in terms of security impact\, not headlines. \n**4) Practical implementation reality**\nThe stuff that makes or breaks programs: where crypto actually lives\, dependency chains\, vendor readiness\, device constraints\, performance tradeoffs\, rollout sequencing\, and “what we learned the hard way.” \n### **Speakers and community contributions** \nWe often invite a guest speaker to share practical experience (implementation lessons\, program strategy\, technical deep dives). Sometimes we’ll host short product introductions – but the default posture is educational and experience-driven\, not salesy. When there’s no guest\, we go deeper on the week’s most important developments and prioritize Q&A. \n### **Typical Agenda** \n**0:00 – 0:05 | Welcome + how to engage (fast)** \n* What this meetup is: **signal > hype**\, practical implications\, community-first\n* How to participate today: chat\, Q&A flow\, how to drop links/resources\n* Quick reminder of community channels (Forum / Slack / LinkedIn group) and how to continue the conversation after the call \n**0:05 – 0:25 | The Weekly Signal Brief (what actually changed)**\nA structured scan in four buckets\, with a “so what?” for each: \n* **Policy & regulation:** new drafts\, mandates\, enforcement signals\, procurement rules\n* **Standards & frameworks:** PQC standards movement\, protocol ecosystem changes\, guidance updates\n* **Quantum capability signals:** credible progress indicators (hardware\, error correction\, scaling)\, what to ignore\n* **Cryptography/cryptanalysis:** meaningful research developments\, “RSA/ECC breaking” signals\, security relevance \n**0:25 – 0:35 | Myth‑Busting / Reality Check (the hype audit)**\nIf something got hyped this week\, we’ll do a quick\, repeatable teardown: \n* **What happened** (one sentence)\n* **What didn’t happen** (the misconception)\n* **What it means for defenders** (real impact)\n* **What changes / what doesn’t** in PQC planning this year \n*Goal:* keep the community calibrated\, reduce panic\, and prevent misallocation of effort. \n**0:35 – 0:50 | One Topic\, Deeper (the week’s main story)**\nA focused deep dive on one theme that affects real programs\, such as: \n* crypto-agility patterns and failure modes\n* hybrid deployment realities (where it works / where it’s a trap)\n* migration sequencing and vendor dependency bottlenecks\n* what a standards change means for architects and CISOs\n* integrity-first thinking (e.g.\, signatures\, trust anchors\, long-lived evidence) \n**0:50 – 1:05 | Guest Spotlight (most weeks) OR Community Lightning Round** \n* **Guest Spotlight (preferred when available):**\n* 10–12 min: experience share / lessons learned / case study / product walkthrough (kept educational)\n* 3–5 min: moderated Q&A (“what surprised you / what broke / what you’d do differently”)\n* **If no guest:**\n* 3 lightning shares (3–4 min each): “one paper / one tool / one lesson / one vendor signal” \n**1:05 – 1:10 | Community Pulse (cross‑channel highlights)** \n* “Top 3 threads” from various community channels this week\n* Quick call-outs: members looking for feedback\, volunteer opportunities\, upcoming topics\n* How to propose a guest / suggest topics / share resources for next week \n**1:10 – 1:28 | Open Q&A / Office Hours** \n* Live questions (chat + audio)\n* “Bring your messy problem” time: inventory\, vendor claims\, timeline pressure\, governance\, metrics\n* Optional: rapid-fire “yes/no + why” on 5–8 quick questions if the room is lively \n**1:28 – 1:30 | Wrap + next week preview** \n* 3 takeaways in 30 seconds\n* What we’re tracking next week\n* Speaker/volunteer reminder (“If you’ve shipped something\, we want the story.”) \n### **Who should join** \nIf you’re responsible for security strategy\, cryptography\, identity\, platform security\, resilience\, compliance\, or product security – and quantum is on your roadmap – this is for you. \n### **What you’ll leave with** \n* Clear visibility into what changed this week\n* Better judgment on what’s noise vs. actionable signal\n* Practical framing for decisions you may need to revisit (inventory\, standards alignment\, vendor dependencies\, rollout sequencing)\n* A community you can learn from (and contribute to)
URL:https://appliedquantum.com/event/quantum-security-community-online-fortnightly-update-america-emea-21
LOCATION:Online event
CATEGORIES:Community
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/03/1024x576-bya3VY.jpg
GEO:-8.521147;179.1962
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Paris:20260422T050000
DTEND;TZID=Europe/Paris:20260422T073000
DTSTAMP:20260404T121324
CREATED:20260217T155808Z
LAST-MODIFIED:20260219T092231Z
UID:10000012-1776834000-1776843000@appliedquantum.com
SUMMARY:Quantum Security Awareness for Practitioners - Free Technical Webcast
DESCRIPTION:A free technical briefing co-hosted by SANS Institute and Applied Quantum. Go beyond “quantum breaks RSA” and get the practitioner’s view: what changes in your TLS\, PKI\, VPN\, identity\, and software supply chain – and how to start testing and implementing without breaking production. \n\nAbout This Event\nThis complimentary webcast is designed for security architects\, engineers\, and cyber defenders who need a practical\, no-hype understanding of post-quantum cryptography (PQC) and quantum security and what it means for real systems. Co-hosted by SANS Institute and Applied Quantum. \nWe’ll keep the introduction short – just enough to align on the threat model and the standards landscape – then we’ll go deeper into the parts that usually get skipped: \n\nWhere PQC actually lands in modern enterprises (protocols\, libraries\, certificates\, HSMs\, third-party platforms)\nWhy the migration is bigger than an algorithm swap\nWhat breaks first (often: performance assumptions\, interoperability\, certificate and handshake sizes\, network edge constraints)\nHow to get traction fast using inventory + prioritization + crypto-agility patterns\n\nFormat: Free live webcastDuration: 2.5 hours (includes Q&A)Level: Awareness-first\, but architect / implementer-orientedCost: Free \n\nWhat You Will Learn\nBy the end of this session\, technical teams will be able to: \n\nExplain the quantum threat in engineering terms (confidentiality and integrity impacts\, including “harvest now\, decrypt later” and long-lived trust risks (” trust now\, forge later”).\nDescribe what NIST has standardized so far – and what that implies for deployment decisions (KEMs vs signatures\, and where each appears in real protocols).\nIdentify the “blast radius” of PQC across enterprise stacks: TLS termination\, mTLS in service meshes\, VPN gateways\, PKI hierarchies\, code signing\, device identity\, and third-party dependencies.\nRecognize common failure modes early (performance regressions\, MTU/fragmentation surprises\, certificate chain bloat\, middlebox issues\, brittle crypto dependencies).\nUnderstand what a Cryptographic Bill of Materials (CBOM) and cryptographic inventory should contain to support a defensible migration plan.\nApply practical crypto-agility patterns (abstraction\, configuration-driven crypto policy\, algorithm negotiation\, safe upgrade/rollback\, test harnessing).\nLeave with a sample “first 90 days” approach: what to inventory\, what to pilot\, what to test\, and how to avoid expensive dead ends.\n\n\nTopics Covered\nThis session covers the following topics (with an emphasis on real-world architectures and operational constraints): \n1) Threat model and technical context (fast\, practical intro)\n\nCRQC as a planning concept (what “cryptanalytically relevant” actually means for engineering timelines)\nHarvest-now/decrypt-later vs integrity and authenticity risks (“trust now\, forge later”)\n“Why now” signals: standards\, platform roadmaps\, and compliance pressure turning into delivery pressure\n\n2) Standards landscape you can build on\n\nNIST PQC standards: what’s finalized\, what’s next\, and why it matters to architects\nKEMs vs signatures in real systems (where key exchange ends and authentication begins)\nHybrid approaches (why they exist\, how they reduce risk\, and what they complicate)\n\n3) Where PQC hits first in real enterprise stacks\n\nTLS 1.3 / HTTPS at the edge: handshake and certificate impacts\, termination patterns\nmTLS for east-west traffic (service mesh / microservices) and what “small inefficiencies” become at scale\nVPN and remote access: gateway constraints\, device fleets\, and “upgrade sequencing”\nPKI and certificate lifecycles: issuance\, rotation\, chain size\, and operational overhead\nSoftware supply chain: code signing\, firmware signing\, CI/CD trust roots\, artifact verification\n\n4) Network and infrastructure realities\n\nPerformance and scaling assumptions that quietly break (latency\, CPU\, memory\, bandwidth)\nMTU\, fragmentation\, and “middlebox weirdness”\nLoad balancers\, proxies\, WAFs\, CDNs\, and cloud-managed TLS: where you can change crypto vs where you can only influence it\n\n5) Cryptographic discovery\, inventory\, and CBOM (the work nobody can skip)\n\nWhat a cryptographic inventory must include to be migration-useful (not just “RSA is used somewhere”)\nBuilding and operationalizing CBOMs across products\, platforms\, and vendors\nContinuous crypto discovery (because inventories rot fast)\n\n6) Risk-driven prioritization and migration planning\n\nHow to prioritize when full inventory is not feasible (risk-driven sampling\, choke points\, long-lived data paths)\nMigration waves: “protect long-life data first” vs “protect the broadest crypto infrastructure first”\nVendor and third-party dependencies: how to ask for the right evidence (not marketing)\n\n7) Crypto-agility patterns for teams that must ship\n\nPractical crypto-agility reference patterns (abstraction layers\, policy engines\, configuration control)\nDesigning for algorithm change as a normal operating condition (not an emergency project)\nTesting\, rollback\, and avoiding one-way doors\n\n\nWhy “Wait and See” Is No Longer a Strategy\nPQC is not a future-only problem – and for technical teams\, the reason is simple: migration lead time is the risk. \nEven if you ignore Q-Day forecasting entirely\, you still face a very practical reality: cryptography is embedded across protocols\, products\, libraries\, certificates\, devices\, and vendor ecosystems. The hard part is not selecting an algorithm – it’s discovering dependencies\, coordinating change across owners\, and validating performance and interoperability before deadlines and incidents force rushed work. \nThe earlier you test\, the fewer surprises you pay for later. \n\nWho Should Attend\nThis webcast is designed for: \n\nSecurity architects\, enterprise architects\, and platform architects\nCryptography engineers\, PKI owners\, and certificate services teams\nNetwork/security engineers responsible for TLS termination\, VPNs\, gateways\, and edge infrastructure\nDevSecOps\, SRE\, and cloud security teams supporting large-scale mTLS and service connectivity\nApplication security and product security teams (especially those who own libraries and build pipelines)\nSecurity engineering leaders who need a technically credible roadmap (not a slideware plan)\n\nNo advanced math or physics required. If you’re comfortable with modern security architecture (TLS/PKI concepts\, key management basics\, and how systems integrate)\, you’re the target audience. \n\nThis Session\nThursday\, 22 April 2026\n\nTime: 11:00 AM SGT | 8:30 AM IST | 1:00 PM AEST | 8:00 PM PDT (21 April)\n\nAll events in the series: Quantum Security Awareness for Practitioners – Free Technical Webcast Series \n\nWant the hands-on version?\nThis webcast is an awareness-level extract of the material. All topics above will be covered in far greater depth in a 5-day\, hands-on course (SEC531) currently being developed by SANS Institute and Applied Quantum\, including practical exercises\, implementation patterns\, and real-world migration playbooks. \n\nRegistration\nThis event is co-hosted by SANS Institute and Applied Quantum. Registration is free. RSVP Below. \nPlease register below using your email address. Within minutes\, you will receive a confirmation email containing a calendar invite and the unique Zoom link for the day. If the email does not arrive shortly\, please check your junk or spam folder\, or contact us at admin@appliedquantum.com. \n\nNo fluff. No jargon. Just the clarity and next steps security practitioners need. For questions or group registrations\, contact Applied Quantum. \n 
URL:https://appliedquantum.com/event/quantum-security-awareness-practitioners-2
CATEGORIES:Webinar
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/02/Applied-Quantum-SANS-Course-Practitioners.jpg
LOCATION:https://us06web.zoom.us/j/88164192504
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=+02:00:20260423T090000
DTEND;TZID=+02:00:20260423T103000
DTSTAMP:20260404T121324
CREATED:20260316T100017Z
LAST-MODIFIED:20260403T103203Z
UID:10000029-1776934800-1776940200@appliedquantum.com
SUMMARY:Quantum Security Community - Online Fortnightly Update (EMEA\, APAC)
DESCRIPTION:***Quantum Security Community*** *is a free\, global\, practitioner-led network sharing real-world PQC insights and supporting one another through the most complex IT/OT security transformation of our time. Explore the channels at* ***[Quantum.Security](https://quantum.security)*** \n—————— \n**A weekly\, online community meetup for quantum security practitioners — focused on signal\, not hype.** \nPost-quantum cryptography (PQC)\, crypto agility\, quantum threat models\, and standards timelines are all evolving quickly. For security teams\, the challenge isn’t “finding information” — it’s deciding **what matters**\, **what changed**\, and **what to do next**. Quantum Security Weekly exists to make that easier. \nWe run the **same meetup twice each week** to cover global time zones: \n* **Session 1:** Europe / Middle East / APAC-friendly\n* **Session 2:** Europe / Americas-friendly\n(Choose the one that fits your schedule – content is aligned across both.) \n### **What happens each week** \nYou’ll get a curated update across the four categories that consistently drive real-world decisions: \n**1) Regulation & policy signals**\nNew requirements\, supervisory guidance\, national strategies\, procurement rules\, sector-specific expectations – and what they imply for timelines and planning. \n**2) Standards and “rules of the road”**\nUpdates to cryptographic standards and related ecosystems (protocols\, identity\, secure elements\, industry frameworks). We focus on what changes adoption feasibility\, interoperability\, or audit/compliance expectations. \n**3) Technical developments**\nCredible signals about quantum computing capability\, relevant cryptanalysis\, and meaningful algorithmic/security research (including “RSA-breaking” or signature-related developments) – explained in terms of security impact\, not headlines. \n**4) Practical implementation reality**\nThe stuff that makes or breaks programs: where crypto actually lives\, dependency chains\, vendor readiness\, device constraints\, performance tradeoffs\, rollout sequencing\, and “what we learned the hard way.” \n### **Speakers and community contributions** \nWe often invite a guest speaker to share practical experience (implementation lessons\, program strategy\, technical deep dives). Sometimes we’ll host short product introductions – but the default posture is educational and experience-driven\, not salesy. When there’s no guest\, we go deeper on the week’s most important developments and prioritize Q&A. \n### **Typical Agenda** \n**0:00 – 0:05 | Welcome + how to engage (fast)** \n* What this meetup is: **signal > hype**\, practical implications\, community-first\n* How to participate today: chat\, Q&A flow\, how to drop links/resources\n* Quick reminder of community channels (Forum / Slack / LinkedIn group) and how to continue the conversation after the call \n**0:05 – 0:25 | The Weekly Signal Brief (what actually changed)**\nA structured scan in four buckets\, with a “so what?” for each: \n* **Policy & regulation:** new drafts\, mandates\, enforcement signals\, procurement rules\n* **Standards & frameworks:** PQC standards movement\, protocol ecosystem changes\, guidance updates\n* **Quantum capability signals:** credible progress indicators (hardware\, error correction\, scaling)\, what to ignore\n* **Cryptography/cryptanalysis:** meaningful research developments\, “RSA/ECC breaking” signals\, security relevance \n**0:25 – 0:35 | Myth‑Busting / Reality Check (the hype audit)**\nIf something got hyped this week\, we’ll do a quick\, repeatable teardown: \n* **What happened** (one sentence)\n* **What didn’t happen** (the misconception)\n* **What it means for defenders** (real impact)\n* **What changes / what doesn’t** in PQC planning this year \n*Goal:* keep the community calibrated\, reduce panic\, and prevent misallocation of effort. \n**0:35 – 0:50 | One Topic\, Deeper (the week’s main story)**\nA focused deep dive on one theme that affects real programs\, such as: \n* crypto-agility patterns and failure modes\n* hybrid deployment realities (where it works / where it’s a trap)\n* migration sequencing and vendor dependency bottlenecks\n* what a standards change means for architects and CISOs\n* integrity-first thinking (e.g.\, signatures\, trust anchors\, long-lived evidence) \n**0:50 – 1:05 | Guest Spotlight (most weeks) OR Community Lightning Round** \n* **Guest Spotlight (preferred when available):**\n* 10–12 min: experience share / lessons learned / case study / product walkthrough (kept educational)\n* 3–5 min: moderated Q&A (“what surprised you / what broke / what you’d do differently”)\n* **If no guest:**\n* 3 lightning shares (3–4 min each): “one paper / one tool / one lesson / one vendor signal” \n**1:05 – 1:10 | Community Pulse (cross‑channel highlights)** \n* “Top 3 threads” from various community channels this week\n* Quick call-outs: members looking for feedback\, volunteer opportunities\, upcoming topics\n* How to propose a guest / suggest topics / share resources for next week \n**1:10 – 1:28 | Open Q&A / Office Hours** \n* Live questions (chat + audio)\n* “Bring your messy problem” time: inventory\, vendor claims\, timeline pressure\, governance\, metrics\n* Optional: rapid-fire “yes/no + why” on 5–8 quick questions if the room is lively \n**1:28 – 1:30 | Wrap + next week preview** \n* 3 takeaways in 30 seconds\n* What we’re tracking next week\n* Speaker/volunteer reminder (“If you’ve shipped something\, we want the story.”) \n### **Who should join** \nIf you’re responsible for security strategy\, cryptography\, identity\, platform security\, resilience\, compliance\, or product security – and quantum is on your roadmap – this is for you. \n### **What you’ll leave with** \n* Clear visibility into what changed this week\n* Better judgment on what’s noise vs. actionable signal\n* Practical framing for decisions you may need to revisit (inventory\, standards alignment\, vendor dependencies\, rollout sequencing)\n* A community you can learn from (and contribute to)
URL:https://appliedquantum.com/event/quantum-security-community-online-fortnightly-update-emea-apac-3
LOCATION:Online event
CATEGORIES:Community
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/03/1024x576-anROVz.jpg
GEO:-8.521147;179.1962
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=+02:00:20260423T170000
DTEND;TZID=+02:00:20260423T183000
DTSTAMP:20260404T121324
CREATED:20260316T100017Z
LAST-MODIFIED:20260328T095952Z
UID:10000030-1776963600-1776969000@appliedquantum.com
SUMMARY:Quantum Security Community - Online Fortnightly Update (America\, EMEA)
DESCRIPTION:***Quantum Security Community*** *is a free\, global\, practitioner-led network sharing real-world PQC insights and supporting one another through the most complex IT/OT security transformation of our time. Explore the channels at* ***[Quantum.Security](https://quantum.security)*** \n—————— \n**A weekly\, online community meetup for quantum security practitioners — focused on signal\, not hype.** \nPost-quantum cryptography (PQC)\, crypto agility\, quantum threat models\, and standards timelines are all evolving quickly. For security teams\, the challenge isn’t “finding information” — it’s deciding **what matters**\, **what changed**\, and **what to do next**. Quantum Security Weekly exists to make that easier. \nWe run the **same meetup twice each week** to cover global time zones: \n* **Session 1:** Europe / Middle East / APAC-friendly\n* **Session 2:** Europe / Americas-friendly\n(Choose the one that fits your schedule – content is aligned across both.) \n### **What happens each week** \nYou’ll get a curated update across the four categories that consistently drive real-world decisions: \n**1) Regulation & policy signals**\nNew requirements\, supervisory guidance\, national strategies\, procurement rules\, sector-specific expectations – and what they imply for timelines and planning. \n**2) Standards and “rules of the road”**\nUpdates to cryptographic standards and related ecosystems (protocols\, identity\, secure elements\, industry frameworks). We focus on what changes adoption feasibility\, interoperability\, or audit/compliance expectations. \n**3) Technical developments**\nCredible signals about quantum computing capability\, relevant cryptanalysis\, and meaningful algorithmic/security research (including “RSA-breaking” or signature-related developments) – explained in terms of security impact\, not headlines. \n**4) Practical implementation reality**\nThe stuff that makes or breaks programs: where crypto actually lives\, dependency chains\, vendor readiness\, device constraints\, performance tradeoffs\, rollout sequencing\, and “what we learned the hard way.” \n### **Speakers and community contributions** \nWe often invite a guest speaker to share practical experience (implementation lessons\, program strategy\, technical deep dives). Sometimes we’ll host short product introductions – but the default posture is educational and experience-driven\, not salesy. When there’s no guest\, we go deeper on the week’s most important developments and prioritize Q&A. \n### **Typical Agenda** \n**0:00 – 0:05 | Welcome + how to engage (fast)** \n* What this meetup is: **signal > hype**\, practical implications\, community-first\n* How to participate today: chat\, Q&A flow\, how to drop links/resources\n* Quick reminder of community channels (Forum / Slack / LinkedIn group) and how to continue the conversation after the call \n**0:05 – 0:25 | The Weekly Signal Brief (what actually changed)**\nA structured scan in four buckets\, with a “so what?” for each: \n* **Policy & regulation:** new drafts\, mandates\, enforcement signals\, procurement rules\n* **Standards & frameworks:** PQC standards movement\, protocol ecosystem changes\, guidance updates\n* **Quantum capability signals:** credible progress indicators (hardware\, error correction\, scaling)\, what to ignore\n* **Cryptography/cryptanalysis:** meaningful research developments\, “RSA/ECC breaking” signals\, security relevance \n**0:25 – 0:35 | Myth‑Busting / Reality Check (the hype audit)**\nIf something got hyped this week\, we’ll do a quick\, repeatable teardown: \n* **What happened** (one sentence)\n* **What didn’t happen** (the misconception)\n* **What it means for defenders** (real impact)\n* **What changes / what doesn’t** in PQC planning this year \n*Goal:* keep the community calibrated\, reduce panic\, and prevent misallocation of effort. \n**0:35 – 0:50 | One Topic\, Deeper (the week’s main story)**\nA focused deep dive on one theme that affects real programs\, such as: \n* crypto-agility patterns and failure modes\n* hybrid deployment realities (where it works / where it’s a trap)\n* migration sequencing and vendor dependency bottlenecks\n* what a standards change means for architects and CISOs\n* integrity-first thinking (e.g.\, signatures\, trust anchors\, long-lived evidence) \n**0:50 – 1:05 | Guest Spotlight (most weeks) OR Community Lightning Round** \n* **Guest Spotlight (preferred when available):**\n* 10–12 min: experience share / lessons learned / case study / product walkthrough (kept educational)\n* 3–5 min: moderated Q&A (“what surprised you / what broke / what you’d do differently”)\n* **If no guest:**\n* 3 lightning shares (3–4 min each): “one paper / one tool / one lesson / one vendor signal” \n**1:05 – 1:10 | Community Pulse (cross‑channel highlights)** \n* “Top 3 threads” from various community channels this week\n* Quick call-outs: members looking for feedback\, volunteer opportunities\, upcoming topics\n* How to propose a guest / suggest topics / share resources for next week \n**1:10 – 1:28 | Open Q&A / Office Hours** \n* Live questions (chat + audio)\n* “Bring your messy problem” time: inventory\, vendor claims\, timeline pressure\, governance\, metrics\n* Optional: rapid-fire “yes/no + why” on 5–8 quick questions if the room is lively \n**1:28 – 1:30 | Wrap + next week preview** \n* 3 takeaways in 30 seconds\n* What we’re tracking next week\n* Speaker/volunteer reminder (“If you’ve shipped something\, we want the story.”) \n### **Who should join** \nIf you’re responsible for security strategy\, cryptography\, identity\, platform security\, resilience\, compliance\, or product security – and quantum is on your roadmap – this is for you. \n### **What you’ll leave with** \n* Clear visibility into what changed this week\n* Better judgment on what’s noise vs. actionable signal\n* Practical framing for decisions you may need to revisit (inventory\, standards alignment\, vendor dependencies\, rollout sequencing)\n* A community you can learn from (and contribute to)
URL:https://appliedquantum.com/event/quantum-security-community-online-fortnightly-update-america-emea-3
LOCATION:Online event
CATEGORIES:Community
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/03/1024x576-bya3VY.jpg
GEO:-8.521147;179.1962
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=+02:00:20260423T170000
DTEND;TZID=+02:00:20260423T183000
DTSTAMP:20260404T121324
CREATED:20260329T100038Z
LAST-MODIFIED:20260403T103203Z
UID:10000068-1776963600-1776969000@appliedquantum.com
SUMMARY:Quantum Security Community - Online Fortnightly Update (America\, EMEA)
DESCRIPTION:***Quantum Security Community*** *is a free\, global\, practitioner-led network sharing real-world PQC insights and supporting one another through the most complex IT/OT security transformation of our time. Explore the channels at* ***[Quantum.Security](https://quantum.security)*** \n—————— \n**A weekly\, online community meetup for quantum security practitioners — focused on signal\, not hype.** \nPost-quantum cryptography (PQC)\, crypto agility\, quantum threat models\, and standards timelines are all evolving quickly. For security teams\, the challenge isn’t “finding information” — it’s deciding **what matters**\, **what changed**\, and **what to do next**. Quantum Security Weekly exists to make that easier. \nWe run the **same meetup twice each week** to cover global time zones: \n* **Session 1:** Europe / Middle East / APAC-friendly\n* **Session 2:** Europe / Americas-friendly\n(Choose the one that fits your schedule – content is aligned across both.) \n### **What happens each week** \nYou’ll get a curated update across the four categories that consistently drive real-world decisions: \n**1) Regulation & policy signals**\nNew requirements\, supervisory guidance\, national strategies\, procurement rules\, sector-specific expectations – and what they imply for timelines and planning. \n**2) Standards and “rules of the road”**\nUpdates to cryptographic standards and related ecosystems (protocols\, identity\, secure elements\, industry frameworks). We focus on what changes adoption feasibility\, interoperability\, or audit/compliance expectations. \n**3) Technical developments**\nCredible signals about quantum computing capability\, relevant cryptanalysis\, and meaningful algorithmic/security research (including “RSA-breaking” or signature-related developments) – explained in terms of security impact\, not headlines. \n**4) Practical implementation reality**\nThe stuff that makes or breaks programs: where crypto actually lives\, dependency chains\, vendor readiness\, device constraints\, performance tradeoffs\, rollout sequencing\, and “what we learned the hard way.” \n### **Speakers and community contributions** \nWe often invite a guest speaker to share practical experience (implementation lessons\, program strategy\, technical deep dives). Sometimes we’ll host short product introductions – but the default posture is educational and experience-driven\, not salesy. When there’s no guest\, we go deeper on the week’s most important developments and prioritize Q&A. \n### **Typical Agenda** \n**0:00 – 0:05 | Welcome + how to engage (fast)** \n* What this meetup is: **signal > hype**\, practical implications\, community-first\n* How to participate today: chat\, Q&A flow\, how to drop links/resources\n* Quick reminder of community channels (Forum / Slack / LinkedIn group) and how to continue the conversation after the call \n**0:05 – 0:25 | The Weekly Signal Brief (what actually changed)**\nA structured scan in four buckets\, with a “so what?” for each: \n* **Policy & regulation:** new drafts\, mandates\, enforcement signals\, procurement rules\n* **Standards & frameworks:** PQC standards movement\, protocol ecosystem changes\, guidance updates\n* **Quantum capability signals:** credible progress indicators (hardware\, error correction\, scaling)\, what to ignore\n* **Cryptography/cryptanalysis:** meaningful research developments\, “RSA/ECC breaking” signals\, security relevance \n**0:25 – 0:35 | Myth‑Busting / Reality Check (the hype audit)**\nIf something got hyped this week\, we’ll do a quick\, repeatable teardown: \n* **What happened** (one sentence)\n* **What didn’t happen** (the misconception)\n* **What it means for defenders** (real impact)\n* **What changes / what doesn’t** in PQC planning this year \n*Goal:* keep the community calibrated\, reduce panic\, and prevent misallocation of effort. \n**0:35 – 0:50 | One Topic\, Deeper (the week’s main story)**\nA focused deep dive on one theme that affects real programs\, such as: \n* crypto-agility patterns and failure modes\n* hybrid deployment realities (where it works / where it’s a trap)\n* migration sequencing and vendor dependency bottlenecks\n* what a standards change means for architects and CISOs\n* integrity-first thinking (e.g.\, signatures\, trust anchors\, long-lived evidence) \n**0:50 – 1:05 | Guest Spotlight (most weeks) OR Community Lightning Round** \n* **Guest Spotlight (preferred when available):**\n* 10–12 min: experience share / lessons learned / case study / product walkthrough (kept educational)\n* 3–5 min: moderated Q&A (“what surprised you / what broke / what you’d do differently”)\n* **If no guest:**\n* 3 lightning shares (3–4 min each): “one paper / one tool / one lesson / one vendor signal” \n**1:05 – 1:10 | Community Pulse (cross‑channel highlights)** \n* “Top 3 threads” from various community channels this week\n* Quick call-outs: members looking for feedback\, volunteer opportunities\, upcoming topics\n* How to propose a guest / suggest topics / share resources for next week \n**1:10 – 1:28 | Open Q&A / Office Hours** \n* Live questions (chat + audio)\n* “Bring your messy problem” time: inventory\, vendor claims\, timeline pressure\, governance\, metrics\n* Optional: rapid-fire “yes/no + why” on 5–8 quick questions if the room is lively \n**1:28 – 1:30 | Wrap + next week preview** \n* 3 takeaways in 30 seconds\n* What we’re tracking next week\n* Speaker/volunteer reminder (“If you’ve shipped something\, we want the story.”) \n### **Who should join** \nIf you’re responsible for security strategy\, cryptography\, identity\, platform security\, resilience\, compliance\, or product security – and quantum is on your roadmap – this is for you. \n### **What you’ll leave with** \n* Clear visibility into what changed this week\n* Better judgment on what’s noise vs. actionable signal\n* Practical framing for decisions you may need to revisit (inventory\, standards alignment\, vendor dependencies\, rollout sequencing)\n* A community you can learn from (and contribute to)
URL:https://appliedquantum.com/event/quantum-security-community-online-fortnightly-update-america-emea-23
LOCATION:Online event
CATEGORIES:Community
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/03/1024x576-bya3VY.jpg
GEO:-8.521147;179.1962
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Paris:20260423T190000
DTEND;TZID=Europe/Paris:20260423T203000
DTSTAMP:20260404T121324
CREATED:20260219T091738Z
LAST-MODIFIED:20260219T131424Z
UID:10000015-1776970800-1776976200@appliedquantum.com
SUMMARY:Quantum Security Awareness (Payments Edition): Payments Are Cryptography - PQC Under Millisecond SLAs
DESCRIPTION:About This Event\nThis complimentary webcast is designed for payments security leaders who need a clear\, no‑nonsense view of the quantum threat – and what to do about it now\, without fluff. Co‑hosted by QSECDEF and Applied Quantum\, this session cuts through generic PQC talk and focuses on what makes payments different: crypto everywhere\, many independent parties\, and millisecond operational envelopes that you can’t break. We focus on the real blockers in payments: interdependencies\, performance budgets\, and vendor/partner sequencing. \nPayments are unusually crypto‑dense and time‑dense: a single authorization spans parties that don’t share one change calendar (merchant → PSP/gateway → processor → network/switch → issuer → clearing/settlement)\, and the chain must complete inside strict timeout/retry behavior. We’ll use an interbank cryptography stack mapping as a concrete illustration of how many trust boundaries exist before you even introduce PQC – and why “just upgrade the algorithm” is not a plan.  \nFig 1: Sampe Cryptographic Complexity in Interbank Payments\nIn payments\, quantum readiness is an interoperability and sequencing problem as much as a cryptography problem. That’s why governance levers matter: PCI DSS v4.0 Req. 12.3.3 (documenting and reviewing cipher suites and protocols) is a practical forcing function for building crypto inventory discipline and making “crypto agility” real rather than aspirational. \nWe’ll translate the most useful real-world lessons into payments-specific decisions – drawing on central-bank experimentation from BIS Project Leap Phase 1 (hybrid encryption for payment-message confidentiality) and Phase 2 (PQC signatures in a TARGET2 context)\, where performance\, interoperability\, crypto-agility\, and vendor dependencies were tested in practice. \nWe’ll also treat integrity as first‑class\, not an afterthought. Payments rely on long‑lived certificates\, signed artifacts\, and device identities that underpin authorization evidence and operational trust. That’s where the TNFL (“trust now\, forge later”) lens becomes operational: it helps you prioritize signature/PKI trust anchors – not only confidentiality flows. \nMost importantly\, this will be a practical\, rails‑tested discussion. We’ll cover the real engineering lessons from BIS Project Leap and Leap 2 – including what these experiments teach us about compatibility\, performance budgets\, message sizes\, and multi‑component change. \nBy the end\, you should have a clear way to identify the 1–2 most “pilotable” payment corridors for hybrid/PQC work without breaking SLAs\, and a smarter structure for vendor/partner conversations grounded in what real payment infrastructure projects encountered\, and industry drivers like PCI DSS 12.3.3\, FS‑ISAC guidance\, and G7 financial-sector coordination efforts. \nFormat: Free live webcast (multiple sessions available) \nDuration: Awareness-level briefing – 1.5 hours \nCost: Free \n\nWhat Will You Learn\n\nWhere PQC migration actually fails first in payments: latency\, retries\, MTU/message size\, HSM throughput\, and certificate-chain realities.\nHow to use BIS Project Leap Phases 1–2 as a practical benchmark for what “PQC in real rails” demands (not a lab PoC).\nHow to prioritize TNFL-sensitive trust anchors (signing keys\, PKI roots\, device identity) alongside confidentiality flows.\nWhat “crypto agility” means operationally in payment platforms—and why hybrid often requires system evolution.\nHow to turn PCI/FS‑ISAC/G7 signals into concrete partner/vendor conversations and sequencing decisions.\n\n\nWho Should Attend\nCISOs and security/crypto leads in issuers\, acquirers\, processors\, PSPs/gateways\, networks/switches\, and payments infrastructure providers. \n\nPrerequisites\nGeneral awareness of quantum security risk\, PQC basics\, and typical migration challenges is helpful – but not required. For a primer-style session\, attendees may optionally join the introductory briefings we regularly provide: see Applied Quantum Events.  \n\nThis Session\nWednesday\, 23 Apr 2026\n\nTime: 7:00 PM CEST | 1:00 PM EDT | 6:00 PM BST | 9:00 PM GST | 10:30 PM IST | 10:00 AM PDT\n\nAll events in the series: Quantum Security Awareness – Industry Editions \n\nRegistration\nThis event is co-hosted by Applied Quantum and QSECDEF. Registration is free. RSVP Below. \nPlease register below using your email address. Within minutes\, you will receive a confirmation email containing a calendar invite and the unique Zoom link for the day. If the email does not arrive shortly\, please check your junk or spam folder\, or contact us at admin@appliedquantum.com. \n\nNo fluff. No jargon. Just the clarity and next steps security leaders need. For questions or group registrations\, contact Applied Quantum. \n 
URL:https://appliedquantum.com/event/quantum-security-awareness-payments-23apr2026
CATEGORIES:Webinar
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/02/Quantum-Security-Industry-Webinars-Payments-23Apr2026.jpg
LOCATION:https://us06web.zoom.us/j/87570273066
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Paris:20260429T150000
DTEND;TZID=Europe/Paris:20260429T163000
DTSTAMP:20260404T121324
CREATED:20260219T132851Z
LAST-MODIFIED:20260220T031658Z
UID:10000019-1777474800-1777480200@appliedquantum.com
SUMMARY:Quantum Security Awareness (Telecommunications Edition): PQC for 5G/6G and Roaming Trust - Core Latency\, Secure Elements\,  and Standards-Led Migration
DESCRIPTION:About This Event\nThis complimentary webcast is designed for telecom security leaders who need a clear\, no‑nonsense understanding of the quantum threat – and what to do about it now. The session skips generic “PQC 101” and goes straight to the telecom reality: global interoperability\, five‑nines availability\, tight control‑plane latency budgets\, and identity anchored in secure elements at massive scale. \nTelecom has a uniquely hard problem because you can’t “modernize crypto” inside one domain and declare victory. Your cryptography spans multiple planes and multiple supply chains: core network service interfaces (mTLS and certificate lifecycles)\, management APIs\, roaming and interconnect trust\, lawful intercept / regulatory interfaces\, and the SIM/eSIM/UICC ecosystem that anchors subscriber identity and provisioning. And unlike many enterprise environments\, telecom change isn’t just “push a new library” – it’s a choreography across vendors\, partners\, and standards\, with a continuous service obligation. \nThat’s why telecom quantum readiness is\, by default\, standards‑led. 3GPP has an active study specifically on transitioning to PQC in 3GPP systems (TR 33.703)\, signalling where future releases are heading and what will likely become “normal” expectations for network equipment and software. In parallel\, ETSI TC SET has analysed the impact of PQC on secure element specifications – a practical bottleneck for SIM/eSIM ecosystems where compute\, memory\, certification\, and lifecycle constraints dominate. The ITU‑T work programme also includes a technical report work item on guidance for advanced cryptography based on PQC\, explicitly referencing future 5G/B5G environments. \nRegulation reinforces the urgency. In the EU\, NIS2 explicitly brings providers of public electronic communications networks and services into scope as part of “digital infrastructure\,” with board‑level accountability and incident/risk management expectations that make “we’ll deal with crypto later” a weak posture. \nThis is an engineering‑grounded awareness session: you will leave with a telecom‑specific way to think about where the PQC transition will pinch first\, how to align internal roadmaps to standards timelines\, and how to pressure‑test vendor claims so “PQC‑ready” becomes a measurable plan rather than a slide. \nFormat: Free live webcast (multiple sessions available) \nDuration: Awareness-level briefing – 1.5 hours \nCost: Free \n\nWhat Will You Learn\n\nA telecom trust map: how crypto responsibilities split across core\, roaming\, interconnect\, OSS/BSS\, and secure elements – and where “hidden” dependencies live.\nWhy secure elements are often the long pole: what PQC means for SIM/eSIM/UICC constraints\, certification cycles\, and operational rollout timelines.\nHow to treat this as a standards programme (not a one‑off project): what 3GPP’s PQC transition work implies for vendor roadmaps and interoperability planning.\nHow to protect the performance envelope: where hybrid approaches are realistic\, where they’re risky\, and how to avoid breaking control‑plane / handshake budgets.\nHow to run “credible” PQC readiness conversations with vendors and partners: what to ask\, what artifacts to demand (supported profiles\, timelines\, failure modes)\, and how to prevent fragmentation across roaming/interconnect ecosystems.\nWhat progress looks like in 6–12 months: the minimum set of decisions and visibility that make a telecom roadmap real (inventory\, dependency mapping\, partner pilots\, vendor gating).\n\n\nWho Should Attend\nCISOs and cyber leaders in telecom operators and carriers\, including: \n\nCore network and platform security architects (5G core\, IMS/voice\, service mesh / mTLS domains)\nRoaming/interconnect and peering security leads\nSIM/eSIM/UICC lifecycle and secure‑element supply chain owners\nPKI\, IAM\, KMS/HSM owners supporting OSS/BSS and network operations\n\n\nPrerequisites\nGeneral awareness of quantum security risk\, PQC basics\, and typical migration challenges is helpful – but not required. For a primer-style session\, attendees may optionally join the introductory briefings we regularly provide: see Applied Quantum Events.  \n\nThis Session\nWednesday\, 29 Apr 2026\n\nTime: 3:00 PM CEST | 2:00 PM BST | 0:00 AM EDT | 6:00 AM PDT | 5:00 PM GST | 6:30 PM IST | 9:00 PM SGT\n\nAll events in the series: Quantum Security Awareness – Industry Editions \n\nRegistration\nRegistration is free. RSVP Below. \nPlease register below using your email address. Within minutes\, you will receive a confirmation email containing a calendar invite and the unique Zoom link for the day. If the email does not arrive shortly\, please check your junk or spam folder\, or contact us at admin@appliedquantum.com. \n\nNo fluff. No jargon. Just the clarity and next steps security leaders need. For questions or group registrations\, contact Applied Quantum. \n 
URL:https://appliedquantum.com/event/quantum-security-awareness-telecommunications-29apr2026
CATEGORIES:Webinar
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/02/Quantum-Security-Industry-Webinars-Telecommunications-29Apr2026.jpg
LOCATION:https://us06web.zoom.us/j/85301568872
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Paris:20260506T070000
DTEND;TZID=Europe/Paris:20260506T083000
DTSTAMP:20260404T121324
CREATED:20260220T030151Z
LAST-MODIFIED:20260220T031735Z
UID:10000023-1778050800-1778056200@appliedquantum.com
SUMMARY:Quantum Security Awareness (Electricity Edition): Quantum-Safe Grid Operations - OT Trust Anchors\, Safety\,  and Decades-Long Lifecycles
DESCRIPTION:About This Event\nThis complimentary webcast is designed for utility and grid security leaders who need a clear\, no‑nonsense understanding of the quantum threat – and what to do about it now\, without hand‑waving. The session is built around the operational reality of electricity: safety and stability are non‑negotiable\, outage windows are precious\, and many OT assets are expected to run for decades. That combination makes “we’ll upgrade the crypto later” an unsafe assumption. \nElectricity providers face a quantum readiness problem that is OT‑dominant and integrity‑dominant. Confidentiality matters – but for grid operations\, the sharper edge is often Trust Now\, Forge Later (TNFL): if signatures and certificates that underpin trusted firmware\, trusted configs\, and trusted device identities become forgeable in the future\, attackers don’t just read traffic – they can introduce changes that look legitimate in environments where patching is slow\, device refresh is rare\, and “roll back” may not exist. This is why electricity quantum readiness tends to start with trust anchors (signing roots\, identity\, remote access control points) rather than a generic “PQC everywhere” plan. \nThe standards and regulatory envelope matters here\, because it shapes where security controls can realistically live. In North America\, NERC CIP‑005‑7 is explicitly about managing electronic access via a controlled Electronic Security Perimeter – it pushes attention to access paths\, electronic access points\, and monitoring/control mechanisms. Globally\, IEC 62351 focuses on security for power system control operations and the IEC TC57 protocol families (e.g.\, IEC 60870‑5/‑6\, IEC 61850\, IEC 61970/61968)\, which strongly influences what “secure-by-standard” looks like in grid protocol stacks. In the EU\, NIS2 puts electricity squarely in the “high criticality” bucket and explicitly scopes multiple electricity entity types\, reinforcing governance and accountability expectations around resilience. \nThis session is intentionally practical and engineering‑grounded: we’ll focus on where crypto actually sits in utility OT\, what breaks first when you try to modernize it\, and why corridor‑first + boundary overlays are often the fastest\, least disruptive way to start reducing quantum exposure while staying inside operational constraints. \nFormat: Free live webcast (multiple sessions available) \nDuration: Awareness-level briefing – 1.5 hours \nCost: Free \n\nWhat Will You Learn\n\nHow to map “grid trust anchors” in real OT terms: firmware/config signing chains\, device identities/cert lifecycles\, remote engineering access\, and control‑center ↔ substation communication paths.\nWhere TNFL hits utilities hardest: why “signed” can stop meaning “safe\,” and how forgeable signatures/certs translate into malicious-but-valid-looking updates\, configs\, and device impersonation in hard‑to‑patch environments.\nHow the standards envelope shapes your options: what CIP‑005‑7 implies for access-path governance and control points\, and what IEC 62351 implies about where security hooks exist in grid protocol stacks (and where they don’t).\nCorridor‑first prioritization: how to pick the 1–2 operational corridors that are both high‑impact and realistically changeable (e.g.\, remote engineering access\, control center ↔ substation gateway) without touching fragile endpoints first.\nBoundary overlays that actually work in OT: practical patterns like gateways\, brokered remote access\, jump hosts\, segmentation enforcement\, and monitoring that reduce quantum exposure before device refresh cycles catch up.\nHow to evaluate OT vendor readiness credibly: the specific questions to ask about lifecycle support\, certificate rollover\, signing agility\, interoperability assumptions\, and upgrade paths—so “PQC-ready” becomes a measurable plan\, not marketing.\n\n\nWho Should Attend\nUtility CISOs\, OT security leads\, grid/SCADA security architects\, substation communications/security owners\, and vendor / supply‑chain risk owners supporting generation\, transmission\, and distribution operations. \n\nPrerequisites\nGeneral familiarity with quantum security concepts\, PQC\, and large‑scale migration challenges is helpful – but not required. If you want a fast\, executive‑level refresher before attending\, you can optionally join Applied Quantum’s free “Quantum Security Awareness for Executives” briefing. See Applied Quantum Events.  \n\nThis Session\nWednesday\, 6 May 2026\n\nTime: 7:00 AM CEST | 6:00 AM BST | 9:00 AM GST | 10:30 AM IST | 1:00 PM SGT | 3:00 PM AEST\n\nAll events in the series: Quantum Security Awareness – Industry Editions \n\nRegistration\nRegistration is free. RSVP Below. \nPlease register below using your email address. Within minutes\, you will receive a confirmation email containing a calendar invite and the unique Zoom link for the day. If the email does not arrive shortly\, please check your junk or spam folder\, or contact us at admin@appliedquantum.com. \n\nNo fluff. No jargon. Just the clarity and next steps security leaders need. For questions or group registrations\, contact Applied Quantum. \n 
URL:https://appliedquantum.com/event/quantum-security-awareness-electricity-6may2026
CATEGORIES:Webinar
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/02/Quantum-Security-Industry-Webinars-Electricity-6May2026.jpg
LOCATION:https://us06web.zoom.us/j/84579869043
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=+02:00:20260507T090000
DTEND;TZID=+02:00:20260507T103000
DTSTAMP:20260404T121324
CREATED:20260316T100017Z
LAST-MODIFIED:20260403T103203Z
UID:10000031-1778144400-1778149800@appliedquantum.com
SUMMARY:Quantum Security Community - Online Fortnightly Update (EMEA\, APAC)
DESCRIPTION:***Quantum Security Community*** *is a free\, global\, practitioner-led network sharing real-world PQC insights and supporting one another through the most complex IT/OT security transformation of our time. Explore the channels at* ***[Quantum.Security](https://quantum.security)*** \n—————— \n**A weekly\, online community meetup for quantum security practitioners — focused on signal\, not hype.** \nPost-quantum cryptography (PQC)\, crypto agility\, quantum threat models\, and standards timelines are all evolving quickly. For security teams\, the challenge isn’t “finding information” — it’s deciding **what matters**\, **what changed**\, and **what to do next**. Quantum Security Weekly exists to make that easier. \nWe run the **same meetup twice each week** to cover global time zones: \n* **Session 1:** Europe / Middle East / APAC-friendly\n* **Session 2:** Europe / Americas-friendly\n(Choose the one that fits your schedule – content is aligned across both.) \n### **What happens each week** \nYou’ll get a curated update across the four categories that consistently drive real-world decisions: \n**1) Regulation & policy signals**\nNew requirements\, supervisory guidance\, national strategies\, procurement rules\, sector-specific expectations – and what they imply for timelines and planning. \n**2) Standards and “rules of the road”**\nUpdates to cryptographic standards and related ecosystems (protocols\, identity\, secure elements\, industry frameworks). We focus on what changes adoption feasibility\, interoperability\, or audit/compliance expectations. \n**3) Technical developments**\nCredible signals about quantum computing capability\, relevant cryptanalysis\, and meaningful algorithmic/security research (including “RSA-breaking” or signature-related developments) – explained in terms of security impact\, not headlines. \n**4) Practical implementation reality**\nThe stuff that makes or breaks programs: where crypto actually lives\, dependency chains\, vendor readiness\, device constraints\, performance tradeoffs\, rollout sequencing\, and “what we learned the hard way.” \n### **Speakers and community contributions** \nWe often invite a guest speaker to share practical experience (implementation lessons\, program strategy\, technical deep dives). Sometimes we’ll host short product introductions – but the default posture is educational and experience-driven\, not salesy. When there’s no guest\, we go deeper on the week’s most important developments and prioritize Q&A. \n### **Typical Agenda** \n**0:00 – 0:05 | Welcome + how to engage (fast)** \n* What this meetup is: **signal > hype**\, practical implications\, community-first\n* How to participate today: chat\, Q&A flow\, how to drop links/resources\n* Quick reminder of community channels (Forum / Slack / LinkedIn group) and how to continue the conversation after the call \n**0:05 – 0:25 | The Weekly Signal Brief (what actually changed)**\nA structured scan in four buckets\, with a “so what?” for each: \n* **Policy & regulation:** new drafts\, mandates\, enforcement signals\, procurement rules\n* **Standards & frameworks:** PQC standards movement\, protocol ecosystem changes\, guidance updates\n* **Quantum capability signals:** credible progress indicators (hardware\, error correction\, scaling)\, what to ignore\n* **Cryptography/cryptanalysis:** meaningful research developments\, “RSA/ECC breaking” signals\, security relevance \n**0:25 – 0:35 | Myth‑Busting / Reality Check (the hype audit)**\nIf something got hyped this week\, we’ll do a quick\, repeatable teardown: \n* **What happened** (one sentence)\n* **What didn’t happen** (the misconception)\n* **What it means for defenders** (real impact)\n* **What changes / what doesn’t** in PQC planning this year \n*Goal:* keep the community calibrated\, reduce panic\, and prevent misallocation of effort. \n**0:35 – 0:50 | One Topic\, Deeper (the week’s main story)**\nA focused deep dive on one theme that affects real programs\, such as: \n* crypto-agility patterns and failure modes\n* hybrid deployment realities (where it works / where it’s a trap)\n* migration sequencing and vendor dependency bottlenecks\n* what a standards change means for architects and CISOs\n* integrity-first thinking (e.g.\, signatures\, trust anchors\, long-lived evidence) \n**0:50 – 1:05 | Guest Spotlight (most weeks) OR Community Lightning Round** \n* **Guest Spotlight (preferred when available):**\n* 10–12 min: experience share / lessons learned / case study / product walkthrough (kept educational)\n* 3–5 min: moderated Q&A (“what surprised you / what broke / what you’d do differently”)\n* **If no guest:**\n* 3 lightning shares (3–4 min each): “one paper / one tool / one lesson / one vendor signal” \n**1:05 – 1:10 | Community Pulse (cross‑channel highlights)** \n* “Top 3 threads” from various community channels this week\n* Quick call-outs: members looking for feedback\, volunteer opportunities\, upcoming topics\n* How to propose a guest / suggest topics / share resources for next week \n**1:10 – 1:28 | Open Q&A / Office Hours** \n* Live questions (chat + audio)\n* “Bring your messy problem” time: inventory\, vendor claims\, timeline pressure\, governance\, metrics\n* Optional: rapid-fire “yes/no + why” on 5–8 quick questions if the room is lively \n**1:28 – 1:30 | Wrap + next week preview** \n* 3 takeaways in 30 seconds\n* What we’re tracking next week\n* Speaker/volunteer reminder (“If you’ve shipped something\, we want the story.”) \n### **Who should join** \nIf you’re responsible for security strategy\, cryptography\, identity\, platform security\, resilience\, compliance\, or product security – and quantum is on your roadmap – this is for you. \n### **What you’ll leave with** \n* Clear visibility into what changed this week\n* Better judgment on what’s noise vs. actionable signal\n* Practical framing for decisions you may need to revisit (inventory\, standards alignment\, vendor dependencies\, rollout sequencing)\n* A community you can learn from (and contribute to)
URL:https://appliedquantum.com/event/quantum-security-community-online-fortnightly-update-emea-apac-4
LOCATION:Online event
CATEGORIES:Community
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/03/1024x576-anROVz.jpg
GEO:-8.521147;179.1962
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260507T150000
DTEND;TZID=America/New_York:20260507T173000
DTSTAMP:20260404T121324
CREATED:20260216T063045Z
LAST-MODIFIED:20260219T085019Z
UID:10000009-1778166000-1778175000@appliedquantum.com
SUMMARY:Quantum Security Awareness for Executives - Free Webcast
DESCRIPTION:A free executive briefing co-hosted by SANS Institute and Applied Quantum. Cut through the hype\, understand the risk\, and leave with actionable next steps. \n\nAbout This Event\nThis complimentary webcast is designed for security leaders who need a clear\, no-nonsense understanding of the quantum threat – and what to do about it now. Co-hosted by SANS Institute and Applied Quantum\, the session explains what’s changing in the cryptographic landscape\, why the migration to quantum-safe standards is far larger than most organizations expect\, and what practical steps you can take today. \nQuantum risk is not a future-only problem. Adversaries can harvest encrypted data today for later decryption\, while regulators and customers increasingly expect demonstrable progress now – not just plans for 2030 or 2035. \nFormat: Free live webcast (multiple sessions available) Duration: Awareness-level briefing – 2 hours Cost: Free \n\nWhat You Will Learn\nThis briefing gives security leaders: \n\nA clear map of the quantum threat landscape\, including how Harvest Now\, Decrypt Later attacks put long-life data at risk immediately – before quantum computers even arrive.\nA leadership-ready understanding of migration scope: cryptography is embedded across applications\, infrastructure\, vendors\, devices\, and identity systems – this is an enterprise-wide migration\, not a single control change.\nA concise view of what’s changing: algorithms\, certificates\, protocols\, vendor roadmaps\, and performance assumptions.\nThe compliance context: why demonstrable progress – inventories\, roadmaps\, vendor commitments\, and pilot results – is increasingly expected now\, not just by 2030/2035.\nA preview of the hard parts: cryptographic discovery\, legacy systems\, third-party dependencies\, and performance impacts.\nA practical checklist of next steps to start building an organization-wide quantum readiness plan.\nCommon narrative and terminology that reduces friction between risk owners and implementers.\n\n\nWhy “Wait and See” Is No Longer a Strategy\nThis is an enterprise-wide cryptographic migration\, not a single control. Crypto is embedded across applications\, infrastructure\, vendors\, devices\, and identity. The deadlines are only part of the story – the real challenge is inventory\, dependency mapping\, and coordinated change across teams and suppliers. \nAttackers don’t need quantum computers to start. Harvest Now\, Decrypt Later can put long-life data at risk immediately. Post-quantum changes can affect performance\, interoperability\, certificates\, and operational processes\, which means planning requires technical reality checks. \nRegulators and stakeholders increasingly expect evidence of progress – not just awareness. \n\nWho Should Attend\nThis webcast is designed for: \n\nCISOs\, CIOs\, Heads of Security\, Security Directors\nSecurity architects and enterprise architects\nGRC\, risk\, and compliance leaders who need a quantum-ready view of evidence and timelines\nIAM\, PKI\, TLS\, and VPN owners and the technical leaders who support them\nVendor assurance and procurement stakeholders involved in security requirements and roadmaps\n\n\nThis Session\nThursday\, 7 May 2026\n\nTime: 3:00 PM EDT | 12:00 PM PDT | 8:00 PM BST | 9:00 PM CEST\n\nAll events in the series: Quantum Security Awareness for Executives – Free Webcast Series \n\nWant to go deeper?\nThese topics are covered in much more detail in the SANS Institute and Applied Quantum course SEC529: Quantum Security Readiness for Executives. Registration now open. \n\nRegistration\nThis event is co-hosted by SANS Institute and Applied Quantum. Registration is free. RSVP Below. \nPlease register below using your email address. Within minutes\, you will receive a confirmation email containing a calendar invite and the unique Zoom link for the day. If the email does not arrive shortly\, please check your junk or spam folder\, or contact us at admin@appliedquantum.com. \n\nNo fluff. No jargon. Just the clarity and next steps security leaders need. For questions or group registrations\, contact Applied Quantum. \n 
URL:https://appliedquantum.com/event/quantum-security-awareness-for-executives-free-webcast-5
CATEGORIES:Webinar
ATTACH;FMTTYPE=image/png:https://appliedquantum.com/wp-content/uploads/2026/02/Applied-Quantum-SANS-Course-Awareness.png
LOCATION:https://us06web.zoom.us/j/84146036613
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=+02:00:20260507T170000
DTEND;TZID=+02:00:20260507T183000
DTSTAMP:20260404T121324
CREATED:20260316T100017Z
LAST-MODIFIED:20260403T103203Z
UID:10000032-1778173200-1778178600@appliedquantum.com
SUMMARY:Quantum Security Community - Online Fortnightly Update (America\, EMEA)
DESCRIPTION:***Quantum Security Community*** *is a free\, global\, practitioner-led network sharing real-world PQC insights and supporting one another through the most complex IT/OT security transformation of our time. Explore the channels at* ***[Quantum.Security](https://quantum.security)*** \n—————— \n**A weekly\, online community meetup for quantum security practitioners — focused on signal\, not hype.** \nPost-quantum cryptography (PQC)\, crypto agility\, quantum threat models\, and standards timelines are all evolving quickly. For security teams\, the challenge isn’t “finding information” — it’s deciding **what matters**\, **what changed**\, and **what to do next**. Quantum Security Weekly exists to make that easier. \nWe run the **same meetup twice each week** to cover global time zones: \n* **Session 1:** Europe / Middle East / APAC-friendly\n* **Session 2:** Europe / Americas-friendly\n(Choose the one that fits your schedule – content is aligned across both.) \n### **What happens each week** \nYou’ll get a curated update across the four categories that consistently drive real-world decisions: \n**1) Regulation & policy signals**\nNew requirements\, supervisory guidance\, national strategies\, procurement rules\, sector-specific expectations – and what they imply for timelines and planning. \n**2) Standards and “rules of the road”**\nUpdates to cryptographic standards and related ecosystems (protocols\, identity\, secure elements\, industry frameworks). We focus on what changes adoption feasibility\, interoperability\, or audit/compliance expectations. \n**3) Technical developments**\nCredible signals about quantum computing capability\, relevant cryptanalysis\, and meaningful algorithmic/security research (including “RSA-breaking” or signature-related developments) – explained in terms of security impact\, not headlines. \n**4) Practical implementation reality**\nThe stuff that makes or breaks programs: where crypto actually lives\, dependency chains\, vendor readiness\, device constraints\, performance tradeoffs\, rollout sequencing\, and “what we learned the hard way.” \n### **Speakers and community contributions** \nWe often invite a guest speaker to share practical experience (implementation lessons\, program strategy\, technical deep dives). Sometimes we’ll host short product introductions – but the default posture is educational and experience-driven\, not salesy. When there’s no guest\, we go deeper on the week’s most important developments and prioritize Q&A. \n### **Typical Agenda** \n**0:00 – 0:05 | Welcome + how to engage (fast)** \n* What this meetup is: **signal > hype**\, practical implications\, community-first\n* How to participate today: chat\, Q&A flow\, how to drop links/resources\n* Quick reminder of community channels (Forum / Slack / LinkedIn group) and how to continue the conversation after the call \n**0:05 – 0:25 | The Weekly Signal Brief (what actually changed)**\nA structured scan in four buckets\, with a “so what?” for each: \n* **Policy & regulation:** new drafts\, mandates\, enforcement signals\, procurement rules\n* **Standards & frameworks:** PQC standards movement\, protocol ecosystem changes\, guidance updates\n* **Quantum capability signals:** credible progress indicators (hardware\, error correction\, scaling)\, what to ignore\n* **Cryptography/cryptanalysis:** meaningful research developments\, “RSA/ECC breaking” signals\, security relevance \n**0:25 – 0:35 | Myth‑Busting / Reality Check (the hype audit)**\nIf something got hyped this week\, we’ll do a quick\, repeatable teardown: \n* **What happened** (one sentence)\n* **What didn’t happen** (the misconception)\n* **What it means for defenders** (real impact)\n* **What changes / what doesn’t** in PQC planning this year \n*Goal:* keep the community calibrated\, reduce panic\, and prevent misallocation of effort. \n**0:35 – 0:50 | One Topic\, Deeper (the week’s main story)**\nA focused deep dive on one theme that affects real programs\, such as: \n* crypto-agility patterns and failure modes\n* hybrid deployment realities (where it works / where it’s a trap)\n* migration sequencing and vendor dependency bottlenecks\n* what a standards change means for architects and CISOs\n* integrity-first thinking (e.g.\, signatures\, trust anchors\, long-lived evidence) \n**0:50 – 1:05 | Guest Spotlight (most weeks) OR Community Lightning Round** \n* **Guest Spotlight (preferred when available):**\n* 10–12 min: experience share / lessons learned / case study / product walkthrough (kept educational)\n* 3–5 min: moderated Q&A (“what surprised you / what broke / what you’d do differently”)\n* **If no guest:**\n* 3 lightning shares (3–4 min each): “one paper / one tool / one lesson / one vendor signal” \n**1:05 – 1:10 | Community Pulse (cross‑channel highlights)** \n* “Top 3 threads” from various community channels this week\n* Quick call-outs: members looking for feedback\, volunteer opportunities\, upcoming topics\n* How to propose a guest / suggest topics / share resources for next week \n**1:10 – 1:28 | Open Q&A / Office Hours** \n* Live questions (chat + audio)\n* “Bring your messy problem” time: inventory\, vendor claims\, timeline pressure\, governance\, metrics\n* Optional: rapid-fire “yes/no + why” on 5–8 quick questions if the room is lively \n**1:28 – 1:30 | Wrap + next week preview** \n* 3 takeaways in 30 seconds\n* What we’re tracking next week\n* Speaker/volunteer reminder (“If you’ve shipped something\, we want the story.”) \n### **Who should join** \nIf you’re responsible for security strategy\, cryptography\, identity\, platform security\, resilience\, compliance\, or product security – and quantum is on your roadmap – this is for you. \n### **What you’ll leave with** \n* Clear visibility into what changed this week\n* Better judgment on what’s noise vs. actionable signal\n* Practical framing for decisions you may need to revisit (inventory\, standards alignment\, vendor dependencies\, rollout sequencing)\n* A community you can learn from (and contribute to)
URL:https://appliedquantum.com/event/quantum-security-community-online-fortnightly-update-america-emea-4
LOCATION:Online event
CATEGORIES:Community
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/03/1024x576-bya3VY.jpg
GEO:-8.521147;179.1962
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=+02:00:20260521T090000
DTEND;TZID=+02:00:20260521T103000
DTSTAMP:20260404T121324
CREATED:20260316T100017Z
LAST-MODIFIED:20260403T103203Z
UID:10000033-1779354000-1779359400@appliedquantum.com
SUMMARY:Quantum Security Community - Online Fortnightly Update (EMEA\, APAC)
DESCRIPTION:***Quantum Security Community*** *is a free\, global\, practitioner-led network sharing real-world PQC insights and supporting one another through the most complex IT/OT security transformation of our time. Explore the channels at* ***[Quantum.Security](https://quantum.security)*** \n—————— \n**A weekly\, online community meetup for quantum security practitioners — focused on signal\, not hype.** \nPost-quantum cryptography (PQC)\, crypto agility\, quantum threat models\, and standards timelines are all evolving quickly. For security teams\, the challenge isn’t “finding information” — it’s deciding **what matters**\, **what changed**\, and **what to do next**. Quantum Security Weekly exists to make that easier. \nWe run the **same meetup twice each week** to cover global time zones: \n* **Session 1:** Europe / Middle East / APAC-friendly\n* **Session 2:** Europe / Americas-friendly\n(Choose the one that fits your schedule – content is aligned across both.) \n### **What happens each week** \nYou’ll get a curated update across the four categories that consistently drive real-world decisions: \n**1) Regulation & policy signals**\nNew requirements\, supervisory guidance\, national strategies\, procurement rules\, sector-specific expectations – and what they imply for timelines and planning. \n**2) Standards and “rules of the road”**\nUpdates to cryptographic standards and related ecosystems (protocols\, identity\, secure elements\, industry frameworks). We focus on what changes adoption feasibility\, interoperability\, or audit/compliance expectations. \n**3) Technical developments**\nCredible signals about quantum computing capability\, relevant cryptanalysis\, and meaningful algorithmic/security research (including “RSA-breaking” or signature-related developments) – explained in terms of security impact\, not headlines. \n**4) Practical implementation reality**\nThe stuff that makes or breaks programs: where crypto actually lives\, dependency chains\, vendor readiness\, device constraints\, performance tradeoffs\, rollout sequencing\, and “what we learned the hard way.” \n### **Speakers and community contributions** \nWe often invite a guest speaker to share practical experience (implementation lessons\, program strategy\, technical deep dives). Sometimes we’ll host short product introductions – but the default posture is educational and experience-driven\, not salesy. When there’s no guest\, we go deeper on the week’s most important developments and prioritize Q&A. \n### **Typical Agenda** \n**0:00 – 0:05 | Welcome + how to engage (fast)** \n* What this meetup is: **signal > hype**\, practical implications\, community-first\n* How to participate today: chat\, Q&A flow\, how to drop links/resources\n* Quick reminder of community channels (Forum / Slack / LinkedIn group) and how to continue the conversation after the call \n**0:05 – 0:25 | The Weekly Signal Brief (what actually changed)**\nA structured scan in four buckets\, with a “so what?” for each: \n* **Policy & regulation:** new drafts\, mandates\, enforcement signals\, procurement rules\n* **Standards & frameworks:** PQC standards movement\, protocol ecosystem changes\, guidance updates\n* **Quantum capability signals:** credible progress indicators (hardware\, error correction\, scaling)\, what to ignore\n* **Cryptography/cryptanalysis:** meaningful research developments\, “RSA/ECC breaking” signals\, security relevance \n**0:25 – 0:35 | Myth‑Busting / Reality Check (the hype audit)**\nIf something got hyped this week\, we’ll do a quick\, repeatable teardown: \n* **What happened** (one sentence)\n* **What didn’t happen** (the misconception)\n* **What it means for defenders** (real impact)\n* **What changes / what doesn’t** in PQC planning this year \n*Goal:* keep the community calibrated\, reduce panic\, and prevent misallocation of effort. \n**0:35 – 0:50 | One Topic\, Deeper (the week’s main story)**\nA focused deep dive on one theme that affects real programs\, such as: \n* crypto-agility patterns and failure modes\n* hybrid deployment realities (where it works / where it’s a trap)\n* migration sequencing and vendor dependency bottlenecks\n* what a standards change means for architects and CISOs\n* integrity-first thinking (e.g.\, signatures\, trust anchors\, long-lived evidence) \n**0:50 – 1:05 | Guest Spotlight (most weeks) OR Community Lightning Round** \n* **Guest Spotlight (preferred when available):**\n* 10–12 min: experience share / lessons learned / case study / product walkthrough (kept educational)\n* 3–5 min: moderated Q&A (“what surprised you / what broke / what you’d do differently”)\n* **If no guest:**\n* 3 lightning shares (3–4 min each): “one paper / one tool / one lesson / one vendor signal” \n**1:05 – 1:10 | Community Pulse (cross‑channel highlights)** \n* “Top 3 threads” from various community channels this week\n* Quick call-outs: members looking for feedback\, volunteer opportunities\, upcoming topics\n* How to propose a guest / suggest topics / share resources for next week \n**1:10 – 1:28 | Open Q&A / Office Hours** \n* Live questions (chat + audio)\n* “Bring your messy problem” time: inventory\, vendor claims\, timeline pressure\, governance\, metrics\n* Optional: rapid-fire “yes/no + why” on 5–8 quick questions if the room is lively \n**1:28 – 1:30 | Wrap + next week preview** \n* 3 takeaways in 30 seconds\n* What we’re tracking next week\n* Speaker/volunteer reminder (“If you’ve shipped something\, we want the story.”) \n### **Who should join** \nIf you’re responsible for security strategy\, cryptography\, identity\, platform security\, resilience\, compliance\, or product security – and quantum is on your roadmap – this is for you. \n### **What you’ll leave with** \n* Clear visibility into what changed this week\n* Better judgment on what’s noise vs. actionable signal\n* Practical framing for decisions you may need to revisit (inventory\, standards alignment\, vendor dependencies\, rollout sequencing)\n* A community you can learn from (and contribute to)
URL:https://appliedquantum.com/event/quantum-security-community-online-fortnightly-update-emea-apac-5
LOCATION:Online event
CATEGORIES:Community
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/03/1024x576-anROVz.jpg
GEO:-8.521147;179.1962
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Paris:20260521T130000
DTEND;TZID=Europe/Paris:20260521T153000
DTSTAMP:20260404T121324
CREATED:20260218T031539Z
LAST-MODIFIED:20260219T084859Z
UID:10000013-1779368400-1779377400@appliedquantum.com
SUMMARY:Quantum Security Awareness for Practitioners - Free Technical Webcast
DESCRIPTION:A free technical briefing co-hosted by SANS Institute and Applied Quantum. Go beyond “quantum breaks RSA” and get the practitioner’s view: what changes in your TLS\, PKI\, VPN\, identity\, and software supply chain – and how to start testing and implementing without breaking production. \n\nAbout This Event\nThis complimentary webcast is designed for security architects\, engineers\, and cyber defenders who need a practical\, no-hype understanding of post-quantum cryptography (PQC) and quantum security and what it means for real systems. Co-hosted by SANS Institute and Applied Quantum. \nWe’ll keep the introduction short – just enough to align on the threat model and the standards landscape – then we’ll go deeper into the parts that usually get skipped: \n\nWhere PQC actually lands in modern enterprises (protocols\, libraries\, certificates\, HSMs\, third-party platforms)\nWhy the migration is bigger than an algorithm swap\nWhat breaks first (often: performance assumptions\, interoperability\, certificate and handshake sizes\, network edge constraints)\nHow to get traction fast using inventory + prioritization + crypto-agility patterns\n\nFormat: Free live webcastDuration: 2.5 hours (includes Q&A)Level: Awareness-first\, but architect / implementer-orientedCost: Free \n\nWhat You Will Learn\nBy the end of this session\, technical teams will be able to: \n\nExplain the quantum threat in engineering terms (confidentiality and integrity impacts\, including “harvest now\, decrypt later” and long-lived trust risks (” trust now\, forge later”).\nDescribe what NIST has standardized so far – and what that implies for deployment decisions (KEMs vs signatures\, and where each appears in real protocols).\nIdentify the “blast radius” of PQC across enterprise stacks: TLS termination\, mTLS in service meshes\, VPN gateways\, PKI hierarchies\, code signing\, device identity\, and third-party dependencies.\nRecognize common failure modes early (performance regressions\, MTU/fragmentation surprises\, certificate chain bloat\, middlebox issues\, brittle crypto dependencies).\nUnderstand what a Cryptographic Bill of Materials (CBOM) and cryptographic inventory should contain to support a defensible migration plan.\nApply practical crypto-agility patterns (abstraction\, configuration-driven crypto policy\, algorithm negotiation\, safe upgrade/rollback\, test harnessing).\nLeave with a sample “first 90 days” approach: what to inventory\, what to pilot\, what to test\, and how to avoid expensive dead ends.\n\n\nTopics Covered\nThis session covers the following topics (with an emphasis on real-world architectures and operational constraints): \n1) Threat model and technical context (fast\, practical intro)\n\nCRQC as a planning concept (what “cryptanalytically relevant” actually means for engineering timelines)\nHarvest-now/decrypt-later vs integrity and authenticity risks (“trust now\, forge later”)\n“Why now” signals: standards\, platform roadmaps\, and compliance pressure turning into delivery pressure\n\n2) Standards landscape you can build on\n\nNIST PQC standards: what’s finalized\, what’s next\, and why it matters to architects\nKEMs vs signatures in real systems (where key exchange ends and authentication begins)\nHybrid approaches (why they exist\, how they reduce risk\, and what they complicate)\n\n3) Where PQC hits first in real enterprise stacks\n\nTLS 1.3 / HTTPS at the edge: handshake and certificate impacts\, termination patterns\nmTLS for east-west traffic (service mesh / microservices) and what “small inefficiencies” become at scale\nVPN and remote access: gateway constraints\, device fleets\, and “upgrade sequencing”\nPKI and certificate lifecycles: issuance\, rotation\, chain size\, and operational overhead\nSoftware supply chain: code signing\, firmware signing\, CI/CD trust roots\, artifact verification\n\n4) Network and infrastructure realities\n\nPerformance and scaling assumptions that quietly break (latency\, CPU\, memory\, bandwidth)\nMTU\, fragmentation\, and “middlebox weirdness”\nLoad balancers\, proxies\, WAFs\, CDNs\, and cloud-managed TLS: where you can change crypto vs where you can only influence it\n\n5) Cryptographic discovery\, inventory\, and CBOM (the work nobody can skip)\n\nWhat a cryptographic inventory must include to be migration-useful (not just “RSA is used somewhere”)\nBuilding and operationalizing CBOMs across products\, platforms\, and vendors\nContinuous crypto discovery (because inventories rot fast)\n\n6) Risk-driven prioritization and migration planning\n\nHow to prioritize when full inventory is not feasible (risk-driven sampling\, choke points\, long-lived data paths)\nMigration waves: “protect long-life data first” vs “protect the broadest crypto infrastructure first”\nVendor and third-party dependencies: how to ask for the right evidence (not marketing)\n\n7) Crypto-agility patterns for teams that must ship\n\nPractical crypto-agility reference patterns (abstraction layers\, policy engines\, configuration control)\nDesigning for algorithm change as a normal operating condition (not an emergency project)\nTesting\, rollback\, and avoiding one-way doors\n\n\nWhy “Wait and See” Is No Longer a Strategy\nPQC is not a future-only problem – and for technical teams\, the reason is simple: migration lead time is the risk. \nEven if you ignore Q-Day forecasting entirely\, you still face a very practical reality: cryptography is embedded across protocols\, products\, libraries\, certificates\, devices\, and vendor ecosystems. The hard part is not selecting an algorithm – it’s discovering dependencies\, coordinating change across owners\, and validating performance and interoperability before deadlines and incidents force rushed work. \nThe earlier you test\, the fewer surprises you pay for later. \n\nWho Should Attend\nThis webcast is designed for: \n\nSecurity architects\, enterprise architects\, and platform architects\nCryptography engineers\, PKI owners\, and certificate services teams\nNetwork/security engineers responsible for TLS termination\, VPNs\, gateways\, and edge infrastructure\nDevSecOps\, SRE\, and cloud security teams supporting large-scale mTLS and service connectivity\nApplication security and product security teams (especially those who own libraries and build pipelines)\nSecurity engineering leaders who need a technically credible roadmap (not a slideware plan)\n\nNo advanced math or physics required. If you’re comfortable with modern security architecture (TLS/PKI concepts\, key management basics\, and how systems integrate)\, you’re the target audience. \n\nThis Session\nThursday\, 21 May 2026\n\nTime: 1:00 PM CEST | 7:00 AM EDT | 12:00 PM BST | 3:00 PM GST (Dubai) | 4:30 PM IST | 7:00 PM SGT | 9:00 PM AEST \n\nAll events in the series: Quantum Security Awareness for Practitioners – Free Technical Webcast Series \n\nWant the hands-on version?\nThis webcast is an awareness-level extract of the material. All topics above will be covered in far greater depth in a 5-day\, hands-on course (SEC531) currently being developed by SANS Institute and Applied Quantum\, including practical exercises\, implementation patterns\, and real-world migration playbooks. \n\nRegistration\nThis event is co-hosted by SANS Institute and Applied Quantum. Registration is free. RSVP Below. \nPlease register below using your email address. Within minutes\, you will receive a confirmation email containing a calendar invite and the unique Zoom link for the day. If the email does not arrive shortly\, please check your junk or spam folder\, or contact us at admin@appliedquantum.com. \n\nNo fluff. No jargon. Just the clarity and next steps security practitioners need. For questions or group registrations\, contact Applied Quantum. \n 
URL:https://appliedquantum.com/event/quantum-security-awareness-practitioners-3
CATEGORIES:Webinar
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/02/Applied-Quantum-SANS-Course-Practitioners.jpg
LOCATION:https://us06web.zoom.us/j/86392656711
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=+02:00:20260521T170000
DTEND;TZID=+02:00:20260521T183000
DTSTAMP:20260404T121324
CREATED:20260316T100018Z
LAST-MODIFIED:20260403T103203Z
UID:10000034-1779382800-1779388200@appliedquantum.com
SUMMARY:Quantum Security Community - Online Fortnightly Update (America\, EMEA)
DESCRIPTION:***Quantum Security Community*** *is a free\, global\, practitioner-led network sharing real-world PQC insights and supporting one another through the most complex IT/OT security transformation of our time. Explore the channels at* ***[Quantum.Security](https://quantum.security)*** \n—————— \n**A weekly\, online community meetup for quantum security practitioners — focused on signal\, not hype.** \nPost-quantum cryptography (PQC)\, crypto agility\, quantum threat models\, and standards timelines are all evolving quickly. For security teams\, the challenge isn’t “finding information” — it’s deciding **what matters**\, **what changed**\, and **what to do next**. Quantum Security Weekly exists to make that easier. \nWe run the **same meetup twice each week** to cover global time zones: \n* **Session 1:** Europe / Middle East / APAC-friendly\n* **Session 2:** Europe / Americas-friendly\n(Choose the one that fits your schedule – content is aligned across both.) \n### **What happens each week** \nYou’ll get a curated update across the four categories that consistently drive real-world decisions: \n**1) Regulation & policy signals**\nNew requirements\, supervisory guidance\, national strategies\, procurement rules\, sector-specific expectations – and what they imply for timelines and planning. \n**2) Standards and “rules of the road”**\nUpdates to cryptographic standards and related ecosystems (protocols\, identity\, secure elements\, industry frameworks). We focus on what changes adoption feasibility\, interoperability\, or audit/compliance expectations. \n**3) Technical developments**\nCredible signals about quantum computing capability\, relevant cryptanalysis\, and meaningful algorithmic/security research (including “RSA-breaking” or signature-related developments) – explained in terms of security impact\, not headlines. \n**4) Practical implementation reality**\nThe stuff that makes or breaks programs: where crypto actually lives\, dependency chains\, vendor readiness\, device constraints\, performance tradeoffs\, rollout sequencing\, and “what we learned the hard way.” \n### **Speakers and community contributions** \nWe often invite a guest speaker to share practical experience (implementation lessons\, program strategy\, technical deep dives). Sometimes we’ll host short product introductions – but the default posture is educational and experience-driven\, not salesy. When there’s no guest\, we go deeper on the week’s most important developments and prioritize Q&A. \n### **Typical Agenda** \n**0:00 – 0:05 | Welcome + how to engage (fast)** \n* What this meetup is: **signal > hype**\, practical implications\, community-first\n* How to participate today: chat\, Q&A flow\, how to drop links/resources\n* Quick reminder of community channels (Forum / Slack / LinkedIn group) and how to continue the conversation after the call \n**0:05 – 0:25 | The Weekly Signal Brief (what actually changed)**\nA structured scan in four buckets\, with a “so what?” for each: \n* **Policy & regulation:** new drafts\, mandates\, enforcement signals\, procurement rules\n* **Standards & frameworks:** PQC standards movement\, protocol ecosystem changes\, guidance updates\n* **Quantum capability signals:** credible progress indicators (hardware\, error correction\, scaling)\, what to ignore\n* **Cryptography/cryptanalysis:** meaningful research developments\, “RSA/ECC breaking” signals\, security relevance \n**0:25 – 0:35 | Myth‑Busting / Reality Check (the hype audit)**\nIf something got hyped this week\, we’ll do a quick\, repeatable teardown: \n* **What happened** (one sentence)\n* **What didn’t happen** (the misconception)\n* **What it means for defenders** (real impact)\n* **What changes / what doesn’t** in PQC planning this year \n*Goal:* keep the community calibrated\, reduce panic\, and prevent misallocation of effort. \n**0:35 – 0:50 | One Topic\, Deeper (the week’s main story)**\nA focused deep dive on one theme that affects real programs\, such as: \n* crypto-agility patterns and failure modes\n* hybrid deployment realities (where it works / where it’s a trap)\n* migration sequencing and vendor dependency bottlenecks\n* what a standards change means for architects and CISOs\n* integrity-first thinking (e.g.\, signatures\, trust anchors\, long-lived evidence) \n**0:50 – 1:05 | Guest Spotlight (most weeks) OR Community Lightning Round** \n* **Guest Spotlight (preferred when available):**\n* 10–12 min: experience share / lessons learned / case study / product walkthrough (kept educational)\n* 3–5 min: moderated Q&A (“what surprised you / what broke / what you’d do differently”)\n* **If no guest:**\n* 3 lightning shares (3–4 min each): “one paper / one tool / one lesson / one vendor signal” \n**1:05 – 1:10 | Community Pulse (cross‑channel highlights)** \n* “Top 3 threads” from various community channels this week\n* Quick call-outs: members looking for feedback\, volunteer opportunities\, upcoming topics\n* How to propose a guest / suggest topics / share resources for next week \n**1:10 – 1:28 | Open Q&A / Office Hours** \n* Live questions (chat + audio)\n* “Bring your messy problem” time: inventory\, vendor claims\, timeline pressure\, governance\, metrics\n* Optional: rapid-fire “yes/no + why” on 5–8 quick questions if the room is lively \n**1:28 – 1:30 | Wrap + next week preview** \n* 3 takeaways in 30 seconds\n* What we’re tracking next week\n* Speaker/volunteer reminder (“If you’ve shipped something\, we want the story.”) \n### **Who should join** \nIf you’re responsible for security strategy\, cryptography\, identity\, platform security\, resilience\, compliance\, or product security – and quantum is on your roadmap – this is for you. \n### **What you’ll leave with** \n* Clear visibility into what changed this week\n* Better judgment on what’s noise vs. actionable signal\n* Practical framing for decisions you may need to revisit (inventory\, standards alignment\, vendor dependencies\, rollout sequencing)\n* A community you can learn from (and contribute to)
URL:https://appliedquantum.com/event/quantum-security-community-online-fortnightly-update-america-emea-5
LOCATION:Online event
CATEGORIES:Community
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/03/1024x576-bya3VY.jpg
GEO:-8.521147;179.1962
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=+02:00:20260604T090000
DTEND;TZID=+02:00:20260604T103000
DTSTAMP:20260404T121324
CREATED:20260316T100018Z
LAST-MODIFIED:20260403T103203Z
UID:10000035-1780563600-1780569000@appliedquantum.com
SUMMARY:Quantum Security Community - Online Fortnightly Update (EMEA\, APAC)
DESCRIPTION:***Quantum Security Community*** *is a free\, global\, practitioner-led network sharing real-world PQC insights and supporting one another through the most complex IT/OT security transformation of our time. Explore the channels at* ***[Quantum.Security](https://quantum.security)*** \n—————— \n**A weekly\, online community meetup for quantum security practitioners — focused on signal\, not hype.** \nPost-quantum cryptography (PQC)\, crypto agility\, quantum threat models\, and standards timelines are all evolving quickly. For security teams\, the challenge isn’t “finding information” — it’s deciding **what matters**\, **what changed**\, and **what to do next**. Quantum Security Weekly exists to make that easier. \nWe run the **same meetup twice each week** to cover global time zones: \n* **Session 1:** Europe / Middle East / APAC-friendly\n* **Session 2:** Europe / Americas-friendly\n(Choose the one that fits your schedule – content is aligned across both.) \n### **What happens each week** \nYou’ll get a curated update across the four categories that consistently drive real-world decisions: \n**1) Regulation & policy signals**\nNew requirements\, supervisory guidance\, national strategies\, procurement rules\, sector-specific expectations – and what they imply for timelines and planning. \n**2) Standards and “rules of the road”**\nUpdates to cryptographic standards and related ecosystems (protocols\, identity\, secure elements\, industry frameworks). We focus on what changes adoption feasibility\, interoperability\, or audit/compliance expectations. \n**3) Technical developments**\nCredible signals about quantum computing capability\, relevant cryptanalysis\, and meaningful algorithmic/security research (including “RSA-breaking” or signature-related developments) – explained in terms of security impact\, not headlines. \n**4) Practical implementation reality**\nThe stuff that makes or breaks programs: where crypto actually lives\, dependency chains\, vendor readiness\, device constraints\, performance tradeoffs\, rollout sequencing\, and “what we learned the hard way.” \n### **Speakers and community contributions** \nWe often invite a guest speaker to share practical experience (implementation lessons\, program strategy\, technical deep dives). Sometimes we’ll host short product introductions – but the default posture is educational and experience-driven\, not salesy. When there’s no guest\, we go deeper on the week’s most important developments and prioritize Q&A. \n### **Typical Agenda** \n**0:00 – 0:05 | Welcome + how to engage (fast)** \n* What this meetup is: **signal > hype**\, practical implications\, community-first\n* How to participate today: chat\, Q&A flow\, how to drop links/resources\n* Quick reminder of community channels (Forum / Slack / LinkedIn group) and how to continue the conversation after the call \n**0:05 – 0:25 | The Weekly Signal Brief (what actually changed)**\nA structured scan in four buckets\, with a “so what?” for each: \n* **Policy & regulation:** new drafts\, mandates\, enforcement signals\, procurement rules\n* **Standards & frameworks:** PQC standards movement\, protocol ecosystem changes\, guidance updates\n* **Quantum capability signals:** credible progress indicators (hardware\, error correction\, scaling)\, what to ignore\n* **Cryptography/cryptanalysis:** meaningful research developments\, “RSA/ECC breaking” signals\, security relevance \n**0:25 – 0:35 | Myth‑Busting / Reality Check (the hype audit)**\nIf something got hyped this week\, we’ll do a quick\, repeatable teardown: \n* **What happened** (one sentence)\n* **What didn’t happen** (the misconception)\n* **What it means for defenders** (real impact)\n* **What changes / what doesn’t** in PQC planning this year \n*Goal:* keep the community calibrated\, reduce panic\, and prevent misallocation of effort. \n**0:35 – 0:50 | One Topic\, Deeper (the week’s main story)**\nA focused deep dive on one theme that affects real programs\, such as: \n* crypto-agility patterns and failure modes\n* hybrid deployment realities (where it works / where it’s a trap)\n* migration sequencing and vendor dependency bottlenecks\n* what a standards change means for architects and CISOs\n* integrity-first thinking (e.g.\, signatures\, trust anchors\, long-lived evidence) \n**0:50 – 1:05 | Guest Spotlight (most weeks) OR Community Lightning Round** \n* **Guest Spotlight (preferred when available):**\n* 10–12 min: experience share / lessons learned / case study / product walkthrough (kept educational)\n* 3–5 min: moderated Q&A (“what surprised you / what broke / what you’d do differently”)\n* **If no guest:**\n* 3 lightning shares (3–4 min each): “one paper / one tool / one lesson / one vendor signal” \n**1:05 – 1:10 | Community Pulse (cross‑channel highlights)** \n* “Top 3 threads” from various community channels this week\n* Quick call-outs: members looking for feedback\, volunteer opportunities\, upcoming topics\n* How to propose a guest / suggest topics / share resources for next week \n**1:10 – 1:28 | Open Q&A / Office Hours** \n* Live questions (chat + audio)\n* “Bring your messy problem” time: inventory\, vendor claims\, timeline pressure\, governance\, metrics\n* Optional: rapid-fire “yes/no + why” on 5–8 quick questions if the room is lively \n**1:28 – 1:30 | Wrap + next week preview** \n* 3 takeaways in 30 seconds\n* What we’re tracking next week\n* Speaker/volunteer reminder (“If you’ve shipped something\, we want the story.”) \n### **Who should join** \nIf you’re responsible for security strategy\, cryptography\, identity\, platform security\, resilience\, compliance\, or product security – and quantum is on your roadmap – this is for you. \n### **What you’ll leave with** \n* Clear visibility into what changed this week\n* Better judgment on what’s noise vs. actionable signal\n* Practical framing for decisions you may need to revisit (inventory\, standards alignment\, vendor dependencies\, rollout sequencing)\n* A community you can learn from (and contribute to)
URL:https://appliedquantum.com/event/quantum-security-community-online-fortnightly-update-emea-apac-6
LOCATION:Online event
CATEGORIES:Community
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/03/1024x576-anROVz.jpg
GEO:-8.521147;179.1962
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=+02:00:20260604T170000
DTEND;TZID=+02:00:20260604T183000
DTSTAMP:20260404T121324
CREATED:20260316T100018Z
LAST-MODIFIED:20260403T103203Z
UID:10000036-1780592400-1780597800@appliedquantum.com
SUMMARY:Quantum Security Community - Online Fortnightly Update (America\, EMEA)
DESCRIPTION:***Quantum Security Community*** *is a free\, global\, practitioner-led network sharing real-world PQC insights and supporting one another through the most complex IT/OT security transformation of our time. Explore the channels at* ***[Quantum.Security](https://quantum.security)*** \n—————— \n**A weekly\, online community meetup for quantum security practitioners — focused on signal\, not hype.** \nPost-quantum cryptography (PQC)\, crypto agility\, quantum threat models\, and standards timelines are all evolving quickly. For security teams\, the challenge isn’t “finding information” — it’s deciding **what matters**\, **what changed**\, and **what to do next**. Quantum Security Weekly exists to make that easier. \nWe run the **same meetup twice each week** to cover global time zones: \n* **Session 1:** Europe / Middle East / APAC-friendly\n* **Session 2:** Europe / Americas-friendly\n(Choose the one that fits your schedule – content is aligned across both.) \n### **What happens each week** \nYou’ll get a curated update across the four categories that consistently drive real-world decisions: \n**1) Regulation & policy signals**\nNew requirements\, supervisory guidance\, national strategies\, procurement rules\, sector-specific expectations – and what they imply for timelines and planning. \n**2) Standards and “rules of the road”**\nUpdates to cryptographic standards and related ecosystems (protocols\, identity\, secure elements\, industry frameworks). We focus on what changes adoption feasibility\, interoperability\, or audit/compliance expectations. \n**3) Technical developments**\nCredible signals about quantum computing capability\, relevant cryptanalysis\, and meaningful algorithmic/security research (including “RSA-breaking” or signature-related developments) – explained in terms of security impact\, not headlines. \n**4) Practical implementation reality**\nThe stuff that makes or breaks programs: where crypto actually lives\, dependency chains\, vendor readiness\, device constraints\, performance tradeoffs\, rollout sequencing\, and “what we learned the hard way.” \n### **Speakers and community contributions** \nWe often invite a guest speaker to share practical experience (implementation lessons\, program strategy\, technical deep dives). Sometimes we’ll host short product introductions – but the default posture is educational and experience-driven\, not salesy. When there’s no guest\, we go deeper on the week’s most important developments and prioritize Q&A. \n### **Typical Agenda** \n**0:00 – 0:05 | Welcome + how to engage (fast)** \n* What this meetup is: **signal > hype**\, practical implications\, community-first\n* How to participate today: chat\, Q&A flow\, how to drop links/resources\n* Quick reminder of community channels (Forum / Slack / LinkedIn group) and how to continue the conversation after the call \n**0:05 – 0:25 | The Weekly Signal Brief (what actually changed)**\nA structured scan in four buckets\, with a “so what?” for each: \n* **Policy & regulation:** new drafts\, mandates\, enforcement signals\, procurement rules\n* **Standards & frameworks:** PQC standards movement\, protocol ecosystem changes\, guidance updates\n* **Quantum capability signals:** credible progress indicators (hardware\, error correction\, scaling)\, what to ignore\n* **Cryptography/cryptanalysis:** meaningful research developments\, “RSA/ECC breaking” signals\, security relevance \n**0:25 – 0:35 | Myth‑Busting / Reality Check (the hype audit)**\nIf something got hyped this week\, we’ll do a quick\, repeatable teardown: \n* **What happened** (one sentence)\n* **What didn’t happen** (the misconception)\n* **What it means for defenders** (real impact)\n* **What changes / what doesn’t** in PQC planning this year \n*Goal:* keep the community calibrated\, reduce panic\, and prevent misallocation of effort. \n**0:35 – 0:50 | One Topic\, Deeper (the week’s main story)**\nA focused deep dive on one theme that affects real programs\, such as: \n* crypto-agility patterns and failure modes\n* hybrid deployment realities (where it works / where it’s a trap)\n* migration sequencing and vendor dependency bottlenecks\n* what a standards change means for architects and CISOs\n* integrity-first thinking (e.g.\, signatures\, trust anchors\, long-lived evidence) \n**0:50 – 1:05 | Guest Spotlight (most weeks) OR Community Lightning Round** \n* **Guest Spotlight (preferred when available):**\n* 10–12 min: experience share / lessons learned / case study / product walkthrough (kept educational)\n* 3–5 min: moderated Q&A (“what surprised you / what broke / what you’d do differently”)\n* **If no guest:**\n* 3 lightning shares (3–4 min each): “one paper / one tool / one lesson / one vendor signal” \n**1:05 – 1:10 | Community Pulse (cross‑channel highlights)** \n* “Top 3 threads” from various community channels this week\n* Quick call-outs: members looking for feedback\, volunteer opportunities\, upcoming topics\n* How to propose a guest / suggest topics / share resources for next week \n**1:10 – 1:28 | Open Q&A / Office Hours** \n* Live questions (chat + audio)\n* “Bring your messy problem” time: inventory\, vendor claims\, timeline pressure\, governance\, metrics\n* Optional: rapid-fire “yes/no + why” on 5–8 quick questions if the room is lively \n**1:28 – 1:30 | Wrap + next week preview** \n* 3 takeaways in 30 seconds\n* What we’re tracking next week\n* Speaker/volunteer reminder (“If you’ve shipped something\, we want the story.”) \n### **Who should join** \nIf you’re responsible for security strategy\, cryptography\, identity\, platform security\, resilience\, compliance\, or product security – and quantum is on your roadmap – this is for you. \n### **What you’ll leave with** \n* Clear visibility into what changed this week\n* Better judgment on what’s noise vs. actionable signal\n* Practical framing for decisions you may need to revisit (inventory\, standards alignment\, vendor dependencies\, rollout sequencing)\n* A community you can learn from (and contribute to)
URL:https://appliedquantum.com/event/quantum-security-community-online-fortnightly-update-america-emea-6
LOCATION:Online event
CATEGORIES:Community
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/03/1024x576-bya3VY.jpg
GEO:-8.521147;179.1962
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Paris:20260611T210000
DTEND;TZID=Europe/Paris:20260611T223000
DTSTAMP:20260404T121324
CREATED:20260219T114208Z
LAST-MODIFIED:20260219T114208Z
UID:10000017-1781211600-1781217000@appliedquantum.com
SUMMARY:Quantum Security Awareness (Banking Edition): Trust Anchors at Bank Scale - PKI\, Signing\, and Long‑Lived Evidence
DESCRIPTION:About This Event\nThis complimentary webcast is designed for banking security leaders who need a clear\, no‑nonsense understanding of the quantum threat – and what to do about it now.  The session avoids generic “PQC 101” and goes straight to what makes banking different: institutional identity and long‑lived evidence are the real blast radius. \nIn a bank\, cryptography isn’t just protecting data in transit – it is the foundation of trust at scale: CA hierarchies\, enterprise PKI\, service‑to‑service mTLS\, customer and workforce authentication\, signed tokens (e.g.\, OAuth/JWT ecosystems)\, document and transaction signing\, code‑signing in CI/CD\, and the regulated archives that prove what happened\, when\, and under which authorization. The uncomfortable banking‑specific reality is that “confidentiality later” is only half the story: if signatures and PKI trust anchors become forgeable in the future\, the bank’s ability to prove integrity\, provenance\, and non‑repudiation comes under pressure. \nThis is also why the industry drivers are accelerating. The G7 Cyber Expert Group released a roadmap specifically to coordinate the transition to post‑quantum cryptography in the financial sector\, explicitly positioning PQC as a systemic resilience issue (not an isolated technical upgrade). ￼ FS‑ISAC has likewise urged global coordination and milestones for financial services migration\, framing the transition as an interdependency problem that can’t be solved bank‑by‑bank in isolation. ￼ \nOn the regulatory side\, the EU’s DORA technical standards don’t mention “PQC” by name – but they effectively force the behavior you need for it: a documented encryption/cryptographic controls policy\, provisions to update cryptographic technology based on developments in cryptanalysis\, and (critically for banks) stronger discipline around certificate and key lifecycle management\, including maintaining a certificate register for critical systems. And while NIS2 raises governance expectations for “banking” as a highly critical sector\, many banks will experience DORA as the sharper operational driver in practice (and the directives explicitly acknowledge that overlap). ￼ \nThe session is intentionally practical: how to start with “trust anchors first\,” how to sequence changes without detonating production dependencies\, and how to pressure‑test vendor roadmaps so “PQC‑ready” becomes a measurable engineering claim rather than marketing. \nFormat: Free live webcast (multiple sessions available) \nDuration: Awareness-level briefing – 1.5 hours \nCost: Free \n\nWhat Will You Learn\n\nA bank‑specific trust map: where quantum‑vulnerable crypto sits across PKI\, token signing\, mTLS\, signing services\, CI/CD\, and regulated archives.\nHow to translate sector signals into action: using the G7 roadmap and FS‑ISAC milestones to set internal timelines and vendor expectations. ￼\nHow to turn “DORA compliance” into quantum readiness: using required crypto policies\, cryptanalysis‑driven update expectations\, and certificate lifecycle controls as forcing functions for crypto agility. ￼\nTrust‑anchor‑first sequencing: what it means in practice (CA modernization\, certificate inventory\, signing key governance\, rollover planning\, hybrid boundaries).\nVendor and third‑party reality checks: what to ask cloud providers\, HSM/KMS vendors\, core banking platforms\, identity stacks\, and managed service partners – and how to spot hand‑wavy roadmaps.\nA pragmatic “first pilots” playbook: which banking domains are most pilotable\, how to contain blast radius\, and what success metrics to track.\n\n\nWho Should Attend\nCISOs\, CISO‑1 cyber leaders\, PKI and IAM owners\, platform security leads\, crypto engineering teams\, cloud/KMS/HSM owners\, and third‑party / outsourcing risk leaders in banks and banking service providers. \n\nPrerequisites\nGeneral familiarity with quantum security concepts\, PQC\, and large‑scale migration challenges is helpful – but not required. If you want a fast\, executive‑level refresher before attending\, you can optionally join Applied Quantum’s free “Quantum Security Awareness for Executives” briefing. See Applied Quantum Events.  \n\nThis Session\nWednesday\, 11 Jun 2026\n\nTime: 9:00 PM CEST | 3:00 PM EDT | 8:00 PM BST | 11:00 PM GST | 12:00 PM PDT\n\nAll events in the series: Quantum Security Awareness – Industry Editions \n\nRegistration\nRegistration is free. RSVP Below. \nPlease register below using your email address. Within minutes\, you will receive a confirmation email containing a calendar invite and the unique Zoom link for the day. If the email does not arrive shortly\, please check your junk or spam folder\, or contact us at admin@appliedquantum.com. \n\nNo fluff. No jargon. Just the clarity and next steps security leaders need. For questions or group registrations\, contact Applied Quantum. \n 
URL:https://appliedquantum.com/event/quantum-security-awareness-banking-11jun2026
CATEGORIES:Webinar
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/02/Quantum-Security-Industry-Webinars-Banking-11Jun2026.jpg
LOCATION:https://us06web.zoom.us/j/83406491661
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Paris:20260617T103000
DTEND;TZID=Europe/Paris:20260617T130000
DTSTAMP:20260404T121324
CREATED:20260216T205845Z
LAST-MODIFIED:20260219T084837Z
UID:10000010-1781692200-1781701200@appliedquantum.com
SUMMARY:Quantum Security Awareness for Executives - Free Webcast
DESCRIPTION:A free executive briefing co-hosted by SANS Institute and Applied Quantum. Cut through the hype\, understand the risk\, and leave with actionable next steps. \n\nAbout This Event\nThis complimentary webcast is designed for security leaders who need a clear\, no-nonsense understanding of the quantum threat – and what to do about it now. Co-hosted by SANS Institute and Applied Quantum\, the session explains what’s changing in the cryptographic landscape\, why the migration to quantum-safe standards is far larger than most organizations expect\, and what practical steps you can take today. \nQuantum risk is not a future-only problem. Adversaries can harvest encrypted data today for later decryption\, while regulators and customers increasingly expect demonstrable progress now – not just plans for 2030 or 2035. \nFormat: Free live webcast (multiple sessions available) Duration: Awareness-level briefing – 2 hours Cost: Free \n\nWhat You Will Learn\nThis briefing gives security leaders: \n\nA clear map of the quantum threat landscape\, including how Harvest Now\, Decrypt Later attacks put long-life data at risk immediately – before quantum computers even arrive.\nA leadership-ready understanding of migration scope: cryptography is embedded across applications\, infrastructure\, vendors\, devices\, and identity systems – this is an enterprise-wide migration\, not a single control change.\nA concise view of what’s changing: algorithms\, certificates\, protocols\, vendor roadmaps\, and performance assumptions.\nThe compliance context: why demonstrable progress – inventories\, roadmaps\, vendor commitments\, and pilot results – is increasingly expected now\, not just by 2030/2035.\nA preview of the hard parts: cryptographic discovery\, legacy systems\, third-party dependencies\, and performance impacts.\nA practical checklist of next steps to start building an organization-wide quantum readiness plan.\nCommon narrative and terminology that reduces friction between risk owners and implementers.\n\n\nWhy “Wait and See” Is No Longer a Strategy\nThis is an enterprise-wide cryptographic migration\, not a single control. Crypto is embedded across applications\, infrastructure\, vendors\, devices\, and identity. The deadlines are only part of the story – the real challenge is inventory\, dependency mapping\, and coordinated change across teams and suppliers. \nAttackers don’t need quantum computers to start. Harvest Now\, Decrypt Later can put long-life data at risk immediately. Post-quantum changes can affect performance\, interoperability\, certificates\, and operational processes\, which means planning requires technical reality checks. \nRegulators and stakeholders increasingly expect evidence of progress – not just awareness. \n\nWho Should Attend\nThis webcast is designed for: \n\nCISOs\, CIOs\, Heads of Security\, Security Directors\nSecurity architects and enterprise architects\nGRC\, risk\, and compliance leaders who need a quantum-ready view of evidence and timelines\nIAM\, PKI\, TLS\, and VPN owners and the technical leaders who support them\nVendor assurance and procurement stakeholders involved in security requirements and roadmaps\n\n\nThis Session\nWednesday\, 17 June 2026\n\nTime: 10:30 AM CEST | 9:30 AM GMT | 12:30 PM GST (Dubai) | 5:00 PM SGT\n\nAll events in the series: Quantum Security Awareness for Executives – Free Webcast Series \n\nWant to go deeper?\nThese topics are covered in much more detail in the SANS Institute and Applied Quantum course SEC529: Quantum Security Readiness for Executives. Registration now open. \n\nRegistration\nThis event is co-hosted by SANS Institute and Applied Quantum. Registration is free. RSVP Below. \nPlease register below using your email address. Within minutes\, you will receive a confirmation email containing a calendar invite and the unique Zoom link for the day. If the email does not arrive shortly\, please check your junk or spam folder\, or contact us at admin@appliedquantum.com. \n\nNo fluff. No jargon. Just the clarity and next steps security leaders need. For questions or group registrations\, contact Applied Quantum. \n 
URL:https://appliedquantum.com/event/quantum-security-awareness-for-executives-free-webcast-6
CATEGORIES:Webinar
ATTACH;FMTTYPE=image/png:https://appliedquantum.com/wp-content/uploads/2026/02/Applied-Quantum-SANS-Course-Awareness.png
LOCATION:https://us06web.zoom.us/j/85364623321
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=+02:00:20260618T090000
DTEND;TZID=+02:00:20260618T103000
DTSTAMP:20260404T121324
CREATED:20260316T100018Z
LAST-MODIFIED:20260403T103203Z
UID:10000037-1781773200-1781778600@appliedquantum.com
SUMMARY:Quantum Security Community - Online Fortnightly Update (EMEA\, APAC)
DESCRIPTION:***Quantum Security Community*** *is a free\, global\, practitioner-led network sharing real-world PQC insights and supporting one another through the most complex IT/OT security transformation of our time. Explore the channels at* ***[Quantum.Security](https://quantum.security)*** \n—————— \n**A weekly\, online community meetup for quantum security practitioners — focused on signal\, not hype.** \nPost-quantum cryptography (PQC)\, crypto agility\, quantum threat models\, and standards timelines are all evolving quickly. For security teams\, the challenge isn’t “finding information” — it’s deciding **what matters**\, **what changed**\, and **what to do next**. Quantum Security Weekly exists to make that easier. \nWe run the **same meetup twice each week** to cover global time zones: \n* **Session 1:** Europe / Middle East / APAC-friendly\n* **Session 2:** Europe / Americas-friendly\n(Choose the one that fits your schedule – content is aligned across both.) \n### **What happens each week** \nYou’ll get a curated update across the four categories that consistently drive real-world decisions: \n**1) Regulation & policy signals**\nNew requirements\, supervisory guidance\, national strategies\, procurement rules\, sector-specific expectations – and what they imply for timelines and planning. \n**2) Standards and “rules of the road”**\nUpdates to cryptographic standards and related ecosystems (protocols\, identity\, secure elements\, industry frameworks). We focus on what changes adoption feasibility\, interoperability\, or audit/compliance expectations. \n**3) Technical developments**\nCredible signals about quantum computing capability\, relevant cryptanalysis\, and meaningful algorithmic/security research (including “RSA-breaking” or signature-related developments) – explained in terms of security impact\, not headlines. \n**4) Practical implementation reality**\nThe stuff that makes or breaks programs: where crypto actually lives\, dependency chains\, vendor readiness\, device constraints\, performance tradeoffs\, rollout sequencing\, and “what we learned the hard way.” \n### **Speakers and community contributions** \nWe often invite a guest speaker to share practical experience (implementation lessons\, program strategy\, technical deep dives). Sometimes we’ll host short product introductions – but the default posture is educational and experience-driven\, not salesy. When there’s no guest\, we go deeper on the week’s most important developments and prioritize Q&A. \n### **Typical Agenda** \n**0:00 – 0:05 | Welcome + how to engage (fast)** \n* What this meetup is: **signal > hype**\, practical implications\, community-first\n* How to participate today: chat\, Q&A flow\, how to drop links/resources\n* Quick reminder of community channels (Forum / Slack / LinkedIn group) and how to continue the conversation after the call \n**0:05 – 0:25 | The Weekly Signal Brief (what actually changed)**\nA structured scan in four buckets\, with a “so what?” for each: \n* **Policy & regulation:** new drafts\, mandates\, enforcement signals\, procurement rules\n* **Standards & frameworks:** PQC standards movement\, protocol ecosystem changes\, guidance updates\n* **Quantum capability signals:** credible progress indicators (hardware\, error correction\, scaling)\, what to ignore\n* **Cryptography/cryptanalysis:** meaningful research developments\, “RSA/ECC breaking” signals\, security relevance \n**0:25 – 0:35 | Myth‑Busting / Reality Check (the hype audit)**\nIf something got hyped this week\, we’ll do a quick\, repeatable teardown: \n* **What happened** (one sentence)\n* **What didn’t happen** (the misconception)\n* **What it means for defenders** (real impact)\n* **What changes / what doesn’t** in PQC planning this year \n*Goal:* keep the community calibrated\, reduce panic\, and prevent misallocation of effort. \n**0:35 – 0:50 | One Topic\, Deeper (the week’s main story)**\nA focused deep dive on one theme that affects real programs\, such as: \n* crypto-agility patterns and failure modes\n* hybrid deployment realities (where it works / where it’s a trap)\n* migration sequencing and vendor dependency bottlenecks\n* what a standards change means for architects and CISOs\n* integrity-first thinking (e.g.\, signatures\, trust anchors\, long-lived evidence) \n**0:50 – 1:05 | Guest Spotlight (most weeks) OR Community Lightning Round** \n* **Guest Spotlight (preferred when available):**\n* 10–12 min: experience share / lessons learned / case study / product walkthrough (kept educational)\n* 3–5 min: moderated Q&A (“what surprised you / what broke / what you’d do differently”)\n* **If no guest:**\n* 3 lightning shares (3–4 min each): “one paper / one tool / one lesson / one vendor signal” \n**1:05 – 1:10 | Community Pulse (cross‑channel highlights)** \n* “Top 3 threads” from various community channels this week\n* Quick call-outs: members looking for feedback\, volunteer opportunities\, upcoming topics\n* How to propose a guest / suggest topics / share resources for next week \n**1:10 – 1:28 | Open Q&A / Office Hours** \n* Live questions (chat + audio)\n* “Bring your messy problem” time: inventory\, vendor claims\, timeline pressure\, governance\, metrics\n* Optional: rapid-fire “yes/no + why” on 5–8 quick questions if the room is lively \n**1:28 – 1:30 | Wrap + next week preview** \n* 3 takeaways in 30 seconds\n* What we’re tracking next week\n* Speaker/volunteer reminder (“If you’ve shipped something\, we want the story.”) \n### **Who should join** \nIf you’re responsible for security strategy\, cryptography\, identity\, platform security\, resilience\, compliance\, or product security – and quantum is on your roadmap – this is for you. \n### **What you’ll leave with** \n* Clear visibility into what changed this week\n* Better judgment on what’s noise vs. actionable signal\n* Practical framing for decisions you may need to revisit (inventory\, standards alignment\, vendor dependencies\, rollout sequencing)\n* A community you can learn from (and contribute to)
URL:https://appliedquantum.com/event/quantum-security-community-online-fortnightly-update-emea-apac-7
LOCATION:Online event
CATEGORIES:Community
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/03/1024x576-anROVz.jpg
GEO:-8.521147;179.1962
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=+02:00:20260618T170000
DTEND;TZID=+02:00:20260618T183000
DTSTAMP:20260404T121324
CREATED:20260316T100018Z
LAST-MODIFIED:20260403T103203Z
UID:10000038-1781802000-1781807400@appliedquantum.com
SUMMARY:Quantum Security Community - Online Fortnightly Update (America\, EMEA)
DESCRIPTION:***Quantum Security Community*** *is a free\, global\, practitioner-led network sharing real-world PQC insights and supporting one another through the most complex IT/OT security transformation of our time. Explore the channels at* ***[Quantum.Security](https://quantum.security)*** \n—————— \n**A weekly\, online community meetup for quantum security practitioners — focused on signal\, not hype.** \nPost-quantum cryptography (PQC)\, crypto agility\, quantum threat models\, and standards timelines are all evolving quickly. For security teams\, the challenge isn’t “finding information” — it’s deciding **what matters**\, **what changed**\, and **what to do next**. Quantum Security Weekly exists to make that easier. \nWe run the **same meetup twice each week** to cover global time zones: \n* **Session 1:** Europe / Middle East / APAC-friendly\n* **Session 2:** Europe / Americas-friendly\n(Choose the one that fits your schedule – content is aligned across both.) \n### **What happens each week** \nYou’ll get a curated update across the four categories that consistently drive real-world decisions: \n**1) Regulation & policy signals**\nNew requirements\, supervisory guidance\, national strategies\, procurement rules\, sector-specific expectations – and what they imply for timelines and planning. \n**2) Standards and “rules of the road”**\nUpdates to cryptographic standards and related ecosystems (protocols\, identity\, secure elements\, industry frameworks). We focus on what changes adoption feasibility\, interoperability\, or audit/compliance expectations. \n**3) Technical developments**\nCredible signals about quantum computing capability\, relevant cryptanalysis\, and meaningful algorithmic/security research (including “RSA-breaking” or signature-related developments) – explained in terms of security impact\, not headlines. \n**4) Practical implementation reality**\nThe stuff that makes or breaks programs: where crypto actually lives\, dependency chains\, vendor readiness\, device constraints\, performance tradeoffs\, rollout sequencing\, and “what we learned the hard way.” \n### **Speakers and community contributions** \nWe often invite a guest speaker to share practical experience (implementation lessons\, program strategy\, technical deep dives). Sometimes we’ll host short product introductions – but the default posture is educational and experience-driven\, not salesy. When there’s no guest\, we go deeper on the week’s most important developments and prioritize Q&A. \n### **Typical Agenda** \n**0:00 – 0:05 | Welcome + how to engage (fast)** \n* What this meetup is: **signal > hype**\, practical implications\, community-first\n* How to participate today: chat\, Q&A flow\, how to drop links/resources\n* Quick reminder of community channels (Forum / Slack / LinkedIn group) and how to continue the conversation after the call \n**0:05 – 0:25 | The Weekly Signal Brief (what actually changed)**\nA structured scan in four buckets\, with a “so what?” for each: \n* **Policy & regulation:** new drafts\, mandates\, enforcement signals\, procurement rules\n* **Standards & frameworks:** PQC standards movement\, protocol ecosystem changes\, guidance updates\n* **Quantum capability signals:** credible progress indicators (hardware\, error correction\, scaling)\, what to ignore\n* **Cryptography/cryptanalysis:** meaningful research developments\, “RSA/ECC breaking” signals\, security relevance \n**0:25 – 0:35 | Myth‑Busting / Reality Check (the hype audit)**\nIf something got hyped this week\, we’ll do a quick\, repeatable teardown: \n* **What happened** (one sentence)\n* **What didn’t happen** (the misconception)\n* **What it means for defenders** (real impact)\n* **What changes / what doesn’t** in PQC planning this year \n*Goal:* keep the community calibrated\, reduce panic\, and prevent misallocation of effort. \n**0:35 – 0:50 | One Topic\, Deeper (the week’s main story)**\nA focused deep dive on one theme that affects real programs\, such as: \n* crypto-agility patterns and failure modes\n* hybrid deployment realities (where it works / where it’s a trap)\n* migration sequencing and vendor dependency bottlenecks\n* what a standards change means for architects and CISOs\n* integrity-first thinking (e.g.\, signatures\, trust anchors\, long-lived evidence) \n**0:50 – 1:05 | Guest Spotlight (most weeks) OR Community Lightning Round** \n* **Guest Spotlight (preferred when available):**\n* 10–12 min: experience share / lessons learned / case study / product walkthrough (kept educational)\n* 3–5 min: moderated Q&A (“what surprised you / what broke / what you’d do differently”)\n* **If no guest:**\n* 3 lightning shares (3–4 min each): “one paper / one tool / one lesson / one vendor signal” \n**1:05 – 1:10 | Community Pulse (cross‑channel highlights)** \n* “Top 3 threads” from various community channels this week\n* Quick call-outs: members looking for feedback\, volunteer opportunities\, upcoming topics\n* How to propose a guest / suggest topics / share resources for next week \n**1:10 – 1:28 | Open Q&A / Office Hours** \n* Live questions (chat + audio)\n* “Bring your messy problem” time: inventory\, vendor claims\, timeline pressure\, governance\, metrics\n* Optional: rapid-fire “yes/no + why” on 5–8 quick questions if the room is lively \n**1:28 – 1:30 | Wrap + next week preview** \n* 3 takeaways in 30 seconds\n* What we’re tracking next week\n* Speaker/volunteer reminder (“If you’ve shipped something\, we want the story.”) \n### **Who should join** \nIf you’re responsible for security strategy\, cryptography\, identity\, platform security\, resilience\, compliance\, or product security – and quantum is on your roadmap – this is for you. \n### **What you’ll leave with** \n* Clear visibility into what changed this week\n* Better judgment on what’s noise vs. actionable signal\n* Practical framing for decisions you may need to revisit (inventory\, standards alignment\, vendor dependencies\, rollout sequencing)\n* A community you can learn from (and contribute to)
URL:https://appliedquantum.com/event/quantum-security-community-online-fortnightly-update-america-emea-7
LOCATION:Online event
CATEGORIES:Community
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/03/1024x576-bya3VY.jpg
GEO:-8.521147;179.1962
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Paris:20260618T190000
DTEND;TZID=Europe/Paris:20260618T203000
DTSTAMP:20260404T121324
CREATED:20260219T130113Z
LAST-MODIFIED:20260220T031746Z
UID:10000022-1781809200-1781814600@appliedquantum.com
SUMMARY:Quantum Security Awareness (Manufacturing Edition): Trust Now\, Forge Later on the Shop Floor - Signed Updates\, Machine Identity\,  and Supplier Reality
DESCRIPTION:About This Event\nThis complimentary webcast is designed for manufacturing security leaders who need a clear\, no‑nonsense understanding of the quantum threat – and what to do about it now\, without getting lost in theory. The session stays focused on the manufacturing reality: OT constraints\, supplier dependencies\, and trust anchors that live inside equipment you don’t fully control. \nDiscrete manufacturing is increasingly “software-defined” – not just in IT\, but on the shop floor. Machine identity\, remote maintenance pathways\, and signed firmware / signed logic updates are now the control points for what code is allowed to run on PLCs\, robots\, vision systems\, and industrial gateways. That is exactly why quantum readiness in manufacturing is not an “upgrade your encryption” exercise. It’s a trust-and-integrity program across long-lived assets\, vendor toolchains\, and operational change windows. \nThis is also where TNFL (Trust Now\, Forge Later) becomes a very practical OT problem. If signatures and certificates that underpin “trusted updates” or “trusted devices” become forgeable in the future\, attackers don’t just decrypt data – they can create counterfeit updates\, impersonate legitimate devices\, or introduce malicious logic that passes validation checks in environments where patching is slow\, downtime is expensive\, and equipment lifecycles are measured in years (often decades). \nWe’ll ground the discussion in the manufacturing patterns security leaders actually grapple with: always‑on plants\, segmented networks\, vendor jump boxes\, third‑party remote support\, and the uncomfortable truth that many of your most important trust anchors are controlled by OEMs. We’ll use ISA/IEC 62443 as a practical scaffold (zones/conduits and lifecycle thinking) to discuss where cryptographic change is safest and least disruptive – typically at boundaries and in intermediate systems before touching the most fragile endpoints. \nThis is an awareness + decision-support session: you will leave with the mental model\, vocabulary\, and prioritization logic to start the right conversations internally (OT/engineering) and externally (OEMs/integrators) – and to avoid the classic trap of “PQC pilots” that never touch real shop-floor dependencies. \nFormat: Free live webcast (multiple sessions available) \nDuration: Awareness-level briefing – 1.5 hours \nCost: Free \n\nWhat Will You Learn\n\nWhere crypto really lives in plants: the trust anchors that matter most (signing roots\, device identity\, remote access\, update channels).\nWhy TNFL dominates OT risk: how “signed” can stop meaning “safe\,” and what that implies for firmware\, logic\, and device authenticity.\nHow to use ISA/IEC 62443 to plan safe change: applying zones/conduits and lifecycle thinking to sequence PQC readiness with minimal disruption.\nBoundary-first prioritization: why gateways\, conduits\, and remote-access intermediates are usually the fastest way to reduce risk early.\nHow to pressure-test OEM claims: what “credible PQC readiness” looks like from vendors (lifecycle commitments\, upgrade paths\, interoperability assumptions)\, and how to avoid bespoke\, non-standard “crypto fixes.”\nWhat a realistic first year looks like: the decisions and proofs that matter (inventory → dependency map → pilot boundaries → vendor gating)\, even when endpoint upgrades are years away.\n\n\nWho Should Attend\nCISOs\, OT security leaders\, plant security architects\, industrial network/SCADA engineers with security remit\, and supplier/vendor‑risk owners in discrete manufacturing environments. \n\nPrerequisites\nGeneral familiarity with quantum security concepts\, PQC\, and large‑scale migration challenges is helpful – but not required. If you want a fast\, executive‑level refresher before attending\, you can optionally join Applied Quantum’s free “Quantum Security Awareness for Executives” briefing. See Applied Quantum Events.  \n\nThis Session\nWednesday\, 18 Jun 2026\n\nTime: 7:00 PM CEST | 1:00 PM EDT | 6:00 PM BST | 9:00 PM GST | 10:00 AM PDT\n\nAll events in the series: Quantum Security Awareness – Industry Editions \n\nRegistration\nRegistration is free. RSVP Below. \nPlease register below using your email address. Within minutes\, you will receive a confirmation email containing a calendar invite and the unique Zoom link for the day. If the email does not arrive shortly\, please check your junk or spam folder\, or contact us at admin@appliedquantum.com. \n\nNo fluff. No jargon. Just the clarity and next steps security leaders need. For questions or group registrations\, contact Applied Quantum. \n 
URL:https://appliedquantum.com/event/quantum-security-awareness-manufacturing-18jun2026
CATEGORIES:Webinar
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/02/Quantum-Security-Industry-Webinars-Manufacturing-18Jun2026.jpg
LOCATION:https://us06web.zoom.us/j/88309177596
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=+02:00:20260702T090000
DTEND;TZID=+02:00:20260702T103000
DTSTAMP:20260404T121324
CREATED:20260316T100018Z
LAST-MODIFIED:20260403T103203Z
UID:10000039-1782982800-1782988200@appliedquantum.com
SUMMARY:Quantum Security Community - Online Fortnightly Update (EMEA\, APAC)
DESCRIPTION:***Quantum Security Community*** *is a free\, global\, practitioner-led network sharing real-world PQC insights and supporting one another through the most complex IT/OT security transformation of our time. Explore the channels at* ***[Quantum.Security](https://quantum.security)*** \n—————— \n**A weekly\, online community meetup for quantum security practitioners — focused on signal\, not hype.** \nPost-quantum cryptography (PQC)\, crypto agility\, quantum threat models\, and standards timelines are all evolving quickly. For security teams\, the challenge isn’t “finding information” — it’s deciding **what matters**\, **what changed**\, and **what to do next**. Quantum Security Weekly exists to make that easier. \nWe run the **same meetup twice each week** to cover global time zones: \n* **Session 1:** Europe / Middle East / APAC-friendly\n* **Session 2:** Europe / Americas-friendly\n(Choose the one that fits your schedule – content is aligned across both.) \n### **What happens each week** \nYou’ll get a curated update across the four categories that consistently drive real-world decisions: \n**1) Regulation & policy signals**\nNew requirements\, supervisory guidance\, national strategies\, procurement rules\, sector-specific expectations – and what they imply for timelines and planning. \n**2) Standards and “rules of the road”**\nUpdates to cryptographic standards and related ecosystems (protocols\, identity\, secure elements\, industry frameworks). We focus on what changes adoption feasibility\, interoperability\, or audit/compliance expectations. \n**3) Technical developments**\nCredible signals about quantum computing capability\, relevant cryptanalysis\, and meaningful algorithmic/security research (including “RSA-breaking” or signature-related developments) – explained in terms of security impact\, not headlines. \n**4) Practical implementation reality**\nThe stuff that makes or breaks programs: where crypto actually lives\, dependency chains\, vendor readiness\, device constraints\, performance tradeoffs\, rollout sequencing\, and “what we learned the hard way.” \n### **Speakers and community contributions** \nWe often invite a guest speaker to share practical experience (implementation lessons\, program strategy\, technical deep dives). Sometimes we’ll host short product introductions – but the default posture is educational and experience-driven\, not salesy. When there’s no guest\, we go deeper on the week’s most important developments and prioritize Q&A. \n### **Typical Agenda** \n**0:00 – 0:05 | Welcome + how to engage (fast)** \n* What this meetup is: **signal > hype**\, practical implications\, community-first\n* How to participate today: chat\, Q&A flow\, how to drop links/resources\n* Quick reminder of community channels (Forum / Slack / LinkedIn group) and how to continue the conversation after the call \n**0:05 – 0:25 | The Weekly Signal Brief (what actually changed)**\nA structured scan in four buckets\, with a “so what?” for each: \n* **Policy & regulation:** new drafts\, mandates\, enforcement signals\, procurement rules\n* **Standards & frameworks:** PQC standards movement\, protocol ecosystem changes\, guidance updates\n* **Quantum capability signals:** credible progress indicators (hardware\, error correction\, scaling)\, what to ignore\n* **Cryptography/cryptanalysis:** meaningful research developments\, “RSA/ECC breaking” signals\, security relevance \n**0:25 – 0:35 | Myth‑Busting / Reality Check (the hype audit)**\nIf something got hyped this week\, we’ll do a quick\, repeatable teardown: \n* **What happened** (one sentence)\n* **What didn’t happen** (the misconception)\n* **What it means for defenders** (real impact)\n* **What changes / what doesn’t** in PQC planning this year \n*Goal:* keep the community calibrated\, reduce panic\, and prevent misallocation of effort. \n**0:35 – 0:50 | One Topic\, Deeper (the week’s main story)**\nA focused deep dive on one theme that affects real programs\, such as: \n* crypto-agility patterns and failure modes\n* hybrid deployment realities (where it works / where it’s a trap)\n* migration sequencing and vendor dependency bottlenecks\n* what a standards change means for architects and CISOs\n* integrity-first thinking (e.g.\, signatures\, trust anchors\, long-lived evidence) \n**0:50 – 1:05 | Guest Spotlight (most weeks) OR Community Lightning Round** \n* **Guest Spotlight (preferred when available):**\n* 10–12 min: experience share / lessons learned / case study / product walkthrough (kept educational)\n* 3–5 min: moderated Q&A (“what surprised you / what broke / what you’d do differently”)\n* **If no guest:**\n* 3 lightning shares (3–4 min each): “one paper / one tool / one lesson / one vendor signal” \n**1:05 – 1:10 | Community Pulse (cross‑channel highlights)** \n* “Top 3 threads” from various community channels this week\n* Quick call-outs: members looking for feedback\, volunteer opportunities\, upcoming topics\n* How to propose a guest / suggest topics / share resources for next week \n**1:10 – 1:28 | Open Q&A / Office Hours** \n* Live questions (chat + audio)\n* “Bring your messy problem” time: inventory\, vendor claims\, timeline pressure\, governance\, metrics\n* Optional: rapid-fire “yes/no + why” on 5–8 quick questions if the room is lively \n**1:28 – 1:30 | Wrap + next week preview** \n* 3 takeaways in 30 seconds\n* What we’re tracking next week\n* Speaker/volunteer reminder (“If you’ve shipped something\, we want the story.”) \n### **Who should join** \nIf you’re responsible for security strategy\, cryptography\, identity\, platform security\, resilience\, compliance\, or product security – and quantum is on your roadmap – this is for you. \n### **What you’ll leave with** \n* Clear visibility into what changed this week\n* Better judgment on what’s noise vs. actionable signal\n* Practical framing for decisions you may need to revisit (inventory\, standards alignment\, vendor dependencies\, rollout sequencing)\n* A community you can learn from (and contribute to)
URL:https://appliedquantum.com/event/quantum-security-community-online-fortnightly-update-emea-apac-8
LOCATION:Online event
CATEGORIES:Community
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/03/1024x576-anROVz.jpg
GEO:-8.521147;179.1962
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=+02:00:20260702T170000
DTEND;TZID=+02:00:20260702T183000
DTSTAMP:20260404T121324
CREATED:20260316T100018Z
LAST-MODIFIED:20260403T103203Z
UID:10000040-1783011600-1783017000@appliedquantum.com
SUMMARY:Quantum Security Community - Online Fortnightly Update (America\, EMEA)
DESCRIPTION:***Quantum Security Community*** *is a free\, global\, practitioner-led network sharing real-world PQC insights and supporting one another through the most complex IT/OT security transformation of our time. Explore the channels at* ***[Quantum.Security](https://quantum.security)*** \n—————— \n**A weekly\, online community meetup for quantum security practitioners — focused on signal\, not hype.** \nPost-quantum cryptography (PQC)\, crypto agility\, quantum threat models\, and standards timelines are all evolving quickly. For security teams\, the challenge isn’t “finding information” — it’s deciding **what matters**\, **what changed**\, and **what to do next**. Quantum Security Weekly exists to make that easier. \nWe run the **same meetup twice each week** to cover global time zones: \n* **Session 1:** Europe / Middle East / APAC-friendly\n* **Session 2:** Europe / Americas-friendly\n(Choose the one that fits your schedule – content is aligned across both.) \n### **What happens each week** \nYou’ll get a curated update across the four categories that consistently drive real-world decisions: \n**1) Regulation & policy signals**\nNew requirements\, supervisory guidance\, national strategies\, procurement rules\, sector-specific expectations – and what they imply for timelines and planning. \n**2) Standards and “rules of the road”**\nUpdates to cryptographic standards and related ecosystems (protocols\, identity\, secure elements\, industry frameworks). We focus on what changes adoption feasibility\, interoperability\, or audit/compliance expectations. \n**3) Technical developments**\nCredible signals about quantum computing capability\, relevant cryptanalysis\, and meaningful algorithmic/security research (including “RSA-breaking” or signature-related developments) – explained in terms of security impact\, not headlines. \n**4) Practical implementation reality**\nThe stuff that makes or breaks programs: where crypto actually lives\, dependency chains\, vendor readiness\, device constraints\, performance tradeoffs\, rollout sequencing\, and “what we learned the hard way.” \n### **Speakers and community contributions** \nWe often invite a guest speaker to share practical experience (implementation lessons\, program strategy\, technical deep dives). Sometimes we’ll host short product introductions – but the default posture is educational and experience-driven\, not salesy. When there’s no guest\, we go deeper on the week’s most important developments and prioritize Q&A. \n### **Typical Agenda** \n**0:00 – 0:05 | Welcome + how to engage (fast)** \n* What this meetup is: **signal > hype**\, practical implications\, community-first\n* How to participate today: chat\, Q&A flow\, how to drop links/resources\n* Quick reminder of community channels (Forum / Slack / LinkedIn group) and how to continue the conversation after the call \n**0:05 – 0:25 | The Weekly Signal Brief (what actually changed)**\nA structured scan in four buckets\, with a “so what?” for each: \n* **Policy & regulation:** new drafts\, mandates\, enforcement signals\, procurement rules\n* **Standards & frameworks:** PQC standards movement\, protocol ecosystem changes\, guidance updates\n* **Quantum capability signals:** credible progress indicators (hardware\, error correction\, scaling)\, what to ignore\n* **Cryptography/cryptanalysis:** meaningful research developments\, “RSA/ECC breaking” signals\, security relevance \n**0:25 – 0:35 | Myth‑Busting / Reality Check (the hype audit)**\nIf something got hyped this week\, we’ll do a quick\, repeatable teardown: \n* **What happened** (one sentence)\n* **What didn’t happen** (the misconception)\n* **What it means for defenders** (real impact)\n* **What changes / what doesn’t** in PQC planning this year \n*Goal:* keep the community calibrated\, reduce panic\, and prevent misallocation of effort. \n**0:35 – 0:50 | One Topic\, Deeper (the week’s main story)**\nA focused deep dive on one theme that affects real programs\, such as: \n* crypto-agility patterns and failure modes\n* hybrid deployment realities (where it works / where it’s a trap)\n* migration sequencing and vendor dependency bottlenecks\n* what a standards change means for architects and CISOs\n* integrity-first thinking (e.g.\, signatures\, trust anchors\, long-lived evidence) \n**0:50 – 1:05 | Guest Spotlight (most weeks) OR Community Lightning Round** \n* **Guest Spotlight (preferred when available):**\n* 10–12 min: experience share / lessons learned / case study / product walkthrough (kept educational)\n* 3–5 min: moderated Q&A (“what surprised you / what broke / what you’d do differently”)\n* **If no guest:**\n* 3 lightning shares (3–4 min each): “one paper / one tool / one lesson / one vendor signal” \n**1:05 – 1:10 | Community Pulse (cross‑channel highlights)** \n* “Top 3 threads” from various community channels this week\n* Quick call-outs: members looking for feedback\, volunteer opportunities\, upcoming topics\n* How to propose a guest / suggest topics / share resources for next week \n**1:10 – 1:28 | Open Q&A / Office Hours** \n* Live questions (chat + audio)\n* “Bring your messy problem” time: inventory\, vendor claims\, timeline pressure\, governance\, metrics\n* Optional: rapid-fire “yes/no + why” on 5–8 quick questions if the room is lively \n**1:28 – 1:30 | Wrap + next week preview** \n* 3 takeaways in 30 seconds\n* What we’re tracking next week\n* Speaker/volunteer reminder (“If you’ve shipped something\, we want the story.”) \n### **Who should join** \nIf you’re responsible for security strategy\, cryptography\, identity\, platform security\, resilience\, compliance\, or product security – and quantum is on your roadmap – this is for you. \n### **What you’ll leave with** \n* Clear visibility into what changed this week\n* Better judgment on what’s noise vs. actionable signal\n* Practical framing for decisions you may need to revisit (inventory\, standards alignment\, vendor dependencies\, rollout sequencing)\n* A community you can learn from (and contribute to)
URL:https://appliedquantum.com/event/quantum-security-community-online-fortnightly-update-america-emea-8
LOCATION:Online event
CATEGORIES:Community
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/03/1024x576-bya3VY.jpg
GEO:-8.521147;179.1962
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=+02:00:20260716T090000
DTEND;TZID=+02:00:20260716T103000
DTSTAMP:20260404T121324
CREATED:20260316T100018Z
LAST-MODIFIED:20260403T103203Z
UID:10000041-1784192400-1784197800@appliedquantum.com
SUMMARY:Quantum Security Community - Online Fortnightly Update (EMEA\, APAC)
DESCRIPTION:***Quantum Security Community*** *is a free\, global\, practitioner-led network sharing real-world PQC insights and supporting one another through the most complex IT/OT security transformation of our time. Explore the channels at* ***[Quantum.Security](https://quantum.security)*** \n—————— \n**A weekly\, online community meetup for quantum security practitioners — focused on signal\, not hype.** \nPost-quantum cryptography (PQC)\, crypto agility\, quantum threat models\, and standards timelines are all evolving quickly. For security teams\, the challenge isn’t “finding information” — it’s deciding **what matters**\, **what changed**\, and **what to do next**. Quantum Security Weekly exists to make that easier. \nWe run the **same meetup twice each week** to cover global time zones: \n* **Session 1:** Europe / Middle East / APAC-friendly\n* **Session 2:** Europe / Americas-friendly\n(Choose the one that fits your schedule – content is aligned across both.) \n### **What happens each week** \nYou’ll get a curated update across the four categories that consistently drive real-world decisions: \n**1) Regulation & policy signals**\nNew requirements\, supervisory guidance\, national strategies\, procurement rules\, sector-specific expectations – and what they imply for timelines and planning. \n**2) Standards and “rules of the road”**\nUpdates to cryptographic standards and related ecosystems (protocols\, identity\, secure elements\, industry frameworks). We focus on what changes adoption feasibility\, interoperability\, or audit/compliance expectations. \n**3) Technical developments**\nCredible signals about quantum computing capability\, relevant cryptanalysis\, and meaningful algorithmic/security research (including “RSA-breaking” or signature-related developments) – explained in terms of security impact\, not headlines. \n**4) Practical implementation reality**\nThe stuff that makes or breaks programs: where crypto actually lives\, dependency chains\, vendor readiness\, device constraints\, performance tradeoffs\, rollout sequencing\, and “what we learned the hard way.” \n### **Speakers and community contributions** \nWe often invite a guest speaker to share practical experience (implementation lessons\, program strategy\, technical deep dives). Sometimes we’ll host short product introductions – but the default posture is educational and experience-driven\, not salesy. When there’s no guest\, we go deeper on the week’s most important developments and prioritize Q&A. \n### **Typical Agenda** \n**0:00 – 0:05 | Welcome + how to engage (fast)** \n* What this meetup is: **signal > hype**\, practical implications\, community-first\n* How to participate today: chat\, Q&A flow\, how to drop links/resources\n* Quick reminder of community channels (Forum / Slack / LinkedIn group) and how to continue the conversation after the call \n**0:05 – 0:25 | The Weekly Signal Brief (what actually changed)**\nA structured scan in four buckets\, with a “so what?” for each: \n* **Policy & regulation:** new drafts\, mandates\, enforcement signals\, procurement rules\n* **Standards & frameworks:** PQC standards movement\, protocol ecosystem changes\, guidance updates\n* **Quantum capability signals:** credible progress indicators (hardware\, error correction\, scaling)\, what to ignore\n* **Cryptography/cryptanalysis:** meaningful research developments\, “RSA/ECC breaking” signals\, security relevance \n**0:25 – 0:35 | Myth‑Busting / Reality Check (the hype audit)**\nIf something got hyped this week\, we’ll do a quick\, repeatable teardown: \n* **What happened** (one sentence)\n* **What didn’t happen** (the misconception)\n* **What it means for defenders** (real impact)\n* **What changes / what doesn’t** in PQC planning this year \n*Goal:* keep the community calibrated\, reduce panic\, and prevent misallocation of effort. \n**0:35 – 0:50 | One Topic\, Deeper (the week’s main story)**\nA focused deep dive on one theme that affects real programs\, such as: \n* crypto-agility patterns and failure modes\n* hybrid deployment realities (where it works / where it’s a trap)\n* migration sequencing and vendor dependency bottlenecks\n* what a standards change means for architects and CISOs\n* integrity-first thinking (e.g.\, signatures\, trust anchors\, long-lived evidence) \n**0:50 – 1:05 | Guest Spotlight (most weeks) OR Community Lightning Round** \n* **Guest Spotlight (preferred when available):**\n* 10–12 min: experience share / lessons learned / case study / product walkthrough (kept educational)\n* 3–5 min: moderated Q&A (“what surprised you / what broke / what you’d do differently”)\n* **If no guest:**\n* 3 lightning shares (3–4 min each): “one paper / one tool / one lesson / one vendor signal” \n**1:05 – 1:10 | Community Pulse (cross‑channel highlights)** \n* “Top 3 threads” from various community channels this week\n* Quick call-outs: members looking for feedback\, volunteer opportunities\, upcoming topics\n* How to propose a guest / suggest topics / share resources for next week \n**1:10 – 1:28 | Open Q&A / Office Hours** \n* Live questions (chat + audio)\n* “Bring your messy problem” time: inventory\, vendor claims\, timeline pressure\, governance\, metrics\n* Optional: rapid-fire “yes/no + why” on 5–8 quick questions if the room is lively \n**1:28 – 1:30 | Wrap + next week preview** \n* 3 takeaways in 30 seconds\n* What we’re tracking next week\n* Speaker/volunteer reminder (“If you’ve shipped something\, we want the story.”) \n### **Who should join** \nIf you’re responsible for security strategy\, cryptography\, identity\, platform security\, resilience\, compliance\, or product security – and quantum is on your roadmap – this is for you. \n### **What you’ll leave with** \n* Clear visibility into what changed this week\n* Better judgment on what’s noise vs. actionable signal\n* Practical framing for decisions you may need to revisit (inventory\, standards alignment\, vendor dependencies\, rollout sequencing)\n* A community you can learn from (and contribute to)
URL:https://appliedquantum.com/event/quantum-security-community-online-fortnightly-update-emea-apac-9
LOCATION:Online event
CATEGORIES:Community
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/03/1024x576-anROVz.jpg
GEO:-8.521147;179.1962
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=+02:00:20260716T170000
DTEND;TZID=+02:00:20260716T183000
DTSTAMP:20260404T121324
CREATED:20260316T100018Z
LAST-MODIFIED:20260403T103203Z
UID:10000042-1784221200-1784226600@appliedquantum.com
SUMMARY:Quantum Security Community - Online Fortnightly Update (America\, EMEA)
DESCRIPTION:***Quantum Security Community*** *is a free\, global\, practitioner-led network sharing real-world PQC insights and supporting one another through the most complex IT/OT security transformation of our time. Explore the channels at* ***[Quantum.Security](https://quantum.security)*** \n—————— \n**A weekly\, online community meetup for quantum security practitioners — focused on signal\, not hype.** \nPost-quantum cryptography (PQC)\, crypto agility\, quantum threat models\, and standards timelines are all evolving quickly. For security teams\, the challenge isn’t “finding information” — it’s deciding **what matters**\, **what changed**\, and **what to do next**. Quantum Security Weekly exists to make that easier. \nWe run the **same meetup twice each week** to cover global time zones: \n* **Session 1:** Europe / Middle East / APAC-friendly\n* **Session 2:** Europe / Americas-friendly\n(Choose the one that fits your schedule – content is aligned across both.) \n### **What happens each week** \nYou’ll get a curated update across the four categories that consistently drive real-world decisions: \n**1) Regulation & policy signals**\nNew requirements\, supervisory guidance\, national strategies\, procurement rules\, sector-specific expectations – and what they imply for timelines and planning. \n**2) Standards and “rules of the road”**\nUpdates to cryptographic standards and related ecosystems (protocols\, identity\, secure elements\, industry frameworks). We focus on what changes adoption feasibility\, interoperability\, or audit/compliance expectations. \n**3) Technical developments**\nCredible signals about quantum computing capability\, relevant cryptanalysis\, and meaningful algorithmic/security research (including “RSA-breaking” or signature-related developments) – explained in terms of security impact\, not headlines. \n**4) Practical implementation reality**\nThe stuff that makes or breaks programs: where crypto actually lives\, dependency chains\, vendor readiness\, device constraints\, performance tradeoffs\, rollout sequencing\, and “what we learned the hard way.” \n### **Speakers and community contributions** \nWe often invite a guest speaker to share practical experience (implementation lessons\, program strategy\, technical deep dives). Sometimes we’ll host short product introductions – but the default posture is educational and experience-driven\, not salesy. When there’s no guest\, we go deeper on the week’s most important developments and prioritize Q&A. \n### **Typical Agenda** \n**0:00 – 0:05 | Welcome + how to engage (fast)** \n* What this meetup is: **signal > hype**\, practical implications\, community-first\n* How to participate today: chat\, Q&A flow\, how to drop links/resources\n* Quick reminder of community channels (Forum / Slack / LinkedIn group) and how to continue the conversation after the call \n**0:05 – 0:25 | The Weekly Signal Brief (what actually changed)**\nA structured scan in four buckets\, with a “so what?” for each: \n* **Policy & regulation:** new drafts\, mandates\, enforcement signals\, procurement rules\n* **Standards & frameworks:** PQC standards movement\, protocol ecosystem changes\, guidance updates\n* **Quantum capability signals:** credible progress indicators (hardware\, error correction\, scaling)\, what to ignore\n* **Cryptography/cryptanalysis:** meaningful research developments\, “RSA/ECC breaking” signals\, security relevance \n**0:25 – 0:35 | Myth‑Busting / Reality Check (the hype audit)**\nIf something got hyped this week\, we’ll do a quick\, repeatable teardown: \n* **What happened** (one sentence)\n* **What didn’t happen** (the misconception)\n* **What it means for defenders** (real impact)\n* **What changes / what doesn’t** in PQC planning this year \n*Goal:* keep the community calibrated\, reduce panic\, and prevent misallocation of effort. \n**0:35 – 0:50 | One Topic\, Deeper (the week’s main story)**\nA focused deep dive on one theme that affects real programs\, such as: \n* crypto-agility patterns and failure modes\n* hybrid deployment realities (where it works / where it’s a trap)\n* migration sequencing and vendor dependency bottlenecks\n* what a standards change means for architects and CISOs\n* integrity-first thinking (e.g.\, signatures\, trust anchors\, long-lived evidence) \n**0:50 – 1:05 | Guest Spotlight (most weeks) OR Community Lightning Round** \n* **Guest Spotlight (preferred when available):**\n* 10–12 min: experience share / lessons learned / case study / product walkthrough (kept educational)\n* 3–5 min: moderated Q&A (“what surprised you / what broke / what you’d do differently”)\n* **If no guest:**\n* 3 lightning shares (3–4 min each): “one paper / one tool / one lesson / one vendor signal” \n**1:05 – 1:10 | Community Pulse (cross‑channel highlights)** \n* “Top 3 threads” from various community channels this week\n* Quick call-outs: members looking for feedback\, volunteer opportunities\, upcoming topics\n* How to propose a guest / suggest topics / share resources for next week \n**1:10 – 1:28 | Open Q&A / Office Hours** \n* Live questions (chat + audio)\n* “Bring your messy problem” time: inventory\, vendor claims\, timeline pressure\, governance\, metrics\n* Optional: rapid-fire “yes/no + why” on 5–8 quick questions if the room is lively \n**1:28 – 1:30 | Wrap + next week preview** \n* 3 takeaways in 30 seconds\n* What we’re tracking next week\n* Speaker/volunteer reminder (“If you’ve shipped something\, we want the story.”) \n### **Who should join** \nIf you’re responsible for security strategy\, cryptography\, identity\, platform security\, resilience\, compliance\, or product security – and quantum is on your roadmap – this is for you. \n### **What you’ll leave with** \n* Clear visibility into what changed this week\n* Better judgment on what’s noise vs. actionable signal\n* Practical framing for decisions you may need to revisit (inventory\, standards alignment\, vendor dependencies\, rollout sequencing)\n* A community you can learn from (and contribute to)
URL:https://appliedquantum.com/event/quantum-security-community-online-fortnightly-update-america-emea-9
LOCATION:Online event
CATEGORIES:Community
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/03/1024x576-bya3VY.jpg
GEO:-8.521147;179.1962
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=+02:00:20260730T090000
DTEND;TZID=+02:00:20260730T103000
DTSTAMP:20260404T121324
CREATED:20260316T100018Z
LAST-MODIFIED:20260403T103204Z
UID:10000043-1785402000-1785407400@appliedquantum.com
SUMMARY:Quantum Security Community - Online Fortnightly Update (EMEA\, APAC)
DESCRIPTION:***Quantum Security Community*** *is a free\, global\, practitioner-led network sharing real-world PQC insights and supporting one another through the most complex IT/OT security transformation of our time. Explore the channels at* ***[Quantum.Security](https://quantum.security)*** \n—————— \n**A weekly\, online community meetup for quantum security practitioners — focused on signal\, not hype.** \nPost-quantum cryptography (PQC)\, crypto agility\, quantum threat models\, and standards timelines are all evolving quickly. For security teams\, the challenge isn’t “finding information” — it’s deciding **what matters**\, **what changed**\, and **what to do next**. Quantum Security Weekly exists to make that easier. \nWe run the **same meetup twice each week** to cover global time zones: \n* **Session 1:** Europe / Middle East / APAC-friendly\n* **Session 2:** Europe / Americas-friendly\n(Choose the one that fits your schedule – content is aligned across both.) \n### **What happens each week** \nYou’ll get a curated update across the four categories that consistently drive real-world decisions: \n**1) Regulation & policy signals**\nNew requirements\, supervisory guidance\, national strategies\, procurement rules\, sector-specific expectations – and what they imply for timelines and planning. \n**2) Standards and “rules of the road”**\nUpdates to cryptographic standards and related ecosystems (protocols\, identity\, secure elements\, industry frameworks). We focus on what changes adoption feasibility\, interoperability\, or audit/compliance expectations. \n**3) Technical developments**\nCredible signals about quantum computing capability\, relevant cryptanalysis\, and meaningful algorithmic/security research (including “RSA-breaking” or signature-related developments) – explained in terms of security impact\, not headlines. \n**4) Practical implementation reality**\nThe stuff that makes or breaks programs: where crypto actually lives\, dependency chains\, vendor readiness\, device constraints\, performance tradeoffs\, rollout sequencing\, and “what we learned the hard way.” \n### **Speakers and community contributions** \nWe often invite a guest speaker to share practical experience (implementation lessons\, program strategy\, technical deep dives). Sometimes we’ll host short product introductions – but the default posture is educational and experience-driven\, not salesy. When there’s no guest\, we go deeper on the week’s most important developments and prioritize Q&A. \n### **Typical Agenda** \n**0:00 – 0:05 | Welcome + how to engage (fast)** \n* What this meetup is: **signal > hype**\, practical implications\, community-first\n* How to participate today: chat\, Q&A flow\, how to drop links/resources\n* Quick reminder of community channels (Forum / Slack / LinkedIn group) and how to continue the conversation after the call \n**0:05 – 0:25 | The Weekly Signal Brief (what actually changed)**\nA structured scan in four buckets\, with a “so what?” for each: \n* **Policy & regulation:** new drafts\, mandates\, enforcement signals\, procurement rules\n* **Standards & frameworks:** PQC standards movement\, protocol ecosystem changes\, guidance updates\n* **Quantum capability signals:** credible progress indicators (hardware\, error correction\, scaling)\, what to ignore\n* **Cryptography/cryptanalysis:** meaningful research developments\, “RSA/ECC breaking” signals\, security relevance \n**0:25 – 0:35 | Myth‑Busting / Reality Check (the hype audit)**\nIf something got hyped this week\, we’ll do a quick\, repeatable teardown: \n* **What happened** (one sentence)\n* **What didn’t happen** (the misconception)\n* **What it means for defenders** (real impact)\n* **What changes / what doesn’t** in PQC planning this year \n*Goal:* keep the community calibrated\, reduce panic\, and prevent misallocation of effort. \n**0:35 – 0:50 | One Topic\, Deeper (the week’s main story)**\nA focused deep dive on one theme that affects real programs\, such as: \n* crypto-agility patterns and failure modes\n* hybrid deployment realities (where it works / where it’s a trap)\n* migration sequencing and vendor dependency bottlenecks\n* what a standards change means for architects and CISOs\n* integrity-first thinking (e.g.\, signatures\, trust anchors\, long-lived evidence) \n**0:50 – 1:05 | Guest Spotlight (most weeks) OR Community Lightning Round** \n* **Guest Spotlight (preferred when available):**\n* 10–12 min: experience share / lessons learned / case study / product walkthrough (kept educational)\n* 3–5 min: moderated Q&A (“what surprised you / what broke / what you’d do differently”)\n* **If no guest:**\n* 3 lightning shares (3–4 min each): “one paper / one tool / one lesson / one vendor signal” \n**1:05 – 1:10 | Community Pulse (cross‑channel highlights)** \n* “Top 3 threads” from various community channels this week\n* Quick call-outs: members looking for feedback\, volunteer opportunities\, upcoming topics\n* How to propose a guest / suggest topics / share resources for next week \n**1:10 – 1:28 | Open Q&A / Office Hours** \n* Live questions (chat + audio)\n* “Bring your messy problem” time: inventory\, vendor claims\, timeline pressure\, governance\, metrics\n* Optional: rapid-fire “yes/no + why” on 5–8 quick questions if the room is lively \n**1:28 – 1:30 | Wrap + next week preview** \n* 3 takeaways in 30 seconds\n* What we’re tracking next week\n* Speaker/volunteer reminder (“If you’ve shipped something\, we want the story.”) \n### **Who should join** \nIf you’re responsible for security strategy\, cryptography\, identity\, platform security\, resilience\, compliance\, or product security – and quantum is on your roadmap – this is for you. \n### **What you’ll leave with** \n* Clear visibility into what changed this week\n* Better judgment on what’s noise vs. actionable signal\n* Practical framing for decisions you may need to revisit (inventory\, standards alignment\, vendor dependencies\, rollout sequencing)\n* A community you can learn from (and contribute to)
URL:https://appliedquantum.com/event/quantum-security-community-online-fortnightly-update-emea-apac-10
LOCATION:Online event
CATEGORIES:Community
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/03/1024x576-anROVz.jpg
GEO:-8.521147;179.1962
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=+02:00:20260730T170000
DTEND;TZID=+02:00:20260730T183000
DTSTAMP:20260404T121324
CREATED:20260316T100018Z
LAST-MODIFIED:20260403T103204Z
UID:10000044-1785430800-1785436200@appliedquantum.com
SUMMARY:Quantum Security Community - Online Fortnightly Update (America\, EMEA)
DESCRIPTION:***Quantum Security Community*** *is a free\, global\, practitioner-led network sharing real-world PQC insights and supporting one another through the most complex IT/OT security transformation of our time. Explore the channels at* ***[Quantum.Security](https://quantum.security)*** \n—————— \n**A weekly\, online community meetup for quantum security practitioners — focused on signal\, not hype.** \nPost-quantum cryptography (PQC)\, crypto agility\, quantum threat models\, and standards timelines are all evolving quickly. For security teams\, the challenge isn’t “finding information” — it’s deciding **what matters**\, **what changed**\, and **what to do next**. Quantum Security Weekly exists to make that easier. \nWe run the **same meetup twice each week** to cover global time zones: \n* **Session 1:** Europe / Middle East / APAC-friendly\n* **Session 2:** Europe / Americas-friendly\n(Choose the one that fits your schedule – content is aligned across both.) \n### **What happens each week** \nYou’ll get a curated update across the four categories that consistently drive real-world decisions: \n**1) Regulation & policy signals**\nNew requirements\, supervisory guidance\, national strategies\, procurement rules\, sector-specific expectations – and what they imply for timelines and planning. \n**2) Standards and “rules of the road”**\nUpdates to cryptographic standards and related ecosystems (protocols\, identity\, secure elements\, industry frameworks). We focus on what changes adoption feasibility\, interoperability\, or audit/compliance expectations. \n**3) Technical developments**\nCredible signals about quantum computing capability\, relevant cryptanalysis\, and meaningful algorithmic/security research (including “RSA-breaking” or signature-related developments) – explained in terms of security impact\, not headlines. \n**4) Practical implementation reality**\nThe stuff that makes or breaks programs: where crypto actually lives\, dependency chains\, vendor readiness\, device constraints\, performance tradeoffs\, rollout sequencing\, and “what we learned the hard way.” \n### **Speakers and community contributions** \nWe often invite a guest speaker to share practical experience (implementation lessons\, program strategy\, technical deep dives). Sometimes we’ll host short product introductions – but the default posture is educational and experience-driven\, not salesy. When there’s no guest\, we go deeper on the week’s most important developments and prioritize Q&A. \n### **Typical Agenda** \n**0:00 – 0:05 | Welcome + how to engage (fast)** \n* What this meetup is: **signal > hype**\, practical implications\, community-first\n* How to participate today: chat\, Q&A flow\, how to drop links/resources\n* Quick reminder of community channels (Forum / Slack / LinkedIn group) and how to continue the conversation after the call \n**0:05 – 0:25 | The Weekly Signal Brief (what actually changed)**\nA structured scan in four buckets\, with a “so what?” for each: \n* **Policy & regulation:** new drafts\, mandates\, enforcement signals\, procurement rules\n* **Standards & frameworks:** PQC standards movement\, protocol ecosystem changes\, guidance updates\n* **Quantum capability signals:** credible progress indicators (hardware\, error correction\, scaling)\, what to ignore\n* **Cryptography/cryptanalysis:** meaningful research developments\, “RSA/ECC breaking” signals\, security relevance \n**0:25 – 0:35 | Myth‑Busting / Reality Check (the hype audit)**\nIf something got hyped this week\, we’ll do a quick\, repeatable teardown: \n* **What happened** (one sentence)\n* **What didn’t happen** (the misconception)\n* **What it means for defenders** (real impact)\n* **What changes / what doesn’t** in PQC planning this year \n*Goal:* keep the community calibrated\, reduce panic\, and prevent misallocation of effort. \n**0:35 – 0:50 | One Topic\, Deeper (the week’s main story)**\nA focused deep dive on one theme that affects real programs\, such as: \n* crypto-agility patterns and failure modes\n* hybrid deployment realities (where it works / where it’s a trap)\n* migration sequencing and vendor dependency bottlenecks\n* what a standards change means for architects and CISOs\n* integrity-first thinking (e.g.\, signatures\, trust anchors\, long-lived evidence) \n**0:50 – 1:05 | Guest Spotlight (most weeks) OR Community Lightning Round** \n* **Guest Spotlight (preferred when available):**\n* 10–12 min: experience share / lessons learned / case study / product walkthrough (kept educational)\n* 3–5 min: moderated Q&A (“what surprised you / what broke / what you’d do differently”)\n* **If no guest:**\n* 3 lightning shares (3–4 min each): “one paper / one tool / one lesson / one vendor signal” \n**1:05 – 1:10 | Community Pulse (cross‑channel highlights)** \n* “Top 3 threads” from various community channels this week\n* Quick call-outs: members looking for feedback\, volunteer opportunities\, upcoming topics\n* How to propose a guest / suggest topics / share resources for next week \n**1:10 – 1:28 | Open Q&A / Office Hours** \n* Live questions (chat + audio)\n* “Bring your messy problem” time: inventory\, vendor claims\, timeline pressure\, governance\, metrics\n* Optional: rapid-fire “yes/no + why” on 5–8 quick questions if the room is lively \n**1:28 – 1:30 | Wrap + next week preview** \n* 3 takeaways in 30 seconds\n* What we’re tracking next week\n* Speaker/volunteer reminder (“If you’ve shipped something\, we want the story.”) \n### **Who should join** \nIf you’re responsible for security strategy\, cryptography\, identity\, platform security\, resilience\, compliance\, or product security – and quantum is on your roadmap – this is for you. \n### **What you’ll leave with** \n* Clear visibility into what changed this week\n* Better judgment on what’s noise vs. actionable signal\n* Practical framing for decisions you may need to revisit (inventory\, standards alignment\, vendor dependencies\, rollout sequencing)\n* A community you can learn from (and contribute to)
URL:https://appliedquantum.com/event/quantum-security-community-online-fortnightly-update-america-emea-10
LOCATION:Online event
CATEGORIES:Community
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/03/1024x576-bya3VY.jpg
GEO:-8.521147;179.1962
END:VEVENT
END:VCALENDAR