BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Applied Quantum - ECPv6.16.2//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:Applied Quantum
X-ORIGINAL-URL:https://appliedquantum.com
X-WR-CALDESC:Events for Applied Quantum
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20250309T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20251102T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20260308T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20261101T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20270314T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20271107T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:Europe/London
BEGIN:DAYLIGHT
TZOFFSETFROM:+0000
TZOFFSETTO:+0100
TZNAME:BST
DTSTART:20250330T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0100
TZOFFSETTO:+0000
TZNAME:GMT
DTSTART:20251026T010000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+0000
TZOFFSETTO:+0100
TZNAME:BST
DTSTART:20260329T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0100
TZOFFSETTO:+0000
TZNAME:GMT
DTSTART:20261025T010000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+0000
TZOFFSETTO:+0100
TZNAME:BST
DTSTART:20270328T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0100
TZOFFSETTO:+0000
TZNAME:GMT
DTSTART:20271031T010000
END:STANDARD
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:Europe/Paris
BEGIN:DAYLIGHT
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
TZNAME:CEST
DTSTART:20250330T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
TZNAME:CET
DTSTART:20251026T010000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
TZNAME:CEST
DTSTART:20260329T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
TZNAME:CET
DTSTART:20261025T010000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
TZNAME:CEST
DTSTART:20270328T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
TZNAME:CET
DTSTART:20271031T010000
END:STANDARD
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:Asia/Singapore
BEGIN:STANDARD
TZOFFSETFROM:+0800
TZOFFSETTO:+0800
TZNAME:+08
DTSTART:20250101T000000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260318T083000
DTEND;TZID=America/New_York:20260318T170000
DTSTAMP:20260520T113911
CREATED:20260215T122450Z
LAST-MODIFIED:20260215T205107Z
UID:10000005-1773822600-1773853200@appliedquantum.com
SUMMARY:SEC529: Quantum Security Readiness for Executives - SANS Institute Course
DESCRIPTION:A one-day executive training course designed to help CISOs and security leaders build a practical quantum-safe roadmap before regulatory deadlines hit. \n\nAbout This Course\nSEC529 is a one-day\, instructor-led course offered by SANS Institute\, the global leader in cybersecurity training. It gives security executives the frameworks\, threat models\, and strategic tools needed to assess quantum risk and lead their organizations toward quantum resilience – without getting lost in the physics. \nWith many regulators expecting critical infrastructure to be quantum-safe by 2030\, this course addresses the narrow window security leaders have to build their strategy before regulatory and adversarial pressures converge. \nCourse Authors: Marin Ivezic & Dr. Kawin Boonyapredee \n\nWhat You Will Learn\nThe course covers the essential knowledge areas for executive-level quantum readiness: \n\nForecasting the threat: Apply structured models to estimate when cryptographically relevant quantum computers (CRQCs) will break current encryption – and what that timeline means for your data today.\nQuantifying HNDL exposure: Identify which encrypted assets are already at risk from Harvest Now\, Decrypt Later attacks and learn to prioritize accordingly.\nCryptographic inventory at the executive level: Map cryptographic dependencies across applications\, infrastructure\, and vendors using executive-level frameworks.\nNavigating compliance: Understand NIST PQC standards\, CNSA 2.0 requirements\, and EU mandates to build an audit-ready migration timeline.\nBuilding the roadmap: Construct a phased Quantum-Safe Migration Plan aligned with budget cycles\, business priorities\, and regulatory deadlines.\nWinning the boardroom: Translate quantum risk into business terms with metrics\, cost models\, and narratives that secure executive buy-in.\n\n\nHands-On Labs\nThe course includes three practical exercises: \n\nQ-Day Estimator – Model realistic timelines for when quantum computers could threaten current cryptography.\nQuantum-Readiness Self-Assessment – Evaluate your organization’s current posture against quantum threats.\nDrafting a Roadmap Briefing for the Board – Build the executive communication materials needed to drive action.\n\n\nWho Should Attend\nThis course is designed for CISOs\, senior security leaders\, technical directors\, information security officers\, and executive cyber leaders responsible for setting cybersecurity direction and managing enterprise risk. It is rated at an intermediate skill level\, with 6 CPEs awarded upon completion. \n\nThis Session\nSANS Cybersecurity Leadership Summit & Training 2026\n\nFormat: Virtual (live\, instructor-led)\nInstructor: Marin Ivezic\nPrice: $1\,315 USD (excluding local taxes)\n\nAll events in the series: SANS Institute Courses on Quantum Security & Post-Quantum Cryptography \n\nRegistration\nThis course is organized and delivered by SANS Institute. All registration is handled directly through SANS. \nRegister on the SANS website → \nFor group purchasing options or questions about the course\, please contact SANS directly. \n\nSEC529 is part of SANS Institute’s Cyber Defense curriculum. For full course details\, prerequisites\, laptop requirements\, and FAQs\, visit the official SANS course page. \n 
URL:https://appliedquantum.com/event/sec529-quantum-security-readiness-for-executives-sans-institute-course-2
CATEGORIES:Training
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/02/SANS-SEC529.jpg
LOCATION:https://appliedquantum.com/event/sec529-quantum-security-readiness-for-executives-sans-institute-course-2
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/London:20260305T083000
DTEND;TZID=Europe/London:20260305T170000
DTSTAMP:20260520T113911
CREATED:20260215T122300Z
LAST-MODIFIED:20260215T205056Z
UID:10000004-1772699400-1772730000@appliedquantum.com
SUMMARY:SEC529: Quantum Security Readiness for Executives - SANS Institute Course
DESCRIPTION:A one-day executive training course designed to help CISOs and security leaders build a practical quantum-safe roadmap before regulatory deadlines hit. \n\nAbout This Course\nSEC529 is a one-day\, instructor-led course offered by SANS Institute\, the global leader in cybersecurity training. It gives security executives the frameworks\, threat models\, and strategic tools needed to assess quantum risk and lead their organizations toward quantum resilience – without getting lost in the physics. \nWith many regulators expecting critical infrastructure to be quantum-safe by 2030\, this course addresses the narrow window security leaders have to build their strategy before regulatory and adversarial pressures converge. \nCourse Authors: Marin Ivezic & Dr. Kawin Boonyapredee \n\nWhat You Will Learn\nThe course covers the essential knowledge areas for executive-level quantum readiness: \n\nForecasting the threat: Apply structured models to estimate when cryptographically relevant quantum computers (CRQCs) will break current encryption – and what that timeline means for your data today.\nQuantifying HNDL exposure: Identify which encrypted assets are already at risk from Harvest Now\, Decrypt Later attacks and learn to prioritize accordingly.\nCryptographic inventory at the executive level: Map cryptographic dependencies across applications\, infrastructure\, and vendors using executive-level frameworks.\nNavigating compliance: Understand NIST PQC standards\, CNSA 2.0 requirements\, and EU mandates to build an audit-ready migration timeline.\nBuilding the roadmap: Construct a phased Quantum-Safe Migration Plan aligned with budget cycles\, business priorities\, and regulatory deadlines.\nWinning the boardroom: Translate quantum risk into business terms with metrics\, cost models\, and narratives that secure executive buy-in.\n\n\nHands-On Labs\nThe course includes three practical exercises: \n\nQ-Day Estimator – Model realistic timelines for when quantum computers could threaten current cryptography.\nQuantum-Readiness Self-Assessment – Evaluate your organization’s current posture against quantum threats.\nDrafting a Roadmap Briefing for the Board – Build the executive communication materials needed to drive action.\n\n\nWho Should Attend\nThis course is designed for CISOs\, senior security leaders\, technical directors\, information security officers\, and executive cyber leaders responsible for setting cybersecurity direction and managing enterprise risk. It is rated at an intermediate skill level\, with 6 CPEs awarded upon completion. \n\nThis Session\nSANS SEC529 Beta Europe Online – March 2026\n\nFormat: Virtual (live\, instructor-led)\nInstructor: Marin Ivezic\nPrice: €1\,230 EUR (excluding local taxes)\n\nAll events in the series: SANS Institute Courses on Quantum Security & Post-Quantum Cryptography \n\nRegistration\nThis course is organized and delivered by SANS Institute. All registration is handled directly through SANS. \nRegister on the SANS website → \nFor group purchasing options or questions about the course\, please contact SANS directly. \n\nSEC529 is part of SANS Institute’s Cyber Defense curriculum. For full course details\, prerequisites\, laptop requirements\, and FAQs\, visit the official SANS course page. \n 
URL:https://appliedquantum.com/event/sec529-quantum-security-readiness-for-executives-sans-institute-course
CATEGORIES:Training
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/02/SANS-SEC529.jpg
LOCATION:https://appliedquantum.com/event/sec529-quantum-security-readiness-for-executives-sans-institute-course
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Paris:20260227T160000
DTEND;TZID=Europe/Paris:20260227T173000
DTSTAMP:20260520T113911
CREATED:20260219T103124Z
LAST-MODIFIED:20260219T115207Z
UID:10000016-1772208000-1772213400@appliedquantum.com
SUMMARY:Quantum Security Awareness (Banking Edition): Trust Anchors at Bank Scale - PKI\, Signing\, and Long‑Lived Evidence
DESCRIPTION:About This Event\nThis complimentary webcast is designed for banking security leaders who need a clear\, no‑nonsense understanding of the quantum threat – and what to do about it now.  The session avoids generic “PQC 101” and goes straight to what makes banking different: institutional identity and long‑lived evidence are the real blast radius. \nIn a bank\, cryptography isn’t just protecting data in transit – it is the foundation of trust at scale: CA hierarchies\, enterprise PKI\, service‑to‑service mTLS\, customer and workforce authentication\, signed tokens (e.g.\, OAuth/JWT ecosystems)\, document and transaction signing\, code‑signing in CI/CD\, and the regulated archives that prove what happened\, when\, and under which authorization. The uncomfortable banking‑specific reality is that “confidentiality later” is only half the story: if signatures and PKI trust anchors become forgeable in the future\, the bank’s ability to prove integrity\, provenance\, and non‑repudiation comes under pressure. \nThis is also why the industry drivers are accelerating. The G7 Cyber Expert Group released a roadmap specifically to coordinate the transition to post‑quantum cryptography in the financial sector\, explicitly positioning PQC as a systemic resilience issue (not an isolated technical upgrade). ￼ FS‑ISAC has likewise urged global coordination and milestones for financial services migration\, framing the transition as an interdependency problem that can’t be solved bank‑by‑bank in isolation. ￼ \nOn the regulatory side\, the EU’s DORA technical standards don’t mention “PQC” by name – but they effectively force the behavior you need for it: a documented encryption/cryptographic controls policy\, provisions to update cryptographic technology based on developments in cryptanalysis\, and (critically for banks) stronger discipline around certificate and key lifecycle management\, including maintaining a certificate register for critical systems. And while NIS2 raises governance expectations for “banking” as a highly critical sector\, many banks will experience DORA as the sharper operational driver in practice (and the directives explicitly acknowledge that overlap). ￼ \nThe session is intentionally practical: how to start with “trust anchors first\,” how to sequence changes without detonating production dependencies\, and how to pressure‑test vendor roadmaps so “PQC‑ready” becomes a measurable engineering claim rather than marketing. \nFormat: Free live webcast (multiple sessions available) \nDuration: Awareness-level briefing – 1.5 hours \nCost: Free \n\nWhat Will You Learn\n\nA bank‑specific trust map: where quantum‑vulnerable crypto sits across PKI\, token signing\, mTLS\, signing services\, CI/CD\, and regulated archives.\nHow to translate sector signals into action: using the G7 roadmap and FS‑ISAC milestones to set internal timelines and vendor expectations. ￼\nHow to turn “DORA compliance” into quantum readiness: using required crypto policies\, cryptanalysis‑driven update expectations\, and certificate lifecycle controls as forcing functions for crypto agility. ￼\nTrust‑anchor‑first sequencing: what it means in practice (CA modernization\, certificate inventory\, signing key governance\, rollover planning\, hybrid boundaries).\nVendor and third‑party reality checks: what to ask cloud providers\, HSM/KMS vendors\, core banking platforms\, identity stacks\, and managed service partners – and how to spot hand‑wavy roadmaps.\nA pragmatic “first pilots” playbook: which banking domains are most pilotable\, how to contain blast radius\, and what success metrics to track.\n\n\nWho Should Attend\nCISOs\, CISO‑1 cyber leaders\, PKI and IAM owners\, platform security leads\, crypto engineering teams\, cloud/KMS/HSM owners\, and third‑party / outsourcing risk leaders in banks and banking service providers. \n\nPrerequisites\nGeneral familiarity with quantum security concepts\, PQC\, and large‑scale migration challenges is helpful – but not required. If you want a fast\, executive‑level refresher before attending\, you can optionally join Applied Quantum’s free “Quantum Security Awareness for Executives” briefing. See Applied Quantum Events.  \n\nThis Session\nWednesday\, 27 Feb 2026\n\nTime: 4:00 PM CET | 10:00 AM EST | 3:00 PM GMT | 7:00 PM GST | 8:30 PM IST | 11:00 PM SGT\n\nAll events in the series: Quantum Security Awareness – Industry Editions \n\nRegistration\nRegistration is free. RSVP Below. \nPlease register below using your email address. Within minutes\, you will receive a confirmation email containing a calendar invite and the unique Zoom link for the day. If the email does not arrive shortly\, please check your junk or spam folder\, or contact us at admin@appliedquantum.com. \n\nNo fluff. No jargon. Just the clarity and next steps security leaders need. For questions or group registrations\, contact Applied Quantum. \n 
URL:https://appliedquantum.com/event/quantum-security-awareness-banking-27feb2026
CATEGORIES:Webinar
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/02/Quantum-Security-Industry-Webinars-Banking-27Feb2026.jpg
LOCATION:https://us06web.zoom.us/j/84625403942
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Asia/Singapore:20260226T130000
DTEND;TZID=Asia/Singapore:20260226T153000
DTSTAMP:20260520T113911
CREATED:20260215T152627Z
LAST-MODIFIED:20260219T092351Z
UID:10000007-1772110800-1772119800@appliedquantum.com
SUMMARY:Quantum Security Awareness for Executives - Free Webcast
DESCRIPTION:A free executive briefing co-hosted by SANS Institute and Applied Quantum. Cut through the hype\, understand the risk\, and leave with actionable next steps. \n\nAbout This Event\nThis complimentary webcast is designed for security leaders who need a clear\, no-nonsense understanding of the quantum threat – and what to do about it now. Co-hosted by SANS Institute and Applied Quantum\, the session explains what’s changing in the cryptographic landscape\, why the migration to quantum-safe standards is far larger than most organizations expect\, and what practical steps you can take today. \nQuantum risk is not a future-only problem. Adversaries can harvest encrypted data today for later decryption\, while regulators and customers increasingly expect demonstrable progress now – not just plans for 2030 or 2035. \nFormat: Free live webcast (multiple sessions available) Duration: Awareness-level briefing – 2 hours Cost: Free \n\nWhat You Will Learn\nThis briefing gives security leaders: \n\nA clear map of the quantum threat landscape\, including how Harvest Now\, Decrypt Later attacks put long-life data at risk immediately – before quantum computers even arrive.\nA leadership-ready understanding of migration scope: cryptography is embedded across applications\, infrastructure\, vendors\, devices\, and identity systems – this is an enterprise-wide migration\, not a single control change.\nA concise view of what’s changing: algorithms\, certificates\, protocols\, vendor roadmaps\, and performance assumptions.\nThe compliance context: why demonstrable progress – inventories\, roadmaps\, vendor commitments\, and pilot results – is increasingly expected now\, not just by 2030/2035.\nA preview of the hard parts: cryptographic discovery\, legacy systems\, third-party dependencies\, and performance impacts.\nA practical checklist of next steps to start building an organization-wide quantum readiness plan.\nCommon narrative and terminology that reduces friction between risk owners and implementers.\n\n\nWhy “Wait and See” Is No Longer a Strategy\nThis is an enterprise-wide cryptographic migration\, not a single control. Crypto is embedded across applications\, infrastructure\, vendors\, devices\, and identity. The deadlines are only part of the story – the real challenge is inventory\, dependency mapping\, and coordinated change across teams and suppliers. \nAttackers don’t need quantum computers to start. Harvest Now\, Decrypt Later can put long-life data at risk immediately. Post-quantum changes can affect performance\, interoperability\, certificates\, and operational processes\, which means planning requires technical reality checks. \nRegulators and stakeholders increasingly expect evidence of progress – not just awareness. \n\nWho Should Attend\nThis webcast is designed for: \n\nCISOs\, CIOs\, Heads of Security\, Security Directors\nSecurity architects and enterprise architects\nGRC\, risk\, and compliance leaders who need a quantum-ready view of evidence and timelines\nIAM\, PKI\, TLS\, and VPN owners and the technical leaders who support them\nVendor assurance and procurement stakeholders involved in security requirements and roadmaps\n\n\nThis Session\nThursday\, 26 February 2026 – APAC-friendly live session\n\nTime: 1:00 PM SGT | 10:30 AM IST | 9:00 AM GST (Dubai) | 5:00 AM UTC |  6:00 AM CET\n\nAll events in the series: Quantum Security Awareness for Executives – Free Webcast Series \n\nWant to go deeper?\nThese topics are covered in much more detail in the SANS Institute and Applied Quantum course SEC529: Quantum Security Readiness for Executives. Registration now open. \n\nRegistration\nThis event is co-hosted by SANS Institute and Applied Quantum. Registration is free. RSVP Below. \nPlease register below using your email address. Within minutes\, you will receive a confirmation email containing a calendar invite and the unique Zoom link for the day. If the email does not arrive shortly\, please check your junk or spam folder\, or contact us at admin@appliedquantum.com. \n\nNo fluff. No jargon. Just the clarity and next steps security leaders need. For questions or group registrations\, contact Applied Quantum. \n 
URL:https://appliedquantum.com/event/quantum-security-readiness-for-security-leaders-free-webcast-3
CATEGORIES:Webinar
ATTACH;FMTTYPE=image/png:https://appliedquantum.com/wp-content/uploads/2026/02/Applied-Quantum-SANS-Course-Awareness.png
LOCATION:https://us06web.zoom.us/j/84898325227
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Paris:20260224T080000
DTEND;TZID=Europe/Paris:20260224T093000
DTSTAMP:20260520T113911
CREATED:20260219T073510Z
LAST-MODIFIED:20260219T091358Z
UID:10000014-1771920000-1771925400@appliedquantum.com
SUMMARY:Quantum Security Awareness (Payments Edition): Payments Are Cryptography - PQC Under Millisecond SLAs
DESCRIPTION:About This Event\nThis complimentary webcast is designed for payments security leaders who need a clear\, no‑nonsense view of the quantum threat – and what to do about it now\, without fluff. Co‑hosted by QSECDEF and Applied Quantum\, this session cuts through generic PQC talk and focuses on what makes payments different: crypto everywhere\, many independent parties\, and millisecond operational envelopes that you can’t break. We focus on the real blockers in payments: interdependencies\, performance budgets\, and vendor/partner sequencing. \nPayments are unusually crypto‑dense and time‑dense: a single authorization spans parties that don’t share one change calendar (merchant → PSP/gateway → processor → network/switch → issuer → clearing/settlement)\, and the chain must complete inside strict timeout/retry behavior. We’ll use an interbank cryptography stack mapping as a concrete illustration of how many trust boundaries exist before you even introduce PQC – and why “just upgrade the algorithm” is not a plan.  \nFig 1: Sampe Cryptographic Complexity in Interbank Payments\nIn payments\, quantum readiness is an interoperability and sequencing problem as much as a cryptography problem. That’s why governance levers matter: PCI DSS v4.0 Req. 12.3.3 (documenting and reviewing cipher suites and protocols) is a practical forcing function for building crypto inventory discipline and making “crypto agility” real rather than aspirational. \nWe’ll translate the most useful real-world lessons into payments-specific decisions – drawing on central-bank experimentation from BIS Project Leap Phase 1 (hybrid encryption for payment-message confidentiality) and Phase 2 (PQC signatures in a TARGET2 context)\, where performance\, interoperability\, crypto-agility\, and vendor dependencies were tested in practice. \nWe’ll also treat integrity as first‑class\, not an afterthought. Payments rely on long‑lived certificates\, signed artifacts\, and device identities that underpin authorization evidence and operational trust. That’s where the TNFL (“trust now\, forge later”) lens becomes operational: it helps you prioritize signature/PKI trust anchors – not only confidentiality flows. \nMost importantly\, this will be a practical\, rails‑tested discussion. We’ll cover the real engineering lessons from BIS Project Leap and Leap 2 – including what these experiments teach us about compatibility\, performance budgets\, message sizes\, and multi‑component change. \nBy the end\, you should have a clear way to identify the 1–2 most “pilotable” payment corridors for hybrid/PQC work without breaking SLAs\, and a smarter structure for vendor/partner conversations grounded in what real payment infrastructure projects encountered\, and industry drivers like PCI DSS 12.3.3\, FS‑ISAC guidance\, and G7 financial-sector coordination efforts. \nFormat: Free live webcast (multiple sessions available) \nDuration: Awareness-level briefing – 1.5 hours \nCost: Free \n\nWhat Will You Learn\n\nWhere PQC migration actually fails first in payments: latency\, retries\, MTU/message size\, HSM throughput\, and certificate-chain realities.\nHow to use BIS Project Leap Phases 1–2 as a practical benchmark for what “PQC in real rails” demands (not a lab PoC).\nHow to prioritize TNFL-sensitive trust anchors (signing keys\, PKI roots\, device identity) alongside confidentiality flows.\nWhat “crypto agility” means operationally in payment platforms—and why hybrid often requires system evolution.\nHow to turn PCI/FS‑ISAC/G7 signals into concrete partner/vendor conversations and sequencing decisions.\n\n\nWho Should Attend\nCISOs and security/crypto leads in issuers\, acquirers\, processors\, PSPs/gateways\, networks/switches\, and payments infrastructure providers. \n\nPrerequisites\nGeneral awareness of quantum security risk\, PQC basics\, and typical migration challenges is helpful – but not required. For a primer-style session\, attendees may optionally join the introductory briefings we regularly provide: see Applied Quantum Events.  \n\nThis Session\nWednesday\, 24 Feb 2026\n\nTime: 8:00 AM CET | 7:00 AM GMT | 11:00 AM GST | 12:30 PM IST | 3:00 PM SGT | 6:00 PM AEDT\n\nAll events in the series: Quantum Security Awareness – Industry Editions \n\nRegistration\nThis event is co-hosted by Applied Quantum and QSECDEF. Registration is free. RSVP Below. \nPlease register below using your email address. Within minutes\, you will receive a confirmation email containing a calendar invite and the unique Zoom link for the day. If the email does not arrive shortly\, please check your junk or spam folder\, or contact us at admin@appliedquantum.com. \n\nNo fluff. No jargon. Just the clarity and next steps security leaders need. For questions or group registrations\, contact Applied Quantum. \n 
URL:https://appliedquantum.com/event/quantum-security-awareness-payments-24feb2026
CATEGORIES:Webinar
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/02/Quantum-Security-Industry-Webinars-Payments-24-Feb.jpg
LOCATION:https://us06web.zoom.us/j/81305976994
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Paris:20260219T190000
DTEND;TZID=Europe/Paris:20260219T213000
DTSTAMP:20260520T113911
CREATED:20260215T123655Z
LAST-MODIFIED:20260219T092415Z
UID:10000006-1771527600-1771536600@appliedquantum.com
SUMMARY:Quantum Security Awareness for Executives - Free Webcast
DESCRIPTION:A free executive briefing co-hosted by SANS Institute and Applied Quantum. Cut through the hype\, understand the risk\, and leave with actionable next steps. \n\nAbout This Event\nThis complimentary webcast is designed for security leaders who need a clear\, no-nonsense understanding of the quantum threat – and what to do about it now. Co-hosted by SANS Institute and Applied Quantum\, the session explains what’s changing in the cryptographic landscape\, why the migration to quantum-safe standards is far larger than most organizations expect\, and what practical steps you can take today. \nQuantum risk is not a future-only problem. Adversaries can harvest encrypted data today for later decryption\, while regulators and customers increasingly expect demonstrable progress now – not just plans for 2030 or 2035. \nFormat: Free live webcast (multiple sessions available) Duration: Awareness-level briefing – 2 hours Cost: Free \n\nWhat You Will Learn\nThis briefing gives security leaders: \n\nA clear map of the quantum threat landscape\, including how Harvest Now\, Decrypt Later attacks put long-life data at risk immediately – before quantum computers even arrive.\nA leadership-ready understanding of migration scope: cryptography is embedded across applications\, infrastructure\, vendors\, devices\, and identity systems – this is an enterprise-wide migration\, not a single control change.\nA concise view of what’s changing: algorithms\, certificates\, protocols\, vendor roadmaps\, and performance assumptions.\nThe compliance context: why demonstrable progress – inventories\, roadmaps\, vendor commitments\, and pilot results – is increasingly expected now\, not just by 2030/2035.\nA preview of the hard parts: cryptographic discovery\, legacy systems\, third-party dependencies\, and performance impacts.\nA practical checklist of next steps to start building an organization-wide quantum readiness plan.\nCommon narrative and terminology that reduces friction between risk owners and implementers.\n\n\nWhy “Wait and See” Is No Longer a Strategy\nThis is an enterprise-wide cryptographic migration\, not a single control. Crypto is embedded across applications\, infrastructure\, vendors\, devices\, and identity. The deadlines are only part of the story – the real challenge is inventory\, dependency mapping\, and coordinated change across teams and suppliers. \nAttackers don’t need quantum computers to start. Harvest Now\, Decrypt Later can put long-life data at risk immediately. Post-quantum changes can affect performance\, interoperability\, certificates\, and operational processes\, which means planning requires technical reality checks. \nRegulators and stakeholders increasingly expect evidence of progress – not just awareness. \n\nWho Should Attend\nThis webcast is designed for: \n\nCISOs\, CIOs\, Heads of Security\, Security Directors\nSecurity architects and enterprise architects\nGRC\, risk\, and compliance leaders who need a quantum-ready view of evidence and timelines\nIAM\, PKI\, TLS\, and VPN owners and the technical leaders who support them\nVendor assurance and procurement stakeholders involved in security requirements and roadmaps\n\n\nThis Session\nThursday\, 19 February 2026 – Americas / Europe\n\nTime: 1:00 PM EST | 10:00 AM PT | 6:00 PM UTC | 7:00 PM CET\n\nAll events in the series: Quantum Security Awareness for Executives – Free Webcast Series \n\nWant to go deeper?\nThese topics are covered in much more detail in the SANS Institute and Applied Quantum course SEC529: Quantum Security Readiness for Executives. Registration now open. \n\nRegistration\nThis event is co-hosted by SANS Institute and Applied Quantum. Registration is free. RSVP Below. \nPlease register below using your email address. Within minutes\, you will receive a confirmation email containing a calendar invite and the unique Zoom link for the day. If the email does not arrive shortly\, please check your junk or spam folder\, or contact us at admin@appliedquantum.com. \n\nNo fluff. No jargon. Just the clarity and next steps security leaders need. For questions or group registrations\, contact Applied Quantum. \n 
URL:https://appliedquantum.com/event/quantum-security-readiness-free-2
CATEGORIES:Webinar
ATTACH;FMTTYPE=image/png:https://appliedquantum.com/wp-content/uploads/2026/02/Applied-Quantum-SANS-Course-Awareness.png
LOCATION:https://us06web.zoom.us/j/81477052265
END:VEVENT
END:VCALENDAR