BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Applied Quantum - ECPv6.15.18//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:Applied Quantum
X-ORIGINAL-URL:https://appliedquantum.com
X-WR-CALDESC:Events for Applied Quantum
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:+02:00
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:Europe/Paris
BEGIN:DAYLIGHT
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
TZNAME:CEST
DTSTART:20250330T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
TZNAME:CET
DTSTART:20251026T010000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
TZNAME:CEST
DTSTART:20260329T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
TZNAME:CET
DTSTART:20261025T010000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
TZNAME:CEST
DTSTART:20270328T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
TZNAME:CET
DTSTART:20271031T010000
END:STANDARD
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:+01:00
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=+02:00:20260702T090000
DTEND;TZID=+02:00:20260702T103000
DTSTAMP:20260406T115905
CREATED:20260316T100018Z
LAST-MODIFIED:20260405T102915Z
UID:10000039-1782982800-1782988200@appliedquantum.com
SUMMARY:Quantum Security Community - Online Fortnightly Update (EMEA\, APAC)
DESCRIPTION:***Quantum Security Community*** *is a free\, global\, practitioner-led network sharing real-world PQC insights and supporting one another through the most complex IT/OT security transformation of our time. Explore the channels at* ***[Quantum.Security](https://quantum.security)*** \n—————— \n**A weekly\, online community meetup for quantum security practitioners — focused on signal\, not hype.** \nPost-quantum cryptography (PQC)\, crypto agility\, quantum threat models\, and standards timelines are all evolving quickly. For security teams\, the challenge isn’t “finding information” — it’s deciding **what matters**\, **what changed**\, and **what to do next**. Quantum Security Weekly exists to make that easier. \nWe run the **same meetup twice each week** to cover global time zones: \n* **Session 1:** Europe / Middle East / APAC-friendly\n* **Session 2:** Europe / Americas-friendly\n(Choose the one that fits your schedule – content is aligned across both.) \n### **What happens each week** \nYou’ll get a curated update across the four categories that consistently drive real-world decisions: \n**1) Regulation & policy signals**\nNew requirements\, supervisory guidance\, national strategies\, procurement rules\, sector-specific expectations – and what they imply for timelines and planning. \n**2) Standards and “rules of the road”**\nUpdates to cryptographic standards and related ecosystems (protocols\, identity\, secure elements\, industry frameworks). We focus on what changes adoption feasibility\, interoperability\, or audit/compliance expectations. \n**3) Technical developments**\nCredible signals about quantum computing capability\, relevant cryptanalysis\, and meaningful algorithmic/security research (including “RSA-breaking” or signature-related developments) – explained in terms of security impact\, not headlines. \n**4) Practical implementation reality**\nThe stuff that makes or breaks programs: where crypto actually lives\, dependency chains\, vendor readiness\, device constraints\, performance tradeoffs\, rollout sequencing\, and “what we learned the hard way.” \n### **Speakers and community contributions** \nWe often invite a guest speaker to share practical experience (implementation lessons\, program strategy\, technical deep dives). Sometimes we’ll host short product introductions – but the default posture is educational and experience-driven\, not salesy. When there’s no guest\, we go deeper on the week’s most important developments and prioritize Q&A. \n### **Typical Agenda** \n**0:00 – 0:05 | Welcome + how to engage (fast)** \n* What this meetup is: **signal > hype**\, practical implications\, community-first\n* How to participate today: chat\, Q&A flow\, how to drop links/resources\n* Quick reminder of community channels (Forum / Slack / LinkedIn group) and how to continue the conversation after the call \n**0:05 – 0:25 | The Weekly Signal Brief (what actually changed)**\nA structured scan in four buckets\, with a “so what?” for each: \n* **Policy & regulation:** new drafts\, mandates\, enforcement signals\, procurement rules\n* **Standards & frameworks:** PQC standards movement\, protocol ecosystem changes\, guidance updates\n* **Quantum capability signals:** credible progress indicators (hardware\, error correction\, scaling)\, what to ignore\n* **Cryptography/cryptanalysis:** meaningful research developments\, “RSA/ECC breaking” signals\, security relevance \n**0:25 – 0:35 | Myth‑Busting / Reality Check (the hype audit)**\nIf something got hyped this week\, we’ll do a quick\, repeatable teardown: \n* **What happened** (one sentence)\n* **What didn’t happen** (the misconception)\n* **What it means for defenders** (real impact)\n* **What changes / what doesn’t** in PQC planning this year \n*Goal:* keep the community calibrated\, reduce panic\, and prevent misallocation of effort. \n**0:35 – 0:50 | One Topic\, Deeper (the week’s main story)**\nA focused deep dive on one theme that affects real programs\, such as: \n* crypto-agility patterns and failure modes\n* hybrid deployment realities (where it works / where it’s a trap)\n* migration sequencing and vendor dependency bottlenecks\n* what a standards change means for architects and CISOs\n* integrity-first thinking (e.g.\, signatures\, trust anchors\, long-lived evidence) \n**0:50 – 1:05 | Guest Spotlight (most weeks) OR Community Lightning Round** \n* **Guest Spotlight (preferred when available):**\n* 10–12 min: experience share / lessons learned / case study / product walkthrough (kept educational)\n* 3–5 min: moderated Q&A (“what surprised you / what broke / what you’d do differently”)\n* **If no guest:**\n* 3 lightning shares (3–4 min each): “one paper / one tool / one lesson / one vendor signal” \n**1:05 – 1:10 | Community Pulse (cross‑channel highlights)** \n* “Top 3 threads” from various community channels this week\n* Quick call-outs: members looking for feedback\, volunteer opportunities\, upcoming topics\n* How to propose a guest / suggest topics / share resources for next week \n**1:10 – 1:28 | Open Q&A / Office Hours** \n* Live questions (chat + audio)\n* “Bring your messy problem” time: inventory\, vendor claims\, timeline pressure\, governance\, metrics\n* Optional: rapid-fire “yes/no + why” on 5–8 quick questions if the room is lively \n**1:28 – 1:30 | Wrap + next week preview** \n* 3 takeaways in 30 seconds\n* What we’re tracking next week\n* Speaker/volunteer reminder (“If you’ve shipped something\, we want the story.”) \n### **Who should join** \nIf you’re responsible for security strategy\, cryptography\, identity\, platform security\, resilience\, compliance\, or product security – and quantum is on your roadmap – this is for you. \n### **What you’ll leave with** \n* Clear visibility into what changed this week\n* Better judgment on what’s noise vs. actionable signal\n* Practical framing for decisions you may need to revisit (inventory\, standards alignment\, vendor dependencies\, rollout sequencing)\n* A community you can learn from (and contribute to)
URL:https://appliedquantum.com/event/quantum-security-community-online-fortnightly-update-emea-apac-8
LOCATION:Online event
CATEGORIES:Community
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/03/1024x576-anROVz.jpg
GEO:-8.521147;179.1962
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=+02:00:20260702T170000
DTEND;TZID=+02:00:20260702T183000
DTSTAMP:20260406T115905
CREATED:20260316T100018Z
LAST-MODIFIED:20260405T102915Z
UID:10000040-1783011600-1783017000@appliedquantum.com
SUMMARY:Quantum Security Community - Online Fortnightly Update (America\, EMEA)
DESCRIPTION:***Quantum Security Community*** *is a free\, global\, practitioner-led network sharing real-world PQC insights and supporting one another through the most complex IT/OT security transformation of our time. Explore the channels at* ***[Quantum.Security](https://quantum.security)*** \n—————— \n**A weekly\, online community meetup for quantum security practitioners — focused on signal\, not hype.** \nPost-quantum cryptography (PQC)\, crypto agility\, quantum threat models\, and standards timelines are all evolving quickly. For security teams\, the challenge isn’t “finding information” — it’s deciding **what matters**\, **what changed**\, and **what to do next**. Quantum Security Weekly exists to make that easier. \nWe run the **same meetup twice each week** to cover global time zones: \n* **Session 1:** Europe / Middle East / APAC-friendly\n* **Session 2:** Europe / Americas-friendly\n(Choose the one that fits your schedule – content is aligned across both.) \n### **What happens each week** \nYou’ll get a curated update across the four categories that consistently drive real-world decisions: \n**1) Regulation & policy signals**\nNew requirements\, supervisory guidance\, national strategies\, procurement rules\, sector-specific expectations – and what they imply for timelines and planning. \n**2) Standards and “rules of the road”**\nUpdates to cryptographic standards and related ecosystems (protocols\, identity\, secure elements\, industry frameworks). We focus on what changes adoption feasibility\, interoperability\, or audit/compliance expectations. \n**3) Technical developments**\nCredible signals about quantum computing capability\, relevant cryptanalysis\, and meaningful algorithmic/security research (including “RSA-breaking” or signature-related developments) – explained in terms of security impact\, not headlines. \n**4) Practical implementation reality**\nThe stuff that makes or breaks programs: where crypto actually lives\, dependency chains\, vendor readiness\, device constraints\, performance tradeoffs\, rollout sequencing\, and “what we learned the hard way.” \n### **Speakers and community contributions** \nWe often invite a guest speaker to share practical experience (implementation lessons\, program strategy\, technical deep dives). Sometimes we’ll host short product introductions – but the default posture is educational and experience-driven\, not salesy. When there’s no guest\, we go deeper on the week’s most important developments and prioritize Q&A. \n### **Typical Agenda** \n**0:00 – 0:05 | Welcome + how to engage (fast)** \n* What this meetup is: **signal > hype**\, practical implications\, community-first\n* How to participate today: chat\, Q&A flow\, how to drop links/resources\n* Quick reminder of community channels (Forum / Slack / LinkedIn group) and how to continue the conversation after the call \n**0:05 – 0:25 | The Weekly Signal Brief (what actually changed)**\nA structured scan in four buckets\, with a “so what?” for each: \n* **Policy & regulation:** new drafts\, mandates\, enforcement signals\, procurement rules\n* **Standards & frameworks:** PQC standards movement\, protocol ecosystem changes\, guidance updates\n* **Quantum capability signals:** credible progress indicators (hardware\, error correction\, scaling)\, what to ignore\n* **Cryptography/cryptanalysis:** meaningful research developments\, “RSA/ECC breaking” signals\, security relevance \n**0:25 – 0:35 | Myth‑Busting / Reality Check (the hype audit)**\nIf something got hyped this week\, we’ll do a quick\, repeatable teardown: \n* **What happened** (one sentence)\n* **What didn’t happen** (the misconception)\n* **What it means for defenders** (real impact)\n* **What changes / what doesn’t** in PQC planning this year \n*Goal:* keep the community calibrated\, reduce panic\, and prevent misallocation of effort. \n**0:35 – 0:50 | One Topic\, Deeper (the week’s main story)**\nA focused deep dive on one theme that affects real programs\, such as: \n* crypto-agility patterns and failure modes\n* hybrid deployment realities (where it works / where it’s a trap)\n* migration sequencing and vendor dependency bottlenecks\n* what a standards change means for architects and CISOs\n* integrity-first thinking (e.g.\, signatures\, trust anchors\, long-lived evidence) \n**0:50 – 1:05 | Guest Spotlight (most weeks) OR Community Lightning Round** \n* **Guest Spotlight (preferred when available):**\n* 10–12 min: experience share / lessons learned / case study / product walkthrough (kept educational)\n* 3–5 min: moderated Q&A (“what surprised you / what broke / what you’d do differently”)\n* **If no guest:**\n* 3 lightning shares (3–4 min each): “one paper / one tool / one lesson / one vendor signal” \n**1:05 – 1:10 | Community Pulse (cross‑channel highlights)** \n* “Top 3 threads” from various community channels this week\n* Quick call-outs: members looking for feedback\, volunteer opportunities\, upcoming topics\n* How to propose a guest / suggest topics / share resources for next week \n**1:10 – 1:28 | Open Q&A / Office Hours** \n* Live questions (chat + audio)\n* “Bring your messy problem” time: inventory\, vendor claims\, timeline pressure\, governance\, metrics\n* Optional: rapid-fire “yes/no + why” on 5–8 quick questions if the room is lively \n**1:28 – 1:30 | Wrap + next week preview** \n* 3 takeaways in 30 seconds\n* What we’re tracking next week\n* Speaker/volunteer reminder (“If you’ve shipped something\, we want the story.”) \n### **Who should join** \nIf you’re responsible for security strategy\, cryptography\, identity\, platform security\, resilience\, compliance\, or product security – and quantum is on your roadmap – this is for you. \n### **What you’ll leave with** \n* Clear visibility into what changed this week\n* Better judgment on what’s noise vs. actionable signal\n* Practical framing for decisions you may need to revisit (inventory\, standards alignment\, vendor dependencies\, rollout sequencing)\n* A community you can learn from (and contribute to)
URL:https://appliedquantum.com/event/quantum-security-community-online-fortnightly-update-america-emea-8
LOCATION:Online event
CATEGORIES:Community
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/03/1024x576-bya3VY.jpg
GEO:-8.521147;179.1962
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=+02:00:20260716T090000
DTEND;TZID=+02:00:20260716T103000
DTSTAMP:20260406T115905
CREATED:20260316T100018Z
LAST-MODIFIED:20260405T102915Z
UID:10000041-1784192400-1784197800@appliedquantum.com
SUMMARY:Quantum Security Community - Online Fortnightly Update (EMEA\, APAC)
DESCRIPTION:***Quantum Security Community*** *is a free\, global\, practitioner-led network sharing real-world PQC insights and supporting one another through the most complex IT/OT security transformation of our time. Explore the channels at* ***[Quantum.Security](https://quantum.security)*** \n—————— \n**A weekly\, online community meetup for quantum security practitioners — focused on signal\, not hype.** \nPost-quantum cryptography (PQC)\, crypto agility\, quantum threat models\, and standards timelines are all evolving quickly. For security teams\, the challenge isn’t “finding information” — it’s deciding **what matters**\, **what changed**\, and **what to do next**. Quantum Security Weekly exists to make that easier. \nWe run the **same meetup twice each week** to cover global time zones: \n* **Session 1:** Europe / Middle East / APAC-friendly\n* **Session 2:** Europe / Americas-friendly\n(Choose the one that fits your schedule – content is aligned across both.) \n### **What happens each week** \nYou’ll get a curated update across the four categories that consistently drive real-world decisions: \n**1) Regulation & policy signals**\nNew requirements\, supervisory guidance\, national strategies\, procurement rules\, sector-specific expectations – and what they imply for timelines and planning. \n**2) Standards and “rules of the road”**\nUpdates to cryptographic standards and related ecosystems (protocols\, identity\, secure elements\, industry frameworks). We focus on what changes adoption feasibility\, interoperability\, or audit/compliance expectations. \n**3) Technical developments**\nCredible signals about quantum computing capability\, relevant cryptanalysis\, and meaningful algorithmic/security research (including “RSA-breaking” or signature-related developments) – explained in terms of security impact\, not headlines. \n**4) Practical implementation reality**\nThe stuff that makes or breaks programs: where crypto actually lives\, dependency chains\, vendor readiness\, device constraints\, performance tradeoffs\, rollout sequencing\, and “what we learned the hard way.” \n### **Speakers and community contributions** \nWe often invite a guest speaker to share practical experience (implementation lessons\, program strategy\, technical deep dives). Sometimes we’ll host short product introductions – but the default posture is educational and experience-driven\, not salesy. When there’s no guest\, we go deeper on the week’s most important developments and prioritize Q&A. \n### **Typical Agenda** \n**0:00 – 0:05 | Welcome + how to engage (fast)** \n* What this meetup is: **signal > hype**\, practical implications\, community-first\n* How to participate today: chat\, Q&A flow\, how to drop links/resources\n* Quick reminder of community channels (Forum / Slack / LinkedIn group) and how to continue the conversation after the call \n**0:05 – 0:25 | The Weekly Signal Brief (what actually changed)**\nA structured scan in four buckets\, with a “so what?” for each: \n* **Policy & regulation:** new drafts\, mandates\, enforcement signals\, procurement rules\n* **Standards & frameworks:** PQC standards movement\, protocol ecosystem changes\, guidance updates\n* **Quantum capability signals:** credible progress indicators (hardware\, error correction\, scaling)\, what to ignore\n* **Cryptography/cryptanalysis:** meaningful research developments\, “RSA/ECC breaking” signals\, security relevance \n**0:25 – 0:35 | Myth‑Busting / Reality Check (the hype audit)**\nIf something got hyped this week\, we’ll do a quick\, repeatable teardown: \n* **What happened** (one sentence)\n* **What didn’t happen** (the misconception)\n* **What it means for defenders** (real impact)\n* **What changes / what doesn’t** in PQC planning this year \n*Goal:* keep the community calibrated\, reduce panic\, and prevent misallocation of effort. \n**0:35 – 0:50 | One Topic\, Deeper (the week’s main story)**\nA focused deep dive on one theme that affects real programs\, such as: \n* crypto-agility patterns and failure modes\n* hybrid deployment realities (where it works / where it’s a trap)\n* migration sequencing and vendor dependency bottlenecks\n* what a standards change means for architects and CISOs\n* integrity-first thinking (e.g.\, signatures\, trust anchors\, long-lived evidence) \n**0:50 – 1:05 | Guest Spotlight (most weeks) OR Community Lightning Round** \n* **Guest Spotlight (preferred when available):**\n* 10–12 min: experience share / lessons learned / case study / product walkthrough (kept educational)\n* 3–5 min: moderated Q&A (“what surprised you / what broke / what you’d do differently”)\n* **If no guest:**\n* 3 lightning shares (3–4 min each): “one paper / one tool / one lesson / one vendor signal” \n**1:05 – 1:10 | Community Pulse (cross‑channel highlights)** \n* “Top 3 threads” from various community channels this week\n* Quick call-outs: members looking for feedback\, volunteer opportunities\, upcoming topics\n* How to propose a guest / suggest topics / share resources for next week \n**1:10 – 1:28 | Open Q&A / Office Hours** \n* Live questions (chat + audio)\n* “Bring your messy problem” time: inventory\, vendor claims\, timeline pressure\, governance\, metrics\n* Optional: rapid-fire “yes/no + why” on 5–8 quick questions if the room is lively \n**1:28 – 1:30 | Wrap + next week preview** \n* 3 takeaways in 30 seconds\n* What we’re tracking next week\n* Speaker/volunteer reminder (“If you’ve shipped something\, we want the story.”) \n### **Who should join** \nIf you’re responsible for security strategy\, cryptography\, identity\, platform security\, resilience\, compliance\, or product security – and quantum is on your roadmap – this is for you. \n### **What you’ll leave with** \n* Clear visibility into what changed this week\n* Better judgment on what’s noise vs. actionable signal\n* Practical framing for decisions you may need to revisit (inventory\, standards alignment\, vendor dependencies\, rollout sequencing)\n* A community you can learn from (and contribute to)
URL:https://appliedquantum.com/event/quantum-security-community-online-fortnightly-update-emea-apac-9
LOCATION:Online event
CATEGORIES:Community
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/03/1024x576-anROVz.jpg
GEO:-8.521147;179.1962
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=+02:00:20260716T170000
DTEND;TZID=+02:00:20260716T183000
DTSTAMP:20260406T115905
CREATED:20260316T100018Z
LAST-MODIFIED:20260405T102915Z
UID:10000042-1784221200-1784226600@appliedquantum.com
SUMMARY:Quantum Security Community - Online Fortnightly Update (America\, EMEA)
DESCRIPTION:***Quantum Security Community*** *is a free\, global\, practitioner-led network sharing real-world PQC insights and supporting one another through the most complex IT/OT security transformation of our time. Explore the channels at* ***[Quantum.Security](https://quantum.security)*** \n—————— \n**A weekly\, online community meetup for quantum security practitioners — focused on signal\, not hype.** \nPost-quantum cryptography (PQC)\, crypto agility\, quantum threat models\, and standards timelines are all evolving quickly. For security teams\, the challenge isn’t “finding information” — it’s deciding **what matters**\, **what changed**\, and **what to do next**. Quantum Security Weekly exists to make that easier. \nWe run the **same meetup twice each week** to cover global time zones: \n* **Session 1:** Europe / Middle East / APAC-friendly\n* **Session 2:** Europe / Americas-friendly\n(Choose the one that fits your schedule – content is aligned across both.) \n### **What happens each week** \nYou’ll get a curated update across the four categories that consistently drive real-world decisions: \n**1) Regulation & policy signals**\nNew requirements\, supervisory guidance\, national strategies\, procurement rules\, sector-specific expectations – and what they imply for timelines and planning. \n**2) Standards and “rules of the road”**\nUpdates to cryptographic standards and related ecosystems (protocols\, identity\, secure elements\, industry frameworks). We focus on what changes adoption feasibility\, interoperability\, or audit/compliance expectations. \n**3) Technical developments**\nCredible signals about quantum computing capability\, relevant cryptanalysis\, and meaningful algorithmic/security research (including “RSA-breaking” or signature-related developments) – explained in terms of security impact\, not headlines. \n**4) Practical implementation reality**\nThe stuff that makes or breaks programs: where crypto actually lives\, dependency chains\, vendor readiness\, device constraints\, performance tradeoffs\, rollout sequencing\, and “what we learned the hard way.” \n### **Speakers and community contributions** \nWe often invite a guest speaker to share practical experience (implementation lessons\, program strategy\, technical deep dives). Sometimes we’ll host short product introductions – but the default posture is educational and experience-driven\, not salesy. When there’s no guest\, we go deeper on the week’s most important developments and prioritize Q&A. \n### **Typical Agenda** \n**0:00 – 0:05 | Welcome + how to engage (fast)** \n* What this meetup is: **signal > hype**\, practical implications\, community-first\n* How to participate today: chat\, Q&A flow\, how to drop links/resources\n* Quick reminder of community channels (Forum / Slack / LinkedIn group) and how to continue the conversation after the call \n**0:05 – 0:25 | The Weekly Signal Brief (what actually changed)**\nA structured scan in four buckets\, with a “so what?” for each: \n* **Policy & regulation:** new drafts\, mandates\, enforcement signals\, procurement rules\n* **Standards & frameworks:** PQC standards movement\, protocol ecosystem changes\, guidance updates\n* **Quantum capability signals:** credible progress indicators (hardware\, error correction\, scaling)\, what to ignore\n* **Cryptography/cryptanalysis:** meaningful research developments\, “RSA/ECC breaking” signals\, security relevance \n**0:25 – 0:35 | Myth‑Busting / Reality Check (the hype audit)**\nIf something got hyped this week\, we’ll do a quick\, repeatable teardown: \n* **What happened** (one sentence)\n* **What didn’t happen** (the misconception)\n* **What it means for defenders** (real impact)\n* **What changes / what doesn’t** in PQC planning this year \n*Goal:* keep the community calibrated\, reduce panic\, and prevent misallocation of effort. \n**0:35 – 0:50 | One Topic\, Deeper (the week’s main story)**\nA focused deep dive on one theme that affects real programs\, such as: \n* crypto-agility patterns and failure modes\n* hybrid deployment realities (where it works / where it’s a trap)\n* migration sequencing and vendor dependency bottlenecks\n* what a standards change means for architects and CISOs\n* integrity-first thinking (e.g.\, signatures\, trust anchors\, long-lived evidence) \n**0:50 – 1:05 | Guest Spotlight (most weeks) OR Community Lightning Round** \n* **Guest Spotlight (preferred when available):**\n* 10–12 min: experience share / lessons learned / case study / product walkthrough (kept educational)\n* 3–5 min: moderated Q&A (“what surprised you / what broke / what you’d do differently”)\n* **If no guest:**\n* 3 lightning shares (3–4 min each): “one paper / one tool / one lesson / one vendor signal” \n**1:05 – 1:10 | Community Pulse (cross‑channel highlights)** \n* “Top 3 threads” from various community channels this week\n* Quick call-outs: members looking for feedback\, volunteer opportunities\, upcoming topics\n* How to propose a guest / suggest topics / share resources for next week \n**1:10 – 1:28 | Open Q&A / Office Hours** \n* Live questions (chat + audio)\n* “Bring your messy problem” time: inventory\, vendor claims\, timeline pressure\, governance\, metrics\n* Optional: rapid-fire “yes/no + why” on 5–8 quick questions if the room is lively \n**1:28 – 1:30 | Wrap + next week preview** \n* 3 takeaways in 30 seconds\n* What we’re tracking next week\n* Speaker/volunteer reminder (“If you’ve shipped something\, we want the story.”) \n### **Who should join** \nIf you’re responsible for security strategy\, cryptography\, identity\, platform security\, resilience\, compliance\, or product security – and quantum is on your roadmap – this is for you. \n### **What you’ll leave with** \n* Clear visibility into what changed this week\n* Better judgment on what’s noise vs. actionable signal\n* Practical framing for decisions you may need to revisit (inventory\, standards alignment\, vendor dependencies\, rollout sequencing)\n* A community you can learn from (and contribute to)
URL:https://appliedquantum.com/event/quantum-security-community-online-fortnightly-update-america-emea-9
LOCATION:Online event
CATEGORIES:Community
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/03/1024x576-bya3VY.jpg
GEO:-8.521147;179.1962
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=+02:00:20260730T090000
DTEND;TZID=+02:00:20260730T103000
DTSTAMP:20260406T115905
CREATED:20260316T100018Z
LAST-MODIFIED:20260405T102915Z
UID:10000043-1785402000-1785407400@appliedquantum.com
SUMMARY:Quantum Security Community - Online Fortnightly Update (EMEA\, APAC)
DESCRIPTION:***Quantum Security Community*** *is a free\, global\, practitioner-led network sharing real-world PQC insights and supporting one another through the most complex IT/OT security transformation of our time. Explore the channels at* ***[Quantum.Security](https://quantum.security)*** \n—————— \n**A weekly\, online community meetup for quantum security practitioners — focused on signal\, not hype.** \nPost-quantum cryptography (PQC)\, crypto agility\, quantum threat models\, and standards timelines are all evolving quickly. For security teams\, the challenge isn’t “finding information” — it’s deciding **what matters**\, **what changed**\, and **what to do next**. Quantum Security Weekly exists to make that easier. \nWe run the **same meetup twice each week** to cover global time zones: \n* **Session 1:** Europe / Middle East / APAC-friendly\n* **Session 2:** Europe / Americas-friendly\n(Choose the one that fits your schedule – content is aligned across both.) \n### **What happens each week** \nYou’ll get a curated update across the four categories that consistently drive real-world decisions: \n**1) Regulation & policy signals**\nNew requirements\, supervisory guidance\, national strategies\, procurement rules\, sector-specific expectations – and what they imply for timelines and planning. \n**2) Standards and “rules of the road”**\nUpdates to cryptographic standards and related ecosystems (protocols\, identity\, secure elements\, industry frameworks). We focus on what changes adoption feasibility\, interoperability\, or audit/compliance expectations. \n**3) Technical developments**\nCredible signals about quantum computing capability\, relevant cryptanalysis\, and meaningful algorithmic/security research (including “RSA-breaking” or signature-related developments) – explained in terms of security impact\, not headlines. \n**4) Practical implementation reality**\nThe stuff that makes or breaks programs: where crypto actually lives\, dependency chains\, vendor readiness\, device constraints\, performance tradeoffs\, rollout sequencing\, and “what we learned the hard way.” \n### **Speakers and community contributions** \nWe often invite a guest speaker to share practical experience (implementation lessons\, program strategy\, technical deep dives). Sometimes we’ll host short product introductions – but the default posture is educational and experience-driven\, not salesy. When there’s no guest\, we go deeper on the week’s most important developments and prioritize Q&A. \n### **Typical Agenda** \n**0:00 – 0:05 | Welcome + how to engage (fast)** \n* What this meetup is: **signal > hype**\, practical implications\, community-first\n* How to participate today: chat\, Q&A flow\, how to drop links/resources\n* Quick reminder of community channels (Forum / Slack / LinkedIn group) and how to continue the conversation after the call \n**0:05 – 0:25 | The Weekly Signal Brief (what actually changed)**\nA structured scan in four buckets\, with a “so what?” for each: \n* **Policy & regulation:** new drafts\, mandates\, enforcement signals\, procurement rules\n* **Standards & frameworks:** PQC standards movement\, protocol ecosystem changes\, guidance updates\n* **Quantum capability signals:** credible progress indicators (hardware\, error correction\, scaling)\, what to ignore\n* **Cryptography/cryptanalysis:** meaningful research developments\, “RSA/ECC breaking” signals\, security relevance \n**0:25 – 0:35 | Myth‑Busting / Reality Check (the hype audit)**\nIf something got hyped this week\, we’ll do a quick\, repeatable teardown: \n* **What happened** (one sentence)\n* **What didn’t happen** (the misconception)\n* **What it means for defenders** (real impact)\n* **What changes / what doesn’t** in PQC planning this year \n*Goal:* keep the community calibrated\, reduce panic\, and prevent misallocation of effort. \n**0:35 – 0:50 | One Topic\, Deeper (the week’s main story)**\nA focused deep dive on one theme that affects real programs\, such as: \n* crypto-agility patterns and failure modes\n* hybrid deployment realities (where it works / where it’s a trap)\n* migration sequencing and vendor dependency bottlenecks\n* what a standards change means for architects and CISOs\n* integrity-first thinking (e.g.\, signatures\, trust anchors\, long-lived evidence) \n**0:50 – 1:05 | Guest Spotlight (most weeks) OR Community Lightning Round** \n* **Guest Spotlight (preferred when available):**\n* 10–12 min: experience share / lessons learned / case study / product walkthrough (kept educational)\n* 3–5 min: moderated Q&A (“what surprised you / what broke / what you’d do differently”)\n* **If no guest:**\n* 3 lightning shares (3–4 min each): “one paper / one tool / one lesson / one vendor signal” \n**1:05 – 1:10 | Community Pulse (cross‑channel highlights)** \n* “Top 3 threads” from various community channels this week\n* Quick call-outs: members looking for feedback\, volunteer opportunities\, upcoming topics\n* How to propose a guest / suggest topics / share resources for next week \n**1:10 – 1:28 | Open Q&A / Office Hours** \n* Live questions (chat + audio)\n* “Bring your messy problem” time: inventory\, vendor claims\, timeline pressure\, governance\, metrics\n* Optional: rapid-fire “yes/no + why” on 5–8 quick questions if the room is lively \n**1:28 – 1:30 | Wrap + next week preview** \n* 3 takeaways in 30 seconds\n* What we’re tracking next week\n* Speaker/volunteer reminder (“If you’ve shipped something\, we want the story.”) \n### **Who should join** \nIf you’re responsible for security strategy\, cryptography\, identity\, platform security\, resilience\, compliance\, or product security – and quantum is on your roadmap – this is for you. \n### **What you’ll leave with** \n* Clear visibility into what changed this week\n* Better judgment on what’s noise vs. actionable signal\n* Practical framing for decisions you may need to revisit (inventory\, standards alignment\, vendor dependencies\, rollout sequencing)\n* A community you can learn from (and contribute to)
URL:https://appliedquantum.com/event/quantum-security-community-online-fortnightly-update-emea-apac-10
LOCATION:Online event
CATEGORIES:Community
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/03/1024x576-anROVz.jpg
GEO:-8.521147;179.1962
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=+02:00:20260730T170000
DTEND;TZID=+02:00:20260730T183000
DTSTAMP:20260406T115905
CREATED:20260316T100018Z
LAST-MODIFIED:20260405T102915Z
UID:10000044-1785430800-1785436200@appliedquantum.com
SUMMARY:Quantum Security Community - Online Fortnightly Update (America\, EMEA)
DESCRIPTION:***Quantum Security Community*** *is a free\, global\, practitioner-led network sharing real-world PQC insights and supporting one another through the most complex IT/OT security transformation of our time. Explore the channels at* ***[Quantum.Security](https://quantum.security)*** \n—————— \n**A weekly\, online community meetup for quantum security practitioners — focused on signal\, not hype.** \nPost-quantum cryptography (PQC)\, crypto agility\, quantum threat models\, and standards timelines are all evolving quickly. For security teams\, the challenge isn’t “finding information” — it’s deciding **what matters**\, **what changed**\, and **what to do next**. Quantum Security Weekly exists to make that easier. \nWe run the **same meetup twice each week** to cover global time zones: \n* **Session 1:** Europe / Middle East / APAC-friendly\n* **Session 2:** Europe / Americas-friendly\n(Choose the one that fits your schedule – content is aligned across both.) \n### **What happens each week** \nYou’ll get a curated update across the four categories that consistently drive real-world decisions: \n**1) Regulation & policy signals**\nNew requirements\, supervisory guidance\, national strategies\, procurement rules\, sector-specific expectations – and what they imply for timelines and planning. \n**2) Standards and “rules of the road”**\nUpdates to cryptographic standards and related ecosystems (protocols\, identity\, secure elements\, industry frameworks). We focus on what changes adoption feasibility\, interoperability\, or audit/compliance expectations. \n**3) Technical developments**\nCredible signals about quantum computing capability\, relevant cryptanalysis\, and meaningful algorithmic/security research (including “RSA-breaking” or signature-related developments) – explained in terms of security impact\, not headlines. \n**4) Practical implementation reality**\nThe stuff that makes or breaks programs: where crypto actually lives\, dependency chains\, vendor readiness\, device constraints\, performance tradeoffs\, rollout sequencing\, and “what we learned the hard way.” \n### **Speakers and community contributions** \nWe often invite a guest speaker to share practical experience (implementation lessons\, program strategy\, technical deep dives). Sometimes we’ll host short product introductions – but the default posture is educational and experience-driven\, not salesy. When there’s no guest\, we go deeper on the week’s most important developments and prioritize Q&A. \n### **Typical Agenda** \n**0:00 – 0:05 | Welcome + how to engage (fast)** \n* What this meetup is: **signal > hype**\, practical implications\, community-first\n* How to participate today: chat\, Q&A flow\, how to drop links/resources\n* Quick reminder of community channels (Forum / Slack / LinkedIn group) and how to continue the conversation after the call \n**0:05 – 0:25 | The Weekly Signal Brief (what actually changed)**\nA structured scan in four buckets\, with a “so what?” for each: \n* **Policy & regulation:** new drafts\, mandates\, enforcement signals\, procurement rules\n* **Standards & frameworks:** PQC standards movement\, protocol ecosystem changes\, guidance updates\n* **Quantum capability signals:** credible progress indicators (hardware\, error correction\, scaling)\, what to ignore\n* **Cryptography/cryptanalysis:** meaningful research developments\, “RSA/ECC breaking” signals\, security relevance \n**0:25 – 0:35 | Myth‑Busting / Reality Check (the hype audit)**\nIf something got hyped this week\, we’ll do a quick\, repeatable teardown: \n* **What happened** (one sentence)\n* **What didn’t happen** (the misconception)\n* **What it means for defenders** (real impact)\n* **What changes / what doesn’t** in PQC planning this year \n*Goal:* keep the community calibrated\, reduce panic\, and prevent misallocation of effort. \n**0:35 – 0:50 | One Topic\, Deeper (the week’s main story)**\nA focused deep dive on one theme that affects real programs\, such as: \n* crypto-agility patterns and failure modes\n* hybrid deployment realities (where it works / where it’s a trap)\n* migration sequencing and vendor dependency bottlenecks\n* what a standards change means for architects and CISOs\n* integrity-first thinking (e.g.\, signatures\, trust anchors\, long-lived evidence) \n**0:50 – 1:05 | Guest Spotlight (most weeks) OR Community Lightning Round** \n* **Guest Spotlight (preferred when available):**\n* 10–12 min: experience share / lessons learned / case study / product walkthrough (kept educational)\n* 3–5 min: moderated Q&A (“what surprised you / what broke / what you’d do differently”)\n* **If no guest:**\n* 3 lightning shares (3–4 min each): “one paper / one tool / one lesson / one vendor signal” \n**1:05 – 1:10 | Community Pulse (cross‑channel highlights)** \n* “Top 3 threads” from various community channels this week\n* Quick call-outs: members looking for feedback\, volunteer opportunities\, upcoming topics\n* How to propose a guest / suggest topics / share resources for next week \n**1:10 – 1:28 | Open Q&A / Office Hours** \n* Live questions (chat + audio)\n* “Bring your messy problem” time: inventory\, vendor claims\, timeline pressure\, governance\, metrics\n* Optional: rapid-fire “yes/no + why” on 5–8 quick questions if the room is lively \n**1:28 – 1:30 | Wrap + next week preview** \n* 3 takeaways in 30 seconds\n* What we’re tracking next week\n* Speaker/volunteer reminder (“If you’ve shipped something\, we want the story.”) \n### **Who should join** \nIf you’re responsible for security strategy\, cryptography\, identity\, platform security\, resilience\, compliance\, or product security – and quantum is on your roadmap – this is for you. \n### **What you’ll leave with** \n* Clear visibility into what changed this week\n* Better judgment on what’s noise vs. actionable signal\n* Practical framing for decisions you may need to revisit (inventory\, standards alignment\, vendor dependencies\, rollout sequencing)\n* A community you can learn from (and contribute to)
URL:https://appliedquantum.com/event/quantum-security-community-online-fortnightly-update-america-emea-10
LOCATION:Online event
CATEGORIES:Community
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/03/1024x576-bya3VY.jpg
GEO:-8.521147;179.1962
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=+02:00:20260813T090000
DTEND;TZID=+02:00:20260813T103000
DTSTAMP:20260406T115905
CREATED:20260316T100018Z
LAST-MODIFIED:20260405T102915Z
UID:10000045-1786611600-1786617000@appliedquantum.com
SUMMARY:Quantum Security Community - Online Fortnightly Update (EMEA\, APAC)
DESCRIPTION:***Quantum Security Community*** *is a free\, global\, practitioner-led network sharing real-world PQC insights and supporting one another through the most complex IT/OT security transformation of our time. Explore the channels at* ***[Quantum.Security](https://quantum.security)*** \n—————— \n**A weekly\, online community meetup for quantum security practitioners — focused on signal\, not hype.** \nPost-quantum cryptography (PQC)\, crypto agility\, quantum threat models\, and standards timelines are all evolving quickly. For security teams\, the challenge isn’t “finding information” — it’s deciding **what matters**\, **what changed**\, and **what to do next**. Quantum Security Weekly exists to make that easier. \nWe run the **same meetup twice each week** to cover global time zones: \n* **Session 1:** Europe / Middle East / APAC-friendly\n* **Session 2:** Europe / Americas-friendly\n(Choose the one that fits your schedule – content is aligned across both.) \n### **What happens each week** \nYou’ll get a curated update across the four categories that consistently drive real-world decisions: \n**1) Regulation & policy signals**\nNew requirements\, supervisory guidance\, national strategies\, procurement rules\, sector-specific expectations – and what they imply for timelines and planning. \n**2) Standards and “rules of the road”**\nUpdates to cryptographic standards and related ecosystems (protocols\, identity\, secure elements\, industry frameworks). We focus on what changes adoption feasibility\, interoperability\, or audit/compliance expectations. \n**3) Technical developments**\nCredible signals about quantum computing capability\, relevant cryptanalysis\, and meaningful algorithmic/security research (including “RSA-breaking” or signature-related developments) – explained in terms of security impact\, not headlines. \n**4) Practical implementation reality**\nThe stuff that makes or breaks programs: where crypto actually lives\, dependency chains\, vendor readiness\, device constraints\, performance tradeoffs\, rollout sequencing\, and “what we learned the hard way.” \n### **Speakers and community contributions** \nWe often invite a guest speaker to share practical experience (implementation lessons\, program strategy\, technical deep dives). Sometimes we’ll host short product introductions – but the default posture is educational and experience-driven\, not salesy. When there’s no guest\, we go deeper on the week’s most important developments and prioritize Q&A. \n### **Typical Agenda** \n**0:00 – 0:05 | Welcome + how to engage (fast)** \n* What this meetup is: **signal > hype**\, practical implications\, community-first\n* How to participate today: chat\, Q&A flow\, how to drop links/resources\n* Quick reminder of community channels (Forum / Slack / LinkedIn group) and how to continue the conversation after the call \n**0:05 – 0:25 | The Weekly Signal Brief (what actually changed)**\nA structured scan in four buckets\, with a “so what?” for each: \n* **Policy & regulation:** new drafts\, mandates\, enforcement signals\, procurement rules\n* **Standards & frameworks:** PQC standards movement\, protocol ecosystem changes\, guidance updates\n* **Quantum capability signals:** credible progress indicators (hardware\, error correction\, scaling)\, what to ignore\n* **Cryptography/cryptanalysis:** meaningful research developments\, “RSA/ECC breaking” signals\, security relevance \n**0:25 – 0:35 | Myth‑Busting / Reality Check (the hype audit)**\nIf something got hyped this week\, we’ll do a quick\, repeatable teardown: \n* **What happened** (one sentence)\n* **What didn’t happen** (the misconception)\n* **What it means for defenders** (real impact)\n* **What changes / what doesn’t** in PQC planning this year \n*Goal:* keep the community calibrated\, reduce panic\, and prevent misallocation of effort. \n**0:35 – 0:50 | One Topic\, Deeper (the week’s main story)**\nA focused deep dive on one theme that affects real programs\, such as: \n* crypto-agility patterns and failure modes\n* hybrid deployment realities (where it works / where it’s a trap)\n* migration sequencing and vendor dependency bottlenecks\n* what a standards change means for architects and CISOs\n* integrity-first thinking (e.g.\, signatures\, trust anchors\, long-lived evidence) \n**0:50 – 1:05 | Guest Spotlight (most weeks) OR Community Lightning Round** \n* **Guest Spotlight (preferred when available):**\n* 10–12 min: experience share / lessons learned / case study / product walkthrough (kept educational)\n* 3–5 min: moderated Q&A (“what surprised you / what broke / what you’d do differently”)\n* **If no guest:**\n* 3 lightning shares (3–4 min each): “one paper / one tool / one lesson / one vendor signal” \n**1:05 – 1:10 | Community Pulse (cross‑channel highlights)** \n* “Top 3 threads” from various community channels this week\n* Quick call-outs: members looking for feedback\, volunteer opportunities\, upcoming topics\n* How to propose a guest / suggest topics / share resources for next week \n**1:10 – 1:28 | Open Q&A / Office Hours** \n* Live questions (chat + audio)\n* “Bring your messy problem” time: inventory\, vendor claims\, timeline pressure\, governance\, metrics\n* Optional: rapid-fire “yes/no + why” on 5–8 quick questions if the room is lively \n**1:28 – 1:30 | Wrap + next week preview** \n* 3 takeaways in 30 seconds\n* What we’re tracking next week\n* Speaker/volunteer reminder (“If you’ve shipped something\, we want the story.”) \n### **Who should join** \nIf you’re responsible for security strategy\, cryptography\, identity\, platform security\, resilience\, compliance\, or product security – and quantum is on your roadmap – this is for you. \n### **What you’ll leave with** \n* Clear visibility into what changed this week\n* Better judgment on what’s noise vs. actionable signal\n* Practical framing for decisions you may need to revisit (inventory\, standards alignment\, vendor dependencies\, rollout sequencing)\n* A community you can learn from (and contribute to)
URL:https://appliedquantum.com/event/quantum-security-community-online-fortnightly-update-emea-apac-11
LOCATION:Online event
CATEGORIES:Community
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/03/1024x576-anROVz.jpg
GEO:-8.521147;179.1962
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=+02:00:20260813T170000
DTEND;TZID=+02:00:20260813T183000
DTSTAMP:20260406T115905
CREATED:20260316T100018Z
LAST-MODIFIED:20260405T102915Z
UID:10000046-1786640400-1786645800@appliedquantum.com
SUMMARY:Quantum Security Community - Online Fortnightly Update (America\, EMEA)
DESCRIPTION:***Quantum Security Community*** *is a free\, global\, practitioner-led network sharing real-world PQC insights and supporting one another through the most complex IT/OT security transformation of our time. Explore the channels at* ***[Quantum.Security](https://quantum.security)*** \n—————— \n**A weekly\, online community meetup for quantum security practitioners — focused on signal\, not hype.** \nPost-quantum cryptography (PQC)\, crypto agility\, quantum threat models\, and standards timelines are all evolving quickly. For security teams\, the challenge isn’t “finding information” — it’s deciding **what matters**\, **what changed**\, and **what to do next**. Quantum Security Weekly exists to make that easier. \nWe run the **same meetup twice each week** to cover global time zones: \n* **Session 1:** Europe / Middle East / APAC-friendly\n* **Session 2:** Europe / Americas-friendly\n(Choose the one that fits your schedule – content is aligned across both.) \n### **What happens each week** \nYou’ll get a curated update across the four categories that consistently drive real-world decisions: \n**1) Regulation & policy signals**\nNew requirements\, supervisory guidance\, national strategies\, procurement rules\, sector-specific expectations – and what they imply for timelines and planning. \n**2) Standards and “rules of the road”**\nUpdates to cryptographic standards and related ecosystems (protocols\, identity\, secure elements\, industry frameworks). We focus on what changes adoption feasibility\, interoperability\, or audit/compliance expectations. \n**3) Technical developments**\nCredible signals about quantum computing capability\, relevant cryptanalysis\, and meaningful algorithmic/security research (including “RSA-breaking” or signature-related developments) – explained in terms of security impact\, not headlines. \n**4) Practical implementation reality**\nThe stuff that makes or breaks programs: where crypto actually lives\, dependency chains\, vendor readiness\, device constraints\, performance tradeoffs\, rollout sequencing\, and “what we learned the hard way.” \n### **Speakers and community contributions** \nWe often invite a guest speaker to share practical experience (implementation lessons\, program strategy\, technical deep dives). Sometimes we’ll host short product introductions – but the default posture is educational and experience-driven\, not salesy. When there’s no guest\, we go deeper on the week’s most important developments and prioritize Q&A. \n### **Typical Agenda** \n**0:00 – 0:05 | Welcome + how to engage (fast)** \n* What this meetup is: **signal > hype**\, practical implications\, community-first\n* How to participate today: chat\, Q&A flow\, how to drop links/resources\n* Quick reminder of community channels (Forum / Slack / LinkedIn group) and how to continue the conversation after the call \n**0:05 – 0:25 | The Weekly Signal Brief (what actually changed)**\nA structured scan in four buckets\, with a “so what?” for each: \n* **Policy & regulation:** new drafts\, mandates\, enforcement signals\, procurement rules\n* **Standards & frameworks:** PQC standards movement\, protocol ecosystem changes\, guidance updates\n* **Quantum capability signals:** credible progress indicators (hardware\, error correction\, scaling)\, what to ignore\n* **Cryptography/cryptanalysis:** meaningful research developments\, “RSA/ECC breaking” signals\, security relevance \n**0:25 – 0:35 | Myth‑Busting / Reality Check (the hype audit)**\nIf something got hyped this week\, we’ll do a quick\, repeatable teardown: \n* **What happened** (one sentence)\n* **What didn’t happen** (the misconception)\n* **What it means for defenders** (real impact)\n* **What changes / what doesn’t** in PQC planning this year \n*Goal:* keep the community calibrated\, reduce panic\, and prevent misallocation of effort. \n**0:35 – 0:50 | One Topic\, Deeper (the week’s main story)**\nA focused deep dive on one theme that affects real programs\, such as: \n* crypto-agility patterns and failure modes\n* hybrid deployment realities (where it works / where it’s a trap)\n* migration sequencing and vendor dependency bottlenecks\n* what a standards change means for architects and CISOs\n* integrity-first thinking (e.g.\, signatures\, trust anchors\, long-lived evidence) \n**0:50 – 1:05 | Guest Spotlight (most weeks) OR Community Lightning Round** \n* **Guest Spotlight (preferred when available):**\n* 10–12 min: experience share / lessons learned / case study / product walkthrough (kept educational)\n* 3–5 min: moderated Q&A (“what surprised you / what broke / what you’d do differently”)\n* **If no guest:**\n* 3 lightning shares (3–4 min each): “one paper / one tool / one lesson / one vendor signal” \n**1:05 – 1:10 | Community Pulse (cross‑channel highlights)** \n* “Top 3 threads” from various community channels this week\n* Quick call-outs: members looking for feedback\, volunteer opportunities\, upcoming topics\n* How to propose a guest / suggest topics / share resources for next week \n**1:10 – 1:28 | Open Q&A / Office Hours** \n* Live questions (chat + audio)\n* “Bring your messy problem” time: inventory\, vendor claims\, timeline pressure\, governance\, metrics\n* Optional: rapid-fire “yes/no + why” on 5–8 quick questions if the room is lively \n**1:28 – 1:30 | Wrap + next week preview** \n* 3 takeaways in 30 seconds\n* What we’re tracking next week\n* Speaker/volunteer reminder (“If you’ve shipped something\, we want the story.”) \n### **Who should join** \nIf you’re responsible for security strategy\, cryptography\, identity\, platform security\, resilience\, compliance\, or product security – and quantum is on your roadmap – this is for you. \n### **What you’ll leave with** \n* Clear visibility into what changed this week\n* Better judgment on what’s noise vs. actionable signal\n* Practical framing for decisions you may need to revisit (inventory\, standards alignment\, vendor dependencies\, rollout sequencing)\n* A community you can learn from (and contribute to)
URL:https://appliedquantum.com/event/quantum-security-community-online-fortnightly-update-america-emea-11
LOCATION:Online event
CATEGORIES:Community
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/03/1024x576-bya3VY.jpg
GEO:-8.521147;179.1962
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=+02:00:20260827T090000
DTEND;TZID=+02:00:20260827T103000
DTSTAMP:20260406T115905
CREATED:20260316T100019Z
LAST-MODIFIED:20260405T102915Z
UID:10000047-1787821200-1787826600@appliedquantum.com
SUMMARY:Quantum Security Community - Online Fortnightly Update (EMEA\, APAC)
DESCRIPTION:***Quantum Security Community*** *is a free\, global\, practitioner-led network sharing real-world PQC insights and supporting one another through the most complex IT/OT security transformation of our time. Explore the channels at* ***[Quantum.Security](https://quantum.security)*** \n—————— \n**A weekly\, online community meetup for quantum security practitioners — focused on signal\, not hype.** \nPost-quantum cryptography (PQC)\, crypto agility\, quantum threat models\, and standards timelines are all evolving quickly. For security teams\, the challenge isn’t “finding information” — it’s deciding **what matters**\, **what changed**\, and **what to do next**. Quantum Security Weekly exists to make that easier. \nWe run the **same meetup twice each week** to cover global time zones: \n* **Session 1:** Europe / Middle East / APAC-friendly\n* **Session 2:** Europe / Americas-friendly\n(Choose the one that fits your schedule – content is aligned across both.) \n### **What happens each week** \nYou’ll get a curated update across the four categories that consistently drive real-world decisions: \n**1) Regulation & policy signals**\nNew requirements\, supervisory guidance\, national strategies\, procurement rules\, sector-specific expectations – and what they imply for timelines and planning. \n**2) Standards and “rules of the road”**\nUpdates to cryptographic standards and related ecosystems (protocols\, identity\, secure elements\, industry frameworks). We focus on what changes adoption feasibility\, interoperability\, or audit/compliance expectations. \n**3) Technical developments**\nCredible signals about quantum computing capability\, relevant cryptanalysis\, and meaningful algorithmic/security research (including “RSA-breaking” or signature-related developments) – explained in terms of security impact\, not headlines. \n**4) Practical implementation reality**\nThe stuff that makes or breaks programs: where crypto actually lives\, dependency chains\, vendor readiness\, device constraints\, performance tradeoffs\, rollout sequencing\, and “what we learned the hard way.” \n### **Speakers and community contributions** \nWe often invite a guest speaker to share practical experience (implementation lessons\, program strategy\, technical deep dives). Sometimes we’ll host short product introductions – but the default posture is educational and experience-driven\, not salesy. When there’s no guest\, we go deeper on the week’s most important developments and prioritize Q&A. \n### **Typical Agenda** \n**0:00 – 0:05 | Welcome + how to engage (fast)** \n* What this meetup is: **signal > hype**\, practical implications\, community-first\n* How to participate today: chat\, Q&A flow\, how to drop links/resources\n* Quick reminder of community channels (Forum / Slack / LinkedIn group) and how to continue the conversation after the call \n**0:05 – 0:25 | The Weekly Signal Brief (what actually changed)**\nA structured scan in four buckets\, with a “so what?” for each: \n* **Policy & regulation:** new drafts\, mandates\, enforcement signals\, procurement rules\n* **Standards & frameworks:** PQC standards movement\, protocol ecosystem changes\, guidance updates\n* **Quantum capability signals:** credible progress indicators (hardware\, error correction\, scaling)\, what to ignore\n* **Cryptography/cryptanalysis:** meaningful research developments\, “RSA/ECC breaking” signals\, security relevance \n**0:25 – 0:35 | Myth‑Busting / Reality Check (the hype audit)**\nIf something got hyped this week\, we’ll do a quick\, repeatable teardown: \n* **What happened** (one sentence)\n* **What didn’t happen** (the misconception)\n* **What it means for defenders** (real impact)\n* **What changes / what doesn’t** in PQC planning this year \n*Goal:* keep the community calibrated\, reduce panic\, and prevent misallocation of effort. \n**0:35 – 0:50 | One Topic\, Deeper (the week’s main story)**\nA focused deep dive on one theme that affects real programs\, such as: \n* crypto-agility patterns and failure modes\n* hybrid deployment realities (where it works / where it’s a trap)\n* migration sequencing and vendor dependency bottlenecks\n* what a standards change means for architects and CISOs\n* integrity-first thinking (e.g.\, signatures\, trust anchors\, long-lived evidence) \n**0:50 – 1:05 | Guest Spotlight (most weeks) OR Community Lightning Round** \n* **Guest Spotlight (preferred when available):**\n* 10–12 min: experience share / lessons learned / case study / product walkthrough (kept educational)\n* 3–5 min: moderated Q&A (“what surprised you / what broke / what you’d do differently”)\n* **If no guest:**\n* 3 lightning shares (3–4 min each): “one paper / one tool / one lesson / one vendor signal” \n**1:05 – 1:10 | Community Pulse (cross‑channel highlights)** \n* “Top 3 threads” from various community channels this week\n* Quick call-outs: members looking for feedback\, volunteer opportunities\, upcoming topics\n* How to propose a guest / suggest topics / share resources for next week \n**1:10 – 1:28 | Open Q&A / Office Hours** \n* Live questions (chat + audio)\n* “Bring your messy problem” time: inventory\, vendor claims\, timeline pressure\, governance\, metrics\n* Optional: rapid-fire “yes/no + why” on 5–8 quick questions if the room is lively \n**1:28 – 1:30 | Wrap + next week preview** \n* 3 takeaways in 30 seconds\n* What we’re tracking next week\n* Speaker/volunteer reminder (“If you’ve shipped something\, we want the story.”) \n### **Who should join** \nIf you’re responsible for security strategy\, cryptography\, identity\, platform security\, resilience\, compliance\, or product security – and quantum is on your roadmap – this is for you. \n### **What you’ll leave with** \n* Clear visibility into what changed this week\n* Better judgment on what’s noise vs. actionable signal\n* Practical framing for decisions you may need to revisit (inventory\, standards alignment\, vendor dependencies\, rollout sequencing)\n* A community you can learn from (and contribute to)
URL:https://appliedquantum.com/event/quantum-security-community-online-fortnightly-update-emea-apac-12
LOCATION:Online event
CATEGORIES:Community
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/03/1024x576-anROVz.jpg
GEO:-8.521147;179.1962
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=+02:00:20260827T170000
DTEND;TZID=+02:00:20260827T183000
DTSTAMP:20260406T115905
CREATED:20260316T100019Z
LAST-MODIFIED:20260405T102915Z
UID:10000048-1787850000-1787855400@appliedquantum.com
SUMMARY:Quantum Security Community - Online Fortnightly Update (America\, EMEA)
DESCRIPTION:***Quantum Security Community*** *is a free\, global\, practitioner-led network sharing real-world PQC insights and supporting one another through the most complex IT/OT security transformation of our time. Explore the channels at* ***[Quantum.Security](https://quantum.security)*** \n—————— \n**A weekly\, online community meetup for quantum security practitioners — focused on signal\, not hype.** \nPost-quantum cryptography (PQC)\, crypto agility\, quantum threat models\, and standards timelines are all evolving quickly. For security teams\, the challenge isn’t “finding information” — it’s deciding **what matters**\, **what changed**\, and **what to do next**. Quantum Security Weekly exists to make that easier. \nWe run the **same meetup twice each week** to cover global time zones: \n* **Session 1:** Europe / Middle East / APAC-friendly\n* **Session 2:** Europe / Americas-friendly\n(Choose the one that fits your schedule – content is aligned across both.) \n### **What happens each week** \nYou’ll get a curated update across the four categories that consistently drive real-world decisions: \n**1) Regulation & policy signals**\nNew requirements\, supervisory guidance\, national strategies\, procurement rules\, sector-specific expectations – and what they imply for timelines and planning. \n**2) Standards and “rules of the road”**\nUpdates to cryptographic standards and related ecosystems (protocols\, identity\, secure elements\, industry frameworks). We focus on what changes adoption feasibility\, interoperability\, or audit/compliance expectations. \n**3) Technical developments**\nCredible signals about quantum computing capability\, relevant cryptanalysis\, and meaningful algorithmic/security research (including “RSA-breaking” or signature-related developments) – explained in terms of security impact\, not headlines. \n**4) Practical implementation reality**\nThe stuff that makes or breaks programs: where crypto actually lives\, dependency chains\, vendor readiness\, device constraints\, performance tradeoffs\, rollout sequencing\, and “what we learned the hard way.” \n### **Speakers and community contributions** \nWe often invite a guest speaker to share practical experience (implementation lessons\, program strategy\, technical deep dives). Sometimes we’ll host short product introductions – but the default posture is educational and experience-driven\, not salesy. When there’s no guest\, we go deeper on the week’s most important developments and prioritize Q&A. \n### **Typical Agenda** \n**0:00 – 0:05 | Welcome + how to engage (fast)** \n* What this meetup is: **signal > hype**\, practical implications\, community-first\n* How to participate today: chat\, Q&A flow\, how to drop links/resources\n* Quick reminder of community channels (Forum / Slack / LinkedIn group) and how to continue the conversation after the call \n**0:05 – 0:25 | The Weekly Signal Brief (what actually changed)**\nA structured scan in four buckets\, with a “so what?” for each: \n* **Policy & regulation:** new drafts\, mandates\, enforcement signals\, procurement rules\n* **Standards & frameworks:** PQC standards movement\, protocol ecosystem changes\, guidance updates\n* **Quantum capability signals:** credible progress indicators (hardware\, error correction\, scaling)\, what to ignore\n* **Cryptography/cryptanalysis:** meaningful research developments\, “RSA/ECC breaking” signals\, security relevance \n**0:25 – 0:35 | Myth‑Busting / Reality Check (the hype audit)**\nIf something got hyped this week\, we’ll do a quick\, repeatable teardown: \n* **What happened** (one sentence)\n* **What didn’t happen** (the misconception)\n* **What it means for defenders** (real impact)\n* **What changes / what doesn’t** in PQC planning this year \n*Goal:* keep the community calibrated\, reduce panic\, and prevent misallocation of effort. \n**0:35 – 0:50 | One Topic\, Deeper (the week’s main story)**\nA focused deep dive on one theme that affects real programs\, such as: \n* crypto-agility patterns and failure modes\n* hybrid deployment realities (where it works / where it’s a trap)\n* migration sequencing and vendor dependency bottlenecks\n* what a standards change means for architects and CISOs\n* integrity-first thinking (e.g.\, signatures\, trust anchors\, long-lived evidence) \n**0:50 – 1:05 | Guest Spotlight (most weeks) OR Community Lightning Round** \n* **Guest Spotlight (preferred when available):**\n* 10–12 min: experience share / lessons learned / case study / product walkthrough (kept educational)\n* 3–5 min: moderated Q&A (“what surprised you / what broke / what you’d do differently”)\n* **If no guest:**\n* 3 lightning shares (3–4 min each): “one paper / one tool / one lesson / one vendor signal” \n**1:05 – 1:10 | Community Pulse (cross‑channel highlights)** \n* “Top 3 threads” from various community channels this week\n* Quick call-outs: members looking for feedback\, volunteer opportunities\, upcoming topics\n* How to propose a guest / suggest topics / share resources for next week \n**1:10 – 1:28 | Open Q&A / Office Hours** \n* Live questions (chat + audio)\n* “Bring your messy problem” time: inventory\, vendor claims\, timeline pressure\, governance\, metrics\n* Optional: rapid-fire “yes/no + why” on 5–8 quick questions if the room is lively \n**1:28 – 1:30 | Wrap + next week preview** \n* 3 takeaways in 30 seconds\n* What we’re tracking next week\n* Speaker/volunteer reminder (“If you’ve shipped something\, we want the story.”) \n### **Who should join** \nIf you’re responsible for security strategy\, cryptography\, identity\, platform security\, resilience\, compliance\, or product security – and quantum is on your roadmap – this is for you. \n### **What you’ll leave with** \n* Clear visibility into what changed this week\n* Better judgment on what’s noise vs. actionable signal\n* Practical framing for decisions you may need to revisit (inventory\, standards alignment\, vendor dependencies\, rollout sequencing)\n* A community you can learn from (and contribute to)
URL:https://appliedquantum.com/event/quantum-security-community-online-fortnightly-update-america-emea-12
LOCATION:Online event
CATEGORIES:Community
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/03/1024x576-bya3VY.jpg
GEO:-8.521147;179.1962
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=+02:00:20260910T090000
DTEND;TZID=+02:00:20260910T103000
DTSTAMP:20260406T115905
CREATED:20260316T100019Z
LAST-MODIFIED:20260405T102915Z
UID:10000049-1789030800-1789036200@appliedquantum.com
SUMMARY:Quantum Security Community - Online Fortnightly Update (EMEA\, APAC)
DESCRIPTION:***Quantum Security Community*** *is a free\, global\, practitioner-led network sharing real-world PQC insights and supporting one another through the most complex IT/OT security transformation of our time. Explore the channels at* ***[Quantum.Security](https://quantum.security)*** \n—————— \n**A weekly\, online community meetup for quantum security practitioners — focused on signal\, not hype.** \nPost-quantum cryptography (PQC)\, crypto agility\, quantum threat models\, and standards timelines are all evolving quickly. For security teams\, the challenge isn’t “finding information” — it’s deciding **what matters**\, **what changed**\, and **what to do next**. Quantum Security Weekly exists to make that easier. \nWe run the **same meetup twice each week** to cover global time zones: \n* **Session 1:** Europe / Middle East / APAC-friendly\n* **Session 2:** Europe / Americas-friendly\n(Choose the one that fits your schedule – content is aligned across both.) \n### **What happens each week** \nYou’ll get a curated update across the four categories that consistently drive real-world decisions: \n**1) Regulation & policy signals**\nNew requirements\, supervisory guidance\, national strategies\, procurement rules\, sector-specific expectations – and what they imply for timelines and planning. \n**2) Standards and “rules of the road”**\nUpdates to cryptographic standards and related ecosystems (protocols\, identity\, secure elements\, industry frameworks). We focus on what changes adoption feasibility\, interoperability\, or audit/compliance expectations. \n**3) Technical developments**\nCredible signals about quantum computing capability\, relevant cryptanalysis\, and meaningful algorithmic/security research (including “RSA-breaking” or signature-related developments) – explained in terms of security impact\, not headlines. \n**4) Practical implementation reality**\nThe stuff that makes or breaks programs: where crypto actually lives\, dependency chains\, vendor readiness\, device constraints\, performance tradeoffs\, rollout sequencing\, and “what we learned the hard way.” \n### **Speakers and community contributions** \nWe often invite a guest speaker to share practical experience (implementation lessons\, program strategy\, technical deep dives). Sometimes we’ll host short product introductions – but the default posture is educational and experience-driven\, not salesy. When there’s no guest\, we go deeper on the week’s most important developments and prioritize Q&A. \n### **Typical Agenda** \n**0:00 – 0:05 | Welcome + how to engage (fast)** \n* What this meetup is: **signal > hype**\, practical implications\, community-first\n* How to participate today: chat\, Q&A flow\, how to drop links/resources\n* Quick reminder of community channels (Forum / Slack / LinkedIn group) and how to continue the conversation after the call \n**0:05 – 0:25 | The Weekly Signal Brief (what actually changed)**\nA structured scan in four buckets\, with a “so what?” for each: \n* **Policy & regulation:** new drafts\, mandates\, enforcement signals\, procurement rules\n* **Standards & frameworks:** PQC standards movement\, protocol ecosystem changes\, guidance updates\n* **Quantum capability signals:** credible progress indicators (hardware\, error correction\, scaling)\, what to ignore\n* **Cryptography/cryptanalysis:** meaningful research developments\, “RSA/ECC breaking” signals\, security relevance \n**0:25 – 0:35 | Myth‑Busting / Reality Check (the hype audit)**\nIf something got hyped this week\, we’ll do a quick\, repeatable teardown: \n* **What happened** (one sentence)\n* **What didn’t happen** (the misconception)\n* **What it means for defenders** (real impact)\n* **What changes / what doesn’t** in PQC planning this year \n*Goal:* keep the community calibrated\, reduce panic\, and prevent misallocation of effort. \n**0:35 – 0:50 | One Topic\, Deeper (the week’s main story)**\nA focused deep dive on one theme that affects real programs\, such as: \n* crypto-agility patterns and failure modes\n* hybrid deployment realities (where it works / where it’s a trap)\n* migration sequencing and vendor dependency bottlenecks\n* what a standards change means for architects and CISOs\n* integrity-first thinking (e.g.\, signatures\, trust anchors\, long-lived evidence) \n**0:50 – 1:05 | Guest Spotlight (most weeks) OR Community Lightning Round** \n* **Guest Spotlight (preferred when available):**\n* 10–12 min: experience share / lessons learned / case study / product walkthrough (kept educational)\n* 3–5 min: moderated Q&A (“what surprised you / what broke / what you’d do differently”)\n* **If no guest:**\n* 3 lightning shares (3–4 min each): “one paper / one tool / one lesson / one vendor signal” \n**1:05 – 1:10 | Community Pulse (cross‑channel highlights)** \n* “Top 3 threads” from various community channels this week\n* Quick call-outs: members looking for feedback\, volunteer opportunities\, upcoming topics\n* How to propose a guest / suggest topics / share resources for next week \n**1:10 – 1:28 | Open Q&A / Office Hours** \n* Live questions (chat + audio)\n* “Bring your messy problem” time: inventory\, vendor claims\, timeline pressure\, governance\, metrics\n* Optional: rapid-fire “yes/no + why” on 5–8 quick questions if the room is lively \n**1:28 – 1:30 | Wrap + next week preview** \n* 3 takeaways in 30 seconds\n* What we’re tracking next week\n* Speaker/volunteer reminder (“If you’ve shipped something\, we want the story.”) \n### **Who should join** \nIf you’re responsible for security strategy\, cryptography\, identity\, platform security\, resilience\, compliance\, or product security – and quantum is on your roadmap – this is for you. \n### **What you’ll leave with** \n* Clear visibility into what changed this week\n* Better judgment on what’s noise vs. actionable signal\n* Practical framing for decisions you may need to revisit (inventory\, standards alignment\, vendor dependencies\, rollout sequencing)\n* A community you can learn from (and contribute to)
URL:https://appliedquantum.com/event/quantum-security-community-online-fortnightly-update-emea-apac-13
LOCATION:Online event
CATEGORIES:Community
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/03/1024x576-anROVz.jpg
GEO:-8.521147;179.1962
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=+02:00:20260910T170000
DTEND;TZID=+02:00:20260910T183000
DTSTAMP:20260406T115905
CREATED:20260316T100019Z
LAST-MODIFIED:20260405T102915Z
UID:10000050-1789059600-1789065000@appliedquantum.com
SUMMARY:Quantum Security Community - Online Fortnightly Update (America\, EMEA)
DESCRIPTION:***Quantum Security Community*** *is a free\, global\, practitioner-led network sharing real-world PQC insights and supporting one another through the most complex IT/OT security transformation of our time. Explore the channels at* ***[Quantum.Security](https://quantum.security)*** \n—————— \n**A weekly\, online community meetup for quantum security practitioners — focused on signal\, not hype.** \nPost-quantum cryptography (PQC)\, crypto agility\, quantum threat models\, and standards timelines are all evolving quickly. For security teams\, the challenge isn’t “finding information” — it’s deciding **what matters**\, **what changed**\, and **what to do next**. Quantum Security Weekly exists to make that easier. \nWe run the **same meetup twice each week** to cover global time zones: \n* **Session 1:** Europe / Middle East / APAC-friendly\n* **Session 2:** Europe / Americas-friendly\n(Choose the one that fits your schedule – content is aligned across both.) \n### **What happens each week** \nYou’ll get a curated update across the four categories that consistently drive real-world decisions: \n**1) Regulation & policy signals**\nNew requirements\, supervisory guidance\, national strategies\, procurement rules\, sector-specific expectations – and what they imply for timelines and planning. \n**2) Standards and “rules of the road”**\nUpdates to cryptographic standards and related ecosystems (protocols\, identity\, secure elements\, industry frameworks). We focus on what changes adoption feasibility\, interoperability\, or audit/compliance expectations. \n**3) Technical developments**\nCredible signals about quantum computing capability\, relevant cryptanalysis\, and meaningful algorithmic/security research (including “RSA-breaking” or signature-related developments) – explained in terms of security impact\, not headlines. \n**4) Practical implementation reality**\nThe stuff that makes or breaks programs: where crypto actually lives\, dependency chains\, vendor readiness\, device constraints\, performance tradeoffs\, rollout sequencing\, and “what we learned the hard way.” \n### **Speakers and community contributions** \nWe often invite a guest speaker to share practical experience (implementation lessons\, program strategy\, technical deep dives). Sometimes we’ll host short product introductions – but the default posture is educational and experience-driven\, not salesy. When there’s no guest\, we go deeper on the week’s most important developments and prioritize Q&A. \n### **Typical Agenda** \n**0:00 – 0:05 | Welcome + how to engage (fast)** \n* What this meetup is: **signal > hype**\, practical implications\, community-first\n* How to participate today: chat\, Q&A flow\, how to drop links/resources\n* Quick reminder of community channels (Forum / Slack / LinkedIn group) and how to continue the conversation after the call \n**0:05 – 0:25 | The Weekly Signal Brief (what actually changed)**\nA structured scan in four buckets\, with a “so what?” for each: \n* **Policy & regulation:** new drafts\, mandates\, enforcement signals\, procurement rules\n* **Standards & frameworks:** PQC standards movement\, protocol ecosystem changes\, guidance updates\n* **Quantum capability signals:** credible progress indicators (hardware\, error correction\, scaling)\, what to ignore\n* **Cryptography/cryptanalysis:** meaningful research developments\, “RSA/ECC breaking” signals\, security relevance \n**0:25 – 0:35 | Myth‑Busting / Reality Check (the hype audit)**\nIf something got hyped this week\, we’ll do a quick\, repeatable teardown: \n* **What happened** (one sentence)\n* **What didn’t happen** (the misconception)\n* **What it means for defenders** (real impact)\n* **What changes / what doesn’t** in PQC planning this year \n*Goal:* keep the community calibrated\, reduce panic\, and prevent misallocation of effort. \n**0:35 – 0:50 | One Topic\, Deeper (the week’s main story)**\nA focused deep dive on one theme that affects real programs\, such as: \n* crypto-agility patterns and failure modes\n* hybrid deployment realities (where it works / where it’s a trap)\n* migration sequencing and vendor dependency bottlenecks\n* what a standards change means for architects and CISOs\n* integrity-first thinking (e.g.\, signatures\, trust anchors\, long-lived evidence) \n**0:50 – 1:05 | Guest Spotlight (most weeks) OR Community Lightning Round** \n* **Guest Spotlight (preferred when available):**\n* 10–12 min: experience share / lessons learned / case study / product walkthrough (kept educational)\n* 3–5 min: moderated Q&A (“what surprised you / what broke / what you’d do differently”)\n* **If no guest:**\n* 3 lightning shares (3–4 min each): “one paper / one tool / one lesson / one vendor signal” \n**1:05 – 1:10 | Community Pulse (cross‑channel highlights)** \n* “Top 3 threads” from various community channels this week\n* Quick call-outs: members looking for feedback\, volunteer opportunities\, upcoming topics\n* How to propose a guest / suggest topics / share resources for next week \n**1:10 – 1:28 | Open Q&A / Office Hours** \n* Live questions (chat + audio)\n* “Bring your messy problem” time: inventory\, vendor claims\, timeline pressure\, governance\, metrics\n* Optional: rapid-fire “yes/no + why” on 5–8 quick questions if the room is lively \n**1:28 – 1:30 | Wrap + next week preview** \n* 3 takeaways in 30 seconds\n* What we’re tracking next week\n* Speaker/volunteer reminder (“If you’ve shipped something\, we want the story.”) \n### **Who should join** \nIf you’re responsible for security strategy\, cryptography\, identity\, platform security\, resilience\, compliance\, or product security – and quantum is on your roadmap – this is for you. \n### **What you’ll leave with** \n* Clear visibility into what changed this week\n* Better judgment on what’s noise vs. actionable signal\n* Practical framing for decisions you may need to revisit (inventory\, standards alignment\, vendor dependencies\, rollout sequencing)\n* A community you can learn from (and contribute to)
URL:https://appliedquantum.com/event/quantum-security-community-online-fortnightly-update-america-emea-13
LOCATION:Online event
CATEGORIES:Community
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/03/1024x576-bya3VY.jpg
GEO:-8.521147;179.1962
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Paris:20260910T190000
DTEND;TZID=Europe/Paris:20260910T203000
DTSTAMP:20260406T115905
CREATED:20260220T031126Z
LAST-MODIFIED:20260220T031357Z
UID:10000024-1789066800-1789072200@appliedquantum.com
SUMMARY:Quantum Security Awareness (Electricity Edition): Quantum-Safe Grid Operations - OT Trust Anchors\, Safety\,  and Decades-Long Lifecycles
DESCRIPTION:About This Event\nThis complimentary webcast is designed for utility and grid security leaders who need a clear\, no‑nonsense understanding of the quantum threat – and what to do about it now\, without hand‑waving. The session is built around the operational reality of electricity: safety and stability are non‑negotiable\, outage windows are precious\, and many OT assets are expected to run for decades. That combination makes “we’ll upgrade the crypto later” an unsafe assumption. \nElectricity providers face a quantum readiness problem that is OT‑dominant and integrity‑dominant. Confidentiality matters – but for grid operations\, the sharper edge is often Trust Now\, Forge Later (TNFL): if signatures and certificates that underpin trusted firmware\, trusted configs\, and trusted device identities become forgeable in the future\, attackers don’t just read traffic – they can introduce changes that look legitimate in environments where patching is slow\, device refresh is rare\, and “roll back” may not exist. This is why electricity quantum readiness tends to start with trust anchors (signing roots\, identity\, remote access control points) rather than a generic “PQC everywhere” plan. \nThe standards and regulatory envelope matters here\, because it shapes where security controls can realistically live. In North America\, NERC CIP‑005‑7 is explicitly about managing electronic access via a controlled Electronic Security Perimeter – it pushes attention to access paths\, electronic access points\, and monitoring/control mechanisms. Globally\, IEC 62351 focuses on security for power system control operations and the IEC TC57 protocol families (e.g.\, IEC 60870‑5/‑6\, IEC 61850\, IEC 61970/61968)\, which strongly influences what “secure-by-standard” looks like in grid protocol stacks. In the EU\, NIS2 puts electricity squarely in the “high criticality” bucket and explicitly scopes multiple electricity entity types\, reinforcing governance and accountability expectations around resilience. \nThis session is intentionally practical and engineering‑grounded: we’ll focus on where crypto actually sits in utility OT\, what breaks first when you try to modernize it\, and why corridor‑first + boundary overlays are often the fastest\, least disruptive way to start reducing quantum exposure while staying inside operational constraints. \nFormat: Free live webcast (multiple sessions available) \nDuration: Awareness-level briefing – 1.5 hours \nCost: Free \n\nWhat Will You Learn\n\nHow to map “grid trust anchors” in real OT terms: firmware/config signing chains\, device identities/cert lifecycles\, remote engineering access\, and control‑center ↔ substation communication paths.\nWhere TNFL hits utilities hardest: why “signed” can stop meaning “safe\,” and how forgeable signatures/certs translate into malicious-but-valid-looking updates\, configs\, and device impersonation in hard‑to‑patch environments.\nHow the standards envelope shapes your options: what CIP‑005‑7 implies for access-path governance and control points\, and what IEC 62351 implies about where security hooks exist in grid protocol stacks (and where they don’t).\nCorridor‑first prioritization: how to pick the 1–2 operational corridors that are both high‑impact and realistically changeable (e.g.\, remote engineering access\, control center ↔ substation gateway) without touching fragile endpoints first.\nBoundary overlays that actually work in OT: practical patterns like gateways\, brokered remote access\, jump hosts\, segmentation enforcement\, and monitoring that reduce quantum exposure before device refresh cycles catch up.\nHow to evaluate OT vendor readiness credibly: the specific questions to ask about lifecycle support\, certificate rollover\, signing agility\, interoperability assumptions\, and upgrade paths—so “PQC-ready” becomes a measurable plan\, not marketing.\n\n\nWho Should Attend\nUtility CISOs\, OT security leads\, grid/SCADA security architects\, substation communications/security owners\, and vendor / supply‑chain risk owners supporting generation\, transmission\, and distribution operations. \n\nPrerequisites\nGeneral familiarity with quantum security concepts\, PQC\, and large‑scale migration challenges is helpful – but not required. If you want a fast\, executive‑level refresher before attending\, you can optionally join Applied Quantum’s free “Quantum Security Awareness for Executives” briefing. See Applied Quantum Events.  \n\nThis Session\nWednesday\, 10 Sep 2026\n\nTime: 7:00 PM CEST | 1:00 PM EDT | 6:00 PM BST | 9:00 PM GST | 10:30 PM IST | 10:00 PM PDT\n\nAll events in the series: Quantum Security Awareness – Industry Editions \n\nRegistration\nRegistration is free. RSVP Below. \nPlease register below using your email address. Within minutes\, you will receive a confirmation email containing a calendar invite and the unique Zoom link for the day. If the email does not arrive shortly\, please check your junk or spam folder\, or contact us at admin@appliedquantum.com. \n\nNo fluff. No jargon. Just the clarity and next steps security leaders need. For questions or group registrations\, contact Applied Quantum. \n 
URL:https://appliedquantum.com/event/quantum-security-awareness-electricity-10sep2026
CATEGORIES:Webinar
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/02/Quantum-Security-Industry-Webinars-Electricity-10sep2026-1.jpg
LOCATION:https://us06web.zoom.us/j/83405649885
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Paris:20260918T070000
DTEND;TZID=Europe/Paris:20260918T083000
DTSTAMP:20260406T115905
CREATED:20260219T115521Z
LAST-MODIFIED:20260220T031824Z
UID:10000018-1789714800-1789720200@appliedquantum.com
SUMMARY:Quantum Security Awareness (Banking Edition): Trust Anchors at Bank Scale - PKI\, Signing\, and Long‑Lived Evidence
DESCRIPTION:About This Event\nThis complimentary webcast is designed for banking security leaders who need a clear\, no‑nonsense understanding of the quantum threat – and what to do about it now.  The session avoids generic “PQC 101” and goes straight to what makes banking different: institutional identity and long‑lived evidence are the real blast radius. \nIn a bank\, cryptography isn’t just protecting data in transit – it is the foundation of trust at scale: CA hierarchies\, enterprise PKI\, service‑to‑service mTLS\, customer and workforce authentication\, signed tokens (e.g.\, OAuth/JWT ecosystems)\, document and transaction signing\, code‑signing in CI/CD\, and the regulated archives that prove what happened\, when\, and under which authorization. The uncomfortable banking‑specific reality is that “confidentiality later” is only half the story: if signatures and PKI trust anchors become forgeable in the future\, the bank’s ability to prove integrity\, provenance\, and non‑repudiation comes under pressure. \nThis is also why the industry drivers are accelerating. The G7 Cyber Expert Group released a roadmap specifically to coordinate the transition to post‑quantum cryptography in the financial sector\, explicitly positioning PQC as a systemic resilience issue (not an isolated technical upgrade). ￼ FS‑ISAC has likewise urged global coordination and milestones for financial services migration\, framing the transition as an interdependency problem that can’t be solved bank‑by‑bank in isolation. ￼ \nOn the regulatory side\, the EU’s DORA technical standards don’t mention “PQC” by name – but they effectively force the behavior you need for it: a documented encryption/cryptographic controls policy\, provisions to update cryptographic technology based on developments in cryptanalysis\, and (critically for banks) stronger discipline around certificate and key lifecycle management\, including maintaining a certificate register for critical systems. And while NIS2 raises governance expectations for “banking” as a highly critical sector\, many banks will experience DORA as the sharper operational driver in practice (and the directives explicitly acknowledge that overlap). ￼ \nThe session is intentionally practical: how to start with “trust anchors first\,” how to sequence changes without detonating production dependencies\, and how to pressure‑test vendor roadmaps so “PQC‑ready” becomes a measurable engineering claim rather than marketing. \nFormat: Free live webcast (multiple sessions available) \nDuration: Awareness-level briefing – 1.5 hours \nCost: Free \n\nWhat Will You Learn\n\nA bank‑specific trust map: where quantum‑vulnerable crypto sits across PKI\, token signing\, mTLS\, signing services\, CI/CD\, and regulated archives.\nHow to translate sector signals into action: using the G7 roadmap and FS‑ISAC milestones to set internal timelines and vendor expectations. ￼\nHow to turn “DORA compliance” into quantum readiness: using required crypto policies\, cryptanalysis‑driven update expectations\, and certificate lifecycle controls as forcing functions for crypto agility. ￼\nTrust‑anchor‑first sequencing: what it means in practice (CA modernization\, certificate inventory\, signing key governance\, rollover planning\, hybrid boundaries).\nVendor and third‑party reality checks: what to ask cloud providers\, HSM/KMS vendors\, core banking platforms\, identity stacks\, and managed service partners – and how to spot hand‑wavy roadmaps.\nA pragmatic “first pilots” playbook: which banking domains are most pilotable\, how to contain blast radius\, and what success metrics to track.\n\n\nWho Should Attend\nCISOs\, CISO‑1 cyber leaders\, PKI and IAM owners\, platform security leads\, crypto engineering teams\, cloud/KMS/HSM owners\, and third‑party / outsourcing risk leaders in banks and banking service providers. \n\nPrerequisites\nGeneral familiarity with quantum security concepts\, PQC\, and large‑scale migration challenges is helpful – but not required. If you want a fast\, executive‑level refresher before attending\, you can optionally join Applied Quantum’s free “Quantum Security Awareness for Executives” briefing. See Applied Quantum Events.  \n\nThis Session\nWednesday\, 18 Sep 2026\n\nTime: 7:00 AM CEST | 9:00 AM GST | 10:30 AM IST | 1:00 PM SGT | 3:00 PM AEST | 10:00 PM PDT (17 Sep)\n\nAll events in the series: Quantum Security Awareness – Industry Editions \n\nRegistration\nRegistration is free. RSVP Below. \nPlease register below using your email address. Within minutes\, you will receive a confirmation email containing a calendar invite and the unique Zoom link for the day. If the email does not arrive shortly\, please check your junk or spam folder\, or contact us at admin@appliedquantum.com. \n\nNo fluff. No jargon. Just the clarity and next steps security leaders need. For questions or group registrations\, contact Applied Quantum. \n 
URL:https://appliedquantum.com/event/quantum-security-awareness-banking-18sep2026
CATEGORIES:Webinar
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/02/Quantum-Security-Industry-Webinars-Banking-18Sep2026.jpg
LOCATION:https://us06web.zoom.us/j/84077140745
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=+02:00:20260924T090000
DTEND;TZID=+02:00:20260924T103000
DTSTAMP:20260406T115905
CREATED:20260316T100019Z
LAST-MODIFIED:20260405T102916Z
UID:10000051-1790240400-1790245800@appliedquantum.com
SUMMARY:Quantum Security Community - Online Fortnightly Update (EMEA\, APAC)
DESCRIPTION:***Quantum Security Community*** *is a free\, global\, practitioner-led network sharing real-world PQC insights and supporting one another through the most complex IT/OT security transformation of our time. Explore the channels at* ***[Quantum.Security](https://quantum.security)*** \n—————— \n**A weekly\, online community meetup for quantum security practitioners — focused on signal\, not hype.** \nPost-quantum cryptography (PQC)\, crypto agility\, quantum threat models\, and standards timelines are all evolving quickly. For security teams\, the challenge isn’t “finding information” — it’s deciding **what matters**\, **what changed**\, and **what to do next**. Quantum Security Weekly exists to make that easier. \nWe run the **same meetup twice each week** to cover global time zones: \n* **Session 1:** Europe / Middle East / APAC-friendly\n* **Session 2:** Europe / Americas-friendly\n(Choose the one that fits your schedule – content is aligned across both.) \n### **What happens each week** \nYou’ll get a curated update across the four categories that consistently drive real-world decisions: \n**1) Regulation & policy signals**\nNew requirements\, supervisory guidance\, national strategies\, procurement rules\, sector-specific expectations – and what they imply for timelines and planning. \n**2) Standards and “rules of the road”**\nUpdates to cryptographic standards and related ecosystems (protocols\, identity\, secure elements\, industry frameworks). We focus on what changes adoption feasibility\, interoperability\, or audit/compliance expectations. \n**3) Technical developments**\nCredible signals about quantum computing capability\, relevant cryptanalysis\, and meaningful algorithmic/security research (including “RSA-breaking” or signature-related developments) – explained in terms of security impact\, not headlines. \n**4) Practical implementation reality**\nThe stuff that makes or breaks programs: where crypto actually lives\, dependency chains\, vendor readiness\, device constraints\, performance tradeoffs\, rollout sequencing\, and “what we learned the hard way.” \n### **Speakers and community contributions** \nWe often invite a guest speaker to share practical experience (implementation lessons\, program strategy\, technical deep dives). Sometimes we’ll host short product introductions – but the default posture is educational and experience-driven\, not salesy. When there’s no guest\, we go deeper on the week’s most important developments and prioritize Q&A. \n### **Typical Agenda** \n**0:00 – 0:05 | Welcome + how to engage (fast)** \n* What this meetup is: **signal > hype**\, practical implications\, community-first\n* How to participate today: chat\, Q&A flow\, how to drop links/resources\n* Quick reminder of community channels (Forum / Slack / LinkedIn group) and how to continue the conversation after the call \n**0:05 – 0:25 | The Weekly Signal Brief (what actually changed)**\nA structured scan in four buckets\, with a “so what?” for each: \n* **Policy & regulation:** new drafts\, mandates\, enforcement signals\, procurement rules\n* **Standards & frameworks:** PQC standards movement\, protocol ecosystem changes\, guidance updates\n* **Quantum capability signals:** credible progress indicators (hardware\, error correction\, scaling)\, what to ignore\n* **Cryptography/cryptanalysis:** meaningful research developments\, “RSA/ECC breaking” signals\, security relevance \n**0:25 – 0:35 | Myth‑Busting / Reality Check (the hype audit)**\nIf something got hyped this week\, we’ll do a quick\, repeatable teardown: \n* **What happened** (one sentence)\n* **What didn’t happen** (the misconception)\n* **What it means for defenders** (real impact)\n* **What changes / what doesn’t** in PQC planning this year \n*Goal:* keep the community calibrated\, reduce panic\, and prevent misallocation of effort. \n**0:35 – 0:50 | One Topic\, Deeper (the week’s main story)**\nA focused deep dive on one theme that affects real programs\, such as: \n* crypto-agility patterns and failure modes\n* hybrid deployment realities (where it works / where it’s a trap)\n* migration sequencing and vendor dependency bottlenecks\n* what a standards change means for architects and CISOs\n* integrity-first thinking (e.g.\, signatures\, trust anchors\, long-lived evidence) \n**0:50 – 1:05 | Guest Spotlight (most weeks) OR Community Lightning Round** \n* **Guest Spotlight (preferred when available):**\n* 10–12 min: experience share / lessons learned / case study / product walkthrough (kept educational)\n* 3–5 min: moderated Q&A (“what surprised you / what broke / what you’d do differently”)\n* **If no guest:**\n* 3 lightning shares (3–4 min each): “one paper / one tool / one lesson / one vendor signal” \n**1:05 – 1:10 | Community Pulse (cross‑channel highlights)** \n* “Top 3 threads” from various community channels this week\n* Quick call-outs: members looking for feedback\, volunteer opportunities\, upcoming topics\n* How to propose a guest / suggest topics / share resources for next week \n**1:10 – 1:28 | Open Q&A / Office Hours** \n* Live questions (chat + audio)\n* “Bring your messy problem” time: inventory\, vendor claims\, timeline pressure\, governance\, metrics\n* Optional: rapid-fire “yes/no + why” on 5–8 quick questions if the room is lively \n**1:28 – 1:30 | Wrap + next week preview** \n* 3 takeaways in 30 seconds\n* What we’re tracking next week\n* Speaker/volunteer reminder (“If you’ve shipped something\, we want the story.”) \n### **Who should join** \nIf you’re responsible for security strategy\, cryptography\, identity\, platform security\, resilience\, compliance\, or product security – and quantum is on your roadmap – this is for you. \n### **What you’ll leave with** \n* Clear visibility into what changed this week\n* Better judgment on what’s noise vs. actionable signal\n* Practical framing for decisions you may need to revisit (inventory\, standards alignment\, vendor dependencies\, rollout sequencing)\n* A community you can learn from (and contribute to)
URL:https://appliedquantum.com/event/quantum-security-community-online-fortnightly-update-emea-apac-14
LOCATION:Online event
CATEGORIES:Community
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/03/1024x576-anROVz.jpg
GEO:-8.521147;179.1962
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=+02:00:20260924T170000
DTEND;TZID=+02:00:20260924T183000
DTSTAMP:20260406T115905
CREATED:20260316T100019Z
LAST-MODIFIED:20260405T102916Z
UID:10000052-1790269200-1790274600@appliedquantum.com
SUMMARY:Quantum Security Community - Online Fortnightly Update (America\, EMEA)
DESCRIPTION:***Quantum Security Community*** *is a free\, global\, practitioner-led network sharing real-world PQC insights and supporting one another through the most complex IT/OT security transformation of our time. Explore the channels at* ***[Quantum.Security](https://quantum.security)*** \n—————— \n**A weekly\, online community meetup for quantum security practitioners — focused on signal\, not hype.** \nPost-quantum cryptography (PQC)\, crypto agility\, quantum threat models\, and standards timelines are all evolving quickly. For security teams\, the challenge isn’t “finding information” — it’s deciding **what matters**\, **what changed**\, and **what to do next**. Quantum Security Weekly exists to make that easier. \nWe run the **same meetup twice each week** to cover global time zones: \n* **Session 1:** Europe / Middle East / APAC-friendly\n* **Session 2:** Europe / Americas-friendly\n(Choose the one that fits your schedule – content is aligned across both.) \n### **What happens each week** \nYou’ll get a curated update across the four categories that consistently drive real-world decisions: \n**1) Regulation & policy signals**\nNew requirements\, supervisory guidance\, national strategies\, procurement rules\, sector-specific expectations – and what they imply for timelines and planning. \n**2) Standards and “rules of the road”**\nUpdates to cryptographic standards and related ecosystems (protocols\, identity\, secure elements\, industry frameworks). We focus on what changes adoption feasibility\, interoperability\, or audit/compliance expectations. \n**3) Technical developments**\nCredible signals about quantum computing capability\, relevant cryptanalysis\, and meaningful algorithmic/security research (including “RSA-breaking” or signature-related developments) – explained in terms of security impact\, not headlines. \n**4) Practical implementation reality**\nThe stuff that makes or breaks programs: where crypto actually lives\, dependency chains\, vendor readiness\, device constraints\, performance tradeoffs\, rollout sequencing\, and “what we learned the hard way.” \n### **Speakers and community contributions** \nWe often invite a guest speaker to share practical experience (implementation lessons\, program strategy\, technical deep dives). Sometimes we’ll host short product introductions – but the default posture is educational and experience-driven\, not salesy. When there’s no guest\, we go deeper on the week’s most important developments and prioritize Q&A. \n### **Typical Agenda** \n**0:00 – 0:05 | Welcome + how to engage (fast)** \n* What this meetup is: **signal > hype**\, practical implications\, community-first\n* How to participate today: chat\, Q&A flow\, how to drop links/resources\n* Quick reminder of community channels (Forum / Slack / LinkedIn group) and how to continue the conversation after the call \n**0:05 – 0:25 | The Weekly Signal Brief (what actually changed)**\nA structured scan in four buckets\, with a “so what?” for each: \n* **Policy & regulation:** new drafts\, mandates\, enforcement signals\, procurement rules\n* **Standards & frameworks:** PQC standards movement\, protocol ecosystem changes\, guidance updates\n* **Quantum capability signals:** credible progress indicators (hardware\, error correction\, scaling)\, what to ignore\n* **Cryptography/cryptanalysis:** meaningful research developments\, “RSA/ECC breaking” signals\, security relevance \n**0:25 – 0:35 | Myth‑Busting / Reality Check (the hype audit)**\nIf something got hyped this week\, we’ll do a quick\, repeatable teardown: \n* **What happened** (one sentence)\n* **What didn’t happen** (the misconception)\n* **What it means for defenders** (real impact)\n* **What changes / what doesn’t** in PQC planning this year \n*Goal:* keep the community calibrated\, reduce panic\, and prevent misallocation of effort. \n**0:35 – 0:50 | One Topic\, Deeper (the week’s main story)**\nA focused deep dive on one theme that affects real programs\, such as: \n* crypto-agility patterns and failure modes\n* hybrid deployment realities (where it works / where it’s a trap)\n* migration sequencing and vendor dependency bottlenecks\n* what a standards change means for architects and CISOs\n* integrity-first thinking (e.g.\, signatures\, trust anchors\, long-lived evidence) \n**0:50 – 1:05 | Guest Spotlight (most weeks) OR Community Lightning Round** \n* **Guest Spotlight (preferred when available):**\n* 10–12 min: experience share / lessons learned / case study / product walkthrough (kept educational)\n* 3–5 min: moderated Q&A (“what surprised you / what broke / what you’d do differently”)\n* **If no guest:**\n* 3 lightning shares (3–4 min each): “one paper / one tool / one lesson / one vendor signal” \n**1:05 – 1:10 | Community Pulse (cross‑channel highlights)** \n* “Top 3 threads” from various community channels this week\n* Quick call-outs: members looking for feedback\, volunteer opportunities\, upcoming topics\n* How to propose a guest / suggest topics / share resources for next week \n**1:10 – 1:28 | Open Q&A / Office Hours** \n* Live questions (chat + audio)\n* “Bring your messy problem” time: inventory\, vendor claims\, timeline pressure\, governance\, metrics\n* Optional: rapid-fire “yes/no + why” on 5–8 quick questions if the room is lively \n**1:28 – 1:30 | Wrap + next week preview** \n* 3 takeaways in 30 seconds\n* What we’re tracking next week\n* Speaker/volunteer reminder (“If you’ve shipped something\, we want the story.”) \n### **Who should join** \nIf you’re responsible for security strategy\, cryptography\, identity\, platform security\, resilience\, compliance\, or product security – and quantum is on your roadmap – this is for you. \n### **What you’ll leave with** \n* Clear visibility into what changed this week\n* Better judgment on what’s noise vs. actionable signal\n* Practical framing for decisions you may need to revisit (inventory\, standards alignment\, vendor dependencies\, rollout sequencing)\n* A community you can learn from (and contribute to)
URL:https://appliedquantum.com/event/quantum-security-community-online-fortnightly-update-america-emea-14
LOCATION:Online event
CATEGORIES:Community
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/03/1024x576-bya3VY.jpg
GEO:-8.521147;179.1962
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=+02:00:20261008T090000
DTEND;TZID=+02:00:20261008T103000
DTSTAMP:20260406T115905
CREATED:20260316T100019Z
LAST-MODIFIED:20260405T102916Z
UID:10000053-1791450000-1791455400@appliedquantum.com
SUMMARY:Quantum Security Community - Online Fortnightly Update (EMEA\, APAC)
DESCRIPTION:***Quantum Security Community*** *is a free\, global\, practitioner-led network sharing real-world PQC insights and supporting one another through the most complex IT/OT security transformation of our time. Explore the channels at* ***[Quantum.Security](https://quantum.security)*** \n—————— \n**A weekly\, online community meetup for quantum security practitioners — focused on signal\, not hype.** \nPost-quantum cryptography (PQC)\, crypto agility\, quantum threat models\, and standards timelines are all evolving quickly. For security teams\, the challenge isn’t “finding information” — it’s deciding **what matters**\, **what changed**\, and **what to do next**. Quantum Security Weekly exists to make that easier. \nWe run the **same meetup twice each week** to cover global time zones: \n* **Session 1:** Europe / Middle East / APAC-friendly\n* **Session 2:** Europe / Americas-friendly\n(Choose the one that fits your schedule – content is aligned across both.) \n### **What happens each week** \nYou’ll get a curated update across the four categories that consistently drive real-world decisions: \n**1) Regulation & policy signals**\nNew requirements\, supervisory guidance\, national strategies\, procurement rules\, sector-specific expectations – and what they imply for timelines and planning. \n**2) Standards and “rules of the road”**\nUpdates to cryptographic standards and related ecosystems (protocols\, identity\, secure elements\, industry frameworks). We focus on what changes adoption feasibility\, interoperability\, or audit/compliance expectations. \n**3) Technical developments**\nCredible signals about quantum computing capability\, relevant cryptanalysis\, and meaningful algorithmic/security research (including “RSA-breaking” or signature-related developments) – explained in terms of security impact\, not headlines. \n**4) Practical implementation reality**\nThe stuff that makes or breaks programs: where crypto actually lives\, dependency chains\, vendor readiness\, device constraints\, performance tradeoffs\, rollout sequencing\, and “what we learned the hard way.” \n### **Speakers and community contributions** \nWe often invite a guest speaker to share practical experience (implementation lessons\, program strategy\, technical deep dives). Sometimes we’ll host short product introductions – but the default posture is educational and experience-driven\, not salesy. When there’s no guest\, we go deeper on the week’s most important developments and prioritize Q&A. \n### **Typical Agenda** \n**0:00 – 0:05 | Welcome + how to engage (fast)** \n* What this meetup is: **signal > hype**\, practical implications\, community-first\n* How to participate today: chat\, Q&A flow\, how to drop links/resources\n* Quick reminder of community channels (Forum / Slack / LinkedIn group) and how to continue the conversation after the call \n**0:05 – 0:25 | The Weekly Signal Brief (what actually changed)**\nA structured scan in four buckets\, with a “so what?” for each: \n* **Policy & regulation:** new drafts\, mandates\, enforcement signals\, procurement rules\n* **Standards & frameworks:** PQC standards movement\, protocol ecosystem changes\, guidance updates\n* **Quantum capability signals:** credible progress indicators (hardware\, error correction\, scaling)\, what to ignore\n* **Cryptography/cryptanalysis:** meaningful research developments\, “RSA/ECC breaking” signals\, security relevance \n**0:25 – 0:35 | Myth‑Busting / Reality Check (the hype audit)**\nIf something got hyped this week\, we’ll do a quick\, repeatable teardown: \n* **What happened** (one sentence)\n* **What didn’t happen** (the misconception)\n* **What it means for defenders** (real impact)\n* **What changes / what doesn’t** in PQC planning this year \n*Goal:* keep the community calibrated\, reduce panic\, and prevent misallocation of effort. \n**0:35 – 0:50 | One Topic\, Deeper (the week’s main story)**\nA focused deep dive on one theme that affects real programs\, such as: \n* crypto-agility patterns and failure modes\n* hybrid deployment realities (where it works / where it’s a trap)\n* migration sequencing and vendor dependency bottlenecks\n* what a standards change means for architects and CISOs\n* integrity-first thinking (e.g.\, signatures\, trust anchors\, long-lived evidence) \n**0:50 – 1:05 | Guest Spotlight (most weeks) OR Community Lightning Round** \n* **Guest Spotlight (preferred when available):**\n* 10–12 min: experience share / lessons learned / case study / product walkthrough (kept educational)\n* 3–5 min: moderated Q&A (“what surprised you / what broke / what you’d do differently”)\n* **If no guest:**\n* 3 lightning shares (3–4 min each): “one paper / one tool / one lesson / one vendor signal” \n**1:05 – 1:10 | Community Pulse (cross‑channel highlights)** \n* “Top 3 threads” from various community channels this week\n* Quick call-outs: members looking for feedback\, volunteer opportunities\, upcoming topics\n* How to propose a guest / suggest topics / share resources for next week \n**1:10 – 1:28 | Open Q&A / Office Hours** \n* Live questions (chat + audio)\n* “Bring your messy problem” time: inventory\, vendor claims\, timeline pressure\, governance\, metrics\n* Optional: rapid-fire “yes/no + why” on 5–8 quick questions if the room is lively \n**1:28 – 1:30 | Wrap + next week preview** \n* 3 takeaways in 30 seconds\n* What we’re tracking next week\n* Speaker/volunteer reminder (“If you’ve shipped something\, we want the story.”) \n### **Who should join** \nIf you’re responsible for security strategy\, cryptography\, identity\, platform security\, resilience\, compliance\, or product security – and quantum is on your roadmap – this is for you. \n### **What you’ll leave with** \n* Clear visibility into what changed this week\n* Better judgment on what’s noise vs. actionable signal\n* Practical framing for decisions you may need to revisit (inventory\, standards alignment\, vendor dependencies\, rollout sequencing)\n* A community you can learn from (and contribute to)
URL:https://appliedquantum.com/event/quantum-security-community-online-fortnightly-update-emea-apac-15
LOCATION:Online event
CATEGORIES:Community
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/03/1024x576-anROVz.jpg
GEO:-8.521147;179.1962
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=+02:00:20261008T170000
DTEND;TZID=+02:00:20261008T183000
DTSTAMP:20260406T115905
CREATED:20260316T100019Z
LAST-MODIFIED:20260405T102916Z
UID:10000054-1791478800-1791484200@appliedquantum.com
SUMMARY:Quantum Security Community - Online Fortnightly Update (America\, EMEA)
DESCRIPTION:***Quantum Security Community*** *is a free\, global\, practitioner-led network sharing real-world PQC insights and supporting one another through the most complex IT/OT security transformation of our time. Explore the channels at* ***[Quantum.Security](https://quantum.security)*** \n—————— \n**A weekly\, online community meetup for quantum security practitioners — focused on signal\, not hype.** \nPost-quantum cryptography (PQC)\, crypto agility\, quantum threat models\, and standards timelines are all evolving quickly. For security teams\, the challenge isn’t “finding information” — it’s deciding **what matters**\, **what changed**\, and **what to do next**. Quantum Security Weekly exists to make that easier. \nWe run the **same meetup twice each week** to cover global time zones: \n* **Session 1:** Europe / Middle East / APAC-friendly\n* **Session 2:** Europe / Americas-friendly\n(Choose the one that fits your schedule – content is aligned across both.) \n### **What happens each week** \nYou’ll get a curated update across the four categories that consistently drive real-world decisions: \n**1) Regulation & policy signals**\nNew requirements\, supervisory guidance\, national strategies\, procurement rules\, sector-specific expectations – and what they imply for timelines and planning. \n**2) Standards and “rules of the road”**\nUpdates to cryptographic standards and related ecosystems (protocols\, identity\, secure elements\, industry frameworks). We focus on what changes adoption feasibility\, interoperability\, or audit/compliance expectations. \n**3) Technical developments**\nCredible signals about quantum computing capability\, relevant cryptanalysis\, and meaningful algorithmic/security research (including “RSA-breaking” or signature-related developments) – explained in terms of security impact\, not headlines. \n**4) Practical implementation reality**\nThe stuff that makes or breaks programs: where crypto actually lives\, dependency chains\, vendor readiness\, device constraints\, performance tradeoffs\, rollout sequencing\, and “what we learned the hard way.” \n### **Speakers and community contributions** \nWe often invite a guest speaker to share practical experience (implementation lessons\, program strategy\, technical deep dives). Sometimes we’ll host short product introductions – but the default posture is educational and experience-driven\, not salesy. When there’s no guest\, we go deeper on the week’s most important developments and prioritize Q&A. \n### **Typical Agenda** \n**0:00 – 0:05 | Welcome + how to engage (fast)** \n* What this meetup is: **signal > hype**\, practical implications\, community-first\n* How to participate today: chat\, Q&A flow\, how to drop links/resources\n* Quick reminder of community channels (Forum / Slack / LinkedIn group) and how to continue the conversation after the call \n**0:05 – 0:25 | The Weekly Signal Brief (what actually changed)**\nA structured scan in four buckets\, with a “so what?” for each: \n* **Policy & regulation:** new drafts\, mandates\, enforcement signals\, procurement rules\n* **Standards & frameworks:** PQC standards movement\, protocol ecosystem changes\, guidance updates\n* **Quantum capability signals:** credible progress indicators (hardware\, error correction\, scaling)\, what to ignore\n* **Cryptography/cryptanalysis:** meaningful research developments\, “RSA/ECC breaking” signals\, security relevance \n**0:25 – 0:35 | Myth‑Busting / Reality Check (the hype audit)**\nIf something got hyped this week\, we’ll do a quick\, repeatable teardown: \n* **What happened** (one sentence)\n* **What didn’t happen** (the misconception)\n* **What it means for defenders** (real impact)\n* **What changes / what doesn’t** in PQC planning this year \n*Goal:* keep the community calibrated\, reduce panic\, and prevent misallocation of effort. \n**0:35 – 0:50 | One Topic\, Deeper (the week’s main story)**\nA focused deep dive on one theme that affects real programs\, such as: \n* crypto-agility patterns and failure modes\n* hybrid deployment realities (where it works / where it’s a trap)\n* migration sequencing and vendor dependency bottlenecks\n* what a standards change means for architects and CISOs\n* integrity-first thinking (e.g.\, signatures\, trust anchors\, long-lived evidence) \n**0:50 – 1:05 | Guest Spotlight (most weeks) OR Community Lightning Round** \n* **Guest Spotlight (preferred when available):**\n* 10–12 min: experience share / lessons learned / case study / product walkthrough (kept educational)\n* 3–5 min: moderated Q&A (“what surprised you / what broke / what you’d do differently”)\n* **If no guest:**\n* 3 lightning shares (3–4 min each): “one paper / one tool / one lesson / one vendor signal” \n**1:05 – 1:10 | Community Pulse (cross‑channel highlights)** \n* “Top 3 threads” from various community channels this week\n* Quick call-outs: members looking for feedback\, volunteer opportunities\, upcoming topics\n* How to propose a guest / suggest topics / share resources for next week \n**1:10 – 1:28 | Open Q&A / Office Hours** \n* Live questions (chat + audio)\n* “Bring your messy problem” time: inventory\, vendor claims\, timeline pressure\, governance\, metrics\n* Optional: rapid-fire “yes/no + why” on 5–8 quick questions if the room is lively \n**1:28 – 1:30 | Wrap + next week preview** \n* 3 takeaways in 30 seconds\n* What we’re tracking next week\n* Speaker/volunteer reminder (“If you’ve shipped something\, we want the story.”) \n### **Who should join** \nIf you’re responsible for security strategy\, cryptography\, identity\, platform security\, resilience\, compliance\, or product security – and quantum is on your roadmap – this is for you. \n### **What you’ll leave with** \n* Clear visibility into what changed this week\n* Better judgment on what’s noise vs. actionable signal\n* Practical framing for decisions you may need to revisit (inventory\, standards alignment\, vendor dependencies\, rollout sequencing)\n* A community you can learn from (and contribute to)
URL:https://appliedquantum.com/event/quantum-security-community-online-fortnightly-update-america-emea-15
LOCATION:Online event
CATEGORIES:Community
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/03/1024x576-bya3VY.jpg
GEO:-8.521147;179.1962
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=+02:00:20261022T090000
DTEND;TZID=+02:00:20261022T103000
DTSTAMP:20260406T115905
CREATED:20260316T100019Z
LAST-MODIFIED:20260405T102916Z
UID:10000055-1792659600-1792665000@appliedquantum.com
SUMMARY:Quantum Security Community - Online Fortnightly Update (EMEA\, APAC)
DESCRIPTION:***Quantum Security Community*** *is a free\, global\, practitioner-led network sharing real-world PQC insights and supporting one another through the most complex IT/OT security transformation of our time. Explore the channels at* ***[Quantum.Security](https://quantum.security)*** \n—————— \n**A weekly\, online community meetup for quantum security practitioners — focused on signal\, not hype.** \nPost-quantum cryptography (PQC)\, crypto agility\, quantum threat models\, and standards timelines are all evolving quickly. For security teams\, the challenge isn’t “finding information” — it’s deciding **what matters**\, **what changed**\, and **what to do next**. Quantum Security Weekly exists to make that easier. \nWe run the **same meetup twice each week** to cover global time zones: \n* **Session 1:** Europe / Middle East / APAC-friendly\n* **Session 2:** Europe / Americas-friendly\n(Choose the one that fits your schedule – content is aligned across both.) \n### **What happens each week** \nYou’ll get a curated update across the four categories that consistently drive real-world decisions: \n**1) Regulation & policy signals**\nNew requirements\, supervisory guidance\, national strategies\, procurement rules\, sector-specific expectations – and what they imply for timelines and planning. \n**2) Standards and “rules of the road”**\nUpdates to cryptographic standards and related ecosystems (protocols\, identity\, secure elements\, industry frameworks). We focus on what changes adoption feasibility\, interoperability\, or audit/compliance expectations. \n**3) Technical developments**\nCredible signals about quantum computing capability\, relevant cryptanalysis\, and meaningful algorithmic/security research (including “RSA-breaking” or signature-related developments) – explained in terms of security impact\, not headlines. \n**4) Practical implementation reality**\nThe stuff that makes or breaks programs: where crypto actually lives\, dependency chains\, vendor readiness\, device constraints\, performance tradeoffs\, rollout sequencing\, and “what we learned the hard way.” \n### **Speakers and community contributions** \nWe often invite a guest speaker to share practical experience (implementation lessons\, program strategy\, technical deep dives). Sometimes we’ll host short product introductions – but the default posture is educational and experience-driven\, not salesy. When there’s no guest\, we go deeper on the week’s most important developments and prioritize Q&A. \n### **Typical Agenda** \n**0:00 – 0:05 | Welcome + how to engage (fast)** \n* What this meetup is: **signal > hype**\, practical implications\, community-first\n* How to participate today: chat\, Q&A flow\, how to drop links/resources\n* Quick reminder of community channels (Forum / Slack / LinkedIn group) and how to continue the conversation after the call \n**0:05 – 0:25 | The Weekly Signal Brief (what actually changed)**\nA structured scan in four buckets\, with a “so what?” for each: \n* **Policy & regulation:** new drafts\, mandates\, enforcement signals\, procurement rules\n* **Standards & frameworks:** PQC standards movement\, protocol ecosystem changes\, guidance updates\n* **Quantum capability signals:** credible progress indicators (hardware\, error correction\, scaling)\, what to ignore\n* **Cryptography/cryptanalysis:** meaningful research developments\, “RSA/ECC breaking” signals\, security relevance \n**0:25 – 0:35 | Myth‑Busting / Reality Check (the hype audit)**\nIf something got hyped this week\, we’ll do a quick\, repeatable teardown: \n* **What happened** (one sentence)\n* **What didn’t happen** (the misconception)\n* **What it means for defenders** (real impact)\n* **What changes / what doesn’t** in PQC planning this year \n*Goal:* keep the community calibrated\, reduce panic\, and prevent misallocation of effort. \n**0:35 – 0:50 | One Topic\, Deeper (the week’s main story)**\nA focused deep dive on one theme that affects real programs\, such as: \n* crypto-agility patterns and failure modes\n* hybrid deployment realities (where it works / where it’s a trap)\n* migration sequencing and vendor dependency bottlenecks\n* what a standards change means for architects and CISOs\n* integrity-first thinking (e.g.\, signatures\, trust anchors\, long-lived evidence) \n**0:50 – 1:05 | Guest Spotlight (most weeks) OR Community Lightning Round** \n* **Guest Spotlight (preferred when available):**\n* 10–12 min: experience share / lessons learned / case study / product walkthrough (kept educational)\n* 3–5 min: moderated Q&A (“what surprised you / what broke / what you’d do differently”)\n* **If no guest:**\n* 3 lightning shares (3–4 min each): “one paper / one tool / one lesson / one vendor signal” \n**1:05 – 1:10 | Community Pulse (cross‑channel highlights)** \n* “Top 3 threads” from various community channels this week\n* Quick call-outs: members looking for feedback\, volunteer opportunities\, upcoming topics\n* How to propose a guest / suggest topics / share resources for next week \n**1:10 – 1:28 | Open Q&A / Office Hours** \n* Live questions (chat + audio)\n* “Bring your messy problem” time: inventory\, vendor claims\, timeline pressure\, governance\, metrics\n* Optional: rapid-fire “yes/no + why” on 5–8 quick questions if the room is lively \n**1:28 – 1:30 | Wrap + next week preview** \n* 3 takeaways in 30 seconds\n* What we’re tracking next week\n* Speaker/volunteer reminder (“If you’ve shipped something\, we want the story.”) \n### **Who should join** \nIf you’re responsible for security strategy\, cryptography\, identity\, platform security\, resilience\, compliance\, or product security – and quantum is on your roadmap – this is for you. \n### **What you’ll leave with** \n* Clear visibility into what changed this week\n* Better judgment on what’s noise vs. actionable signal\n* Practical framing for decisions you may need to revisit (inventory\, standards alignment\, vendor dependencies\, rollout sequencing)\n* A community you can learn from (and contribute to)
URL:https://appliedquantum.com/event/quantum-security-community-online-fortnightly-update-emea-apac-16
LOCATION:Online event
CATEGORIES:Community
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/03/1024x576-anROVz.jpg
GEO:-8.521147;179.1962
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=+02:00:20261022T170000
DTEND;TZID=+02:00:20261022T183000
DTSTAMP:20260406T115905
CREATED:20260316T100019Z
LAST-MODIFIED:20260405T102916Z
UID:10000056-1792688400-1792693800@appliedquantum.com
SUMMARY:Quantum Security Community - Online Fortnightly Update (America\, EMEA)
DESCRIPTION:***Quantum Security Community*** *is a free\, global\, practitioner-led network sharing real-world PQC insights and supporting one another through the most complex IT/OT security transformation of our time. Explore the channels at* ***[Quantum.Security](https://quantum.security)*** \n—————— \n**A weekly\, online community meetup for quantum security practitioners — focused on signal\, not hype.** \nPost-quantum cryptography (PQC)\, crypto agility\, quantum threat models\, and standards timelines are all evolving quickly. For security teams\, the challenge isn’t “finding information” — it’s deciding **what matters**\, **what changed**\, and **what to do next**. Quantum Security Weekly exists to make that easier. \nWe run the **same meetup twice each week** to cover global time zones: \n* **Session 1:** Europe / Middle East / APAC-friendly\n* **Session 2:** Europe / Americas-friendly\n(Choose the one that fits your schedule – content is aligned across both.) \n### **What happens each week** \nYou’ll get a curated update across the four categories that consistently drive real-world decisions: \n**1) Regulation & policy signals**\nNew requirements\, supervisory guidance\, national strategies\, procurement rules\, sector-specific expectations – and what they imply for timelines and planning. \n**2) Standards and “rules of the road”**\nUpdates to cryptographic standards and related ecosystems (protocols\, identity\, secure elements\, industry frameworks). We focus on what changes adoption feasibility\, interoperability\, or audit/compliance expectations. \n**3) Technical developments**\nCredible signals about quantum computing capability\, relevant cryptanalysis\, and meaningful algorithmic/security research (including “RSA-breaking” or signature-related developments) – explained in terms of security impact\, not headlines. \n**4) Practical implementation reality**\nThe stuff that makes or breaks programs: where crypto actually lives\, dependency chains\, vendor readiness\, device constraints\, performance tradeoffs\, rollout sequencing\, and “what we learned the hard way.” \n### **Speakers and community contributions** \nWe often invite a guest speaker to share practical experience (implementation lessons\, program strategy\, technical deep dives). Sometimes we’ll host short product introductions – but the default posture is educational and experience-driven\, not salesy. When there’s no guest\, we go deeper on the week’s most important developments and prioritize Q&A. \n### **Typical Agenda** \n**0:00 – 0:05 | Welcome + how to engage (fast)** \n* What this meetup is: **signal > hype**\, practical implications\, community-first\n* How to participate today: chat\, Q&A flow\, how to drop links/resources\n* Quick reminder of community channels (Forum / Slack / LinkedIn group) and how to continue the conversation after the call \n**0:05 – 0:25 | The Weekly Signal Brief (what actually changed)**\nA structured scan in four buckets\, with a “so what?” for each: \n* **Policy & regulation:** new drafts\, mandates\, enforcement signals\, procurement rules\n* **Standards & frameworks:** PQC standards movement\, protocol ecosystem changes\, guidance updates\n* **Quantum capability signals:** credible progress indicators (hardware\, error correction\, scaling)\, what to ignore\n* **Cryptography/cryptanalysis:** meaningful research developments\, “RSA/ECC breaking” signals\, security relevance \n**0:25 – 0:35 | Myth‑Busting / Reality Check (the hype audit)**\nIf something got hyped this week\, we’ll do a quick\, repeatable teardown: \n* **What happened** (one sentence)\n* **What didn’t happen** (the misconception)\n* **What it means for defenders** (real impact)\n* **What changes / what doesn’t** in PQC planning this year \n*Goal:* keep the community calibrated\, reduce panic\, and prevent misallocation of effort. \n**0:35 – 0:50 | One Topic\, Deeper (the week’s main story)**\nA focused deep dive on one theme that affects real programs\, such as: \n* crypto-agility patterns and failure modes\n* hybrid deployment realities (where it works / where it’s a trap)\n* migration sequencing and vendor dependency bottlenecks\n* what a standards change means for architects and CISOs\n* integrity-first thinking (e.g.\, signatures\, trust anchors\, long-lived evidence) \n**0:50 – 1:05 | Guest Spotlight (most weeks) OR Community Lightning Round** \n* **Guest Spotlight (preferred when available):**\n* 10–12 min: experience share / lessons learned / case study / product walkthrough (kept educational)\n* 3–5 min: moderated Q&A (“what surprised you / what broke / what you’d do differently”)\n* **If no guest:**\n* 3 lightning shares (3–4 min each): “one paper / one tool / one lesson / one vendor signal” \n**1:05 – 1:10 | Community Pulse (cross‑channel highlights)** \n* “Top 3 threads” from various community channels this week\n* Quick call-outs: members looking for feedback\, volunteer opportunities\, upcoming topics\n* How to propose a guest / suggest topics / share resources for next week \n**1:10 – 1:28 | Open Q&A / Office Hours** \n* Live questions (chat + audio)\n* “Bring your messy problem” time: inventory\, vendor claims\, timeline pressure\, governance\, metrics\n* Optional: rapid-fire “yes/no + why” on 5–8 quick questions if the room is lively \n**1:28 – 1:30 | Wrap + next week preview** \n* 3 takeaways in 30 seconds\n* What we’re tracking next week\n* Speaker/volunteer reminder (“If you’ve shipped something\, we want the story.”) \n### **Who should join** \nIf you’re responsible for security strategy\, cryptography\, identity\, platform security\, resilience\, compliance\, or product security – and quantum is on your roadmap – this is for you. \n### **What you’ll leave with** \n* Clear visibility into what changed this week\n* Better judgment on what’s noise vs. actionable signal\n* Practical framing for decisions you may need to revisit (inventory\, standards alignment\, vendor dependencies\, rollout sequencing)\n* A community you can learn from (and contribute to)
URL:https://appliedquantum.com/event/quantum-security-community-online-fortnightly-update-america-emea-16
LOCATION:Online event
CATEGORIES:Community
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/03/1024x576-bya3VY.jpg
GEO:-8.521147;179.1962
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=+01:00:20261105T090000
DTEND;TZID=+01:00:20261105T103000
DTSTAMP:20260406T115905
CREATED:20260316T100019Z
LAST-MODIFIED:20260405T102916Z
UID:10000057-1793869200-1793874600@appliedquantum.com
SUMMARY:Quantum Security Community - Online Fortnightly Update (EMEA\, APAC)
DESCRIPTION:***Quantum Security Community*** *is a free\, global\, practitioner-led network sharing real-world PQC insights and supporting one another through the most complex IT/OT security transformation of our time. Explore the channels at* ***[Quantum.Security](https://quantum.security)*** \n—————— \n**A weekly\, online community meetup for quantum security practitioners — focused on signal\, not hype.** \nPost-quantum cryptography (PQC)\, crypto agility\, quantum threat models\, and standards timelines are all evolving quickly. For security teams\, the challenge isn’t “finding information” — it’s deciding **what matters**\, **what changed**\, and **what to do next**. Quantum Security Weekly exists to make that easier. \nWe run the **same meetup twice each week** to cover global time zones: \n* **Session 1:** Europe / Middle East / APAC-friendly\n* **Session 2:** Europe / Americas-friendly\n(Choose the one that fits your schedule – content is aligned across both.) \n### **What happens each week** \nYou’ll get a curated update across the four categories that consistently drive real-world decisions: \n**1) Regulation & policy signals**\nNew requirements\, supervisory guidance\, national strategies\, procurement rules\, sector-specific expectations – and what they imply for timelines and planning. \n**2) Standards and “rules of the road”**\nUpdates to cryptographic standards and related ecosystems (protocols\, identity\, secure elements\, industry frameworks). We focus on what changes adoption feasibility\, interoperability\, or audit/compliance expectations. \n**3) Technical developments**\nCredible signals about quantum computing capability\, relevant cryptanalysis\, and meaningful algorithmic/security research (including “RSA-breaking” or signature-related developments) – explained in terms of security impact\, not headlines. \n**4) Practical implementation reality**\nThe stuff that makes or breaks programs: where crypto actually lives\, dependency chains\, vendor readiness\, device constraints\, performance tradeoffs\, rollout sequencing\, and “what we learned the hard way.” \n### **Speakers and community contributions** \nWe often invite a guest speaker to share practical experience (implementation lessons\, program strategy\, technical deep dives). Sometimes we’ll host short product introductions – but the default posture is educational and experience-driven\, not salesy. When there’s no guest\, we go deeper on the week’s most important developments and prioritize Q&A. \n### **Typical Agenda** \n**0:00 – 0:05 | Welcome + how to engage (fast)** \n* What this meetup is: **signal > hype**\, practical implications\, community-first\n* How to participate today: chat\, Q&A flow\, how to drop links/resources\n* Quick reminder of community channels (Forum / Slack / LinkedIn group) and how to continue the conversation after the call \n**0:05 – 0:25 | The Weekly Signal Brief (what actually changed)**\nA structured scan in four buckets\, with a “so what?” for each: \n* **Policy & regulation:** new drafts\, mandates\, enforcement signals\, procurement rules\n* **Standards & frameworks:** PQC standards movement\, protocol ecosystem changes\, guidance updates\n* **Quantum capability signals:** credible progress indicators (hardware\, error correction\, scaling)\, what to ignore\n* **Cryptography/cryptanalysis:** meaningful research developments\, “RSA/ECC breaking” signals\, security relevance \n**0:25 – 0:35 | Myth‑Busting / Reality Check (the hype audit)**\nIf something got hyped this week\, we’ll do a quick\, repeatable teardown: \n* **What happened** (one sentence)\n* **What didn’t happen** (the misconception)\n* **What it means for defenders** (real impact)\n* **What changes / what doesn’t** in PQC planning this year \n*Goal:* keep the community calibrated\, reduce panic\, and prevent misallocation of effort. \n**0:35 – 0:50 | One Topic\, Deeper (the week’s main story)**\nA focused deep dive on one theme that affects real programs\, such as: \n* crypto-agility patterns and failure modes\n* hybrid deployment realities (where it works / where it’s a trap)\n* migration sequencing and vendor dependency bottlenecks\n* what a standards change means for architects and CISOs\n* integrity-first thinking (e.g.\, signatures\, trust anchors\, long-lived evidence) \n**0:50 – 1:05 | Guest Spotlight (most weeks) OR Community Lightning Round** \n* **Guest Spotlight (preferred when available):**\n* 10–12 min: experience share / lessons learned / case study / product walkthrough (kept educational)\n* 3–5 min: moderated Q&A (“what surprised you / what broke / what you’d do differently”)\n* **If no guest:**\n* 3 lightning shares (3–4 min each): “one paper / one tool / one lesson / one vendor signal” \n**1:05 – 1:10 | Community Pulse (cross‑channel highlights)** \n* “Top 3 threads” from various community channels this week\n* Quick call-outs: members looking for feedback\, volunteer opportunities\, upcoming topics\n* How to propose a guest / suggest topics / share resources for next week \n**1:10 – 1:28 | Open Q&A / Office Hours** \n* Live questions (chat + audio)\n* “Bring your messy problem” time: inventory\, vendor claims\, timeline pressure\, governance\, metrics\n* Optional: rapid-fire “yes/no + why” on 5–8 quick questions if the room is lively \n**1:28 – 1:30 | Wrap + next week preview** \n* 3 takeaways in 30 seconds\n* What we’re tracking next week\n* Speaker/volunteer reminder (“If you’ve shipped something\, we want the story.”) \n### **Who should join** \nIf you’re responsible for security strategy\, cryptography\, identity\, platform security\, resilience\, compliance\, or product security – and quantum is on your roadmap – this is for you. \n### **What you’ll leave with** \n* Clear visibility into what changed this week\n* Better judgment on what’s noise vs. actionable signal\n* Practical framing for decisions you may need to revisit (inventory\, standards alignment\, vendor dependencies\, rollout sequencing)\n* A community you can learn from (and contribute to)
URL:https://appliedquantum.com/event/quantum-security-community-online-fortnightly-update-emea-apac-17
LOCATION:Online event
CATEGORIES:Community
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/03/1024x576-anROVz.jpg
GEO:-8.521147;179.1962
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=+01:00:20261105T170000
DTEND;TZID=+01:00:20261105T183000
DTSTAMP:20260406T115905
CREATED:20260316T100019Z
LAST-MODIFIED:20260405T102916Z
UID:10000058-1793898000-1793903400@appliedquantum.com
SUMMARY:Quantum Security Community - Online Fortnightly Update (America\, EMEA)
DESCRIPTION:***Quantum Security Community*** *is a free\, global\, practitioner-led network sharing real-world PQC insights and supporting one another through the most complex IT/OT security transformation of our time. Explore the channels at* ***[Quantum.Security](https://quantum.security)*** \n—————— \n**A weekly\, online community meetup for quantum security practitioners — focused on signal\, not hype.** \nPost-quantum cryptography (PQC)\, crypto agility\, quantum threat models\, and standards timelines are all evolving quickly. For security teams\, the challenge isn’t “finding information” — it’s deciding **what matters**\, **what changed**\, and **what to do next**. Quantum Security Weekly exists to make that easier. \nWe run the **same meetup twice each week** to cover global time zones: \n* **Session 1:** Europe / Middle East / APAC-friendly\n* **Session 2:** Europe / Americas-friendly\n(Choose the one that fits your schedule – content is aligned across both.) \n### **What happens each week** \nYou’ll get a curated update across the four categories that consistently drive real-world decisions: \n**1) Regulation & policy signals**\nNew requirements\, supervisory guidance\, national strategies\, procurement rules\, sector-specific expectations – and what they imply for timelines and planning. \n**2) Standards and “rules of the road”**\nUpdates to cryptographic standards and related ecosystems (protocols\, identity\, secure elements\, industry frameworks). We focus on what changes adoption feasibility\, interoperability\, or audit/compliance expectations. \n**3) Technical developments**\nCredible signals about quantum computing capability\, relevant cryptanalysis\, and meaningful algorithmic/security research (including “RSA-breaking” or signature-related developments) – explained in terms of security impact\, not headlines. \n**4) Practical implementation reality**\nThe stuff that makes or breaks programs: where crypto actually lives\, dependency chains\, vendor readiness\, device constraints\, performance tradeoffs\, rollout sequencing\, and “what we learned the hard way.” \n### **Speakers and community contributions** \nWe often invite a guest speaker to share practical experience (implementation lessons\, program strategy\, technical deep dives). Sometimes we’ll host short product introductions – but the default posture is educational and experience-driven\, not salesy. When there’s no guest\, we go deeper on the week’s most important developments and prioritize Q&A. \n### **Typical Agenda** \n**0:00 – 0:05 | Welcome + how to engage (fast)** \n* What this meetup is: **signal > hype**\, practical implications\, community-first\n* How to participate today: chat\, Q&A flow\, how to drop links/resources\n* Quick reminder of community channels (Forum / Slack / LinkedIn group) and how to continue the conversation after the call \n**0:05 – 0:25 | The Weekly Signal Brief (what actually changed)**\nA structured scan in four buckets\, with a “so what?” for each: \n* **Policy & regulation:** new drafts\, mandates\, enforcement signals\, procurement rules\n* **Standards & frameworks:** PQC standards movement\, protocol ecosystem changes\, guidance updates\n* **Quantum capability signals:** credible progress indicators (hardware\, error correction\, scaling)\, what to ignore\n* **Cryptography/cryptanalysis:** meaningful research developments\, “RSA/ECC breaking” signals\, security relevance \n**0:25 – 0:35 | Myth‑Busting / Reality Check (the hype audit)**\nIf something got hyped this week\, we’ll do a quick\, repeatable teardown: \n* **What happened** (one sentence)\n* **What didn’t happen** (the misconception)\n* **What it means for defenders** (real impact)\n* **What changes / what doesn’t** in PQC planning this year \n*Goal:* keep the community calibrated\, reduce panic\, and prevent misallocation of effort. \n**0:35 – 0:50 | One Topic\, Deeper (the week’s main story)**\nA focused deep dive on one theme that affects real programs\, such as: \n* crypto-agility patterns and failure modes\n* hybrid deployment realities (where it works / where it’s a trap)\n* migration sequencing and vendor dependency bottlenecks\n* what a standards change means for architects and CISOs\n* integrity-first thinking (e.g.\, signatures\, trust anchors\, long-lived evidence) \n**0:50 – 1:05 | Guest Spotlight (most weeks) OR Community Lightning Round** \n* **Guest Spotlight (preferred when available):**\n* 10–12 min: experience share / lessons learned / case study / product walkthrough (kept educational)\n* 3–5 min: moderated Q&A (“what surprised you / what broke / what you’d do differently”)\n* **If no guest:**\n* 3 lightning shares (3–4 min each): “one paper / one tool / one lesson / one vendor signal” \n**1:05 – 1:10 | Community Pulse (cross‑channel highlights)** \n* “Top 3 threads” from various community channels this week\n* Quick call-outs: members looking for feedback\, volunteer opportunities\, upcoming topics\n* How to propose a guest / suggest topics / share resources for next week \n**1:10 – 1:28 | Open Q&A / Office Hours** \n* Live questions (chat + audio)\n* “Bring your messy problem” time: inventory\, vendor claims\, timeline pressure\, governance\, metrics\n* Optional: rapid-fire “yes/no + why” on 5–8 quick questions if the room is lively \n**1:28 – 1:30 | Wrap + next week preview** \n* 3 takeaways in 30 seconds\n* What we’re tracking next week\n* Speaker/volunteer reminder (“If you’ve shipped something\, we want the story.”) \n### **Who should join** \nIf you’re responsible for security strategy\, cryptography\, identity\, platform security\, resilience\, compliance\, or product security – and quantum is on your roadmap – this is for you. \n### **What you’ll leave with** \n* Clear visibility into what changed this week\n* Better judgment on what’s noise vs. actionable signal\n* Practical framing for decisions you may need to revisit (inventory\, standards alignment\, vendor dependencies\, rollout sequencing)\n* A community you can learn from (and contribute to)
URL:https://appliedquantum.com/event/quantum-security-community-online-fortnightly-update-america-emea-17
LOCATION:Online event
CATEGORIES:Community
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/03/1024x576-bya3VY.jpg
GEO:-8.521147;179.1962
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=+01:00:20261119T090000
DTEND;TZID=+01:00:20261119T103000
DTSTAMP:20260406T115905
CREATED:20260316T100019Z
LAST-MODIFIED:20260405T102916Z
UID:10000059-1795078800-1795084200@appliedquantum.com
SUMMARY:Quantum Security Community - Online Fortnightly Update (EMEA\, APAC)
DESCRIPTION:***Quantum Security Community*** *is a free\, global\, practitioner-led network sharing real-world PQC insights and supporting one another through the most complex IT/OT security transformation of our time. Explore the channels at* ***[Quantum.Security](https://quantum.security)*** \n—————— \n**A weekly\, online community meetup for quantum security practitioners — focused on signal\, not hype.** \nPost-quantum cryptography (PQC)\, crypto agility\, quantum threat models\, and standards timelines are all evolving quickly. For security teams\, the challenge isn’t “finding information” — it’s deciding **what matters**\, **what changed**\, and **what to do next**. Quantum Security Weekly exists to make that easier. \nWe run the **same meetup twice each week** to cover global time zones: \n* **Session 1:** Europe / Middle East / APAC-friendly\n* **Session 2:** Europe / Americas-friendly\n(Choose the one that fits your schedule – content is aligned across both.) \n### **What happens each week** \nYou’ll get a curated update across the four categories that consistently drive real-world decisions: \n**1) Regulation & policy signals**\nNew requirements\, supervisory guidance\, national strategies\, procurement rules\, sector-specific expectations – and what they imply for timelines and planning. \n**2) Standards and “rules of the road”**\nUpdates to cryptographic standards and related ecosystems (protocols\, identity\, secure elements\, industry frameworks). We focus on what changes adoption feasibility\, interoperability\, or audit/compliance expectations. \n**3) Technical developments**\nCredible signals about quantum computing capability\, relevant cryptanalysis\, and meaningful algorithmic/security research (including “RSA-breaking” or signature-related developments) – explained in terms of security impact\, not headlines. \n**4) Practical implementation reality**\nThe stuff that makes or breaks programs: where crypto actually lives\, dependency chains\, vendor readiness\, device constraints\, performance tradeoffs\, rollout sequencing\, and “what we learned the hard way.” \n### **Speakers and community contributions** \nWe often invite a guest speaker to share practical experience (implementation lessons\, program strategy\, technical deep dives). Sometimes we’ll host short product introductions – but the default posture is educational and experience-driven\, not salesy. When there’s no guest\, we go deeper on the week’s most important developments and prioritize Q&A. \n### **Typical Agenda** \n**0:00 – 0:05 | Welcome + how to engage (fast)** \n* What this meetup is: **signal > hype**\, practical implications\, community-first\n* How to participate today: chat\, Q&A flow\, how to drop links/resources\n* Quick reminder of community channels (Forum / Slack / LinkedIn group) and how to continue the conversation after the call \n**0:05 – 0:25 | The Weekly Signal Brief (what actually changed)**\nA structured scan in four buckets\, with a “so what?” for each: \n* **Policy & regulation:** new drafts\, mandates\, enforcement signals\, procurement rules\n* **Standards & frameworks:** PQC standards movement\, protocol ecosystem changes\, guidance updates\n* **Quantum capability signals:** credible progress indicators (hardware\, error correction\, scaling)\, what to ignore\n* **Cryptography/cryptanalysis:** meaningful research developments\, “RSA/ECC breaking” signals\, security relevance \n**0:25 – 0:35 | Myth‑Busting / Reality Check (the hype audit)**\nIf something got hyped this week\, we’ll do a quick\, repeatable teardown: \n* **What happened** (one sentence)\n* **What didn’t happen** (the misconception)\n* **What it means for defenders** (real impact)\n* **What changes / what doesn’t** in PQC planning this year \n*Goal:* keep the community calibrated\, reduce panic\, and prevent misallocation of effort. \n**0:35 – 0:50 | One Topic\, Deeper (the week’s main story)**\nA focused deep dive on one theme that affects real programs\, such as: \n* crypto-agility patterns and failure modes\n* hybrid deployment realities (where it works / where it’s a trap)\n* migration sequencing and vendor dependency bottlenecks\n* what a standards change means for architects and CISOs\n* integrity-first thinking (e.g.\, signatures\, trust anchors\, long-lived evidence) \n**0:50 – 1:05 | Guest Spotlight (most weeks) OR Community Lightning Round** \n* **Guest Spotlight (preferred when available):**\n* 10–12 min: experience share / lessons learned / case study / product walkthrough (kept educational)\n* 3–5 min: moderated Q&A (“what surprised you / what broke / what you’d do differently”)\n* **If no guest:**\n* 3 lightning shares (3–4 min each): “one paper / one tool / one lesson / one vendor signal” \n**1:05 – 1:10 | Community Pulse (cross‑channel highlights)** \n* “Top 3 threads” from various community channels this week\n* Quick call-outs: members looking for feedback\, volunteer opportunities\, upcoming topics\n* How to propose a guest / suggest topics / share resources for next week \n**1:10 – 1:28 | Open Q&A / Office Hours** \n* Live questions (chat + audio)\n* “Bring your messy problem” time: inventory\, vendor claims\, timeline pressure\, governance\, metrics\n* Optional: rapid-fire “yes/no + why” on 5–8 quick questions if the room is lively \n**1:28 – 1:30 | Wrap + next week preview** \n* 3 takeaways in 30 seconds\n* What we’re tracking next week\n* Speaker/volunteer reminder (“If you’ve shipped something\, we want the story.”) \n### **Who should join** \nIf you’re responsible for security strategy\, cryptography\, identity\, platform security\, resilience\, compliance\, or product security – and quantum is on your roadmap – this is for you. \n### **What you’ll leave with** \n* Clear visibility into what changed this week\n* Better judgment on what’s noise vs. actionable signal\n* Practical framing for decisions you may need to revisit (inventory\, standards alignment\, vendor dependencies\, rollout sequencing)\n* A community you can learn from (and contribute to)
URL:https://appliedquantum.com/event/quantum-security-community-online-fortnightly-update-emea-apac-18
LOCATION:Online event
CATEGORIES:Community
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/03/1024x576-anROVz.jpg
GEO:-8.521147;179.1962
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=+01:00:20261119T170000
DTEND;TZID=+01:00:20261119T183000
DTSTAMP:20260406T115905
CREATED:20260316T100019Z
LAST-MODIFIED:20260405T102916Z
UID:10000060-1795107600-1795113000@appliedquantum.com
SUMMARY:Quantum Security Community - Online Fortnightly Update (America\, EMEA)
DESCRIPTION:***Quantum Security Community*** *is a free\, global\, practitioner-led network sharing real-world PQC insights and supporting one another through the most complex IT/OT security transformation of our time. Explore the channels at* ***[Quantum.Security](https://quantum.security)*** \n—————— \n**A weekly\, online community meetup for quantum security practitioners — focused on signal\, not hype.** \nPost-quantum cryptography (PQC)\, crypto agility\, quantum threat models\, and standards timelines are all evolving quickly. For security teams\, the challenge isn’t “finding information” — it’s deciding **what matters**\, **what changed**\, and **what to do next**. Quantum Security Weekly exists to make that easier. \nWe run the **same meetup twice each week** to cover global time zones: \n* **Session 1:** Europe / Middle East / APAC-friendly\n* **Session 2:** Europe / Americas-friendly\n(Choose the one that fits your schedule – content is aligned across both.) \n### **What happens each week** \nYou’ll get a curated update across the four categories that consistently drive real-world decisions: \n**1) Regulation & policy signals**\nNew requirements\, supervisory guidance\, national strategies\, procurement rules\, sector-specific expectations – and what they imply for timelines and planning. \n**2) Standards and “rules of the road”**\nUpdates to cryptographic standards and related ecosystems (protocols\, identity\, secure elements\, industry frameworks). We focus on what changes adoption feasibility\, interoperability\, or audit/compliance expectations. \n**3) Technical developments**\nCredible signals about quantum computing capability\, relevant cryptanalysis\, and meaningful algorithmic/security research (including “RSA-breaking” or signature-related developments) – explained in terms of security impact\, not headlines. \n**4) Practical implementation reality**\nThe stuff that makes or breaks programs: where crypto actually lives\, dependency chains\, vendor readiness\, device constraints\, performance tradeoffs\, rollout sequencing\, and “what we learned the hard way.” \n### **Speakers and community contributions** \nWe often invite a guest speaker to share practical experience (implementation lessons\, program strategy\, technical deep dives). Sometimes we’ll host short product introductions – but the default posture is educational and experience-driven\, not salesy. When there’s no guest\, we go deeper on the week’s most important developments and prioritize Q&A. \n### **Typical Agenda** \n**0:00 – 0:05 | Welcome + how to engage (fast)** \n* What this meetup is: **signal > hype**\, practical implications\, community-first\n* How to participate today: chat\, Q&A flow\, how to drop links/resources\n* Quick reminder of community channels (Forum / Slack / LinkedIn group) and how to continue the conversation after the call \n**0:05 – 0:25 | The Weekly Signal Brief (what actually changed)**\nA structured scan in four buckets\, with a “so what?” for each: \n* **Policy & regulation:** new drafts\, mandates\, enforcement signals\, procurement rules\n* **Standards & frameworks:** PQC standards movement\, protocol ecosystem changes\, guidance updates\n* **Quantum capability signals:** credible progress indicators (hardware\, error correction\, scaling)\, what to ignore\n* **Cryptography/cryptanalysis:** meaningful research developments\, “RSA/ECC breaking” signals\, security relevance \n**0:25 – 0:35 | Myth‑Busting / Reality Check (the hype audit)**\nIf something got hyped this week\, we’ll do a quick\, repeatable teardown: \n* **What happened** (one sentence)\n* **What didn’t happen** (the misconception)\n* **What it means for defenders** (real impact)\n* **What changes / what doesn’t** in PQC planning this year \n*Goal:* keep the community calibrated\, reduce panic\, and prevent misallocation of effort. \n**0:35 – 0:50 | One Topic\, Deeper (the week’s main story)**\nA focused deep dive on one theme that affects real programs\, such as: \n* crypto-agility patterns and failure modes\n* hybrid deployment realities (where it works / where it’s a trap)\n* migration sequencing and vendor dependency bottlenecks\n* what a standards change means for architects and CISOs\n* integrity-first thinking (e.g.\, signatures\, trust anchors\, long-lived evidence) \n**0:50 – 1:05 | Guest Spotlight (most weeks) OR Community Lightning Round** \n* **Guest Spotlight (preferred when available):**\n* 10–12 min: experience share / lessons learned / case study / product walkthrough (kept educational)\n* 3–5 min: moderated Q&A (“what surprised you / what broke / what you’d do differently”)\n* **If no guest:**\n* 3 lightning shares (3–4 min each): “one paper / one tool / one lesson / one vendor signal” \n**1:05 – 1:10 | Community Pulse (cross‑channel highlights)** \n* “Top 3 threads” from various community channels this week\n* Quick call-outs: members looking for feedback\, volunteer opportunities\, upcoming topics\n* How to propose a guest / suggest topics / share resources for next week \n**1:10 – 1:28 | Open Q&A / Office Hours** \n* Live questions (chat + audio)\n* “Bring your messy problem” time: inventory\, vendor claims\, timeline pressure\, governance\, metrics\n* Optional: rapid-fire “yes/no + why” on 5–8 quick questions if the room is lively \n**1:28 – 1:30 | Wrap + next week preview** \n* 3 takeaways in 30 seconds\n* What we’re tracking next week\n* Speaker/volunteer reminder (“If you’ve shipped something\, we want the story.”) \n### **Who should join** \nIf you’re responsible for security strategy\, cryptography\, identity\, platform security\, resilience\, compliance\, or product security – and quantum is on your roadmap – this is for you. \n### **What you’ll leave with** \n* Clear visibility into what changed this week\n* Better judgment on what’s noise vs. actionable signal\n* Practical framing for decisions you may need to revisit (inventory\, standards alignment\, vendor dependencies\, rollout sequencing)\n* A community you can learn from (and contribute to)
URL:https://appliedquantum.com/event/quantum-security-community-online-fortnightly-update-america-emea-18
LOCATION:Online event
CATEGORIES:Community
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/03/1024x576-bya3VY.jpg
GEO:-8.521147;179.1962
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=+01:00:20261203T090000
DTEND;TZID=+01:00:20261203T103000
DTSTAMP:20260406T115905
CREATED:20260316T100020Z
LAST-MODIFIED:20260405T102916Z
UID:10000061-1796288400-1796293800@appliedquantum.com
SUMMARY:Quantum Security Community - Online Fortnightly Update (EMEA\, APAC)
DESCRIPTION:***Quantum Security Community*** *is a free\, global\, practitioner-led network sharing real-world PQC insights and supporting one another through the most complex IT/OT security transformation of our time. Explore the channels at* ***[Quantum.Security](https://quantum.security)*** \n—————— \n**A weekly\, online community meetup for quantum security practitioners — focused on signal\, not hype.** \nPost-quantum cryptography (PQC)\, crypto agility\, quantum threat models\, and standards timelines are all evolving quickly. For security teams\, the challenge isn’t “finding information” — it’s deciding **what matters**\, **what changed**\, and **what to do next**. Quantum Security Weekly exists to make that easier. \nWe run the **same meetup twice each week** to cover global time zones: \n* **Session 1:** Europe / Middle East / APAC-friendly\n* **Session 2:** Europe / Americas-friendly\n(Choose the one that fits your schedule – content is aligned across both.) \n### **What happens each week** \nYou’ll get a curated update across the four categories that consistently drive real-world decisions: \n**1) Regulation & policy signals**\nNew requirements\, supervisory guidance\, national strategies\, procurement rules\, sector-specific expectations – and what they imply for timelines and planning. \n**2) Standards and “rules of the road”**\nUpdates to cryptographic standards and related ecosystems (protocols\, identity\, secure elements\, industry frameworks). We focus on what changes adoption feasibility\, interoperability\, or audit/compliance expectations. \n**3) Technical developments**\nCredible signals about quantum computing capability\, relevant cryptanalysis\, and meaningful algorithmic/security research (including “RSA-breaking” or signature-related developments) – explained in terms of security impact\, not headlines. \n**4) Practical implementation reality**\nThe stuff that makes or breaks programs: where crypto actually lives\, dependency chains\, vendor readiness\, device constraints\, performance tradeoffs\, rollout sequencing\, and “what we learned the hard way.” \n### **Speakers and community contributions** \nWe often invite a guest speaker to share practical experience (implementation lessons\, program strategy\, technical deep dives). Sometimes we’ll host short product introductions – but the default posture is educational and experience-driven\, not salesy. When there’s no guest\, we go deeper on the week’s most important developments and prioritize Q&A. \n### **Typical Agenda** \n**0:00 – 0:05 | Welcome + how to engage (fast)** \n* What this meetup is: **signal > hype**\, practical implications\, community-first\n* How to participate today: chat\, Q&A flow\, how to drop links/resources\n* Quick reminder of community channels (Forum / Slack / LinkedIn group) and how to continue the conversation after the call \n**0:05 – 0:25 | The Weekly Signal Brief (what actually changed)**\nA structured scan in four buckets\, with a “so what?” for each: \n* **Policy & regulation:** new drafts\, mandates\, enforcement signals\, procurement rules\n* **Standards & frameworks:** PQC standards movement\, protocol ecosystem changes\, guidance updates\n* **Quantum capability signals:** credible progress indicators (hardware\, error correction\, scaling)\, what to ignore\n* **Cryptography/cryptanalysis:** meaningful research developments\, “RSA/ECC breaking” signals\, security relevance \n**0:25 – 0:35 | Myth‑Busting / Reality Check (the hype audit)**\nIf something got hyped this week\, we’ll do a quick\, repeatable teardown: \n* **What happened** (one sentence)\n* **What didn’t happen** (the misconception)\n* **What it means for defenders** (real impact)\n* **What changes / what doesn’t** in PQC planning this year \n*Goal:* keep the community calibrated\, reduce panic\, and prevent misallocation of effort. \n**0:35 – 0:50 | One Topic\, Deeper (the week’s main story)**\nA focused deep dive on one theme that affects real programs\, such as: \n* crypto-agility patterns and failure modes\n* hybrid deployment realities (where it works / where it’s a trap)\n* migration sequencing and vendor dependency bottlenecks\n* what a standards change means for architects and CISOs\n* integrity-first thinking (e.g.\, signatures\, trust anchors\, long-lived evidence) \n**0:50 – 1:05 | Guest Spotlight (most weeks) OR Community Lightning Round** \n* **Guest Spotlight (preferred when available):**\n* 10–12 min: experience share / lessons learned / case study / product walkthrough (kept educational)\n* 3–5 min: moderated Q&A (“what surprised you / what broke / what you’d do differently”)\n* **If no guest:**\n* 3 lightning shares (3–4 min each): “one paper / one tool / one lesson / one vendor signal” \n**1:05 – 1:10 | Community Pulse (cross‑channel highlights)** \n* “Top 3 threads” from various community channels this week\n* Quick call-outs: members looking for feedback\, volunteer opportunities\, upcoming topics\n* How to propose a guest / suggest topics / share resources for next week \n**1:10 – 1:28 | Open Q&A / Office Hours** \n* Live questions (chat + audio)\n* “Bring your messy problem” time: inventory\, vendor claims\, timeline pressure\, governance\, metrics\n* Optional: rapid-fire “yes/no + why” on 5–8 quick questions if the room is lively \n**1:28 – 1:30 | Wrap + next week preview** \n* 3 takeaways in 30 seconds\n* What we’re tracking next week\n* Speaker/volunteer reminder (“If you’ve shipped something\, we want the story.”) \n### **Who should join** \nIf you’re responsible for security strategy\, cryptography\, identity\, platform security\, resilience\, compliance\, or product security – and quantum is on your roadmap – this is for you. \n### **What you’ll leave with** \n* Clear visibility into what changed this week\n* Better judgment on what’s noise vs. actionable signal\n* Practical framing for decisions you may need to revisit (inventory\, standards alignment\, vendor dependencies\, rollout sequencing)\n* A community you can learn from (and contribute to)
URL:https://appliedquantum.com/event/quantum-security-community-online-fortnightly-update-emea-apac-19
LOCATION:Online event
CATEGORIES:Community
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/03/1024x576-anROVz.jpg
GEO:-8.521147;179.1962
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=+01:00:20261203T170000
DTEND;TZID=+01:00:20261203T183000
DTSTAMP:20260406T115905
CREATED:20260316T100020Z
LAST-MODIFIED:20260405T102916Z
UID:10000062-1796317200-1796322600@appliedquantum.com
SUMMARY:Quantum Security Community - Online Fortnightly Update (America\, EMEA)
DESCRIPTION:***Quantum Security Community*** *is a free\, global\, practitioner-led network sharing real-world PQC insights and supporting one another through the most complex IT/OT security transformation of our time. Explore the channels at* ***[Quantum.Security](https://quantum.security)*** \n—————— \n**A weekly\, online community meetup for quantum security practitioners — focused on signal\, not hype.** \nPost-quantum cryptography (PQC)\, crypto agility\, quantum threat models\, and standards timelines are all evolving quickly. For security teams\, the challenge isn’t “finding information” — it’s deciding **what matters**\, **what changed**\, and **what to do next**. Quantum Security Weekly exists to make that easier. \nWe run the **same meetup twice each week** to cover global time zones: \n* **Session 1:** Europe / Middle East / APAC-friendly\n* **Session 2:** Europe / Americas-friendly\n(Choose the one that fits your schedule – content is aligned across both.) \n### **What happens each week** \nYou’ll get a curated update across the four categories that consistently drive real-world decisions: \n**1) Regulation & policy signals**\nNew requirements\, supervisory guidance\, national strategies\, procurement rules\, sector-specific expectations – and what they imply for timelines and planning. \n**2) Standards and “rules of the road”**\nUpdates to cryptographic standards and related ecosystems (protocols\, identity\, secure elements\, industry frameworks). We focus on what changes adoption feasibility\, interoperability\, or audit/compliance expectations. \n**3) Technical developments**\nCredible signals about quantum computing capability\, relevant cryptanalysis\, and meaningful algorithmic/security research (including “RSA-breaking” or signature-related developments) – explained in terms of security impact\, not headlines. \n**4) Practical implementation reality**\nThe stuff that makes or breaks programs: where crypto actually lives\, dependency chains\, vendor readiness\, device constraints\, performance tradeoffs\, rollout sequencing\, and “what we learned the hard way.” \n### **Speakers and community contributions** \nWe often invite a guest speaker to share practical experience (implementation lessons\, program strategy\, technical deep dives). Sometimes we’ll host short product introductions – but the default posture is educational and experience-driven\, not salesy. When there’s no guest\, we go deeper on the week’s most important developments and prioritize Q&A. \n### **Typical Agenda** \n**0:00 – 0:05 | Welcome + how to engage (fast)** \n* What this meetup is: **signal > hype**\, practical implications\, community-first\n* How to participate today: chat\, Q&A flow\, how to drop links/resources\n* Quick reminder of community channels (Forum / Slack / LinkedIn group) and how to continue the conversation after the call \n**0:05 – 0:25 | The Weekly Signal Brief (what actually changed)**\nA structured scan in four buckets\, with a “so what?” for each: \n* **Policy & regulation:** new drafts\, mandates\, enforcement signals\, procurement rules\n* **Standards & frameworks:** PQC standards movement\, protocol ecosystem changes\, guidance updates\n* **Quantum capability signals:** credible progress indicators (hardware\, error correction\, scaling)\, what to ignore\n* **Cryptography/cryptanalysis:** meaningful research developments\, “RSA/ECC breaking” signals\, security relevance \n**0:25 – 0:35 | Myth‑Busting / Reality Check (the hype audit)**\nIf something got hyped this week\, we’ll do a quick\, repeatable teardown: \n* **What happened** (one sentence)\n* **What didn’t happen** (the misconception)\n* **What it means for defenders** (real impact)\n* **What changes / what doesn’t** in PQC planning this year \n*Goal:* keep the community calibrated\, reduce panic\, and prevent misallocation of effort. \n**0:35 – 0:50 | One Topic\, Deeper (the week’s main story)**\nA focused deep dive on one theme that affects real programs\, such as: \n* crypto-agility patterns and failure modes\n* hybrid deployment realities (where it works / where it’s a trap)\n* migration sequencing and vendor dependency bottlenecks\n* what a standards change means for architects and CISOs\n* integrity-first thinking (e.g.\, signatures\, trust anchors\, long-lived evidence) \n**0:50 – 1:05 | Guest Spotlight (most weeks) OR Community Lightning Round** \n* **Guest Spotlight (preferred when available):**\n* 10–12 min: experience share / lessons learned / case study / product walkthrough (kept educational)\n* 3–5 min: moderated Q&A (“what surprised you / what broke / what you’d do differently”)\n* **If no guest:**\n* 3 lightning shares (3–4 min each): “one paper / one tool / one lesson / one vendor signal” \n**1:05 – 1:10 | Community Pulse (cross‑channel highlights)** \n* “Top 3 threads” from various community channels this week\n* Quick call-outs: members looking for feedback\, volunteer opportunities\, upcoming topics\n* How to propose a guest / suggest topics / share resources for next week \n**1:10 – 1:28 | Open Q&A / Office Hours** \n* Live questions (chat + audio)\n* “Bring your messy problem” time: inventory\, vendor claims\, timeline pressure\, governance\, metrics\n* Optional: rapid-fire “yes/no + why” on 5–8 quick questions if the room is lively \n**1:28 – 1:30 | Wrap + next week preview** \n* 3 takeaways in 30 seconds\n* What we’re tracking next week\n* Speaker/volunteer reminder (“If you’ve shipped something\, we want the story.”) \n### **Who should join** \nIf you’re responsible for security strategy\, cryptography\, identity\, platform security\, resilience\, compliance\, or product security – and quantum is on your roadmap – this is for you. \n### **What you’ll leave with** \n* Clear visibility into what changed this week\n* Better judgment on what’s noise vs. actionable signal\n* Practical framing for decisions you may need to revisit (inventory\, standards alignment\, vendor dependencies\, rollout sequencing)\n* A community you can learn from (and contribute to)
URL:https://appliedquantum.com/event/quantum-security-community-online-fortnightly-update-america-emea-19
LOCATION:Online event
CATEGORIES:Community
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/03/1024x576-bya3VY.jpg
GEO:-8.521147;179.1962
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=+01:00:20261217T090000
DTEND;TZID=+01:00:20261217T103000
DTSTAMP:20260406T115905
CREATED:20260316T100020Z
LAST-MODIFIED:20260405T102916Z
UID:10000063-1797498000-1797503400@appliedquantum.com
SUMMARY:Quantum Security Community - Online Fortnightly Update (EMEA\, APAC)
DESCRIPTION:***Quantum Security Community*** *is a free\, global\, practitioner-led network sharing real-world PQC insights and supporting one another through the most complex IT/OT security transformation of our time. Explore the channels at* ***[Quantum.Security](https://quantum.security)*** \n—————— \n**A weekly\, online community meetup for quantum security practitioners — focused on signal\, not hype.** \nPost-quantum cryptography (PQC)\, crypto agility\, quantum threat models\, and standards timelines are all evolving quickly. For security teams\, the challenge isn’t “finding information” — it’s deciding **what matters**\, **what changed**\, and **what to do next**. Quantum Security Weekly exists to make that easier. \nWe run the **same meetup twice each week** to cover global time zones: \n* **Session 1:** Europe / Middle East / APAC-friendly\n* **Session 2:** Europe / Americas-friendly\n(Choose the one that fits your schedule – content is aligned across both.) \n### **What happens each week** \nYou’ll get a curated update across the four categories that consistently drive real-world decisions: \n**1) Regulation & policy signals**\nNew requirements\, supervisory guidance\, national strategies\, procurement rules\, sector-specific expectations – and what they imply for timelines and planning. \n**2) Standards and “rules of the road”**\nUpdates to cryptographic standards and related ecosystems (protocols\, identity\, secure elements\, industry frameworks). We focus on what changes adoption feasibility\, interoperability\, or audit/compliance expectations. \n**3) Technical developments**\nCredible signals about quantum computing capability\, relevant cryptanalysis\, and meaningful algorithmic/security research (including “RSA-breaking” or signature-related developments) – explained in terms of security impact\, not headlines. \n**4) Practical implementation reality**\nThe stuff that makes or breaks programs: where crypto actually lives\, dependency chains\, vendor readiness\, device constraints\, performance tradeoffs\, rollout sequencing\, and “what we learned the hard way.” \n### **Speakers and community contributions** \nWe often invite a guest speaker to share practical experience (implementation lessons\, program strategy\, technical deep dives). Sometimes we’ll host short product introductions – but the default posture is educational and experience-driven\, not salesy. When there’s no guest\, we go deeper on the week’s most important developments and prioritize Q&A. \n### **Typical Agenda** \n**0:00 – 0:05 | Welcome + how to engage (fast)** \n* What this meetup is: **signal > hype**\, practical implications\, community-first\n* How to participate today: chat\, Q&A flow\, how to drop links/resources\n* Quick reminder of community channels (Forum / Slack / LinkedIn group) and how to continue the conversation after the call \n**0:05 – 0:25 | The Weekly Signal Brief (what actually changed)**\nA structured scan in four buckets\, with a “so what?” for each: \n* **Policy & regulation:** new drafts\, mandates\, enforcement signals\, procurement rules\n* **Standards & frameworks:** PQC standards movement\, protocol ecosystem changes\, guidance updates\n* **Quantum capability signals:** credible progress indicators (hardware\, error correction\, scaling)\, what to ignore\n* **Cryptography/cryptanalysis:** meaningful research developments\, “RSA/ECC breaking” signals\, security relevance \n**0:25 – 0:35 | Myth‑Busting / Reality Check (the hype audit)**\nIf something got hyped this week\, we’ll do a quick\, repeatable teardown: \n* **What happened** (one sentence)\n* **What didn’t happen** (the misconception)\n* **What it means for defenders** (real impact)\n* **What changes / what doesn’t** in PQC planning this year \n*Goal:* keep the community calibrated\, reduce panic\, and prevent misallocation of effort. \n**0:35 – 0:50 | One Topic\, Deeper (the week’s main story)**\nA focused deep dive on one theme that affects real programs\, such as: \n* crypto-agility patterns and failure modes\n* hybrid deployment realities (where it works / where it’s a trap)\n* migration sequencing and vendor dependency bottlenecks\n* what a standards change means for architects and CISOs\n* integrity-first thinking (e.g.\, signatures\, trust anchors\, long-lived evidence) \n**0:50 – 1:05 | Guest Spotlight (most weeks) OR Community Lightning Round** \n* **Guest Spotlight (preferred when available):**\n* 10–12 min: experience share / lessons learned / case study / product walkthrough (kept educational)\n* 3–5 min: moderated Q&A (“what surprised you / what broke / what you’d do differently”)\n* **If no guest:**\n* 3 lightning shares (3–4 min each): “one paper / one tool / one lesson / one vendor signal” \n**1:05 – 1:10 | Community Pulse (cross‑channel highlights)** \n* “Top 3 threads” from various community channels this week\n* Quick call-outs: members looking for feedback\, volunteer opportunities\, upcoming topics\n* How to propose a guest / suggest topics / share resources for next week \n**1:10 – 1:28 | Open Q&A / Office Hours** \n* Live questions (chat + audio)\n* “Bring your messy problem” time: inventory\, vendor claims\, timeline pressure\, governance\, metrics\n* Optional: rapid-fire “yes/no + why” on 5–8 quick questions if the room is lively \n**1:28 – 1:30 | Wrap + next week preview** \n* 3 takeaways in 30 seconds\n* What we’re tracking next week\n* Speaker/volunteer reminder (“If you’ve shipped something\, we want the story.”) \n### **Who should join** \nIf you’re responsible for security strategy\, cryptography\, identity\, platform security\, resilience\, compliance\, or product security – and quantum is on your roadmap – this is for you. \n### **What you’ll leave with** \n* Clear visibility into what changed this week\n* Better judgment on what’s noise vs. actionable signal\n* Practical framing for decisions you may need to revisit (inventory\, standards alignment\, vendor dependencies\, rollout sequencing)\n* A community you can learn from (and contribute to)
URL:https://appliedquantum.com/event/quantum-security-community-online-fortnightly-update-emea-apac-20
LOCATION:Online event
CATEGORIES:Community
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/03/1024x576-anROVz.jpg
GEO:-8.521147;179.1962
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=+01:00:20261217T170000
DTEND;TZID=+01:00:20261217T183000
DTSTAMP:20260406T115905
CREATED:20260320T103014Z
LAST-MODIFIED:20260405T102916Z
UID:10000064-1797526800-1797532200@appliedquantum.com
SUMMARY:Quantum Security Community - Online Fortnightly Update (America\, EMEA)
DESCRIPTION:***Quantum Security Community*** *is a free\, global\, practitioner-led network sharing real-world PQC insights and supporting one another through the most complex IT/OT security transformation of our time. Explore the channels at* ***[Quantum.Security](https://quantum.security)*** \n—————— \n**A weekly\, online community meetup for quantum security practitioners — focused on signal\, not hype.** \nPost-quantum cryptography (PQC)\, crypto agility\, quantum threat models\, and standards timelines are all evolving quickly. For security teams\, the challenge isn’t “finding information” — it’s deciding **what matters**\, **what changed**\, and **what to do next**. Quantum Security Weekly exists to make that easier. \nWe run the **same meetup twice each week** to cover global time zones: \n* **Session 1:** Europe / Middle East / APAC-friendly\n* **Session 2:** Europe / Americas-friendly\n(Choose the one that fits your schedule – content is aligned across both.) \n### **What happens each week** \nYou’ll get a curated update across the four categories that consistently drive real-world decisions: \n**1) Regulation & policy signals**\nNew requirements\, supervisory guidance\, national strategies\, procurement rules\, sector-specific expectations – and what they imply for timelines and planning. \n**2) Standards and “rules of the road”**\nUpdates to cryptographic standards and related ecosystems (protocols\, identity\, secure elements\, industry frameworks). We focus on what changes adoption feasibility\, interoperability\, or audit/compliance expectations. \n**3) Technical developments**\nCredible signals about quantum computing capability\, relevant cryptanalysis\, and meaningful algorithmic/security research (including “RSA-breaking” or signature-related developments) – explained in terms of security impact\, not headlines. \n**4) Practical implementation reality**\nThe stuff that makes or breaks programs: where crypto actually lives\, dependency chains\, vendor readiness\, device constraints\, performance tradeoffs\, rollout sequencing\, and “what we learned the hard way.” \n### **Speakers and community contributions** \nWe often invite a guest speaker to share practical experience (implementation lessons\, program strategy\, technical deep dives). Sometimes we’ll host short product introductions – but the default posture is educational and experience-driven\, not salesy. When there’s no guest\, we go deeper on the week’s most important developments and prioritize Q&A. \n### **Typical Agenda** \n**0:00 – 0:05 | Welcome + how to engage (fast)** \n* What this meetup is: **signal > hype**\, practical implications\, community-first\n* How to participate today: chat\, Q&A flow\, how to drop links/resources\n* Quick reminder of community channels (Forum / Slack / LinkedIn group) and how to continue the conversation after the call \n**0:05 – 0:25 | The Weekly Signal Brief (what actually changed)**\nA structured scan in four buckets\, with a “so what?” for each: \n* **Policy & regulation:** new drafts\, mandates\, enforcement signals\, procurement rules\n* **Standards & frameworks:** PQC standards movement\, protocol ecosystem changes\, guidance updates\n* **Quantum capability signals:** credible progress indicators (hardware\, error correction\, scaling)\, what to ignore\n* **Cryptography/cryptanalysis:** meaningful research developments\, “RSA/ECC breaking” signals\, security relevance \n**0:25 – 0:35 | Myth‑Busting / Reality Check (the hype audit)**\nIf something got hyped this week\, we’ll do a quick\, repeatable teardown: \n* **What happened** (one sentence)\n* **What didn’t happen** (the misconception)\n* **What it means for defenders** (real impact)\n* **What changes / what doesn’t** in PQC planning this year \n*Goal:* keep the community calibrated\, reduce panic\, and prevent misallocation of effort. \n**0:35 – 0:50 | One Topic\, Deeper (the week’s main story)**\nA focused deep dive on one theme that affects real programs\, such as: \n* crypto-agility patterns and failure modes\n* hybrid deployment realities (where it works / where it’s a trap)\n* migration sequencing and vendor dependency bottlenecks\n* what a standards change means for architects and CISOs\n* integrity-first thinking (e.g.\, signatures\, trust anchors\, long-lived evidence) \n**0:50 – 1:05 | Guest Spotlight (most weeks) OR Community Lightning Round** \n* **Guest Spotlight (preferred when available):**\n* 10–12 min: experience share / lessons learned / case study / product walkthrough (kept educational)\n* 3–5 min: moderated Q&A (“what surprised you / what broke / what you’d do differently”)\n* **If no guest:**\n* 3 lightning shares (3–4 min each): “one paper / one tool / one lesson / one vendor signal” \n**1:05 – 1:10 | Community Pulse (cross‑channel highlights)** \n* “Top 3 threads” from various community channels this week\n* Quick call-outs: members looking for feedback\, volunteer opportunities\, upcoming topics\n* How to propose a guest / suggest topics / share resources for next week \n**1:10 – 1:28 | Open Q&A / Office Hours** \n* Live questions (chat + audio)\n* “Bring your messy problem” time: inventory\, vendor claims\, timeline pressure\, governance\, metrics\n* Optional: rapid-fire “yes/no + why” on 5–8 quick questions if the room is lively \n**1:28 – 1:30 | Wrap + next week preview** \n* 3 takeaways in 30 seconds\n* What we’re tracking next week\n* Speaker/volunteer reminder (“If you’ve shipped something\, we want the story.”) \n### **Who should join** \nIf you’re responsible for security strategy\, cryptography\, identity\, platform security\, resilience\, compliance\, or product security – and quantum is on your roadmap – this is for you. \n### **What you’ll leave with** \n* Clear visibility into what changed this week\n* Better judgment on what’s noise vs. actionable signal\n* Practical framing for decisions you may need to revisit (inventory\, standards alignment\, vendor dependencies\, rollout sequencing)\n* A community you can learn from (and contribute to)
URL:https://appliedquantum.com/event/quantum-security-community-online-fortnightly-update-america-emea-20
LOCATION:Online event
CATEGORIES:Community
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/03/1024x576-bya3VY.jpg
GEO:-8.521147;179.1962
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=+01:00:20261231T090000
DTEND;TZID=+01:00:20261231T103000
DTSTAMP:20260406T115905
CREATED:20260327T091757Z
LAST-MODIFIED:20260405T102916Z
UID:10000066-1798707600-1798713000@appliedquantum.com
SUMMARY:Quantum Security Community - Online Fortnightly Update (EMEA\, APAC)
DESCRIPTION:***Quantum Security Community*** *is a free\, global\, practitioner-led network sharing real-world PQC insights and supporting one another through the most complex IT/OT security transformation of our time. Explore the channels at* ***[Quantum.Security](https://quantum.security)*** \n—————— \n**A weekly\, online community meetup for quantum security practitioners — focused on signal\, not hype.** \nPost-quantum cryptography (PQC)\, crypto agility\, quantum threat models\, and standards timelines are all evolving quickly. For security teams\, the challenge isn’t “finding information” — it’s deciding **what matters**\, **what changed**\, and **what to do next**. Quantum Security Weekly exists to make that easier. \nWe run the **same meetup twice each week** to cover global time zones: \n* **Session 1:** Europe / Middle East / APAC-friendly\n* **Session 2:** Europe / Americas-friendly\n(Choose the one that fits your schedule – content is aligned across both.) \n### **What happens each week** \nYou’ll get a curated update across the four categories that consistently drive real-world decisions: \n**1) Regulation & policy signals**\nNew requirements\, supervisory guidance\, national strategies\, procurement rules\, sector-specific expectations – and what they imply for timelines and planning. \n**2) Standards and “rules of the road”**\nUpdates to cryptographic standards and related ecosystems (protocols\, identity\, secure elements\, industry frameworks). We focus on what changes adoption feasibility\, interoperability\, or audit/compliance expectations. \n**3) Technical developments**\nCredible signals about quantum computing capability\, relevant cryptanalysis\, and meaningful algorithmic/security research (including “RSA-breaking” or signature-related developments) – explained in terms of security impact\, not headlines. \n**4) Practical implementation reality**\nThe stuff that makes or breaks programs: where crypto actually lives\, dependency chains\, vendor readiness\, device constraints\, performance tradeoffs\, rollout sequencing\, and “what we learned the hard way.” \n### **Speakers and community contributions** \nWe often invite a guest speaker to share practical experience (implementation lessons\, program strategy\, technical deep dives). Sometimes we’ll host short product introductions – but the default posture is educational and experience-driven\, not salesy. When there’s no guest\, we go deeper on the week’s most important developments and prioritize Q&A. \n### **Typical Agenda** \n**0:00 – 0:05 | Welcome + how to engage (fast)** \n* What this meetup is: **signal > hype**\, practical implications\, community-first\n* How to participate today: chat\, Q&A flow\, how to drop links/resources\n* Quick reminder of community channels (Forum / Slack / LinkedIn group) and how to continue the conversation after the call \n**0:05 – 0:25 | The Weekly Signal Brief (what actually changed)**\nA structured scan in four buckets\, with a “so what?” for each: \n* **Policy & regulation:** new drafts\, mandates\, enforcement signals\, procurement rules\n* **Standards & frameworks:** PQC standards movement\, protocol ecosystem changes\, guidance updates\n* **Quantum capability signals:** credible progress indicators (hardware\, error correction\, scaling)\, what to ignore\n* **Cryptography/cryptanalysis:** meaningful research developments\, “RSA/ECC breaking” signals\, security relevance \n**0:25 – 0:35 | Myth‑Busting / Reality Check (the hype audit)**\nIf something got hyped this week\, we’ll do a quick\, repeatable teardown: \n* **What happened** (one sentence)\n* **What didn’t happen** (the misconception)\n* **What it means for defenders** (real impact)\n* **What changes / what doesn’t** in PQC planning this year \n*Goal:* keep the community calibrated\, reduce panic\, and prevent misallocation of effort. \n**0:35 – 0:50 | One Topic\, Deeper (the week’s main story)**\nA focused deep dive on one theme that affects real programs\, such as: \n* crypto-agility patterns and failure modes\n* hybrid deployment realities (where it works / where it’s a trap)\n* migration sequencing and vendor dependency bottlenecks\n* what a standards change means for architects and CISOs\n* integrity-first thinking (e.g.\, signatures\, trust anchors\, long-lived evidence) \n**0:50 – 1:05 | Guest Spotlight (most weeks) OR Community Lightning Round** \n* **Guest Spotlight (preferred when available):**\n* 10–12 min: experience share / lessons learned / case study / product walkthrough (kept educational)\n* 3–5 min: moderated Q&A (“what surprised you / what broke / what you’d do differently”)\n* **If no guest:**\n* 3 lightning shares (3–4 min each): “one paper / one tool / one lesson / one vendor signal” \n**1:05 – 1:10 | Community Pulse (cross‑channel highlights)** \n* “Top 3 threads” from various community channels this week\n* Quick call-outs: members looking for feedback\, volunteer opportunities\, upcoming topics\n* How to propose a guest / suggest topics / share resources for next week \n**1:10 – 1:28 | Open Q&A / Office Hours** \n* Live questions (chat + audio)\n* “Bring your messy problem” time: inventory\, vendor claims\, timeline pressure\, governance\, metrics\n* Optional: rapid-fire “yes/no + why” on 5–8 quick questions if the room is lively \n**1:28 – 1:30 | Wrap + next week preview** \n* 3 takeaways in 30 seconds\n* What we’re tracking next week\n* Speaker/volunteer reminder (“If you’ve shipped something\, we want the story.”) \n### **Who should join** \nIf you’re responsible for security strategy\, cryptography\, identity\, platform security\, resilience\, compliance\, or product security – and quantum is on your roadmap – this is for you. \n### **What you’ll leave with** \n* Clear visibility into what changed this week\n* Better judgment on what’s noise vs. actionable signal\n* Practical framing for decisions you may need to revisit (inventory\, standards alignment\, vendor dependencies\, rollout sequencing)\n* A community you can learn from (and contribute to)
URL:https://appliedquantum.com/event/quantum-security-community-online-fortnightly-update-emea-apac-21
LOCATION:Online event
CATEGORIES:Community
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/03/1024x576-anROVz.jpg
GEO:-8.521147;179.1962
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=+01:00:20261231T170000
DTEND;TZID=+01:00:20261231T183000
DTSTAMP:20260406T115905
CREATED:20260327T091757Z
LAST-MODIFIED:20260405T102916Z
UID:10000067-1798736400-1798741800@appliedquantum.com
SUMMARY:Quantum Security Community - Online Fortnightly Update (America\, EMEA)
DESCRIPTION:***Quantum Security Community*** *is a free\, global\, practitioner-led network sharing real-world PQC insights and supporting one another through the most complex IT/OT security transformation of our time. Explore the channels at* ***[Quantum.Security](https://quantum.security)*** \n—————— \n**A weekly\, online community meetup for quantum security practitioners — focused on signal\, not hype.** \nPost-quantum cryptography (PQC)\, crypto agility\, quantum threat models\, and standards timelines are all evolving quickly. For security teams\, the challenge isn’t “finding information” — it’s deciding **what matters**\, **what changed**\, and **what to do next**. Quantum Security Weekly exists to make that easier. \nWe run the **same meetup twice each week** to cover global time zones: \n* **Session 1:** Europe / Middle East / APAC-friendly\n* **Session 2:** Europe / Americas-friendly\n(Choose the one that fits your schedule – content is aligned across both.) \n### **What happens each week** \nYou’ll get a curated update across the four categories that consistently drive real-world decisions: \n**1) Regulation & policy signals**\nNew requirements\, supervisory guidance\, national strategies\, procurement rules\, sector-specific expectations – and what they imply for timelines and planning. \n**2) Standards and “rules of the road”**\nUpdates to cryptographic standards and related ecosystems (protocols\, identity\, secure elements\, industry frameworks). We focus on what changes adoption feasibility\, interoperability\, or audit/compliance expectations. \n**3) Technical developments**\nCredible signals about quantum computing capability\, relevant cryptanalysis\, and meaningful algorithmic/security research (including “RSA-breaking” or signature-related developments) – explained in terms of security impact\, not headlines. \n**4) Practical implementation reality**\nThe stuff that makes or breaks programs: where crypto actually lives\, dependency chains\, vendor readiness\, device constraints\, performance tradeoffs\, rollout sequencing\, and “what we learned the hard way.” \n### **Speakers and community contributions** \nWe often invite a guest speaker to share practical experience (implementation lessons\, program strategy\, technical deep dives). Sometimes we’ll host short product introductions – but the default posture is educational and experience-driven\, not salesy. When there’s no guest\, we go deeper on the week’s most important developments and prioritize Q&A. \n### **Typical Agenda** \n**0:00 – 0:05 | Welcome + how to engage (fast)** \n* What this meetup is: **signal > hype**\, practical implications\, community-first\n* How to participate today: chat\, Q&A flow\, how to drop links/resources\n* Quick reminder of community channels (Forum / Slack / LinkedIn group) and how to continue the conversation after the call \n**0:05 – 0:25 | The Weekly Signal Brief (what actually changed)**\nA structured scan in four buckets\, with a “so what?” for each: \n* **Policy & regulation:** new drafts\, mandates\, enforcement signals\, procurement rules\n* **Standards & frameworks:** PQC standards movement\, protocol ecosystem changes\, guidance updates\n* **Quantum capability signals:** credible progress indicators (hardware\, error correction\, scaling)\, what to ignore\n* **Cryptography/cryptanalysis:** meaningful research developments\, “RSA/ECC breaking” signals\, security relevance \n**0:25 – 0:35 | Myth‑Busting / Reality Check (the hype audit)**\nIf something got hyped this week\, we’ll do a quick\, repeatable teardown: \n* **What happened** (one sentence)\n* **What didn’t happen** (the misconception)\n* **What it means for defenders** (real impact)\n* **What changes / what doesn’t** in PQC planning this year \n*Goal:* keep the community calibrated\, reduce panic\, and prevent misallocation of effort. \n**0:35 – 0:50 | One Topic\, Deeper (the week’s main story)**\nA focused deep dive on one theme that affects real programs\, such as: \n* crypto-agility patterns and failure modes\n* hybrid deployment realities (where it works / where it’s a trap)\n* migration sequencing and vendor dependency bottlenecks\n* what a standards change means for architects and CISOs\n* integrity-first thinking (e.g.\, signatures\, trust anchors\, long-lived evidence) \n**0:50 – 1:05 | Guest Spotlight (most weeks) OR Community Lightning Round** \n* **Guest Spotlight (preferred when available):**\n* 10–12 min: experience share / lessons learned / case study / product walkthrough (kept educational)\n* 3–5 min: moderated Q&A (“what surprised you / what broke / what you’d do differently”)\n* **If no guest:**\n* 3 lightning shares (3–4 min each): “one paper / one tool / one lesson / one vendor signal” \n**1:05 – 1:10 | Community Pulse (cross‑channel highlights)** \n* “Top 3 threads” from various community channels this week\n* Quick call-outs: members looking for feedback\, volunteer opportunities\, upcoming topics\n* How to propose a guest / suggest topics / share resources for next week \n**1:10 – 1:28 | Open Q&A / Office Hours** \n* Live questions (chat + audio)\n* “Bring your messy problem” time: inventory\, vendor claims\, timeline pressure\, governance\, metrics\n* Optional: rapid-fire “yes/no + why” on 5–8 quick questions if the room is lively \n**1:28 – 1:30 | Wrap + next week preview** \n* 3 takeaways in 30 seconds\n* What we’re tracking next week\n* Speaker/volunteer reminder (“If you’ve shipped something\, we want the story.”) \n### **Who should join** \nIf you’re responsible for security strategy\, cryptography\, identity\, platform security\, resilience\, compliance\, or product security – and quantum is on your roadmap – this is for you. \n### **What you’ll leave with** \n* Clear visibility into what changed this week\n* Better judgment on what’s noise vs. actionable signal\n* Practical framing for decisions you may need to revisit (inventory\, standards alignment\, vendor dependencies\, rollout sequencing)\n* A community you can learn from (and contribute to)
URL:https://appliedquantum.com/event/quantum-security-community-online-fortnightly-update-america-emea-22
LOCATION:Online event
CATEGORIES:Community
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/03/1024x576-bya3VY.jpg
GEO:-8.521147;179.1962
END:VEVENT
END:VCALENDAR