BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Applied Quantum - ECPv6.15.18//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:Applied Quantum
X-ORIGINAL-URL:https://appliedquantum.com
X-WR-CALDESC:Events for Applied Quantum
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:+02:00
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:+01:00
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=+02:00:20260604T170000
DTEND;TZID=+02:00:20260604T183000
DTSTAMP:20260404T134519
CREATED:20260316T100018Z
LAST-MODIFIED:20260404T103027Z
UID:10000036-1780592400-1780597800@appliedquantum.com
SUMMARY:Quantum Security Community - Online Fortnightly Update (America\, EMEA)
DESCRIPTION:***Quantum Security Community*** *is a free\, global\, practitioner-led network sharing real-world PQC insights and supporting one another through the most complex IT/OT security transformation of our time. Explore the channels at* ***[Quantum.Security](https://quantum.security)*** \n—————— \n**A weekly\, online community meetup for quantum security practitioners — focused on signal\, not hype.** \nPost-quantum cryptography (PQC)\, crypto agility\, quantum threat models\, and standards timelines are all evolving quickly. For security teams\, the challenge isn’t “finding information” — it’s deciding **what matters**\, **what changed**\, and **what to do next**. Quantum Security Weekly exists to make that easier. \nWe run the **same meetup twice each week** to cover global time zones: \n* **Session 1:** Europe / Middle East / APAC-friendly\n* **Session 2:** Europe / Americas-friendly\n(Choose the one that fits your schedule – content is aligned across both.) \n### **What happens each week** \nYou’ll get a curated update across the four categories that consistently drive real-world decisions: \n**1) Regulation & policy signals**\nNew requirements\, supervisory guidance\, national strategies\, procurement rules\, sector-specific expectations – and what they imply for timelines and planning. \n**2) Standards and “rules of the road”**\nUpdates to cryptographic standards and related ecosystems (protocols\, identity\, secure elements\, industry frameworks). We focus on what changes adoption feasibility\, interoperability\, or audit/compliance expectations. \n**3) Technical developments**\nCredible signals about quantum computing capability\, relevant cryptanalysis\, and meaningful algorithmic/security research (including “RSA-breaking” or signature-related developments) – explained in terms of security impact\, not headlines. \n**4) Practical implementation reality**\nThe stuff that makes or breaks programs: where crypto actually lives\, dependency chains\, vendor readiness\, device constraints\, performance tradeoffs\, rollout sequencing\, and “what we learned the hard way.” \n### **Speakers and community contributions** \nWe often invite a guest speaker to share practical experience (implementation lessons\, program strategy\, technical deep dives). Sometimes we’ll host short product introductions – but the default posture is educational and experience-driven\, not salesy. When there’s no guest\, we go deeper on the week’s most important developments and prioritize Q&A. \n### **Typical Agenda** \n**0:00 – 0:05 | Welcome + how to engage (fast)** \n* What this meetup is: **signal > hype**\, practical implications\, community-first\n* How to participate today: chat\, Q&A flow\, how to drop links/resources\n* Quick reminder of community channels (Forum / Slack / LinkedIn group) and how to continue the conversation after the call \n**0:05 – 0:25 | The Weekly Signal Brief (what actually changed)**\nA structured scan in four buckets\, with a “so what?” for each: \n* **Policy & regulation:** new drafts\, mandates\, enforcement signals\, procurement rules\n* **Standards & frameworks:** PQC standards movement\, protocol ecosystem changes\, guidance updates\n* **Quantum capability signals:** credible progress indicators (hardware\, error correction\, scaling)\, what to ignore\n* **Cryptography/cryptanalysis:** meaningful research developments\, “RSA/ECC breaking” signals\, security relevance \n**0:25 – 0:35 | Myth‑Busting / Reality Check (the hype audit)**\nIf something got hyped this week\, we’ll do a quick\, repeatable teardown: \n* **What happened** (one sentence)\n* **What didn’t happen** (the misconception)\n* **What it means for defenders** (real impact)\n* **What changes / what doesn’t** in PQC planning this year \n*Goal:* keep the community calibrated\, reduce panic\, and prevent misallocation of effort. \n**0:35 – 0:50 | One Topic\, Deeper (the week’s main story)**\nA focused deep dive on one theme that affects real programs\, such as: \n* crypto-agility patterns and failure modes\n* hybrid deployment realities (where it works / where it’s a trap)\n* migration sequencing and vendor dependency bottlenecks\n* what a standards change means for architects and CISOs\n* integrity-first thinking (e.g.\, signatures\, trust anchors\, long-lived evidence) \n**0:50 – 1:05 | Guest Spotlight (most weeks) OR Community Lightning Round** \n* **Guest Spotlight (preferred when available):**\n* 10–12 min: experience share / lessons learned / case study / product walkthrough (kept educational)\n* 3–5 min: moderated Q&A (“what surprised you / what broke / what you’d do differently”)\n* **If no guest:**\n* 3 lightning shares (3–4 min each): “one paper / one tool / one lesson / one vendor signal” \n**1:05 – 1:10 | Community Pulse (cross‑channel highlights)** \n* “Top 3 threads” from various community channels this week\n* Quick call-outs: members looking for feedback\, volunteer opportunities\, upcoming topics\n* How to propose a guest / suggest topics / share resources for next week \n**1:10 – 1:28 | Open Q&A / Office Hours** \n* Live questions (chat + audio)\n* “Bring your messy problem” time: inventory\, vendor claims\, timeline pressure\, governance\, metrics\n* Optional: rapid-fire “yes/no + why” on 5–8 quick questions if the room is lively \n**1:28 – 1:30 | Wrap + next week preview** \n* 3 takeaways in 30 seconds\n* What we’re tracking next week\n* Speaker/volunteer reminder (“If you’ve shipped something\, we want the story.”) \n### **Who should join** \nIf you’re responsible for security strategy\, cryptography\, identity\, platform security\, resilience\, compliance\, or product security – and quantum is on your roadmap – this is for you. \n### **What you’ll leave with** \n* Clear visibility into what changed this week\n* Better judgment on what’s noise vs. actionable signal\n* Practical framing for decisions you may need to revisit (inventory\, standards alignment\, vendor dependencies\, rollout sequencing)\n* A community you can learn from (and contribute to)
URL:https://appliedquantum.com/event/quantum-security-community-online-fortnightly-update-america-emea-6
LOCATION:Online event
CATEGORIES:Community
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/03/1024x576-bya3VY.jpg
GEO:-8.521147;179.1962
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=+02:00:20260618T090000
DTEND;TZID=+02:00:20260618T103000
DTSTAMP:20260404T134519
CREATED:20260316T100018Z
LAST-MODIFIED:20260404T103027Z
UID:10000037-1781773200-1781778600@appliedquantum.com
SUMMARY:Quantum Security Community - Online Fortnightly Update (EMEA\, APAC)
DESCRIPTION:***Quantum Security Community*** *is a free\, global\, practitioner-led network sharing real-world PQC insights and supporting one another through the most complex IT/OT security transformation of our time. Explore the channels at* ***[Quantum.Security](https://quantum.security)*** \n—————— \n**A weekly\, online community meetup for quantum security practitioners — focused on signal\, not hype.** \nPost-quantum cryptography (PQC)\, crypto agility\, quantum threat models\, and standards timelines are all evolving quickly. For security teams\, the challenge isn’t “finding information” — it’s deciding **what matters**\, **what changed**\, and **what to do next**. Quantum Security Weekly exists to make that easier. \nWe run the **same meetup twice each week** to cover global time zones: \n* **Session 1:** Europe / Middle East / APAC-friendly\n* **Session 2:** Europe / Americas-friendly\n(Choose the one that fits your schedule – content is aligned across both.) \n### **What happens each week** \nYou’ll get a curated update across the four categories that consistently drive real-world decisions: \n**1) Regulation & policy signals**\nNew requirements\, supervisory guidance\, national strategies\, procurement rules\, sector-specific expectations – and what they imply for timelines and planning. \n**2) Standards and “rules of the road”**\nUpdates to cryptographic standards and related ecosystems (protocols\, identity\, secure elements\, industry frameworks). We focus on what changes adoption feasibility\, interoperability\, or audit/compliance expectations. \n**3) Technical developments**\nCredible signals about quantum computing capability\, relevant cryptanalysis\, and meaningful algorithmic/security research (including “RSA-breaking” or signature-related developments) – explained in terms of security impact\, not headlines. \n**4) Practical implementation reality**\nThe stuff that makes or breaks programs: where crypto actually lives\, dependency chains\, vendor readiness\, device constraints\, performance tradeoffs\, rollout sequencing\, and “what we learned the hard way.” \n### **Speakers and community contributions** \nWe often invite a guest speaker to share practical experience (implementation lessons\, program strategy\, technical deep dives). Sometimes we’ll host short product introductions – but the default posture is educational and experience-driven\, not salesy. When there’s no guest\, we go deeper on the week’s most important developments and prioritize Q&A. \n### **Typical Agenda** \n**0:00 – 0:05 | Welcome + how to engage (fast)** \n* What this meetup is: **signal > hype**\, practical implications\, community-first\n* How to participate today: chat\, Q&A flow\, how to drop links/resources\n* Quick reminder of community channels (Forum / Slack / LinkedIn group) and how to continue the conversation after the call \n**0:05 – 0:25 | The Weekly Signal Brief (what actually changed)**\nA structured scan in four buckets\, with a “so what?” for each: \n* **Policy & regulation:** new drafts\, mandates\, enforcement signals\, procurement rules\n* **Standards & frameworks:** PQC standards movement\, protocol ecosystem changes\, guidance updates\n* **Quantum capability signals:** credible progress indicators (hardware\, error correction\, scaling)\, what to ignore\n* **Cryptography/cryptanalysis:** meaningful research developments\, “RSA/ECC breaking” signals\, security relevance \n**0:25 – 0:35 | Myth‑Busting / Reality Check (the hype audit)**\nIf something got hyped this week\, we’ll do a quick\, repeatable teardown: \n* **What happened** (one sentence)\n* **What didn’t happen** (the misconception)\n* **What it means for defenders** (real impact)\n* **What changes / what doesn’t** in PQC planning this year \n*Goal:* keep the community calibrated\, reduce panic\, and prevent misallocation of effort. \n**0:35 – 0:50 | One Topic\, Deeper (the week’s main story)**\nA focused deep dive on one theme that affects real programs\, such as: \n* crypto-agility patterns and failure modes\n* hybrid deployment realities (where it works / where it’s a trap)\n* migration sequencing and vendor dependency bottlenecks\n* what a standards change means for architects and CISOs\n* integrity-first thinking (e.g.\, signatures\, trust anchors\, long-lived evidence) \n**0:50 – 1:05 | Guest Spotlight (most weeks) OR Community Lightning Round** \n* **Guest Spotlight (preferred when available):**\n* 10–12 min: experience share / lessons learned / case study / product walkthrough (kept educational)\n* 3–5 min: moderated Q&A (“what surprised you / what broke / what you’d do differently”)\n* **If no guest:**\n* 3 lightning shares (3–4 min each): “one paper / one tool / one lesson / one vendor signal” \n**1:05 – 1:10 | Community Pulse (cross‑channel highlights)** \n* “Top 3 threads” from various community channels this week\n* Quick call-outs: members looking for feedback\, volunteer opportunities\, upcoming topics\n* How to propose a guest / suggest topics / share resources for next week \n**1:10 – 1:28 | Open Q&A / Office Hours** \n* Live questions (chat + audio)\n* “Bring your messy problem” time: inventory\, vendor claims\, timeline pressure\, governance\, metrics\n* Optional: rapid-fire “yes/no + why” on 5–8 quick questions if the room is lively \n**1:28 – 1:30 | Wrap + next week preview** \n* 3 takeaways in 30 seconds\n* What we’re tracking next week\n* Speaker/volunteer reminder (“If you’ve shipped something\, we want the story.”) \n### **Who should join** \nIf you’re responsible for security strategy\, cryptography\, identity\, platform security\, resilience\, compliance\, or product security – and quantum is on your roadmap – this is for you. \n### **What you’ll leave with** \n* Clear visibility into what changed this week\n* Better judgment on what’s noise vs. actionable signal\n* Practical framing for decisions you may need to revisit (inventory\, standards alignment\, vendor dependencies\, rollout sequencing)\n* A community you can learn from (and contribute to)
URL:https://appliedquantum.com/event/quantum-security-community-online-fortnightly-update-emea-apac-7
LOCATION:Online event
CATEGORIES:Community
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/03/1024x576-anROVz.jpg
GEO:-8.521147;179.1962
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=+02:00:20260618T170000
DTEND;TZID=+02:00:20260618T183000
DTSTAMP:20260404T134519
CREATED:20260316T100018Z
LAST-MODIFIED:20260404T103027Z
UID:10000038-1781802000-1781807400@appliedquantum.com
SUMMARY:Quantum Security Community - Online Fortnightly Update (America\, EMEA)
DESCRIPTION:***Quantum Security Community*** *is a free\, global\, practitioner-led network sharing real-world PQC insights and supporting one another through the most complex IT/OT security transformation of our time. Explore the channels at* ***[Quantum.Security](https://quantum.security)*** \n—————— \n**A weekly\, online community meetup for quantum security practitioners — focused on signal\, not hype.** \nPost-quantum cryptography (PQC)\, crypto agility\, quantum threat models\, and standards timelines are all evolving quickly. For security teams\, the challenge isn’t “finding information” — it’s deciding **what matters**\, **what changed**\, and **what to do next**. Quantum Security Weekly exists to make that easier. \nWe run the **same meetup twice each week** to cover global time zones: \n* **Session 1:** Europe / Middle East / APAC-friendly\n* **Session 2:** Europe / Americas-friendly\n(Choose the one that fits your schedule – content is aligned across both.) \n### **What happens each week** \nYou’ll get a curated update across the four categories that consistently drive real-world decisions: \n**1) Regulation & policy signals**\nNew requirements\, supervisory guidance\, national strategies\, procurement rules\, sector-specific expectations – and what they imply for timelines and planning. \n**2) Standards and “rules of the road”**\nUpdates to cryptographic standards and related ecosystems (protocols\, identity\, secure elements\, industry frameworks). We focus on what changes adoption feasibility\, interoperability\, or audit/compliance expectations. \n**3) Technical developments**\nCredible signals about quantum computing capability\, relevant cryptanalysis\, and meaningful algorithmic/security research (including “RSA-breaking” or signature-related developments) – explained in terms of security impact\, not headlines. \n**4) Practical implementation reality**\nThe stuff that makes or breaks programs: where crypto actually lives\, dependency chains\, vendor readiness\, device constraints\, performance tradeoffs\, rollout sequencing\, and “what we learned the hard way.” \n### **Speakers and community contributions** \nWe often invite a guest speaker to share practical experience (implementation lessons\, program strategy\, technical deep dives). Sometimes we’ll host short product introductions – but the default posture is educational and experience-driven\, not salesy. When there’s no guest\, we go deeper on the week’s most important developments and prioritize Q&A. \n### **Typical Agenda** \n**0:00 – 0:05 | Welcome + how to engage (fast)** \n* What this meetup is: **signal > hype**\, practical implications\, community-first\n* How to participate today: chat\, Q&A flow\, how to drop links/resources\n* Quick reminder of community channels (Forum / Slack / LinkedIn group) and how to continue the conversation after the call \n**0:05 – 0:25 | The Weekly Signal Brief (what actually changed)**\nA structured scan in four buckets\, with a “so what?” for each: \n* **Policy & regulation:** new drafts\, mandates\, enforcement signals\, procurement rules\n* **Standards & frameworks:** PQC standards movement\, protocol ecosystem changes\, guidance updates\n* **Quantum capability signals:** credible progress indicators (hardware\, error correction\, scaling)\, what to ignore\n* **Cryptography/cryptanalysis:** meaningful research developments\, “RSA/ECC breaking” signals\, security relevance \n**0:25 – 0:35 | Myth‑Busting / Reality Check (the hype audit)**\nIf something got hyped this week\, we’ll do a quick\, repeatable teardown: \n* **What happened** (one sentence)\n* **What didn’t happen** (the misconception)\n* **What it means for defenders** (real impact)\n* **What changes / what doesn’t** in PQC planning this year \n*Goal:* keep the community calibrated\, reduce panic\, and prevent misallocation of effort. \n**0:35 – 0:50 | One Topic\, Deeper (the week’s main story)**\nA focused deep dive on one theme that affects real programs\, such as: \n* crypto-agility patterns and failure modes\n* hybrid deployment realities (where it works / where it’s a trap)\n* migration sequencing and vendor dependency bottlenecks\n* what a standards change means for architects and CISOs\n* integrity-first thinking (e.g.\, signatures\, trust anchors\, long-lived evidence) \n**0:50 – 1:05 | Guest Spotlight (most weeks) OR Community Lightning Round** \n* **Guest Spotlight (preferred when available):**\n* 10–12 min: experience share / lessons learned / case study / product walkthrough (kept educational)\n* 3–5 min: moderated Q&A (“what surprised you / what broke / what you’d do differently”)\n* **If no guest:**\n* 3 lightning shares (3–4 min each): “one paper / one tool / one lesson / one vendor signal” \n**1:05 – 1:10 | Community Pulse (cross‑channel highlights)** \n* “Top 3 threads” from various community channels this week\n* Quick call-outs: members looking for feedback\, volunteer opportunities\, upcoming topics\n* How to propose a guest / suggest topics / share resources for next week \n**1:10 – 1:28 | Open Q&A / Office Hours** \n* Live questions (chat + audio)\n* “Bring your messy problem” time: inventory\, vendor claims\, timeline pressure\, governance\, metrics\n* Optional: rapid-fire “yes/no + why” on 5–8 quick questions if the room is lively \n**1:28 – 1:30 | Wrap + next week preview** \n* 3 takeaways in 30 seconds\n* What we’re tracking next week\n* Speaker/volunteer reminder (“If you’ve shipped something\, we want the story.”) \n### **Who should join** \nIf you’re responsible for security strategy\, cryptography\, identity\, platform security\, resilience\, compliance\, or product security – and quantum is on your roadmap – this is for you. \n### **What you’ll leave with** \n* Clear visibility into what changed this week\n* Better judgment on what’s noise vs. actionable signal\n* Practical framing for decisions you may need to revisit (inventory\, standards alignment\, vendor dependencies\, rollout sequencing)\n* A community you can learn from (and contribute to)
URL:https://appliedquantum.com/event/quantum-security-community-online-fortnightly-update-america-emea-7
LOCATION:Online event
CATEGORIES:Community
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/03/1024x576-bya3VY.jpg
GEO:-8.521147;179.1962
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=+02:00:20260702T090000
DTEND;TZID=+02:00:20260702T103000
DTSTAMP:20260404T134519
CREATED:20260316T100018Z
LAST-MODIFIED:20260404T103027Z
UID:10000039-1782982800-1782988200@appliedquantum.com
SUMMARY:Quantum Security Community - Online Fortnightly Update (EMEA\, APAC)
DESCRIPTION:***Quantum Security Community*** *is a free\, global\, practitioner-led network sharing real-world PQC insights and supporting one another through the most complex IT/OT security transformation of our time. Explore the channels at* ***[Quantum.Security](https://quantum.security)*** \n—————— \n**A weekly\, online community meetup for quantum security practitioners — focused on signal\, not hype.** \nPost-quantum cryptography (PQC)\, crypto agility\, quantum threat models\, and standards timelines are all evolving quickly. For security teams\, the challenge isn’t “finding information” — it’s deciding **what matters**\, **what changed**\, and **what to do next**. Quantum Security Weekly exists to make that easier. \nWe run the **same meetup twice each week** to cover global time zones: \n* **Session 1:** Europe / Middle East / APAC-friendly\n* **Session 2:** Europe / Americas-friendly\n(Choose the one that fits your schedule – content is aligned across both.) \n### **What happens each week** \nYou’ll get a curated update across the four categories that consistently drive real-world decisions: \n**1) Regulation & policy signals**\nNew requirements\, supervisory guidance\, national strategies\, procurement rules\, sector-specific expectations – and what they imply for timelines and planning. \n**2) Standards and “rules of the road”**\nUpdates to cryptographic standards and related ecosystems (protocols\, identity\, secure elements\, industry frameworks). We focus on what changes adoption feasibility\, interoperability\, or audit/compliance expectations. \n**3) Technical developments**\nCredible signals about quantum computing capability\, relevant cryptanalysis\, and meaningful algorithmic/security research (including “RSA-breaking” or signature-related developments) – explained in terms of security impact\, not headlines. \n**4) Practical implementation reality**\nThe stuff that makes or breaks programs: where crypto actually lives\, dependency chains\, vendor readiness\, device constraints\, performance tradeoffs\, rollout sequencing\, and “what we learned the hard way.” \n### **Speakers and community contributions** \nWe often invite a guest speaker to share practical experience (implementation lessons\, program strategy\, technical deep dives). Sometimes we’ll host short product introductions – but the default posture is educational and experience-driven\, not salesy. When there’s no guest\, we go deeper on the week’s most important developments and prioritize Q&A. \n### **Typical Agenda** \n**0:00 – 0:05 | Welcome + how to engage (fast)** \n* What this meetup is: **signal > hype**\, practical implications\, community-first\n* How to participate today: chat\, Q&A flow\, how to drop links/resources\n* Quick reminder of community channels (Forum / Slack / LinkedIn group) and how to continue the conversation after the call \n**0:05 – 0:25 | The Weekly Signal Brief (what actually changed)**\nA structured scan in four buckets\, with a “so what?” for each: \n* **Policy & regulation:** new drafts\, mandates\, enforcement signals\, procurement rules\n* **Standards & frameworks:** PQC standards movement\, protocol ecosystem changes\, guidance updates\n* **Quantum capability signals:** credible progress indicators (hardware\, error correction\, scaling)\, what to ignore\n* **Cryptography/cryptanalysis:** meaningful research developments\, “RSA/ECC breaking” signals\, security relevance \n**0:25 – 0:35 | Myth‑Busting / Reality Check (the hype audit)**\nIf something got hyped this week\, we’ll do a quick\, repeatable teardown: \n* **What happened** (one sentence)\n* **What didn’t happen** (the misconception)\n* **What it means for defenders** (real impact)\n* **What changes / what doesn’t** in PQC planning this year \n*Goal:* keep the community calibrated\, reduce panic\, and prevent misallocation of effort. \n**0:35 – 0:50 | One Topic\, Deeper (the week’s main story)**\nA focused deep dive on one theme that affects real programs\, such as: \n* crypto-agility patterns and failure modes\n* hybrid deployment realities (where it works / where it’s a trap)\n* migration sequencing and vendor dependency bottlenecks\n* what a standards change means for architects and CISOs\n* integrity-first thinking (e.g.\, signatures\, trust anchors\, long-lived evidence) \n**0:50 – 1:05 | Guest Spotlight (most weeks) OR Community Lightning Round** \n* **Guest Spotlight (preferred when available):**\n* 10–12 min: experience share / lessons learned / case study / product walkthrough (kept educational)\n* 3–5 min: moderated Q&A (“what surprised you / what broke / what you’d do differently”)\n* **If no guest:**\n* 3 lightning shares (3–4 min each): “one paper / one tool / one lesson / one vendor signal” \n**1:05 – 1:10 | Community Pulse (cross‑channel highlights)** \n* “Top 3 threads” from various community channels this week\n* Quick call-outs: members looking for feedback\, volunteer opportunities\, upcoming topics\n* How to propose a guest / suggest topics / share resources for next week \n**1:10 – 1:28 | Open Q&A / Office Hours** \n* Live questions (chat + audio)\n* “Bring your messy problem” time: inventory\, vendor claims\, timeline pressure\, governance\, metrics\n* Optional: rapid-fire “yes/no + why” on 5–8 quick questions if the room is lively \n**1:28 – 1:30 | Wrap + next week preview** \n* 3 takeaways in 30 seconds\n* What we’re tracking next week\n* Speaker/volunteer reminder (“If you’ve shipped something\, we want the story.”) \n### **Who should join** \nIf you’re responsible for security strategy\, cryptography\, identity\, platform security\, resilience\, compliance\, or product security – and quantum is on your roadmap – this is for you. \n### **What you’ll leave with** \n* Clear visibility into what changed this week\n* Better judgment on what’s noise vs. actionable signal\n* Practical framing for decisions you may need to revisit (inventory\, standards alignment\, vendor dependencies\, rollout sequencing)\n* A community you can learn from (and contribute to)
URL:https://appliedquantum.com/event/quantum-security-community-online-fortnightly-update-emea-apac-8
LOCATION:Online event
CATEGORIES:Community
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/03/1024x576-anROVz.jpg
GEO:-8.521147;179.1962
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=+02:00:20260702T170000
DTEND;TZID=+02:00:20260702T183000
DTSTAMP:20260404T134519
CREATED:20260316T100018Z
LAST-MODIFIED:20260404T103027Z
UID:10000040-1783011600-1783017000@appliedquantum.com
SUMMARY:Quantum Security Community - Online Fortnightly Update (America\, EMEA)
DESCRIPTION:***Quantum Security Community*** *is a free\, global\, practitioner-led network sharing real-world PQC insights and supporting one another through the most complex IT/OT security transformation of our time. Explore the channels at* ***[Quantum.Security](https://quantum.security)*** \n—————— \n**A weekly\, online community meetup for quantum security practitioners — focused on signal\, not hype.** \nPost-quantum cryptography (PQC)\, crypto agility\, quantum threat models\, and standards timelines are all evolving quickly. For security teams\, the challenge isn’t “finding information” — it’s deciding **what matters**\, **what changed**\, and **what to do next**. Quantum Security Weekly exists to make that easier. \nWe run the **same meetup twice each week** to cover global time zones: \n* **Session 1:** Europe / Middle East / APAC-friendly\n* **Session 2:** Europe / Americas-friendly\n(Choose the one that fits your schedule – content is aligned across both.) \n### **What happens each week** \nYou’ll get a curated update across the four categories that consistently drive real-world decisions: \n**1) Regulation & policy signals**\nNew requirements\, supervisory guidance\, national strategies\, procurement rules\, sector-specific expectations – and what they imply for timelines and planning. \n**2) Standards and “rules of the road”**\nUpdates to cryptographic standards and related ecosystems (protocols\, identity\, secure elements\, industry frameworks). We focus on what changes adoption feasibility\, interoperability\, or audit/compliance expectations. \n**3) Technical developments**\nCredible signals about quantum computing capability\, relevant cryptanalysis\, and meaningful algorithmic/security research (including “RSA-breaking” or signature-related developments) – explained in terms of security impact\, not headlines. \n**4) Practical implementation reality**\nThe stuff that makes or breaks programs: where crypto actually lives\, dependency chains\, vendor readiness\, device constraints\, performance tradeoffs\, rollout sequencing\, and “what we learned the hard way.” \n### **Speakers and community contributions** \nWe often invite a guest speaker to share practical experience (implementation lessons\, program strategy\, technical deep dives). Sometimes we’ll host short product introductions – but the default posture is educational and experience-driven\, not salesy. When there’s no guest\, we go deeper on the week’s most important developments and prioritize Q&A. \n### **Typical Agenda** \n**0:00 – 0:05 | Welcome + how to engage (fast)** \n* What this meetup is: **signal > hype**\, practical implications\, community-first\n* How to participate today: chat\, Q&A flow\, how to drop links/resources\n* Quick reminder of community channels (Forum / Slack / LinkedIn group) and how to continue the conversation after the call \n**0:05 – 0:25 | The Weekly Signal Brief (what actually changed)**\nA structured scan in four buckets\, with a “so what?” for each: \n* **Policy & regulation:** new drafts\, mandates\, enforcement signals\, procurement rules\n* **Standards & frameworks:** PQC standards movement\, protocol ecosystem changes\, guidance updates\n* **Quantum capability signals:** credible progress indicators (hardware\, error correction\, scaling)\, what to ignore\n* **Cryptography/cryptanalysis:** meaningful research developments\, “RSA/ECC breaking” signals\, security relevance \n**0:25 – 0:35 | Myth‑Busting / Reality Check (the hype audit)**\nIf something got hyped this week\, we’ll do a quick\, repeatable teardown: \n* **What happened** (one sentence)\n* **What didn’t happen** (the misconception)\n* **What it means for defenders** (real impact)\n* **What changes / what doesn’t** in PQC planning this year \n*Goal:* keep the community calibrated\, reduce panic\, and prevent misallocation of effort. \n**0:35 – 0:50 | One Topic\, Deeper (the week’s main story)**\nA focused deep dive on one theme that affects real programs\, such as: \n* crypto-agility patterns and failure modes\n* hybrid deployment realities (where it works / where it’s a trap)\n* migration sequencing and vendor dependency bottlenecks\n* what a standards change means for architects and CISOs\n* integrity-first thinking (e.g.\, signatures\, trust anchors\, long-lived evidence) \n**0:50 – 1:05 | Guest Spotlight (most weeks) OR Community Lightning Round** \n* **Guest Spotlight (preferred when available):**\n* 10–12 min: experience share / lessons learned / case study / product walkthrough (kept educational)\n* 3–5 min: moderated Q&A (“what surprised you / what broke / what you’d do differently”)\n* **If no guest:**\n* 3 lightning shares (3–4 min each): “one paper / one tool / one lesson / one vendor signal” \n**1:05 – 1:10 | Community Pulse (cross‑channel highlights)** \n* “Top 3 threads” from various community channels this week\n* Quick call-outs: members looking for feedback\, volunteer opportunities\, upcoming topics\n* How to propose a guest / suggest topics / share resources for next week \n**1:10 – 1:28 | Open Q&A / Office Hours** \n* Live questions (chat + audio)\n* “Bring your messy problem” time: inventory\, vendor claims\, timeline pressure\, governance\, metrics\n* Optional: rapid-fire “yes/no + why” on 5–8 quick questions if the room is lively \n**1:28 – 1:30 | Wrap + next week preview** \n* 3 takeaways in 30 seconds\n* What we’re tracking next week\n* Speaker/volunteer reminder (“If you’ve shipped something\, we want the story.”) \n### **Who should join** \nIf you’re responsible for security strategy\, cryptography\, identity\, platform security\, resilience\, compliance\, or product security – and quantum is on your roadmap – this is for you. \n### **What you’ll leave with** \n* Clear visibility into what changed this week\n* Better judgment on what’s noise vs. actionable signal\n* Practical framing for decisions you may need to revisit (inventory\, standards alignment\, vendor dependencies\, rollout sequencing)\n* A community you can learn from (and contribute to)
URL:https://appliedquantum.com/event/quantum-security-community-online-fortnightly-update-america-emea-8
LOCATION:Online event
CATEGORIES:Community
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/03/1024x576-bya3VY.jpg
GEO:-8.521147;179.1962
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=+02:00:20260716T090000
DTEND;TZID=+02:00:20260716T103000
DTSTAMP:20260404T134519
CREATED:20260316T100018Z
LAST-MODIFIED:20260404T103027Z
UID:10000041-1784192400-1784197800@appliedquantum.com
SUMMARY:Quantum Security Community - Online Fortnightly Update (EMEA\, APAC)
DESCRIPTION:***Quantum Security Community*** *is a free\, global\, practitioner-led network sharing real-world PQC insights and supporting one another through the most complex IT/OT security transformation of our time. Explore the channels at* ***[Quantum.Security](https://quantum.security)*** \n—————— \n**A weekly\, online community meetup for quantum security practitioners — focused on signal\, not hype.** \nPost-quantum cryptography (PQC)\, crypto agility\, quantum threat models\, and standards timelines are all evolving quickly. For security teams\, the challenge isn’t “finding information” — it’s deciding **what matters**\, **what changed**\, and **what to do next**. Quantum Security Weekly exists to make that easier. \nWe run the **same meetup twice each week** to cover global time zones: \n* **Session 1:** Europe / Middle East / APAC-friendly\n* **Session 2:** Europe / Americas-friendly\n(Choose the one that fits your schedule – content is aligned across both.) \n### **What happens each week** \nYou’ll get a curated update across the four categories that consistently drive real-world decisions: \n**1) Regulation & policy signals**\nNew requirements\, supervisory guidance\, national strategies\, procurement rules\, sector-specific expectations – and what they imply for timelines and planning. \n**2) Standards and “rules of the road”**\nUpdates to cryptographic standards and related ecosystems (protocols\, identity\, secure elements\, industry frameworks). We focus on what changes adoption feasibility\, interoperability\, or audit/compliance expectations. \n**3) Technical developments**\nCredible signals about quantum computing capability\, relevant cryptanalysis\, and meaningful algorithmic/security research (including “RSA-breaking” or signature-related developments) – explained in terms of security impact\, not headlines. \n**4) Practical implementation reality**\nThe stuff that makes or breaks programs: where crypto actually lives\, dependency chains\, vendor readiness\, device constraints\, performance tradeoffs\, rollout sequencing\, and “what we learned the hard way.” \n### **Speakers and community contributions** \nWe often invite a guest speaker to share practical experience (implementation lessons\, program strategy\, technical deep dives). Sometimes we’ll host short product introductions – but the default posture is educational and experience-driven\, not salesy. When there’s no guest\, we go deeper on the week’s most important developments and prioritize Q&A. \n### **Typical Agenda** \n**0:00 – 0:05 | Welcome + how to engage (fast)** \n* What this meetup is: **signal > hype**\, practical implications\, community-first\n* How to participate today: chat\, Q&A flow\, how to drop links/resources\n* Quick reminder of community channels (Forum / Slack / LinkedIn group) and how to continue the conversation after the call \n**0:05 – 0:25 | The Weekly Signal Brief (what actually changed)**\nA structured scan in four buckets\, with a “so what?” for each: \n* **Policy & regulation:** new drafts\, mandates\, enforcement signals\, procurement rules\n* **Standards & frameworks:** PQC standards movement\, protocol ecosystem changes\, guidance updates\n* **Quantum capability signals:** credible progress indicators (hardware\, error correction\, scaling)\, what to ignore\n* **Cryptography/cryptanalysis:** meaningful research developments\, “RSA/ECC breaking” signals\, security relevance \n**0:25 – 0:35 | Myth‑Busting / Reality Check (the hype audit)**\nIf something got hyped this week\, we’ll do a quick\, repeatable teardown: \n* **What happened** (one sentence)\n* **What didn’t happen** (the misconception)\n* **What it means for defenders** (real impact)\n* **What changes / what doesn’t** in PQC planning this year \n*Goal:* keep the community calibrated\, reduce panic\, and prevent misallocation of effort. \n**0:35 – 0:50 | One Topic\, Deeper (the week’s main story)**\nA focused deep dive on one theme that affects real programs\, such as: \n* crypto-agility patterns and failure modes\n* hybrid deployment realities (where it works / where it’s a trap)\n* migration sequencing and vendor dependency bottlenecks\n* what a standards change means for architects and CISOs\n* integrity-first thinking (e.g.\, signatures\, trust anchors\, long-lived evidence) \n**0:50 – 1:05 | Guest Spotlight (most weeks) OR Community Lightning Round** \n* **Guest Spotlight (preferred when available):**\n* 10–12 min: experience share / lessons learned / case study / product walkthrough (kept educational)\n* 3–5 min: moderated Q&A (“what surprised you / what broke / what you’d do differently”)\n* **If no guest:**\n* 3 lightning shares (3–4 min each): “one paper / one tool / one lesson / one vendor signal” \n**1:05 – 1:10 | Community Pulse (cross‑channel highlights)** \n* “Top 3 threads” from various community channels this week\n* Quick call-outs: members looking for feedback\, volunteer opportunities\, upcoming topics\n* How to propose a guest / suggest topics / share resources for next week \n**1:10 – 1:28 | Open Q&A / Office Hours** \n* Live questions (chat + audio)\n* “Bring your messy problem” time: inventory\, vendor claims\, timeline pressure\, governance\, metrics\n* Optional: rapid-fire “yes/no + why” on 5–8 quick questions if the room is lively \n**1:28 – 1:30 | Wrap + next week preview** \n* 3 takeaways in 30 seconds\n* What we’re tracking next week\n* Speaker/volunteer reminder (“If you’ve shipped something\, we want the story.”) \n### **Who should join** \nIf you’re responsible for security strategy\, cryptography\, identity\, platform security\, resilience\, compliance\, or product security – and quantum is on your roadmap – this is for you. \n### **What you’ll leave with** \n* Clear visibility into what changed this week\n* Better judgment on what’s noise vs. actionable signal\n* Practical framing for decisions you may need to revisit (inventory\, standards alignment\, vendor dependencies\, rollout sequencing)\n* A community you can learn from (and contribute to)
URL:https://appliedquantum.com/event/quantum-security-community-online-fortnightly-update-emea-apac-9
LOCATION:Online event
CATEGORIES:Community
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/03/1024x576-anROVz.jpg
GEO:-8.521147;179.1962
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=+02:00:20260716T170000
DTEND;TZID=+02:00:20260716T183000
DTSTAMP:20260404T134519
CREATED:20260316T100018Z
LAST-MODIFIED:20260404T103027Z
UID:10000042-1784221200-1784226600@appliedquantum.com
SUMMARY:Quantum Security Community - Online Fortnightly Update (America\, EMEA)
DESCRIPTION:***Quantum Security Community*** *is a free\, global\, practitioner-led network sharing real-world PQC insights and supporting one another through the most complex IT/OT security transformation of our time. Explore the channels at* ***[Quantum.Security](https://quantum.security)*** \n—————— \n**A weekly\, online community meetup for quantum security practitioners — focused on signal\, not hype.** \nPost-quantum cryptography (PQC)\, crypto agility\, quantum threat models\, and standards timelines are all evolving quickly. For security teams\, the challenge isn’t “finding information” — it’s deciding **what matters**\, **what changed**\, and **what to do next**. Quantum Security Weekly exists to make that easier. \nWe run the **same meetup twice each week** to cover global time zones: \n* **Session 1:** Europe / Middle East / APAC-friendly\n* **Session 2:** Europe / Americas-friendly\n(Choose the one that fits your schedule – content is aligned across both.) \n### **What happens each week** \nYou’ll get a curated update across the four categories that consistently drive real-world decisions: \n**1) Regulation & policy signals**\nNew requirements\, supervisory guidance\, national strategies\, procurement rules\, sector-specific expectations – and what they imply for timelines and planning. \n**2) Standards and “rules of the road”**\nUpdates to cryptographic standards and related ecosystems (protocols\, identity\, secure elements\, industry frameworks). We focus on what changes adoption feasibility\, interoperability\, or audit/compliance expectations. \n**3) Technical developments**\nCredible signals about quantum computing capability\, relevant cryptanalysis\, and meaningful algorithmic/security research (including “RSA-breaking” or signature-related developments) – explained in terms of security impact\, not headlines. \n**4) Practical implementation reality**\nThe stuff that makes or breaks programs: where crypto actually lives\, dependency chains\, vendor readiness\, device constraints\, performance tradeoffs\, rollout sequencing\, and “what we learned the hard way.” \n### **Speakers and community contributions** \nWe often invite a guest speaker to share practical experience (implementation lessons\, program strategy\, technical deep dives). Sometimes we’ll host short product introductions – but the default posture is educational and experience-driven\, not salesy. When there’s no guest\, we go deeper on the week’s most important developments and prioritize Q&A. \n### **Typical Agenda** \n**0:00 – 0:05 | Welcome + how to engage (fast)** \n* What this meetup is: **signal > hype**\, practical implications\, community-first\n* How to participate today: chat\, Q&A flow\, how to drop links/resources\n* Quick reminder of community channels (Forum / Slack / LinkedIn group) and how to continue the conversation after the call \n**0:05 – 0:25 | The Weekly Signal Brief (what actually changed)**\nA structured scan in four buckets\, with a “so what?” for each: \n* **Policy & regulation:** new drafts\, mandates\, enforcement signals\, procurement rules\n* **Standards & frameworks:** PQC standards movement\, protocol ecosystem changes\, guidance updates\n* **Quantum capability signals:** credible progress indicators (hardware\, error correction\, scaling)\, what to ignore\n* **Cryptography/cryptanalysis:** meaningful research developments\, “RSA/ECC breaking” signals\, security relevance \n**0:25 – 0:35 | Myth‑Busting / Reality Check (the hype audit)**\nIf something got hyped this week\, we’ll do a quick\, repeatable teardown: \n* **What happened** (one sentence)\n* **What didn’t happen** (the misconception)\n* **What it means for defenders** (real impact)\n* **What changes / what doesn’t** in PQC planning this year \n*Goal:* keep the community calibrated\, reduce panic\, and prevent misallocation of effort. \n**0:35 – 0:50 | One Topic\, Deeper (the week’s main story)**\nA focused deep dive on one theme that affects real programs\, such as: \n* crypto-agility patterns and failure modes\n* hybrid deployment realities (where it works / where it’s a trap)\n* migration sequencing and vendor dependency bottlenecks\n* what a standards change means for architects and CISOs\n* integrity-first thinking (e.g.\, signatures\, trust anchors\, long-lived evidence) \n**0:50 – 1:05 | Guest Spotlight (most weeks) OR Community Lightning Round** \n* **Guest Spotlight (preferred when available):**\n* 10–12 min: experience share / lessons learned / case study / product walkthrough (kept educational)\n* 3–5 min: moderated Q&A (“what surprised you / what broke / what you’d do differently”)\n* **If no guest:**\n* 3 lightning shares (3–4 min each): “one paper / one tool / one lesson / one vendor signal” \n**1:05 – 1:10 | Community Pulse (cross‑channel highlights)** \n* “Top 3 threads” from various community channels this week\n* Quick call-outs: members looking for feedback\, volunteer opportunities\, upcoming topics\n* How to propose a guest / suggest topics / share resources for next week \n**1:10 – 1:28 | Open Q&A / Office Hours** \n* Live questions (chat + audio)\n* “Bring your messy problem” time: inventory\, vendor claims\, timeline pressure\, governance\, metrics\n* Optional: rapid-fire “yes/no + why” on 5–8 quick questions if the room is lively \n**1:28 – 1:30 | Wrap + next week preview** \n* 3 takeaways in 30 seconds\n* What we’re tracking next week\n* Speaker/volunteer reminder (“If you’ve shipped something\, we want the story.”) \n### **Who should join** \nIf you’re responsible for security strategy\, cryptography\, identity\, platform security\, resilience\, compliance\, or product security – and quantum is on your roadmap – this is for you. \n### **What you’ll leave with** \n* Clear visibility into what changed this week\n* Better judgment on what’s noise vs. actionable signal\n* Practical framing for decisions you may need to revisit (inventory\, standards alignment\, vendor dependencies\, rollout sequencing)\n* A community you can learn from (and contribute to)
URL:https://appliedquantum.com/event/quantum-security-community-online-fortnightly-update-america-emea-9
LOCATION:Online event
CATEGORIES:Community
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/03/1024x576-bya3VY.jpg
GEO:-8.521147;179.1962
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=+02:00:20260730T090000
DTEND;TZID=+02:00:20260730T103000
DTSTAMP:20260404T134519
CREATED:20260316T100018Z
LAST-MODIFIED:20260404T103027Z
UID:10000043-1785402000-1785407400@appliedquantum.com
SUMMARY:Quantum Security Community - Online Fortnightly Update (EMEA\, APAC)
DESCRIPTION:***Quantum Security Community*** *is a free\, global\, practitioner-led network sharing real-world PQC insights and supporting one another through the most complex IT/OT security transformation of our time. Explore the channels at* ***[Quantum.Security](https://quantum.security)*** \n—————— \n**A weekly\, online community meetup for quantum security practitioners — focused on signal\, not hype.** \nPost-quantum cryptography (PQC)\, crypto agility\, quantum threat models\, and standards timelines are all evolving quickly. For security teams\, the challenge isn’t “finding information” — it’s deciding **what matters**\, **what changed**\, and **what to do next**. Quantum Security Weekly exists to make that easier. \nWe run the **same meetup twice each week** to cover global time zones: \n* **Session 1:** Europe / Middle East / APAC-friendly\n* **Session 2:** Europe / Americas-friendly\n(Choose the one that fits your schedule – content is aligned across both.) \n### **What happens each week** \nYou’ll get a curated update across the four categories that consistently drive real-world decisions: \n**1) Regulation & policy signals**\nNew requirements\, supervisory guidance\, national strategies\, procurement rules\, sector-specific expectations – and what they imply for timelines and planning. \n**2) Standards and “rules of the road”**\nUpdates to cryptographic standards and related ecosystems (protocols\, identity\, secure elements\, industry frameworks). We focus on what changes adoption feasibility\, interoperability\, or audit/compliance expectations. \n**3) Technical developments**\nCredible signals about quantum computing capability\, relevant cryptanalysis\, and meaningful algorithmic/security research (including “RSA-breaking” or signature-related developments) – explained in terms of security impact\, not headlines. \n**4) Practical implementation reality**\nThe stuff that makes or breaks programs: where crypto actually lives\, dependency chains\, vendor readiness\, device constraints\, performance tradeoffs\, rollout sequencing\, and “what we learned the hard way.” \n### **Speakers and community contributions** \nWe often invite a guest speaker to share practical experience (implementation lessons\, program strategy\, technical deep dives). Sometimes we’ll host short product introductions – but the default posture is educational and experience-driven\, not salesy. When there’s no guest\, we go deeper on the week’s most important developments and prioritize Q&A. \n### **Typical Agenda** \n**0:00 – 0:05 | Welcome + how to engage (fast)** \n* What this meetup is: **signal > hype**\, practical implications\, community-first\n* How to participate today: chat\, Q&A flow\, how to drop links/resources\n* Quick reminder of community channels (Forum / Slack / LinkedIn group) and how to continue the conversation after the call \n**0:05 – 0:25 | The Weekly Signal Brief (what actually changed)**\nA structured scan in four buckets\, with a “so what?” for each: \n* **Policy & regulation:** new drafts\, mandates\, enforcement signals\, procurement rules\n* **Standards & frameworks:** PQC standards movement\, protocol ecosystem changes\, guidance updates\n* **Quantum capability signals:** credible progress indicators (hardware\, error correction\, scaling)\, what to ignore\n* **Cryptography/cryptanalysis:** meaningful research developments\, “RSA/ECC breaking” signals\, security relevance \n**0:25 – 0:35 | Myth‑Busting / Reality Check (the hype audit)**\nIf something got hyped this week\, we’ll do a quick\, repeatable teardown: \n* **What happened** (one sentence)\n* **What didn’t happen** (the misconception)\n* **What it means for defenders** (real impact)\n* **What changes / what doesn’t** in PQC planning this year \n*Goal:* keep the community calibrated\, reduce panic\, and prevent misallocation of effort. \n**0:35 – 0:50 | One Topic\, Deeper (the week’s main story)**\nA focused deep dive on one theme that affects real programs\, such as: \n* crypto-agility patterns and failure modes\n* hybrid deployment realities (where it works / where it’s a trap)\n* migration sequencing and vendor dependency bottlenecks\n* what a standards change means for architects and CISOs\n* integrity-first thinking (e.g.\, signatures\, trust anchors\, long-lived evidence) \n**0:50 – 1:05 | Guest Spotlight (most weeks) OR Community Lightning Round** \n* **Guest Spotlight (preferred when available):**\n* 10–12 min: experience share / lessons learned / case study / product walkthrough (kept educational)\n* 3–5 min: moderated Q&A (“what surprised you / what broke / what you’d do differently”)\n* **If no guest:**\n* 3 lightning shares (3–4 min each): “one paper / one tool / one lesson / one vendor signal” \n**1:05 – 1:10 | Community Pulse (cross‑channel highlights)** \n* “Top 3 threads” from various community channels this week\n* Quick call-outs: members looking for feedback\, volunteer opportunities\, upcoming topics\n* How to propose a guest / suggest topics / share resources for next week \n**1:10 – 1:28 | Open Q&A / Office Hours** \n* Live questions (chat + audio)\n* “Bring your messy problem” time: inventory\, vendor claims\, timeline pressure\, governance\, metrics\n* Optional: rapid-fire “yes/no + why” on 5–8 quick questions if the room is lively \n**1:28 – 1:30 | Wrap + next week preview** \n* 3 takeaways in 30 seconds\n* What we’re tracking next week\n* Speaker/volunteer reminder (“If you’ve shipped something\, we want the story.”) \n### **Who should join** \nIf you’re responsible for security strategy\, cryptography\, identity\, platform security\, resilience\, compliance\, or product security – and quantum is on your roadmap – this is for you. \n### **What you’ll leave with** \n* Clear visibility into what changed this week\n* Better judgment on what’s noise vs. actionable signal\n* Practical framing for decisions you may need to revisit (inventory\, standards alignment\, vendor dependencies\, rollout sequencing)\n* A community you can learn from (and contribute to)
URL:https://appliedquantum.com/event/quantum-security-community-online-fortnightly-update-emea-apac-10
LOCATION:Online event
CATEGORIES:Community
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/03/1024x576-anROVz.jpg
GEO:-8.521147;179.1962
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=+02:00:20260730T170000
DTEND;TZID=+02:00:20260730T183000
DTSTAMP:20260404T134519
CREATED:20260316T100018Z
LAST-MODIFIED:20260404T103027Z
UID:10000044-1785430800-1785436200@appliedquantum.com
SUMMARY:Quantum Security Community - Online Fortnightly Update (America\, EMEA)
DESCRIPTION:***Quantum Security Community*** *is a free\, global\, practitioner-led network sharing real-world PQC insights and supporting one another through the most complex IT/OT security transformation of our time. Explore the channels at* ***[Quantum.Security](https://quantum.security)*** \n—————— \n**A weekly\, online community meetup for quantum security practitioners — focused on signal\, not hype.** \nPost-quantum cryptography (PQC)\, crypto agility\, quantum threat models\, and standards timelines are all evolving quickly. For security teams\, the challenge isn’t “finding information” — it’s deciding **what matters**\, **what changed**\, and **what to do next**. Quantum Security Weekly exists to make that easier. \nWe run the **same meetup twice each week** to cover global time zones: \n* **Session 1:** Europe / Middle East / APAC-friendly\n* **Session 2:** Europe / Americas-friendly\n(Choose the one that fits your schedule – content is aligned across both.) \n### **What happens each week** \nYou’ll get a curated update across the four categories that consistently drive real-world decisions: \n**1) Regulation & policy signals**\nNew requirements\, supervisory guidance\, national strategies\, procurement rules\, sector-specific expectations – and what they imply for timelines and planning. \n**2) Standards and “rules of the road”**\nUpdates to cryptographic standards and related ecosystems (protocols\, identity\, secure elements\, industry frameworks). We focus on what changes adoption feasibility\, interoperability\, or audit/compliance expectations. \n**3) Technical developments**\nCredible signals about quantum computing capability\, relevant cryptanalysis\, and meaningful algorithmic/security research (including “RSA-breaking” or signature-related developments) – explained in terms of security impact\, not headlines. \n**4) Practical implementation reality**\nThe stuff that makes or breaks programs: where crypto actually lives\, dependency chains\, vendor readiness\, device constraints\, performance tradeoffs\, rollout sequencing\, and “what we learned the hard way.” \n### **Speakers and community contributions** \nWe often invite a guest speaker to share practical experience (implementation lessons\, program strategy\, technical deep dives). Sometimes we’ll host short product introductions – but the default posture is educational and experience-driven\, not salesy. When there’s no guest\, we go deeper on the week’s most important developments and prioritize Q&A. \n### **Typical Agenda** \n**0:00 – 0:05 | Welcome + how to engage (fast)** \n* What this meetup is: **signal > hype**\, practical implications\, community-first\n* How to participate today: chat\, Q&A flow\, how to drop links/resources\n* Quick reminder of community channels (Forum / Slack / LinkedIn group) and how to continue the conversation after the call \n**0:05 – 0:25 | The Weekly Signal Brief (what actually changed)**\nA structured scan in four buckets\, with a “so what?” for each: \n* **Policy & regulation:** new drafts\, mandates\, enforcement signals\, procurement rules\n* **Standards & frameworks:** PQC standards movement\, protocol ecosystem changes\, guidance updates\n* **Quantum capability signals:** credible progress indicators (hardware\, error correction\, scaling)\, what to ignore\n* **Cryptography/cryptanalysis:** meaningful research developments\, “RSA/ECC breaking” signals\, security relevance \n**0:25 – 0:35 | Myth‑Busting / Reality Check (the hype audit)**\nIf something got hyped this week\, we’ll do a quick\, repeatable teardown: \n* **What happened** (one sentence)\n* **What didn’t happen** (the misconception)\n* **What it means for defenders** (real impact)\n* **What changes / what doesn’t** in PQC planning this year \n*Goal:* keep the community calibrated\, reduce panic\, and prevent misallocation of effort. \n**0:35 – 0:50 | One Topic\, Deeper (the week’s main story)**\nA focused deep dive on one theme that affects real programs\, such as: \n* crypto-agility patterns and failure modes\n* hybrid deployment realities (where it works / where it’s a trap)\n* migration sequencing and vendor dependency bottlenecks\n* what a standards change means for architects and CISOs\n* integrity-first thinking (e.g.\, signatures\, trust anchors\, long-lived evidence) \n**0:50 – 1:05 | Guest Spotlight (most weeks) OR Community Lightning Round** \n* **Guest Spotlight (preferred when available):**\n* 10–12 min: experience share / lessons learned / case study / product walkthrough (kept educational)\n* 3–5 min: moderated Q&A (“what surprised you / what broke / what you’d do differently”)\n* **If no guest:**\n* 3 lightning shares (3–4 min each): “one paper / one tool / one lesson / one vendor signal” \n**1:05 – 1:10 | Community Pulse (cross‑channel highlights)** \n* “Top 3 threads” from various community channels this week\n* Quick call-outs: members looking for feedback\, volunteer opportunities\, upcoming topics\n* How to propose a guest / suggest topics / share resources for next week \n**1:10 – 1:28 | Open Q&A / Office Hours** \n* Live questions (chat + audio)\n* “Bring your messy problem” time: inventory\, vendor claims\, timeline pressure\, governance\, metrics\n* Optional: rapid-fire “yes/no + why” on 5–8 quick questions if the room is lively \n**1:28 – 1:30 | Wrap + next week preview** \n* 3 takeaways in 30 seconds\n* What we’re tracking next week\n* Speaker/volunteer reminder (“If you’ve shipped something\, we want the story.”) \n### **Who should join** \nIf you’re responsible for security strategy\, cryptography\, identity\, platform security\, resilience\, compliance\, or product security – and quantum is on your roadmap – this is for you. \n### **What you’ll leave with** \n* Clear visibility into what changed this week\n* Better judgment on what’s noise vs. actionable signal\n* Practical framing for decisions you may need to revisit (inventory\, standards alignment\, vendor dependencies\, rollout sequencing)\n* A community you can learn from (and contribute to)
URL:https://appliedquantum.com/event/quantum-security-community-online-fortnightly-update-america-emea-10
LOCATION:Online event
CATEGORIES:Community
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/03/1024x576-bya3VY.jpg
GEO:-8.521147;179.1962
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=+02:00:20260813T090000
DTEND;TZID=+02:00:20260813T103000
DTSTAMP:20260404T134519
CREATED:20260316T100018Z
LAST-MODIFIED:20260404T103027Z
UID:10000045-1786611600-1786617000@appliedquantum.com
SUMMARY:Quantum Security Community - Online Fortnightly Update (EMEA\, APAC)
DESCRIPTION:***Quantum Security Community*** *is a free\, global\, practitioner-led network sharing real-world PQC insights and supporting one another through the most complex IT/OT security transformation of our time. Explore the channels at* ***[Quantum.Security](https://quantum.security)*** \n—————— \n**A weekly\, online community meetup for quantum security practitioners — focused on signal\, not hype.** \nPost-quantum cryptography (PQC)\, crypto agility\, quantum threat models\, and standards timelines are all evolving quickly. For security teams\, the challenge isn’t “finding information” — it’s deciding **what matters**\, **what changed**\, and **what to do next**. Quantum Security Weekly exists to make that easier. \nWe run the **same meetup twice each week** to cover global time zones: \n* **Session 1:** Europe / Middle East / APAC-friendly\n* **Session 2:** Europe / Americas-friendly\n(Choose the one that fits your schedule – content is aligned across both.) \n### **What happens each week** \nYou’ll get a curated update across the four categories that consistently drive real-world decisions: \n**1) Regulation & policy signals**\nNew requirements\, supervisory guidance\, national strategies\, procurement rules\, sector-specific expectations – and what they imply for timelines and planning. \n**2) Standards and “rules of the road”**\nUpdates to cryptographic standards and related ecosystems (protocols\, identity\, secure elements\, industry frameworks). We focus on what changes adoption feasibility\, interoperability\, or audit/compliance expectations. \n**3) Technical developments**\nCredible signals about quantum computing capability\, relevant cryptanalysis\, and meaningful algorithmic/security research (including “RSA-breaking” or signature-related developments) – explained in terms of security impact\, not headlines. \n**4) Practical implementation reality**\nThe stuff that makes or breaks programs: where crypto actually lives\, dependency chains\, vendor readiness\, device constraints\, performance tradeoffs\, rollout sequencing\, and “what we learned the hard way.” \n### **Speakers and community contributions** \nWe often invite a guest speaker to share practical experience (implementation lessons\, program strategy\, technical deep dives). Sometimes we’ll host short product introductions – but the default posture is educational and experience-driven\, not salesy. When there’s no guest\, we go deeper on the week’s most important developments and prioritize Q&A. \n### **Typical Agenda** \n**0:00 – 0:05 | Welcome + how to engage (fast)** \n* What this meetup is: **signal > hype**\, practical implications\, community-first\n* How to participate today: chat\, Q&A flow\, how to drop links/resources\n* Quick reminder of community channels (Forum / Slack / LinkedIn group) and how to continue the conversation after the call \n**0:05 – 0:25 | The Weekly Signal Brief (what actually changed)**\nA structured scan in four buckets\, with a “so what?” for each: \n* **Policy & regulation:** new drafts\, mandates\, enforcement signals\, procurement rules\n* **Standards & frameworks:** PQC standards movement\, protocol ecosystem changes\, guidance updates\n* **Quantum capability signals:** credible progress indicators (hardware\, error correction\, scaling)\, what to ignore\n* **Cryptography/cryptanalysis:** meaningful research developments\, “RSA/ECC breaking” signals\, security relevance \n**0:25 – 0:35 | Myth‑Busting / Reality Check (the hype audit)**\nIf something got hyped this week\, we’ll do a quick\, repeatable teardown: \n* **What happened** (one sentence)\n* **What didn’t happen** (the misconception)\n* **What it means for defenders** (real impact)\n* **What changes / what doesn’t** in PQC planning this year \n*Goal:* keep the community calibrated\, reduce panic\, and prevent misallocation of effort. \n**0:35 – 0:50 | One Topic\, Deeper (the week’s main story)**\nA focused deep dive on one theme that affects real programs\, such as: \n* crypto-agility patterns and failure modes\n* hybrid deployment realities (where it works / where it’s a trap)\n* migration sequencing and vendor dependency bottlenecks\n* what a standards change means for architects and CISOs\n* integrity-first thinking (e.g.\, signatures\, trust anchors\, long-lived evidence) \n**0:50 – 1:05 | Guest Spotlight (most weeks) OR Community Lightning Round** \n* **Guest Spotlight (preferred when available):**\n* 10–12 min: experience share / lessons learned / case study / product walkthrough (kept educational)\n* 3–5 min: moderated Q&A (“what surprised you / what broke / what you’d do differently”)\n* **If no guest:**\n* 3 lightning shares (3–4 min each): “one paper / one tool / one lesson / one vendor signal” \n**1:05 – 1:10 | Community Pulse (cross‑channel highlights)** \n* “Top 3 threads” from various community channels this week\n* Quick call-outs: members looking for feedback\, volunteer opportunities\, upcoming topics\n* How to propose a guest / suggest topics / share resources for next week \n**1:10 – 1:28 | Open Q&A / Office Hours** \n* Live questions (chat + audio)\n* “Bring your messy problem” time: inventory\, vendor claims\, timeline pressure\, governance\, metrics\n* Optional: rapid-fire “yes/no + why” on 5–8 quick questions if the room is lively \n**1:28 – 1:30 | Wrap + next week preview** \n* 3 takeaways in 30 seconds\n* What we’re tracking next week\n* Speaker/volunteer reminder (“If you’ve shipped something\, we want the story.”) \n### **Who should join** \nIf you’re responsible for security strategy\, cryptography\, identity\, platform security\, resilience\, compliance\, or product security – and quantum is on your roadmap – this is for you. \n### **What you’ll leave with** \n* Clear visibility into what changed this week\n* Better judgment on what’s noise vs. actionable signal\n* Practical framing for decisions you may need to revisit (inventory\, standards alignment\, vendor dependencies\, rollout sequencing)\n* A community you can learn from (and contribute to)
URL:https://appliedquantum.com/event/quantum-security-community-online-fortnightly-update-emea-apac-11
LOCATION:Online event
CATEGORIES:Community
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/03/1024x576-anROVz.jpg
GEO:-8.521147;179.1962
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=+02:00:20260813T170000
DTEND;TZID=+02:00:20260813T183000
DTSTAMP:20260404T134519
CREATED:20260316T100018Z
LAST-MODIFIED:20260404T103027Z
UID:10000046-1786640400-1786645800@appliedquantum.com
SUMMARY:Quantum Security Community - Online Fortnightly Update (America\, EMEA)
DESCRIPTION:***Quantum Security Community*** *is a free\, global\, practitioner-led network sharing real-world PQC insights and supporting one another through the most complex IT/OT security transformation of our time. Explore the channels at* ***[Quantum.Security](https://quantum.security)*** \n—————— \n**A weekly\, online community meetup for quantum security practitioners — focused on signal\, not hype.** \nPost-quantum cryptography (PQC)\, crypto agility\, quantum threat models\, and standards timelines are all evolving quickly. For security teams\, the challenge isn’t “finding information” — it’s deciding **what matters**\, **what changed**\, and **what to do next**. Quantum Security Weekly exists to make that easier. \nWe run the **same meetup twice each week** to cover global time zones: \n* **Session 1:** Europe / Middle East / APAC-friendly\n* **Session 2:** Europe / Americas-friendly\n(Choose the one that fits your schedule – content is aligned across both.) \n### **What happens each week** \nYou’ll get a curated update across the four categories that consistently drive real-world decisions: \n**1) Regulation & policy signals**\nNew requirements\, supervisory guidance\, national strategies\, procurement rules\, sector-specific expectations – and what they imply for timelines and planning. \n**2) Standards and “rules of the road”**\nUpdates to cryptographic standards and related ecosystems (protocols\, identity\, secure elements\, industry frameworks). We focus on what changes adoption feasibility\, interoperability\, or audit/compliance expectations. \n**3) Technical developments**\nCredible signals about quantum computing capability\, relevant cryptanalysis\, and meaningful algorithmic/security research (including “RSA-breaking” or signature-related developments) – explained in terms of security impact\, not headlines. \n**4) Practical implementation reality**\nThe stuff that makes or breaks programs: where crypto actually lives\, dependency chains\, vendor readiness\, device constraints\, performance tradeoffs\, rollout sequencing\, and “what we learned the hard way.” \n### **Speakers and community contributions** \nWe often invite a guest speaker to share practical experience (implementation lessons\, program strategy\, technical deep dives). Sometimes we’ll host short product introductions – but the default posture is educational and experience-driven\, not salesy. When there’s no guest\, we go deeper on the week’s most important developments and prioritize Q&A. \n### **Typical Agenda** \n**0:00 – 0:05 | Welcome + how to engage (fast)** \n* What this meetup is: **signal > hype**\, practical implications\, community-first\n* How to participate today: chat\, Q&A flow\, how to drop links/resources\n* Quick reminder of community channels (Forum / Slack / LinkedIn group) and how to continue the conversation after the call \n**0:05 – 0:25 | The Weekly Signal Brief (what actually changed)**\nA structured scan in four buckets\, with a “so what?” for each: \n* **Policy & regulation:** new drafts\, mandates\, enforcement signals\, procurement rules\n* **Standards & frameworks:** PQC standards movement\, protocol ecosystem changes\, guidance updates\n* **Quantum capability signals:** credible progress indicators (hardware\, error correction\, scaling)\, what to ignore\n* **Cryptography/cryptanalysis:** meaningful research developments\, “RSA/ECC breaking” signals\, security relevance \n**0:25 – 0:35 | Myth‑Busting / Reality Check (the hype audit)**\nIf something got hyped this week\, we’ll do a quick\, repeatable teardown: \n* **What happened** (one sentence)\n* **What didn’t happen** (the misconception)\n* **What it means for defenders** (real impact)\n* **What changes / what doesn’t** in PQC planning this year \n*Goal:* keep the community calibrated\, reduce panic\, and prevent misallocation of effort. \n**0:35 – 0:50 | One Topic\, Deeper (the week’s main story)**\nA focused deep dive on one theme that affects real programs\, such as: \n* crypto-agility patterns and failure modes\n* hybrid deployment realities (where it works / where it’s a trap)\n* migration sequencing and vendor dependency bottlenecks\n* what a standards change means for architects and CISOs\n* integrity-first thinking (e.g.\, signatures\, trust anchors\, long-lived evidence) \n**0:50 – 1:05 | Guest Spotlight (most weeks) OR Community Lightning Round** \n* **Guest Spotlight (preferred when available):**\n* 10–12 min: experience share / lessons learned / case study / product walkthrough (kept educational)\n* 3–5 min: moderated Q&A (“what surprised you / what broke / what you’d do differently”)\n* **If no guest:**\n* 3 lightning shares (3–4 min each): “one paper / one tool / one lesson / one vendor signal” \n**1:05 – 1:10 | Community Pulse (cross‑channel highlights)** \n* “Top 3 threads” from various community channels this week\n* Quick call-outs: members looking for feedback\, volunteer opportunities\, upcoming topics\n* How to propose a guest / suggest topics / share resources for next week \n**1:10 – 1:28 | Open Q&A / Office Hours** \n* Live questions (chat + audio)\n* “Bring your messy problem” time: inventory\, vendor claims\, timeline pressure\, governance\, metrics\n* Optional: rapid-fire “yes/no + why” on 5–8 quick questions if the room is lively \n**1:28 – 1:30 | Wrap + next week preview** \n* 3 takeaways in 30 seconds\n* What we’re tracking next week\n* Speaker/volunteer reminder (“If you’ve shipped something\, we want the story.”) \n### **Who should join** \nIf you’re responsible for security strategy\, cryptography\, identity\, platform security\, resilience\, compliance\, or product security – and quantum is on your roadmap – this is for you. \n### **What you’ll leave with** \n* Clear visibility into what changed this week\n* Better judgment on what’s noise vs. actionable signal\n* Practical framing for decisions you may need to revisit (inventory\, standards alignment\, vendor dependencies\, rollout sequencing)\n* A community you can learn from (and contribute to)
URL:https://appliedquantum.com/event/quantum-security-community-online-fortnightly-update-america-emea-11
LOCATION:Online event
CATEGORIES:Community
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/03/1024x576-bya3VY.jpg
GEO:-8.521147;179.1962
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=+02:00:20260827T090000
DTEND;TZID=+02:00:20260827T103000
DTSTAMP:20260404T134519
CREATED:20260316T100019Z
LAST-MODIFIED:20260404T103027Z
UID:10000047-1787821200-1787826600@appliedquantum.com
SUMMARY:Quantum Security Community - Online Fortnightly Update (EMEA\, APAC)
DESCRIPTION:***Quantum Security Community*** *is a free\, global\, practitioner-led network sharing real-world PQC insights and supporting one another through the most complex IT/OT security transformation of our time. Explore the channels at* ***[Quantum.Security](https://quantum.security)*** \n—————— \n**A weekly\, online community meetup for quantum security practitioners — focused on signal\, not hype.** \nPost-quantum cryptography (PQC)\, crypto agility\, quantum threat models\, and standards timelines are all evolving quickly. For security teams\, the challenge isn’t “finding information” — it’s deciding **what matters**\, **what changed**\, and **what to do next**. Quantum Security Weekly exists to make that easier. \nWe run the **same meetup twice each week** to cover global time zones: \n* **Session 1:** Europe / Middle East / APAC-friendly\n* **Session 2:** Europe / Americas-friendly\n(Choose the one that fits your schedule – content is aligned across both.) \n### **What happens each week** \nYou’ll get a curated update across the four categories that consistently drive real-world decisions: \n**1) Regulation & policy signals**\nNew requirements\, supervisory guidance\, national strategies\, procurement rules\, sector-specific expectations – and what they imply for timelines and planning. \n**2) Standards and “rules of the road”**\nUpdates to cryptographic standards and related ecosystems (protocols\, identity\, secure elements\, industry frameworks). We focus on what changes adoption feasibility\, interoperability\, or audit/compliance expectations. \n**3) Technical developments**\nCredible signals about quantum computing capability\, relevant cryptanalysis\, and meaningful algorithmic/security research (including “RSA-breaking” or signature-related developments) – explained in terms of security impact\, not headlines. \n**4) Practical implementation reality**\nThe stuff that makes or breaks programs: where crypto actually lives\, dependency chains\, vendor readiness\, device constraints\, performance tradeoffs\, rollout sequencing\, and “what we learned the hard way.” \n### **Speakers and community contributions** \nWe often invite a guest speaker to share practical experience (implementation lessons\, program strategy\, technical deep dives). Sometimes we’ll host short product introductions – but the default posture is educational and experience-driven\, not salesy. When there’s no guest\, we go deeper on the week’s most important developments and prioritize Q&A. \n### **Typical Agenda** \n**0:00 – 0:05 | Welcome + how to engage (fast)** \n* What this meetup is: **signal > hype**\, practical implications\, community-first\n* How to participate today: chat\, Q&A flow\, how to drop links/resources\n* Quick reminder of community channels (Forum / Slack / LinkedIn group) and how to continue the conversation after the call \n**0:05 – 0:25 | The Weekly Signal Brief (what actually changed)**\nA structured scan in four buckets\, with a “so what?” for each: \n* **Policy & regulation:** new drafts\, mandates\, enforcement signals\, procurement rules\n* **Standards & frameworks:** PQC standards movement\, protocol ecosystem changes\, guidance updates\n* **Quantum capability signals:** credible progress indicators (hardware\, error correction\, scaling)\, what to ignore\n* **Cryptography/cryptanalysis:** meaningful research developments\, “RSA/ECC breaking” signals\, security relevance \n**0:25 – 0:35 | Myth‑Busting / Reality Check (the hype audit)**\nIf something got hyped this week\, we’ll do a quick\, repeatable teardown: \n* **What happened** (one sentence)\n* **What didn’t happen** (the misconception)\n* **What it means for defenders** (real impact)\n* **What changes / what doesn’t** in PQC planning this year \n*Goal:* keep the community calibrated\, reduce panic\, and prevent misallocation of effort. \n**0:35 – 0:50 | One Topic\, Deeper (the week’s main story)**\nA focused deep dive on one theme that affects real programs\, such as: \n* crypto-agility patterns and failure modes\n* hybrid deployment realities (where it works / where it’s a trap)\n* migration sequencing and vendor dependency bottlenecks\n* what a standards change means for architects and CISOs\n* integrity-first thinking (e.g.\, signatures\, trust anchors\, long-lived evidence) \n**0:50 – 1:05 | Guest Spotlight (most weeks) OR Community Lightning Round** \n* **Guest Spotlight (preferred when available):**\n* 10–12 min: experience share / lessons learned / case study / product walkthrough (kept educational)\n* 3–5 min: moderated Q&A (“what surprised you / what broke / what you’d do differently”)\n* **If no guest:**\n* 3 lightning shares (3–4 min each): “one paper / one tool / one lesson / one vendor signal” \n**1:05 – 1:10 | Community Pulse (cross‑channel highlights)** \n* “Top 3 threads” from various community channels this week\n* Quick call-outs: members looking for feedback\, volunteer opportunities\, upcoming topics\n* How to propose a guest / suggest topics / share resources for next week \n**1:10 – 1:28 | Open Q&A / Office Hours** \n* Live questions (chat + audio)\n* “Bring your messy problem” time: inventory\, vendor claims\, timeline pressure\, governance\, metrics\n* Optional: rapid-fire “yes/no + why” on 5–8 quick questions if the room is lively \n**1:28 – 1:30 | Wrap + next week preview** \n* 3 takeaways in 30 seconds\n* What we’re tracking next week\n* Speaker/volunteer reminder (“If you’ve shipped something\, we want the story.”) \n### **Who should join** \nIf you’re responsible for security strategy\, cryptography\, identity\, platform security\, resilience\, compliance\, or product security – and quantum is on your roadmap – this is for you. \n### **What you’ll leave with** \n* Clear visibility into what changed this week\n* Better judgment on what’s noise vs. actionable signal\n* Practical framing for decisions you may need to revisit (inventory\, standards alignment\, vendor dependencies\, rollout sequencing)\n* A community you can learn from (and contribute to)
URL:https://appliedquantum.com/event/quantum-security-community-online-fortnightly-update-emea-apac-12
LOCATION:Online event
CATEGORIES:Community
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/03/1024x576-anROVz.jpg
GEO:-8.521147;179.1962
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=+02:00:20260827T170000
DTEND;TZID=+02:00:20260827T183000
DTSTAMP:20260404T134519
CREATED:20260316T100019Z
LAST-MODIFIED:20260404T103027Z
UID:10000048-1787850000-1787855400@appliedquantum.com
SUMMARY:Quantum Security Community - Online Fortnightly Update (America\, EMEA)
DESCRIPTION:***Quantum Security Community*** *is a free\, global\, practitioner-led network sharing real-world PQC insights and supporting one another through the most complex IT/OT security transformation of our time. Explore the channels at* ***[Quantum.Security](https://quantum.security)*** \n—————— \n**A weekly\, online community meetup for quantum security practitioners — focused on signal\, not hype.** \nPost-quantum cryptography (PQC)\, crypto agility\, quantum threat models\, and standards timelines are all evolving quickly. For security teams\, the challenge isn’t “finding information” — it’s deciding **what matters**\, **what changed**\, and **what to do next**. Quantum Security Weekly exists to make that easier. \nWe run the **same meetup twice each week** to cover global time zones: \n* **Session 1:** Europe / Middle East / APAC-friendly\n* **Session 2:** Europe / Americas-friendly\n(Choose the one that fits your schedule – content is aligned across both.) \n### **What happens each week** \nYou’ll get a curated update across the four categories that consistently drive real-world decisions: \n**1) Regulation & policy signals**\nNew requirements\, supervisory guidance\, national strategies\, procurement rules\, sector-specific expectations – and what they imply for timelines and planning. \n**2) Standards and “rules of the road”**\nUpdates to cryptographic standards and related ecosystems (protocols\, identity\, secure elements\, industry frameworks). We focus on what changes adoption feasibility\, interoperability\, or audit/compliance expectations. \n**3) Technical developments**\nCredible signals about quantum computing capability\, relevant cryptanalysis\, and meaningful algorithmic/security research (including “RSA-breaking” or signature-related developments) – explained in terms of security impact\, not headlines. \n**4) Practical implementation reality**\nThe stuff that makes or breaks programs: where crypto actually lives\, dependency chains\, vendor readiness\, device constraints\, performance tradeoffs\, rollout sequencing\, and “what we learned the hard way.” \n### **Speakers and community contributions** \nWe often invite a guest speaker to share practical experience (implementation lessons\, program strategy\, technical deep dives). Sometimes we’ll host short product introductions – but the default posture is educational and experience-driven\, not salesy. When there’s no guest\, we go deeper on the week’s most important developments and prioritize Q&A. \n### **Typical Agenda** \n**0:00 – 0:05 | Welcome + how to engage (fast)** \n* What this meetup is: **signal > hype**\, practical implications\, community-first\n* How to participate today: chat\, Q&A flow\, how to drop links/resources\n* Quick reminder of community channels (Forum / Slack / LinkedIn group) and how to continue the conversation after the call \n**0:05 – 0:25 | The Weekly Signal Brief (what actually changed)**\nA structured scan in four buckets\, with a “so what?” for each: \n* **Policy & regulation:** new drafts\, mandates\, enforcement signals\, procurement rules\n* **Standards & frameworks:** PQC standards movement\, protocol ecosystem changes\, guidance updates\n* **Quantum capability signals:** credible progress indicators (hardware\, error correction\, scaling)\, what to ignore\n* **Cryptography/cryptanalysis:** meaningful research developments\, “RSA/ECC breaking” signals\, security relevance \n**0:25 – 0:35 | Myth‑Busting / Reality Check (the hype audit)**\nIf something got hyped this week\, we’ll do a quick\, repeatable teardown: \n* **What happened** (one sentence)\n* **What didn’t happen** (the misconception)\n* **What it means for defenders** (real impact)\n* **What changes / what doesn’t** in PQC planning this year \n*Goal:* keep the community calibrated\, reduce panic\, and prevent misallocation of effort. \n**0:35 – 0:50 | One Topic\, Deeper (the week’s main story)**\nA focused deep dive on one theme that affects real programs\, such as: \n* crypto-agility patterns and failure modes\n* hybrid deployment realities (where it works / where it’s a trap)\n* migration sequencing and vendor dependency bottlenecks\n* what a standards change means for architects and CISOs\n* integrity-first thinking (e.g.\, signatures\, trust anchors\, long-lived evidence) \n**0:50 – 1:05 | Guest Spotlight (most weeks) OR Community Lightning Round** \n* **Guest Spotlight (preferred when available):**\n* 10–12 min: experience share / lessons learned / case study / product walkthrough (kept educational)\n* 3–5 min: moderated Q&A (“what surprised you / what broke / what you’d do differently”)\n* **If no guest:**\n* 3 lightning shares (3–4 min each): “one paper / one tool / one lesson / one vendor signal” \n**1:05 – 1:10 | Community Pulse (cross‑channel highlights)** \n* “Top 3 threads” from various community channels this week\n* Quick call-outs: members looking for feedback\, volunteer opportunities\, upcoming topics\n* How to propose a guest / suggest topics / share resources for next week \n**1:10 – 1:28 | Open Q&A / Office Hours** \n* Live questions (chat + audio)\n* “Bring your messy problem” time: inventory\, vendor claims\, timeline pressure\, governance\, metrics\n* Optional: rapid-fire “yes/no + why” on 5–8 quick questions if the room is lively \n**1:28 – 1:30 | Wrap + next week preview** \n* 3 takeaways in 30 seconds\n* What we’re tracking next week\n* Speaker/volunteer reminder (“If you’ve shipped something\, we want the story.”) \n### **Who should join** \nIf you’re responsible for security strategy\, cryptography\, identity\, platform security\, resilience\, compliance\, or product security – and quantum is on your roadmap – this is for you. \n### **What you’ll leave with** \n* Clear visibility into what changed this week\n* Better judgment on what’s noise vs. actionable signal\n* Practical framing for decisions you may need to revisit (inventory\, standards alignment\, vendor dependencies\, rollout sequencing)\n* A community you can learn from (and contribute to)
URL:https://appliedquantum.com/event/quantum-security-community-online-fortnightly-update-america-emea-12
LOCATION:Online event
CATEGORIES:Community
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/03/1024x576-bya3VY.jpg
GEO:-8.521147;179.1962
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=+02:00:20260910T090000
DTEND;TZID=+02:00:20260910T103000
DTSTAMP:20260404T134519
CREATED:20260316T100019Z
LAST-MODIFIED:20260404T103027Z
UID:10000049-1789030800-1789036200@appliedquantum.com
SUMMARY:Quantum Security Community - Online Fortnightly Update (EMEA\, APAC)
DESCRIPTION:***Quantum Security Community*** *is a free\, global\, practitioner-led network sharing real-world PQC insights and supporting one another through the most complex IT/OT security transformation of our time. Explore the channels at* ***[Quantum.Security](https://quantum.security)*** \n—————— \n**A weekly\, online community meetup for quantum security practitioners — focused on signal\, not hype.** \nPost-quantum cryptography (PQC)\, crypto agility\, quantum threat models\, and standards timelines are all evolving quickly. For security teams\, the challenge isn’t “finding information” — it’s deciding **what matters**\, **what changed**\, and **what to do next**. Quantum Security Weekly exists to make that easier. \nWe run the **same meetup twice each week** to cover global time zones: \n* **Session 1:** Europe / Middle East / APAC-friendly\n* **Session 2:** Europe / Americas-friendly\n(Choose the one that fits your schedule – content is aligned across both.) \n### **What happens each week** \nYou’ll get a curated update across the four categories that consistently drive real-world decisions: \n**1) Regulation & policy signals**\nNew requirements\, supervisory guidance\, national strategies\, procurement rules\, sector-specific expectations – and what they imply for timelines and planning. \n**2) Standards and “rules of the road”**\nUpdates to cryptographic standards and related ecosystems (protocols\, identity\, secure elements\, industry frameworks). We focus on what changes adoption feasibility\, interoperability\, or audit/compliance expectations. \n**3) Technical developments**\nCredible signals about quantum computing capability\, relevant cryptanalysis\, and meaningful algorithmic/security research (including “RSA-breaking” or signature-related developments) – explained in terms of security impact\, not headlines. \n**4) Practical implementation reality**\nThe stuff that makes or breaks programs: where crypto actually lives\, dependency chains\, vendor readiness\, device constraints\, performance tradeoffs\, rollout sequencing\, and “what we learned the hard way.” \n### **Speakers and community contributions** \nWe often invite a guest speaker to share practical experience (implementation lessons\, program strategy\, technical deep dives). Sometimes we’ll host short product introductions – but the default posture is educational and experience-driven\, not salesy. When there’s no guest\, we go deeper on the week’s most important developments and prioritize Q&A. \n### **Typical Agenda** \n**0:00 – 0:05 | Welcome + how to engage (fast)** \n* What this meetup is: **signal > hype**\, practical implications\, community-first\n* How to participate today: chat\, Q&A flow\, how to drop links/resources\n* Quick reminder of community channels (Forum / Slack / LinkedIn group) and how to continue the conversation after the call \n**0:05 – 0:25 | The Weekly Signal Brief (what actually changed)**\nA structured scan in four buckets\, with a “so what?” for each: \n* **Policy & regulation:** new drafts\, mandates\, enforcement signals\, procurement rules\n* **Standards & frameworks:** PQC standards movement\, protocol ecosystem changes\, guidance updates\n* **Quantum capability signals:** credible progress indicators (hardware\, error correction\, scaling)\, what to ignore\n* **Cryptography/cryptanalysis:** meaningful research developments\, “RSA/ECC breaking” signals\, security relevance \n**0:25 – 0:35 | Myth‑Busting / Reality Check (the hype audit)**\nIf something got hyped this week\, we’ll do a quick\, repeatable teardown: \n* **What happened** (one sentence)\n* **What didn’t happen** (the misconception)\n* **What it means for defenders** (real impact)\n* **What changes / what doesn’t** in PQC planning this year \n*Goal:* keep the community calibrated\, reduce panic\, and prevent misallocation of effort. \n**0:35 – 0:50 | One Topic\, Deeper (the week’s main story)**\nA focused deep dive on one theme that affects real programs\, such as: \n* crypto-agility patterns and failure modes\n* hybrid deployment realities (where it works / where it’s a trap)\n* migration sequencing and vendor dependency bottlenecks\n* what a standards change means for architects and CISOs\n* integrity-first thinking (e.g.\, signatures\, trust anchors\, long-lived evidence) \n**0:50 – 1:05 | Guest Spotlight (most weeks) OR Community Lightning Round** \n* **Guest Spotlight (preferred when available):**\n* 10–12 min: experience share / lessons learned / case study / product walkthrough (kept educational)\n* 3–5 min: moderated Q&A (“what surprised you / what broke / what you’d do differently”)\n* **If no guest:**\n* 3 lightning shares (3–4 min each): “one paper / one tool / one lesson / one vendor signal” \n**1:05 – 1:10 | Community Pulse (cross‑channel highlights)** \n* “Top 3 threads” from various community channels this week\n* Quick call-outs: members looking for feedback\, volunteer opportunities\, upcoming topics\n* How to propose a guest / suggest topics / share resources for next week \n**1:10 – 1:28 | Open Q&A / Office Hours** \n* Live questions (chat + audio)\n* “Bring your messy problem” time: inventory\, vendor claims\, timeline pressure\, governance\, metrics\n* Optional: rapid-fire “yes/no + why” on 5–8 quick questions if the room is lively \n**1:28 – 1:30 | Wrap + next week preview** \n* 3 takeaways in 30 seconds\n* What we’re tracking next week\n* Speaker/volunteer reminder (“If you’ve shipped something\, we want the story.”) \n### **Who should join** \nIf you’re responsible for security strategy\, cryptography\, identity\, platform security\, resilience\, compliance\, or product security – and quantum is on your roadmap – this is for you. \n### **What you’ll leave with** \n* Clear visibility into what changed this week\n* Better judgment on what’s noise vs. actionable signal\n* Practical framing for decisions you may need to revisit (inventory\, standards alignment\, vendor dependencies\, rollout sequencing)\n* A community you can learn from (and contribute to)
URL:https://appliedquantum.com/event/quantum-security-community-online-fortnightly-update-emea-apac-13
LOCATION:Online event
CATEGORIES:Community
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/03/1024x576-anROVz.jpg
GEO:-8.521147;179.1962
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=+02:00:20260910T170000
DTEND;TZID=+02:00:20260910T183000
DTSTAMP:20260404T134519
CREATED:20260316T100019Z
LAST-MODIFIED:20260404T103027Z
UID:10000050-1789059600-1789065000@appliedquantum.com
SUMMARY:Quantum Security Community - Online Fortnightly Update (America\, EMEA)
DESCRIPTION:***Quantum Security Community*** *is a free\, global\, practitioner-led network sharing real-world PQC insights and supporting one another through the most complex IT/OT security transformation of our time. Explore the channels at* ***[Quantum.Security](https://quantum.security)*** \n—————— \n**A weekly\, online community meetup for quantum security practitioners — focused on signal\, not hype.** \nPost-quantum cryptography (PQC)\, crypto agility\, quantum threat models\, and standards timelines are all evolving quickly. For security teams\, the challenge isn’t “finding information” — it’s deciding **what matters**\, **what changed**\, and **what to do next**. Quantum Security Weekly exists to make that easier. \nWe run the **same meetup twice each week** to cover global time zones: \n* **Session 1:** Europe / Middle East / APAC-friendly\n* **Session 2:** Europe / Americas-friendly\n(Choose the one that fits your schedule – content is aligned across both.) \n### **What happens each week** \nYou’ll get a curated update across the four categories that consistently drive real-world decisions: \n**1) Regulation & policy signals**\nNew requirements\, supervisory guidance\, national strategies\, procurement rules\, sector-specific expectations – and what they imply for timelines and planning. \n**2) Standards and “rules of the road”**\nUpdates to cryptographic standards and related ecosystems (protocols\, identity\, secure elements\, industry frameworks). We focus on what changes adoption feasibility\, interoperability\, or audit/compliance expectations. \n**3) Technical developments**\nCredible signals about quantum computing capability\, relevant cryptanalysis\, and meaningful algorithmic/security research (including “RSA-breaking” or signature-related developments) – explained in terms of security impact\, not headlines. \n**4) Practical implementation reality**\nThe stuff that makes or breaks programs: where crypto actually lives\, dependency chains\, vendor readiness\, device constraints\, performance tradeoffs\, rollout sequencing\, and “what we learned the hard way.” \n### **Speakers and community contributions** \nWe often invite a guest speaker to share practical experience (implementation lessons\, program strategy\, technical deep dives). Sometimes we’ll host short product introductions – but the default posture is educational and experience-driven\, not salesy. When there’s no guest\, we go deeper on the week’s most important developments and prioritize Q&A. \n### **Typical Agenda** \n**0:00 – 0:05 | Welcome + how to engage (fast)** \n* What this meetup is: **signal > hype**\, practical implications\, community-first\n* How to participate today: chat\, Q&A flow\, how to drop links/resources\n* Quick reminder of community channels (Forum / Slack / LinkedIn group) and how to continue the conversation after the call \n**0:05 – 0:25 | The Weekly Signal Brief (what actually changed)**\nA structured scan in four buckets\, with a “so what?” for each: \n* **Policy & regulation:** new drafts\, mandates\, enforcement signals\, procurement rules\n* **Standards & frameworks:** PQC standards movement\, protocol ecosystem changes\, guidance updates\n* **Quantum capability signals:** credible progress indicators (hardware\, error correction\, scaling)\, what to ignore\n* **Cryptography/cryptanalysis:** meaningful research developments\, “RSA/ECC breaking” signals\, security relevance \n**0:25 – 0:35 | Myth‑Busting / Reality Check (the hype audit)**\nIf something got hyped this week\, we’ll do a quick\, repeatable teardown: \n* **What happened** (one sentence)\n* **What didn’t happen** (the misconception)\n* **What it means for defenders** (real impact)\n* **What changes / what doesn’t** in PQC planning this year \n*Goal:* keep the community calibrated\, reduce panic\, and prevent misallocation of effort. \n**0:35 – 0:50 | One Topic\, Deeper (the week’s main story)**\nA focused deep dive on one theme that affects real programs\, such as: \n* crypto-agility patterns and failure modes\n* hybrid deployment realities (where it works / where it’s a trap)\n* migration sequencing and vendor dependency bottlenecks\n* what a standards change means for architects and CISOs\n* integrity-first thinking (e.g.\, signatures\, trust anchors\, long-lived evidence) \n**0:50 – 1:05 | Guest Spotlight (most weeks) OR Community Lightning Round** \n* **Guest Spotlight (preferred when available):**\n* 10–12 min: experience share / lessons learned / case study / product walkthrough (kept educational)\n* 3–5 min: moderated Q&A (“what surprised you / what broke / what you’d do differently”)\n* **If no guest:**\n* 3 lightning shares (3–4 min each): “one paper / one tool / one lesson / one vendor signal” \n**1:05 – 1:10 | Community Pulse (cross‑channel highlights)** \n* “Top 3 threads” from various community channels this week\n* Quick call-outs: members looking for feedback\, volunteer opportunities\, upcoming topics\n* How to propose a guest / suggest topics / share resources for next week \n**1:10 – 1:28 | Open Q&A / Office Hours** \n* Live questions (chat + audio)\n* “Bring your messy problem” time: inventory\, vendor claims\, timeline pressure\, governance\, metrics\n* Optional: rapid-fire “yes/no + why” on 5–8 quick questions if the room is lively \n**1:28 – 1:30 | Wrap + next week preview** \n* 3 takeaways in 30 seconds\n* What we’re tracking next week\n* Speaker/volunteer reminder (“If you’ve shipped something\, we want the story.”) \n### **Who should join** \nIf you’re responsible for security strategy\, cryptography\, identity\, platform security\, resilience\, compliance\, or product security – and quantum is on your roadmap – this is for you. \n### **What you’ll leave with** \n* Clear visibility into what changed this week\n* Better judgment on what’s noise vs. actionable signal\n* Practical framing for decisions you may need to revisit (inventory\, standards alignment\, vendor dependencies\, rollout sequencing)\n* A community you can learn from (and contribute to)
URL:https://appliedquantum.com/event/quantum-security-community-online-fortnightly-update-america-emea-13
LOCATION:Online event
CATEGORIES:Community
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/03/1024x576-bya3VY.jpg
GEO:-8.521147;179.1962
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=+02:00:20260924T090000
DTEND;TZID=+02:00:20260924T103000
DTSTAMP:20260404T134519
CREATED:20260316T100019Z
LAST-MODIFIED:20260404T103027Z
UID:10000051-1790240400-1790245800@appliedquantum.com
SUMMARY:Quantum Security Community - Online Fortnightly Update (EMEA\, APAC)
DESCRIPTION:***Quantum Security Community*** *is a free\, global\, practitioner-led network sharing real-world PQC insights and supporting one another through the most complex IT/OT security transformation of our time. Explore the channels at* ***[Quantum.Security](https://quantum.security)*** \n—————— \n**A weekly\, online community meetup for quantum security practitioners — focused on signal\, not hype.** \nPost-quantum cryptography (PQC)\, crypto agility\, quantum threat models\, and standards timelines are all evolving quickly. For security teams\, the challenge isn’t “finding information” — it’s deciding **what matters**\, **what changed**\, and **what to do next**. Quantum Security Weekly exists to make that easier. \nWe run the **same meetup twice each week** to cover global time zones: \n* **Session 1:** Europe / Middle East / APAC-friendly\n* **Session 2:** Europe / Americas-friendly\n(Choose the one that fits your schedule – content is aligned across both.) \n### **What happens each week** \nYou’ll get a curated update across the four categories that consistently drive real-world decisions: \n**1) Regulation & policy signals**\nNew requirements\, supervisory guidance\, national strategies\, procurement rules\, sector-specific expectations – and what they imply for timelines and planning. \n**2) Standards and “rules of the road”**\nUpdates to cryptographic standards and related ecosystems (protocols\, identity\, secure elements\, industry frameworks). We focus on what changes adoption feasibility\, interoperability\, or audit/compliance expectations. \n**3) Technical developments**\nCredible signals about quantum computing capability\, relevant cryptanalysis\, and meaningful algorithmic/security research (including “RSA-breaking” or signature-related developments) – explained in terms of security impact\, not headlines. \n**4) Practical implementation reality**\nThe stuff that makes or breaks programs: where crypto actually lives\, dependency chains\, vendor readiness\, device constraints\, performance tradeoffs\, rollout sequencing\, and “what we learned the hard way.” \n### **Speakers and community contributions** \nWe often invite a guest speaker to share practical experience (implementation lessons\, program strategy\, technical deep dives). Sometimes we’ll host short product introductions – but the default posture is educational and experience-driven\, not salesy. When there’s no guest\, we go deeper on the week’s most important developments and prioritize Q&A. \n### **Typical Agenda** \n**0:00 – 0:05 | Welcome + how to engage (fast)** \n* What this meetup is: **signal > hype**\, practical implications\, community-first\n* How to participate today: chat\, Q&A flow\, how to drop links/resources\n* Quick reminder of community channels (Forum / Slack / LinkedIn group) and how to continue the conversation after the call \n**0:05 – 0:25 | The Weekly Signal Brief (what actually changed)**\nA structured scan in four buckets\, with a “so what?” for each: \n* **Policy & regulation:** new drafts\, mandates\, enforcement signals\, procurement rules\n* **Standards & frameworks:** PQC standards movement\, protocol ecosystem changes\, guidance updates\n* **Quantum capability signals:** credible progress indicators (hardware\, error correction\, scaling)\, what to ignore\n* **Cryptography/cryptanalysis:** meaningful research developments\, “RSA/ECC breaking” signals\, security relevance \n**0:25 – 0:35 | Myth‑Busting / Reality Check (the hype audit)**\nIf something got hyped this week\, we’ll do a quick\, repeatable teardown: \n* **What happened** (one sentence)\n* **What didn’t happen** (the misconception)\n* **What it means for defenders** (real impact)\n* **What changes / what doesn’t** in PQC planning this year \n*Goal:* keep the community calibrated\, reduce panic\, and prevent misallocation of effort. \n**0:35 – 0:50 | One Topic\, Deeper (the week’s main story)**\nA focused deep dive on one theme that affects real programs\, such as: \n* crypto-agility patterns and failure modes\n* hybrid deployment realities (where it works / where it’s a trap)\n* migration sequencing and vendor dependency bottlenecks\n* what a standards change means for architects and CISOs\n* integrity-first thinking (e.g.\, signatures\, trust anchors\, long-lived evidence) \n**0:50 – 1:05 | Guest Spotlight (most weeks) OR Community Lightning Round** \n* **Guest Spotlight (preferred when available):**\n* 10–12 min: experience share / lessons learned / case study / product walkthrough (kept educational)\n* 3–5 min: moderated Q&A (“what surprised you / what broke / what you’d do differently”)\n* **If no guest:**\n* 3 lightning shares (3–4 min each): “one paper / one tool / one lesson / one vendor signal” \n**1:05 – 1:10 | Community Pulse (cross‑channel highlights)** \n* “Top 3 threads” from various community channels this week\n* Quick call-outs: members looking for feedback\, volunteer opportunities\, upcoming topics\n* How to propose a guest / suggest topics / share resources for next week \n**1:10 – 1:28 | Open Q&A / Office Hours** \n* Live questions (chat + audio)\n* “Bring your messy problem” time: inventory\, vendor claims\, timeline pressure\, governance\, metrics\n* Optional: rapid-fire “yes/no + why” on 5–8 quick questions if the room is lively \n**1:28 – 1:30 | Wrap + next week preview** \n* 3 takeaways in 30 seconds\n* What we’re tracking next week\n* Speaker/volunteer reminder (“If you’ve shipped something\, we want the story.”) \n### **Who should join** \nIf you’re responsible for security strategy\, cryptography\, identity\, platform security\, resilience\, compliance\, or product security – and quantum is on your roadmap – this is for you. \n### **What you’ll leave with** \n* Clear visibility into what changed this week\n* Better judgment on what’s noise vs. actionable signal\n* Practical framing for decisions you may need to revisit (inventory\, standards alignment\, vendor dependencies\, rollout sequencing)\n* A community you can learn from (and contribute to)
URL:https://appliedquantum.com/event/quantum-security-community-online-fortnightly-update-emea-apac-14
LOCATION:Online event
CATEGORIES:Community
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/03/1024x576-anROVz.jpg
GEO:-8.521147;179.1962
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=+02:00:20260924T170000
DTEND;TZID=+02:00:20260924T183000
DTSTAMP:20260404T134519
CREATED:20260316T100019Z
LAST-MODIFIED:20260404T103027Z
UID:10000052-1790269200-1790274600@appliedquantum.com
SUMMARY:Quantum Security Community - Online Fortnightly Update (America\, EMEA)
DESCRIPTION:***Quantum Security Community*** *is a free\, global\, practitioner-led network sharing real-world PQC insights and supporting one another through the most complex IT/OT security transformation of our time. Explore the channels at* ***[Quantum.Security](https://quantum.security)*** \n—————— \n**A weekly\, online community meetup for quantum security practitioners — focused on signal\, not hype.** \nPost-quantum cryptography (PQC)\, crypto agility\, quantum threat models\, and standards timelines are all evolving quickly. For security teams\, the challenge isn’t “finding information” — it’s deciding **what matters**\, **what changed**\, and **what to do next**. Quantum Security Weekly exists to make that easier. \nWe run the **same meetup twice each week** to cover global time zones: \n* **Session 1:** Europe / Middle East / APAC-friendly\n* **Session 2:** Europe / Americas-friendly\n(Choose the one that fits your schedule – content is aligned across both.) \n### **What happens each week** \nYou’ll get a curated update across the four categories that consistently drive real-world decisions: \n**1) Regulation & policy signals**\nNew requirements\, supervisory guidance\, national strategies\, procurement rules\, sector-specific expectations – and what they imply for timelines and planning. \n**2) Standards and “rules of the road”**\nUpdates to cryptographic standards and related ecosystems (protocols\, identity\, secure elements\, industry frameworks). We focus on what changes adoption feasibility\, interoperability\, or audit/compliance expectations. \n**3) Technical developments**\nCredible signals about quantum computing capability\, relevant cryptanalysis\, and meaningful algorithmic/security research (including “RSA-breaking” or signature-related developments) – explained in terms of security impact\, not headlines. \n**4) Practical implementation reality**\nThe stuff that makes or breaks programs: where crypto actually lives\, dependency chains\, vendor readiness\, device constraints\, performance tradeoffs\, rollout sequencing\, and “what we learned the hard way.” \n### **Speakers and community contributions** \nWe often invite a guest speaker to share practical experience (implementation lessons\, program strategy\, technical deep dives). Sometimes we’ll host short product introductions – but the default posture is educational and experience-driven\, not salesy. When there’s no guest\, we go deeper on the week’s most important developments and prioritize Q&A. \n### **Typical Agenda** \n**0:00 – 0:05 | Welcome + how to engage (fast)** \n* What this meetup is: **signal > hype**\, practical implications\, community-first\n* How to participate today: chat\, Q&A flow\, how to drop links/resources\n* Quick reminder of community channels (Forum / Slack / LinkedIn group) and how to continue the conversation after the call \n**0:05 – 0:25 | The Weekly Signal Brief (what actually changed)**\nA structured scan in four buckets\, with a “so what?” for each: \n* **Policy & regulation:** new drafts\, mandates\, enforcement signals\, procurement rules\n* **Standards & frameworks:** PQC standards movement\, protocol ecosystem changes\, guidance updates\n* **Quantum capability signals:** credible progress indicators (hardware\, error correction\, scaling)\, what to ignore\n* **Cryptography/cryptanalysis:** meaningful research developments\, “RSA/ECC breaking” signals\, security relevance \n**0:25 – 0:35 | Myth‑Busting / Reality Check (the hype audit)**\nIf something got hyped this week\, we’ll do a quick\, repeatable teardown: \n* **What happened** (one sentence)\n* **What didn’t happen** (the misconception)\n* **What it means for defenders** (real impact)\n* **What changes / what doesn’t** in PQC planning this year \n*Goal:* keep the community calibrated\, reduce panic\, and prevent misallocation of effort. \n**0:35 – 0:50 | One Topic\, Deeper (the week’s main story)**\nA focused deep dive on one theme that affects real programs\, such as: \n* crypto-agility patterns and failure modes\n* hybrid deployment realities (where it works / where it’s a trap)\n* migration sequencing and vendor dependency bottlenecks\n* what a standards change means for architects and CISOs\n* integrity-first thinking (e.g.\, signatures\, trust anchors\, long-lived evidence) \n**0:50 – 1:05 | Guest Spotlight (most weeks) OR Community Lightning Round** \n* **Guest Spotlight (preferred when available):**\n* 10–12 min: experience share / lessons learned / case study / product walkthrough (kept educational)\n* 3–5 min: moderated Q&A (“what surprised you / what broke / what you’d do differently”)\n* **If no guest:**\n* 3 lightning shares (3–4 min each): “one paper / one tool / one lesson / one vendor signal” \n**1:05 – 1:10 | Community Pulse (cross‑channel highlights)** \n* “Top 3 threads” from various community channels this week\n* Quick call-outs: members looking for feedback\, volunteer opportunities\, upcoming topics\n* How to propose a guest / suggest topics / share resources for next week \n**1:10 – 1:28 | Open Q&A / Office Hours** \n* Live questions (chat + audio)\n* “Bring your messy problem” time: inventory\, vendor claims\, timeline pressure\, governance\, metrics\n* Optional: rapid-fire “yes/no + why” on 5–8 quick questions if the room is lively \n**1:28 – 1:30 | Wrap + next week preview** \n* 3 takeaways in 30 seconds\n* What we’re tracking next week\n* Speaker/volunteer reminder (“If you’ve shipped something\, we want the story.”) \n### **Who should join** \nIf you’re responsible for security strategy\, cryptography\, identity\, platform security\, resilience\, compliance\, or product security – and quantum is on your roadmap – this is for you. \n### **What you’ll leave with** \n* Clear visibility into what changed this week\n* Better judgment on what’s noise vs. actionable signal\n* Practical framing for decisions you may need to revisit (inventory\, standards alignment\, vendor dependencies\, rollout sequencing)\n* A community you can learn from (and contribute to)
URL:https://appliedquantum.com/event/quantum-security-community-online-fortnightly-update-america-emea-14
LOCATION:Online event
CATEGORIES:Community
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/03/1024x576-bya3VY.jpg
GEO:-8.521147;179.1962
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=+02:00:20261008T090000
DTEND;TZID=+02:00:20261008T103000
DTSTAMP:20260404T134519
CREATED:20260316T100019Z
LAST-MODIFIED:20260404T103027Z
UID:10000053-1791450000-1791455400@appliedquantum.com
SUMMARY:Quantum Security Community - Online Fortnightly Update (EMEA\, APAC)
DESCRIPTION:***Quantum Security Community*** *is a free\, global\, practitioner-led network sharing real-world PQC insights and supporting one another through the most complex IT/OT security transformation of our time. Explore the channels at* ***[Quantum.Security](https://quantum.security)*** \n—————— \n**A weekly\, online community meetup for quantum security practitioners — focused on signal\, not hype.** \nPost-quantum cryptography (PQC)\, crypto agility\, quantum threat models\, and standards timelines are all evolving quickly. For security teams\, the challenge isn’t “finding information” — it’s deciding **what matters**\, **what changed**\, and **what to do next**. Quantum Security Weekly exists to make that easier. \nWe run the **same meetup twice each week** to cover global time zones: \n* **Session 1:** Europe / Middle East / APAC-friendly\n* **Session 2:** Europe / Americas-friendly\n(Choose the one that fits your schedule – content is aligned across both.) \n### **What happens each week** \nYou’ll get a curated update across the four categories that consistently drive real-world decisions: \n**1) Regulation & policy signals**\nNew requirements\, supervisory guidance\, national strategies\, procurement rules\, sector-specific expectations – and what they imply for timelines and planning. \n**2) Standards and “rules of the road”**\nUpdates to cryptographic standards and related ecosystems (protocols\, identity\, secure elements\, industry frameworks). We focus on what changes adoption feasibility\, interoperability\, or audit/compliance expectations. \n**3) Technical developments**\nCredible signals about quantum computing capability\, relevant cryptanalysis\, and meaningful algorithmic/security research (including “RSA-breaking” or signature-related developments) – explained in terms of security impact\, not headlines. \n**4) Practical implementation reality**\nThe stuff that makes or breaks programs: where crypto actually lives\, dependency chains\, vendor readiness\, device constraints\, performance tradeoffs\, rollout sequencing\, and “what we learned the hard way.” \n### **Speakers and community contributions** \nWe often invite a guest speaker to share practical experience (implementation lessons\, program strategy\, technical deep dives). Sometimes we’ll host short product introductions – but the default posture is educational and experience-driven\, not salesy. When there’s no guest\, we go deeper on the week’s most important developments and prioritize Q&A. \n### **Typical Agenda** \n**0:00 – 0:05 | Welcome + how to engage (fast)** \n* What this meetup is: **signal > hype**\, practical implications\, community-first\n* How to participate today: chat\, Q&A flow\, how to drop links/resources\n* Quick reminder of community channels (Forum / Slack / LinkedIn group) and how to continue the conversation after the call \n**0:05 – 0:25 | The Weekly Signal Brief (what actually changed)**\nA structured scan in four buckets\, with a “so what?” for each: \n* **Policy & regulation:** new drafts\, mandates\, enforcement signals\, procurement rules\n* **Standards & frameworks:** PQC standards movement\, protocol ecosystem changes\, guidance updates\n* **Quantum capability signals:** credible progress indicators (hardware\, error correction\, scaling)\, what to ignore\n* **Cryptography/cryptanalysis:** meaningful research developments\, “RSA/ECC breaking” signals\, security relevance \n**0:25 – 0:35 | Myth‑Busting / Reality Check (the hype audit)**\nIf something got hyped this week\, we’ll do a quick\, repeatable teardown: \n* **What happened** (one sentence)\n* **What didn’t happen** (the misconception)\n* **What it means for defenders** (real impact)\n* **What changes / what doesn’t** in PQC planning this year \n*Goal:* keep the community calibrated\, reduce panic\, and prevent misallocation of effort. \n**0:35 – 0:50 | One Topic\, Deeper (the week’s main story)**\nA focused deep dive on one theme that affects real programs\, such as: \n* crypto-agility patterns and failure modes\n* hybrid deployment realities (where it works / where it’s a trap)\n* migration sequencing and vendor dependency bottlenecks\n* what a standards change means for architects and CISOs\n* integrity-first thinking (e.g.\, signatures\, trust anchors\, long-lived evidence) \n**0:50 – 1:05 | Guest Spotlight (most weeks) OR Community Lightning Round** \n* **Guest Spotlight (preferred when available):**\n* 10–12 min: experience share / lessons learned / case study / product walkthrough (kept educational)\n* 3–5 min: moderated Q&A (“what surprised you / what broke / what you’d do differently”)\n* **If no guest:**\n* 3 lightning shares (3–4 min each): “one paper / one tool / one lesson / one vendor signal” \n**1:05 – 1:10 | Community Pulse (cross‑channel highlights)** \n* “Top 3 threads” from various community channels this week\n* Quick call-outs: members looking for feedback\, volunteer opportunities\, upcoming topics\n* How to propose a guest / suggest topics / share resources for next week \n**1:10 – 1:28 | Open Q&A / Office Hours** \n* Live questions (chat + audio)\n* “Bring your messy problem” time: inventory\, vendor claims\, timeline pressure\, governance\, metrics\n* Optional: rapid-fire “yes/no + why” on 5–8 quick questions if the room is lively \n**1:28 – 1:30 | Wrap + next week preview** \n* 3 takeaways in 30 seconds\n* What we’re tracking next week\n* Speaker/volunteer reminder (“If you’ve shipped something\, we want the story.”) \n### **Who should join** \nIf you’re responsible for security strategy\, cryptography\, identity\, platform security\, resilience\, compliance\, or product security – and quantum is on your roadmap – this is for you. \n### **What you’ll leave with** \n* Clear visibility into what changed this week\n* Better judgment on what’s noise vs. actionable signal\n* Practical framing for decisions you may need to revisit (inventory\, standards alignment\, vendor dependencies\, rollout sequencing)\n* A community you can learn from (and contribute to)
URL:https://appliedquantum.com/event/quantum-security-community-online-fortnightly-update-emea-apac-15
LOCATION:Online event
CATEGORIES:Community
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/03/1024x576-anROVz.jpg
GEO:-8.521147;179.1962
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=+02:00:20261008T170000
DTEND;TZID=+02:00:20261008T183000
DTSTAMP:20260404T134519
CREATED:20260316T100019Z
LAST-MODIFIED:20260404T103027Z
UID:10000054-1791478800-1791484200@appliedquantum.com
SUMMARY:Quantum Security Community - Online Fortnightly Update (America\, EMEA)
DESCRIPTION:***Quantum Security Community*** *is a free\, global\, practitioner-led network sharing real-world PQC insights and supporting one another through the most complex IT/OT security transformation of our time. Explore the channels at* ***[Quantum.Security](https://quantum.security)*** \n—————— \n**A weekly\, online community meetup for quantum security practitioners — focused on signal\, not hype.** \nPost-quantum cryptography (PQC)\, crypto agility\, quantum threat models\, and standards timelines are all evolving quickly. For security teams\, the challenge isn’t “finding information” — it’s deciding **what matters**\, **what changed**\, and **what to do next**. Quantum Security Weekly exists to make that easier. \nWe run the **same meetup twice each week** to cover global time zones: \n* **Session 1:** Europe / Middle East / APAC-friendly\n* **Session 2:** Europe / Americas-friendly\n(Choose the one that fits your schedule – content is aligned across both.) \n### **What happens each week** \nYou’ll get a curated update across the four categories that consistently drive real-world decisions: \n**1) Regulation & policy signals**\nNew requirements\, supervisory guidance\, national strategies\, procurement rules\, sector-specific expectations – and what they imply for timelines and planning. \n**2) Standards and “rules of the road”**\nUpdates to cryptographic standards and related ecosystems (protocols\, identity\, secure elements\, industry frameworks). We focus on what changes adoption feasibility\, interoperability\, or audit/compliance expectations. \n**3) Technical developments**\nCredible signals about quantum computing capability\, relevant cryptanalysis\, and meaningful algorithmic/security research (including “RSA-breaking” or signature-related developments) – explained in terms of security impact\, not headlines. \n**4) Practical implementation reality**\nThe stuff that makes or breaks programs: where crypto actually lives\, dependency chains\, vendor readiness\, device constraints\, performance tradeoffs\, rollout sequencing\, and “what we learned the hard way.” \n### **Speakers and community contributions** \nWe often invite a guest speaker to share practical experience (implementation lessons\, program strategy\, technical deep dives). Sometimes we’ll host short product introductions – but the default posture is educational and experience-driven\, not salesy. When there’s no guest\, we go deeper on the week’s most important developments and prioritize Q&A. \n### **Typical Agenda** \n**0:00 – 0:05 | Welcome + how to engage (fast)** \n* What this meetup is: **signal > hype**\, practical implications\, community-first\n* How to participate today: chat\, Q&A flow\, how to drop links/resources\n* Quick reminder of community channels (Forum / Slack / LinkedIn group) and how to continue the conversation after the call \n**0:05 – 0:25 | The Weekly Signal Brief (what actually changed)**\nA structured scan in four buckets\, with a “so what?” for each: \n* **Policy & regulation:** new drafts\, mandates\, enforcement signals\, procurement rules\n* **Standards & frameworks:** PQC standards movement\, protocol ecosystem changes\, guidance updates\n* **Quantum capability signals:** credible progress indicators (hardware\, error correction\, scaling)\, what to ignore\n* **Cryptography/cryptanalysis:** meaningful research developments\, “RSA/ECC breaking” signals\, security relevance \n**0:25 – 0:35 | Myth‑Busting / Reality Check (the hype audit)**\nIf something got hyped this week\, we’ll do a quick\, repeatable teardown: \n* **What happened** (one sentence)\n* **What didn’t happen** (the misconception)\n* **What it means for defenders** (real impact)\n* **What changes / what doesn’t** in PQC planning this year \n*Goal:* keep the community calibrated\, reduce panic\, and prevent misallocation of effort. \n**0:35 – 0:50 | One Topic\, Deeper (the week’s main story)**\nA focused deep dive on one theme that affects real programs\, such as: \n* crypto-agility patterns and failure modes\n* hybrid deployment realities (where it works / where it’s a trap)\n* migration sequencing and vendor dependency bottlenecks\n* what a standards change means for architects and CISOs\n* integrity-first thinking (e.g.\, signatures\, trust anchors\, long-lived evidence) \n**0:50 – 1:05 | Guest Spotlight (most weeks) OR Community Lightning Round** \n* **Guest Spotlight (preferred when available):**\n* 10–12 min: experience share / lessons learned / case study / product walkthrough (kept educational)\n* 3–5 min: moderated Q&A (“what surprised you / what broke / what you’d do differently”)\n* **If no guest:**\n* 3 lightning shares (3–4 min each): “one paper / one tool / one lesson / one vendor signal” \n**1:05 – 1:10 | Community Pulse (cross‑channel highlights)** \n* “Top 3 threads” from various community channels this week\n* Quick call-outs: members looking for feedback\, volunteer opportunities\, upcoming topics\n* How to propose a guest / suggest topics / share resources for next week \n**1:10 – 1:28 | Open Q&A / Office Hours** \n* Live questions (chat + audio)\n* “Bring your messy problem” time: inventory\, vendor claims\, timeline pressure\, governance\, metrics\n* Optional: rapid-fire “yes/no + why” on 5–8 quick questions if the room is lively \n**1:28 – 1:30 | Wrap + next week preview** \n* 3 takeaways in 30 seconds\n* What we’re tracking next week\n* Speaker/volunteer reminder (“If you’ve shipped something\, we want the story.”) \n### **Who should join** \nIf you’re responsible for security strategy\, cryptography\, identity\, platform security\, resilience\, compliance\, or product security – and quantum is on your roadmap – this is for you. \n### **What you’ll leave with** \n* Clear visibility into what changed this week\n* Better judgment on what’s noise vs. actionable signal\n* Practical framing for decisions you may need to revisit (inventory\, standards alignment\, vendor dependencies\, rollout sequencing)\n* A community you can learn from (and contribute to)
URL:https://appliedquantum.com/event/quantum-security-community-online-fortnightly-update-america-emea-15
LOCATION:Online event
CATEGORIES:Community
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/03/1024x576-bya3VY.jpg
GEO:-8.521147;179.1962
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=+02:00:20261022T090000
DTEND;TZID=+02:00:20261022T103000
DTSTAMP:20260404T134519
CREATED:20260316T100019Z
LAST-MODIFIED:20260404T103027Z
UID:10000055-1792659600-1792665000@appliedquantum.com
SUMMARY:Quantum Security Community - Online Fortnightly Update (EMEA\, APAC)
DESCRIPTION:***Quantum Security Community*** *is a free\, global\, practitioner-led network sharing real-world PQC insights and supporting one another through the most complex IT/OT security transformation of our time. Explore the channels at* ***[Quantum.Security](https://quantum.security)*** \n—————— \n**A weekly\, online community meetup for quantum security practitioners — focused on signal\, not hype.** \nPost-quantum cryptography (PQC)\, crypto agility\, quantum threat models\, and standards timelines are all evolving quickly. For security teams\, the challenge isn’t “finding information” — it’s deciding **what matters**\, **what changed**\, and **what to do next**. Quantum Security Weekly exists to make that easier. \nWe run the **same meetup twice each week** to cover global time zones: \n* **Session 1:** Europe / Middle East / APAC-friendly\n* **Session 2:** Europe / Americas-friendly\n(Choose the one that fits your schedule – content is aligned across both.) \n### **What happens each week** \nYou’ll get a curated update across the four categories that consistently drive real-world decisions: \n**1) Regulation & policy signals**\nNew requirements\, supervisory guidance\, national strategies\, procurement rules\, sector-specific expectations – and what they imply for timelines and planning. \n**2) Standards and “rules of the road”**\nUpdates to cryptographic standards and related ecosystems (protocols\, identity\, secure elements\, industry frameworks). We focus on what changes adoption feasibility\, interoperability\, or audit/compliance expectations. \n**3) Technical developments**\nCredible signals about quantum computing capability\, relevant cryptanalysis\, and meaningful algorithmic/security research (including “RSA-breaking” or signature-related developments) – explained in terms of security impact\, not headlines. \n**4) Practical implementation reality**\nThe stuff that makes or breaks programs: where crypto actually lives\, dependency chains\, vendor readiness\, device constraints\, performance tradeoffs\, rollout sequencing\, and “what we learned the hard way.” \n### **Speakers and community contributions** \nWe often invite a guest speaker to share practical experience (implementation lessons\, program strategy\, technical deep dives). Sometimes we’ll host short product introductions – but the default posture is educational and experience-driven\, not salesy. When there’s no guest\, we go deeper on the week’s most important developments and prioritize Q&A. \n### **Typical Agenda** \n**0:00 – 0:05 | Welcome + how to engage (fast)** \n* What this meetup is: **signal > hype**\, practical implications\, community-first\n* How to participate today: chat\, Q&A flow\, how to drop links/resources\n* Quick reminder of community channels (Forum / Slack / LinkedIn group) and how to continue the conversation after the call \n**0:05 – 0:25 | The Weekly Signal Brief (what actually changed)**\nA structured scan in four buckets\, with a “so what?” for each: \n* **Policy & regulation:** new drafts\, mandates\, enforcement signals\, procurement rules\n* **Standards & frameworks:** PQC standards movement\, protocol ecosystem changes\, guidance updates\n* **Quantum capability signals:** credible progress indicators (hardware\, error correction\, scaling)\, what to ignore\n* **Cryptography/cryptanalysis:** meaningful research developments\, “RSA/ECC breaking” signals\, security relevance \n**0:25 – 0:35 | Myth‑Busting / Reality Check (the hype audit)**\nIf something got hyped this week\, we’ll do a quick\, repeatable teardown: \n* **What happened** (one sentence)\n* **What didn’t happen** (the misconception)\n* **What it means for defenders** (real impact)\n* **What changes / what doesn’t** in PQC planning this year \n*Goal:* keep the community calibrated\, reduce panic\, and prevent misallocation of effort. \n**0:35 – 0:50 | One Topic\, Deeper (the week’s main story)**\nA focused deep dive on one theme that affects real programs\, such as: \n* crypto-agility patterns and failure modes\n* hybrid deployment realities (where it works / where it’s a trap)\n* migration sequencing and vendor dependency bottlenecks\n* what a standards change means for architects and CISOs\n* integrity-first thinking (e.g.\, signatures\, trust anchors\, long-lived evidence) \n**0:50 – 1:05 | Guest Spotlight (most weeks) OR Community Lightning Round** \n* **Guest Spotlight (preferred when available):**\n* 10–12 min: experience share / lessons learned / case study / product walkthrough (kept educational)\n* 3–5 min: moderated Q&A (“what surprised you / what broke / what you’d do differently”)\n* **If no guest:**\n* 3 lightning shares (3–4 min each): “one paper / one tool / one lesson / one vendor signal” \n**1:05 – 1:10 | Community Pulse (cross‑channel highlights)** \n* “Top 3 threads” from various community channels this week\n* Quick call-outs: members looking for feedback\, volunteer opportunities\, upcoming topics\n* How to propose a guest / suggest topics / share resources for next week \n**1:10 – 1:28 | Open Q&A / Office Hours** \n* Live questions (chat + audio)\n* “Bring your messy problem” time: inventory\, vendor claims\, timeline pressure\, governance\, metrics\n* Optional: rapid-fire “yes/no + why” on 5–8 quick questions if the room is lively \n**1:28 – 1:30 | Wrap + next week preview** \n* 3 takeaways in 30 seconds\n* What we’re tracking next week\n* Speaker/volunteer reminder (“If you’ve shipped something\, we want the story.”) \n### **Who should join** \nIf you’re responsible for security strategy\, cryptography\, identity\, platform security\, resilience\, compliance\, or product security – and quantum is on your roadmap – this is for you. \n### **What you’ll leave with** \n* Clear visibility into what changed this week\n* Better judgment on what’s noise vs. actionable signal\n* Practical framing for decisions you may need to revisit (inventory\, standards alignment\, vendor dependencies\, rollout sequencing)\n* A community you can learn from (and contribute to)
URL:https://appliedquantum.com/event/quantum-security-community-online-fortnightly-update-emea-apac-16
LOCATION:Online event
CATEGORIES:Community
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/03/1024x576-anROVz.jpg
GEO:-8.521147;179.1962
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=+02:00:20261022T170000
DTEND;TZID=+02:00:20261022T183000
DTSTAMP:20260404T134519
CREATED:20260316T100019Z
LAST-MODIFIED:20260404T103027Z
UID:10000056-1792688400-1792693800@appliedquantum.com
SUMMARY:Quantum Security Community - Online Fortnightly Update (America\, EMEA)
DESCRIPTION:***Quantum Security Community*** *is a free\, global\, practitioner-led network sharing real-world PQC insights and supporting one another through the most complex IT/OT security transformation of our time. Explore the channels at* ***[Quantum.Security](https://quantum.security)*** \n—————— \n**A weekly\, online community meetup for quantum security practitioners — focused on signal\, not hype.** \nPost-quantum cryptography (PQC)\, crypto agility\, quantum threat models\, and standards timelines are all evolving quickly. For security teams\, the challenge isn’t “finding information” — it’s deciding **what matters**\, **what changed**\, and **what to do next**. Quantum Security Weekly exists to make that easier. \nWe run the **same meetup twice each week** to cover global time zones: \n* **Session 1:** Europe / Middle East / APAC-friendly\n* **Session 2:** Europe / Americas-friendly\n(Choose the one that fits your schedule – content is aligned across both.) \n### **What happens each week** \nYou’ll get a curated update across the four categories that consistently drive real-world decisions: \n**1) Regulation & policy signals**\nNew requirements\, supervisory guidance\, national strategies\, procurement rules\, sector-specific expectations – and what they imply for timelines and planning. \n**2) Standards and “rules of the road”**\nUpdates to cryptographic standards and related ecosystems (protocols\, identity\, secure elements\, industry frameworks). We focus on what changes adoption feasibility\, interoperability\, or audit/compliance expectations. \n**3) Technical developments**\nCredible signals about quantum computing capability\, relevant cryptanalysis\, and meaningful algorithmic/security research (including “RSA-breaking” or signature-related developments) – explained in terms of security impact\, not headlines. \n**4) Practical implementation reality**\nThe stuff that makes or breaks programs: where crypto actually lives\, dependency chains\, vendor readiness\, device constraints\, performance tradeoffs\, rollout sequencing\, and “what we learned the hard way.” \n### **Speakers and community contributions** \nWe often invite a guest speaker to share practical experience (implementation lessons\, program strategy\, technical deep dives). Sometimes we’ll host short product introductions – but the default posture is educational and experience-driven\, not salesy. When there’s no guest\, we go deeper on the week’s most important developments and prioritize Q&A. \n### **Typical Agenda** \n**0:00 – 0:05 | Welcome + how to engage (fast)** \n* What this meetup is: **signal > hype**\, practical implications\, community-first\n* How to participate today: chat\, Q&A flow\, how to drop links/resources\n* Quick reminder of community channels (Forum / Slack / LinkedIn group) and how to continue the conversation after the call \n**0:05 – 0:25 | The Weekly Signal Brief (what actually changed)**\nA structured scan in four buckets\, with a “so what?” for each: \n* **Policy & regulation:** new drafts\, mandates\, enforcement signals\, procurement rules\n* **Standards & frameworks:** PQC standards movement\, protocol ecosystem changes\, guidance updates\n* **Quantum capability signals:** credible progress indicators (hardware\, error correction\, scaling)\, what to ignore\n* **Cryptography/cryptanalysis:** meaningful research developments\, “RSA/ECC breaking” signals\, security relevance \n**0:25 – 0:35 | Myth‑Busting / Reality Check (the hype audit)**\nIf something got hyped this week\, we’ll do a quick\, repeatable teardown: \n* **What happened** (one sentence)\n* **What didn’t happen** (the misconception)\n* **What it means for defenders** (real impact)\n* **What changes / what doesn’t** in PQC planning this year \n*Goal:* keep the community calibrated\, reduce panic\, and prevent misallocation of effort. \n**0:35 – 0:50 | One Topic\, Deeper (the week’s main story)**\nA focused deep dive on one theme that affects real programs\, such as: \n* crypto-agility patterns and failure modes\n* hybrid deployment realities (where it works / where it’s a trap)\n* migration sequencing and vendor dependency bottlenecks\n* what a standards change means for architects and CISOs\n* integrity-first thinking (e.g.\, signatures\, trust anchors\, long-lived evidence) \n**0:50 – 1:05 | Guest Spotlight (most weeks) OR Community Lightning Round** \n* **Guest Spotlight (preferred when available):**\n* 10–12 min: experience share / lessons learned / case study / product walkthrough (kept educational)\n* 3–5 min: moderated Q&A (“what surprised you / what broke / what you’d do differently”)\n* **If no guest:**\n* 3 lightning shares (3–4 min each): “one paper / one tool / one lesson / one vendor signal” \n**1:05 – 1:10 | Community Pulse (cross‑channel highlights)** \n* “Top 3 threads” from various community channels this week\n* Quick call-outs: members looking for feedback\, volunteer opportunities\, upcoming topics\n* How to propose a guest / suggest topics / share resources for next week \n**1:10 – 1:28 | Open Q&A / Office Hours** \n* Live questions (chat + audio)\n* “Bring your messy problem” time: inventory\, vendor claims\, timeline pressure\, governance\, metrics\n* Optional: rapid-fire “yes/no + why” on 5–8 quick questions if the room is lively \n**1:28 – 1:30 | Wrap + next week preview** \n* 3 takeaways in 30 seconds\n* What we’re tracking next week\n* Speaker/volunteer reminder (“If you’ve shipped something\, we want the story.”) \n### **Who should join** \nIf you’re responsible for security strategy\, cryptography\, identity\, platform security\, resilience\, compliance\, or product security – and quantum is on your roadmap – this is for you. \n### **What you’ll leave with** \n* Clear visibility into what changed this week\n* Better judgment on what’s noise vs. actionable signal\n* Practical framing for decisions you may need to revisit (inventory\, standards alignment\, vendor dependencies\, rollout sequencing)\n* A community you can learn from (and contribute to)
URL:https://appliedquantum.com/event/quantum-security-community-online-fortnightly-update-america-emea-16
LOCATION:Online event
CATEGORIES:Community
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/03/1024x576-bya3VY.jpg
GEO:-8.521147;179.1962
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=+01:00:20261105T090000
DTEND;TZID=+01:00:20261105T103000
DTSTAMP:20260404T134519
CREATED:20260316T100019Z
LAST-MODIFIED:20260404T103028Z
UID:10000057-1793869200-1793874600@appliedquantum.com
SUMMARY:Quantum Security Community - Online Fortnightly Update (EMEA\, APAC)
DESCRIPTION:***Quantum Security Community*** *is a free\, global\, practitioner-led network sharing real-world PQC insights and supporting one another through the most complex IT/OT security transformation of our time. Explore the channels at* ***[Quantum.Security](https://quantum.security)*** \n—————— \n**A weekly\, online community meetup for quantum security practitioners — focused on signal\, not hype.** \nPost-quantum cryptography (PQC)\, crypto agility\, quantum threat models\, and standards timelines are all evolving quickly. For security teams\, the challenge isn’t “finding information” — it’s deciding **what matters**\, **what changed**\, and **what to do next**. Quantum Security Weekly exists to make that easier. \nWe run the **same meetup twice each week** to cover global time zones: \n* **Session 1:** Europe / Middle East / APAC-friendly\n* **Session 2:** Europe / Americas-friendly\n(Choose the one that fits your schedule – content is aligned across both.) \n### **What happens each week** \nYou’ll get a curated update across the four categories that consistently drive real-world decisions: \n**1) Regulation & policy signals**\nNew requirements\, supervisory guidance\, national strategies\, procurement rules\, sector-specific expectations – and what they imply for timelines and planning. \n**2) Standards and “rules of the road”**\nUpdates to cryptographic standards and related ecosystems (protocols\, identity\, secure elements\, industry frameworks). We focus on what changes adoption feasibility\, interoperability\, or audit/compliance expectations. \n**3) Technical developments**\nCredible signals about quantum computing capability\, relevant cryptanalysis\, and meaningful algorithmic/security research (including “RSA-breaking” or signature-related developments) – explained in terms of security impact\, not headlines. \n**4) Practical implementation reality**\nThe stuff that makes or breaks programs: where crypto actually lives\, dependency chains\, vendor readiness\, device constraints\, performance tradeoffs\, rollout sequencing\, and “what we learned the hard way.” \n### **Speakers and community contributions** \nWe often invite a guest speaker to share practical experience (implementation lessons\, program strategy\, technical deep dives). Sometimes we’ll host short product introductions – but the default posture is educational and experience-driven\, not salesy. When there’s no guest\, we go deeper on the week’s most important developments and prioritize Q&A. \n### **Typical Agenda** \n**0:00 – 0:05 | Welcome + how to engage (fast)** \n* What this meetup is: **signal > hype**\, practical implications\, community-first\n* How to participate today: chat\, Q&A flow\, how to drop links/resources\n* Quick reminder of community channels (Forum / Slack / LinkedIn group) and how to continue the conversation after the call \n**0:05 – 0:25 | The Weekly Signal Brief (what actually changed)**\nA structured scan in four buckets\, with a “so what?” for each: \n* **Policy & regulation:** new drafts\, mandates\, enforcement signals\, procurement rules\n* **Standards & frameworks:** PQC standards movement\, protocol ecosystem changes\, guidance updates\n* **Quantum capability signals:** credible progress indicators (hardware\, error correction\, scaling)\, what to ignore\n* **Cryptography/cryptanalysis:** meaningful research developments\, “RSA/ECC breaking” signals\, security relevance \n**0:25 – 0:35 | Myth‑Busting / Reality Check (the hype audit)**\nIf something got hyped this week\, we’ll do a quick\, repeatable teardown: \n* **What happened** (one sentence)\n* **What didn’t happen** (the misconception)\n* **What it means for defenders** (real impact)\n* **What changes / what doesn’t** in PQC planning this year \n*Goal:* keep the community calibrated\, reduce panic\, and prevent misallocation of effort. \n**0:35 – 0:50 | One Topic\, Deeper (the week’s main story)**\nA focused deep dive on one theme that affects real programs\, such as: \n* crypto-agility patterns and failure modes\n* hybrid deployment realities (where it works / where it’s a trap)\n* migration sequencing and vendor dependency bottlenecks\n* what a standards change means for architects and CISOs\n* integrity-first thinking (e.g.\, signatures\, trust anchors\, long-lived evidence) \n**0:50 – 1:05 | Guest Spotlight (most weeks) OR Community Lightning Round** \n* **Guest Spotlight (preferred when available):**\n* 10–12 min: experience share / lessons learned / case study / product walkthrough (kept educational)\n* 3–5 min: moderated Q&A (“what surprised you / what broke / what you’d do differently”)\n* **If no guest:**\n* 3 lightning shares (3–4 min each): “one paper / one tool / one lesson / one vendor signal” \n**1:05 – 1:10 | Community Pulse (cross‑channel highlights)** \n* “Top 3 threads” from various community channels this week\n* Quick call-outs: members looking for feedback\, volunteer opportunities\, upcoming topics\n* How to propose a guest / suggest topics / share resources for next week \n**1:10 – 1:28 | Open Q&A / Office Hours** \n* Live questions (chat + audio)\n* “Bring your messy problem” time: inventory\, vendor claims\, timeline pressure\, governance\, metrics\n* Optional: rapid-fire “yes/no + why” on 5–8 quick questions if the room is lively \n**1:28 – 1:30 | Wrap + next week preview** \n* 3 takeaways in 30 seconds\n* What we’re tracking next week\n* Speaker/volunteer reminder (“If you’ve shipped something\, we want the story.”) \n### **Who should join** \nIf you’re responsible for security strategy\, cryptography\, identity\, platform security\, resilience\, compliance\, or product security – and quantum is on your roadmap – this is for you. \n### **What you’ll leave with** \n* Clear visibility into what changed this week\n* Better judgment on what’s noise vs. actionable signal\n* Practical framing for decisions you may need to revisit (inventory\, standards alignment\, vendor dependencies\, rollout sequencing)\n* A community you can learn from (and contribute to)
URL:https://appliedquantum.com/event/quantum-security-community-online-fortnightly-update-emea-apac-17
LOCATION:Online event
CATEGORIES:Community
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/03/1024x576-anROVz.jpg
GEO:-8.521147;179.1962
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=+01:00:20261105T170000
DTEND;TZID=+01:00:20261105T183000
DTSTAMP:20260404T134519
CREATED:20260316T100019Z
LAST-MODIFIED:20260404T103028Z
UID:10000058-1793898000-1793903400@appliedquantum.com
SUMMARY:Quantum Security Community - Online Fortnightly Update (America\, EMEA)
DESCRIPTION:***Quantum Security Community*** *is a free\, global\, practitioner-led network sharing real-world PQC insights and supporting one another through the most complex IT/OT security transformation of our time. Explore the channels at* ***[Quantum.Security](https://quantum.security)*** \n—————— \n**A weekly\, online community meetup for quantum security practitioners — focused on signal\, not hype.** \nPost-quantum cryptography (PQC)\, crypto agility\, quantum threat models\, and standards timelines are all evolving quickly. For security teams\, the challenge isn’t “finding information” — it’s deciding **what matters**\, **what changed**\, and **what to do next**. Quantum Security Weekly exists to make that easier. \nWe run the **same meetup twice each week** to cover global time zones: \n* **Session 1:** Europe / Middle East / APAC-friendly\n* **Session 2:** Europe / Americas-friendly\n(Choose the one that fits your schedule – content is aligned across both.) \n### **What happens each week** \nYou’ll get a curated update across the four categories that consistently drive real-world decisions: \n**1) Regulation & policy signals**\nNew requirements\, supervisory guidance\, national strategies\, procurement rules\, sector-specific expectations – and what they imply for timelines and planning. \n**2) Standards and “rules of the road”**\nUpdates to cryptographic standards and related ecosystems (protocols\, identity\, secure elements\, industry frameworks). We focus on what changes adoption feasibility\, interoperability\, or audit/compliance expectations. \n**3) Technical developments**\nCredible signals about quantum computing capability\, relevant cryptanalysis\, and meaningful algorithmic/security research (including “RSA-breaking” or signature-related developments) – explained in terms of security impact\, not headlines. \n**4) Practical implementation reality**\nThe stuff that makes or breaks programs: where crypto actually lives\, dependency chains\, vendor readiness\, device constraints\, performance tradeoffs\, rollout sequencing\, and “what we learned the hard way.” \n### **Speakers and community contributions** \nWe often invite a guest speaker to share practical experience (implementation lessons\, program strategy\, technical deep dives). Sometimes we’ll host short product introductions – but the default posture is educational and experience-driven\, not salesy. When there’s no guest\, we go deeper on the week’s most important developments and prioritize Q&A. \n### **Typical Agenda** \n**0:00 – 0:05 | Welcome + how to engage (fast)** \n* What this meetup is: **signal > hype**\, practical implications\, community-first\n* How to participate today: chat\, Q&A flow\, how to drop links/resources\n* Quick reminder of community channels (Forum / Slack / LinkedIn group) and how to continue the conversation after the call \n**0:05 – 0:25 | The Weekly Signal Brief (what actually changed)**\nA structured scan in four buckets\, with a “so what?” for each: \n* **Policy & regulation:** new drafts\, mandates\, enforcement signals\, procurement rules\n* **Standards & frameworks:** PQC standards movement\, protocol ecosystem changes\, guidance updates\n* **Quantum capability signals:** credible progress indicators (hardware\, error correction\, scaling)\, what to ignore\n* **Cryptography/cryptanalysis:** meaningful research developments\, “RSA/ECC breaking” signals\, security relevance \n**0:25 – 0:35 | Myth‑Busting / Reality Check (the hype audit)**\nIf something got hyped this week\, we’ll do a quick\, repeatable teardown: \n* **What happened** (one sentence)\n* **What didn’t happen** (the misconception)\n* **What it means for defenders** (real impact)\n* **What changes / what doesn’t** in PQC planning this year \n*Goal:* keep the community calibrated\, reduce panic\, and prevent misallocation of effort. \n**0:35 – 0:50 | One Topic\, Deeper (the week’s main story)**\nA focused deep dive on one theme that affects real programs\, such as: \n* crypto-agility patterns and failure modes\n* hybrid deployment realities (where it works / where it’s a trap)\n* migration sequencing and vendor dependency bottlenecks\n* what a standards change means for architects and CISOs\n* integrity-first thinking (e.g.\, signatures\, trust anchors\, long-lived evidence) \n**0:50 – 1:05 | Guest Spotlight (most weeks) OR Community Lightning Round** \n* **Guest Spotlight (preferred when available):**\n* 10–12 min: experience share / lessons learned / case study / product walkthrough (kept educational)\n* 3–5 min: moderated Q&A (“what surprised you / what broke / what you’d do differently”)\n* **If no guest:**\n* 3 lightning shares (3–4 min each): “one paper / one tool / one lesson / one vendor signal” \n**1:05 – 1:10 | Community Pulse (cross‑channel highlights)** \n* “Top 3 threads” from various community channels this week\n* Quick call-outs: members looking for feedback\, volunteer opportunities\, upcoming topics\n* How to propose a guest / suggest topics / share resources for next week \n**1:10 – 1:28 | Open Q&A / Office Hours** \n* Live questions (chat + audio)\n* “Bring your messy problem” time: inventory\, vendor claims\, timeline pressure\, governance\, metrics\n* Optional: rapid-fire “yes/no + why” on 5–8 quick questions if the room is lively \n**1:28 – 1:30 | Wrap + next week preview** \n* 3 takeaways in 30 seconds\n* What we’re tracking next week\n* Speaker/volunteer reminder (“If you’ve shipped something\, we want the story.”) \n### **Who should join** \nIf you’re responsible for security strategy\, cryptography\, identity\, platform security\, resilience\, compliance\, or product security – and quantum is on your roadmap – this is for you. \n### **What you’ll leave with** \n* Clear visibility into what changed this week\n* Better judgment on what’s noise vs. actionable signal\n* Practical framing for decisions you may need to revisit (inventory\, standards alignment\, vendor dependencies\, rollout sequencing)\n* A community you can learn from (and contribute to)
URL:https://appliedquantum.com/event/quantum-security-community-online-fortnightly-update-america-emea-17
LOCATION:Online event
CATEGORIES:Community
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/03/1024x576-bya3VY.jpg
GEO:-8.521147;179.1962
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=+01:00:20261119T090000
DTEND;TZID=+01:00:20261119T103000
DTSTAMP:20260404T134519
CREATED:20260316T100019Z
LAST-MODIFIED:20260404T103028Z
UID:10000059-1795078800-1795084200@appliedquantum.com
SUMMARY:Quantum Security Community - Online Fortnightly Update (EMEA\, APAC)
DESCRIPTION:***Quantum Security Community*** *is a free\, global\, practitioner-led network sharing real-world PQC insights and supporting one another through the most complex IT/OT security transformation of our time. Explore the channels at* ***[Quantum.Security](https://quantum.security)*** \n—————— \n**A weekly\, online community meetup for quantum security practitioners — focused on signal\, not hype.** \nPost-quantum cryptography (PQC)\, crypto agility\, quantum threat models\, and standards timelines are all evolving quickly. For security teams\, the challenge isn’t “finding information” — it’s deciding **what matters**\, **what changed**\, and **what to do next**. Quantum Security Weekly exists to make that easier. \nWe run the **same meetup twice each week** to cover global time zones: \n* **Session 1:** Europe / Middle East / APAC-friendly\n* **Session 2:** Europe / Americas-friendly\n(Choose the one that fits your schedule – content is aligned across both.) \n### **What happens each week** \nYou’ll get a curated update across the four categories that consistently drive real-world decisions: \n**1) Regulation & policy signals**\nNew requirements\, supervisory guidance\, national strategies\, procurement rules\, sector-specific expectations – and what they imply for timelines and planning. \n**2) Standards and “rules of the road”**\nUpdates to cryptographic standards and related ecosystems (protocols\, identity\, secure elements\, industry frameworks). We focus on what changes adoption feasibility\, interoperability\, or audit/compliance expectations. \n**3) Technical developments**\nCredible signals about quantum computing capability\, relevant cryptanalysis\, and meaningful algorithmic/security research (including “RSA-breaking” or signature-related developments) – explained in terms of security impact\, not headlines. \n**4) Practical implementation reality**\nThe stuff that makes or breaks programs: where crypto actually lives\, dependency chains\, vendor readiness\, device constraints\, performance tradeoffs\, rollout sequencing\, and “what we learned the hard way.” \n### **Speakers and community contributions** \nWe often invite a guest speaker to share practical experience (implementation lessons\, program strategy\, technical deep dives). Sometimes we’ll host short product introductions – but the default posture is educational and experience-driven\, not salesy. When there’s no guest\, we go deeper on the week’s most important developments and prioritize Q&A. \n### **Typical Agenda** \n**0:00 – 0:05 | Welcome + how to engage (fast)** \n* What this meetup is: **signal > hype**\, practical implications\, community-first\n* How to participate today: chat\, Q&A flow\, how to drop links/resources\n* Quick reminder of community channels (Forum / Slack / LinkedIn group) and how to continue the conversation after the call \n**0:05 – 0:25 | The Weekly Signal Brief (what actually changed)**\nA structured scan in four buckets\, with a “so what?” for each: \n* **Policy & regulation:** new drafts\, mandates\, enforcement signals\, procurement rules\n* **Standards & frameworks:** PQC standards movement\, protocol ecosystem changes\, guidance updates\n* **Quantum capability signals:** credible progress indicators (hardware\, error correction\, scaling)\, what to ignore\n* **Cryptography/cryptanalysis:** meaningful research developments\, “RSA/ECC breaking” signals\, security relevance \n**0:25 – 0:35 | Myth‑Busting / Reality Check (the hype audit)**\nIf something got hyped this week\, we’ll do a quick\, repeatable teardown: \n* **What happened** (one sentence)\n* **What didn’t happen** (the misconception)\n* **What it means for defenders** (real impact)\n* **What changes / what doesn’t** in PQC planning this year \n*Goal:* keep the community calibrated\, reduce panic\, and prevent misallocation of effort. \n**0:35 – 0:50 | One Topic\, Deeper (the week’s main story)**\nA focused deep dive on one theme that affects real programs\, such as: \n* crypto-agility patterns and failure modes\n* hybrid deployment realities (where it works / where it’s a trap)\n* migration sequencing and vendor dependency bottlenecks\n* what a standards change means for architects and CISOs\n* integrity-first thinking (e.g.\, signatures\, trust anchors\, long-lived evidence) \n**0:50 – 1:05 | Guest Spotlight (most weeks) OR Community Lightning Round** \n* **Guest Spotlight (preferred when available):**\n* 10–12 min: experience share / lessons learned / case study / product walkthrough (kept educational)\n* 3–5 min: moderated Q&A (“what surprised you / what broke / what you’d do differently”)\n* **If no guest:**\n* 3 lightning shares (3–4 min each): “one paper / one tool / one lesson / one vendor signal” \n**1:05 – 1:10 | Community Pulse (cross‑channel highlights)** \n* “Top 3 threads” from various community channels this week\n* Quick call-outs: members looking for feedback\, volunteer opportunities\, upcoming topics\n* How to propose a guest / suggest topics / share resources for next week \n**1:10 – 1:28 | Open Q&A / Office Hours** \n* Live questions (chat + audio)\n* “Bring your messy problem” time: inventory\, vendor claims\, timeline pressure\, governance\, metrics\n* Optional: rapid-fire “yes/no + why” on 5–8 quick questions if the room is lively \n**1:28 – 1:30 | Wrap + next week preview** \n* 3 takeaways in 30 seconds\n* What we’re tracking next week\n* Speaker/volunteer reminder (“If you’ve shipped something\, we want the story.”) \n### **Who should join** \nIf you’re responsible for security strategy\, cryptography\, identity\, platform security\, resilience\, compliance\, or product security – and quantum is on your roadmap – this is for you. \n### **What you’ll leave with** \n* Clear visibility into what changed this week\n* Better judgment on what’s noise vs. actionable signal\n* Practical framing for decisions you may need to revisit (inventory\, standards alignment\, vendor dependencies\, rollout sequencing)\n* A community you can learn from (and contribute to)
URL:https://appliedquantum.com/event/quantum-security-community-online-fortnightly-update-emea-apac-18
LOCATION:Online event
CATEGORIES:Community
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/03/1024x576-anROVz.jpg
GEO:-8.521147;179.1962
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=+01:00:20261119T170000
DTEND;TZID=+01:00:20261119T183000
DTSTAMP:20260404T134519
CREATED:20260316T100019Z
LAST-MODIFIED:20260404T103028Z
UID:10000060-1795107600-1795113000@appliedquantum.com
SUMMARY:Quantum Security Community - Online Fortnightly Update (America\, EMEA)
DESCRIPTION:***Quantum Security Community*** *is a free\, global\, practitioner-led network sharing real-world PQC insights and supporting one another through the most complex IT/OT security transformation of our time. Explore the channels at* ***[Quantum.Security](https://quantum.security)*** \n—————— \n**A weekly\, online community meetup for quantum security practitioners — focused on signal\, not hype.** \nPost-quantum cryptography (PQC)\, crypto agility\, quantum threat models\, and standards timelines are all evolving quickly. For security teams\, the challenge isn’t “finding information” — it’s deciding **what matters**\, **what changed**\, and **what to do next**. Quantum Security Weekly exists to make that easier. \nWe run the **same meetup twice each week** to cover global time zones: \n* **Session 1:** Europe / Middle East / APAC-friendly\n* **Session 2:** Europe / Americas-friendly\n(Choose the one that fits your schedule – content is aligned across both.) \n### **What happens each week** \nYou’ll get a curated update across the four categories that consistently drive real-world decisions: \n**1) Regulation & policy signals**\nNew requirements\, supervisory guidance\, national strategies\, procurement rules\, sector-specific expectations – and what they imply for timelines and planning. \n**2) Standards and “rules of the road”**\nUpdates to cryptographic standards and related ecosystems (protocols\, identity\, secure elements\, industry frameworks). We focus on what changes adoption feasibility\, interoperability\, or audit/compliance expectations. \n**3) Technical developments**\nCredible signals about quantum computing capability\, relevant cryptanalysis\, and meaningful algorithmic/security research (including “RSA-breaking” or signature-related developments) – explained in terms of security impact\, not headlines. \n**4) Practical implementation reality**\nThe stuff that makes or breaks programs: where crypto actually lives\, dependency chains\, vendor readiness\, device constraints\, performance tradeoffs\, rollout sequencing\, and “what we learned the hard way.” \n### **Speakers and community contributions** \nWe often invite a guest speaker to share practical experience (implementation lessons\, program strategy\, technical deep dives). Sometimes we’ll host short product introductions – but the default posture is educational and experience-driven\, not salesy. When there’s no guest\, we go deeper on the week’s most important developments and prioritize Q&A. \n### **Typical Agenda** \n**0:00 – 0:05 | Welcome + how to engage (fast)** \n* What this meetup is: **signal > hype**\, practical implications\, community-first\n* How to participate today: chat\, Q&A flow\, how to drop links/resources\n* Quick reminder of community channels (Forum / Slack / LinkedIn group) and how to continue the conversation after the call \n**0:05 – 0:25 | The Weekly Signal Brief (what actually changed)**\nA structured scan in four buckets\, with a “so what?” for each: \n* **Policy & regulation:** new drafts\, mandates\, enforcement signals\, procurement rules\n* **Standards & frameworks:** PQC standards movement\, protocol ecosystem changes\, guidance updates\n* **Quantum capability signals:** credible progress indicators (hardware\, error correction\, scaling)\, what to ignore\n* **Cryptography/cryptanalysis:** meaningful research developments\, “RSA/ECC breaking” signals\, security relevance \n**0:25 – 0:35 | Myth‑Busting / Reality Check (the hype audit)**\nIf something got hyped this week\, we’ll do a quick\, repeatable teardown: \n* **What happened** (one sentence)\n* **What didn’t happen** (the misconception)\n* **What it means for defenders** (real impact)\n* **What changes / what doesn’t** in PQC planning this year \n*Goal:* keep the community calibrated\, reduce panic\, and prevent misallocation of effort. \n**0:35 – 0:50 | One Topic\, Deeper (the week’s main story)**\nA focused deep dive on one theme that affects real programs\, such as: \n* crypto-agility patterns and failure modes\n* hybrid deployment realities (where it works / where it’s a trap)\n* migration sequencing and vendor dependency bottlenecks\n* what a standards change means for architects and CISOs\n* integrity-first thinking (e.g.\, signatures\, trust anchors\, long-lived evidence) \n**0:50 – 1:05 | Guest Spotlight (most weeks) OR Community Lightning Round** \n* **Guest Spotlight (preferred when available):**\n* 10–12 min: experience share / lessons learned / case study / product walkthrough (kept educational)\n* 3–5 min: moderated Q&A (“what surprised you / what broke / what you’d do differently”)\n* **If no guest:**\n* 3 lightning shares (3–4 min each): “one paper / one tool / one lesson / one vendor signal” \n**1:05 – 1:10 | Community Pulse (cross‑channel highlights)** \n* “Top 3 threads” from various community channels this week\n* Quick call-outs: members looking for feedback\, volunteer opportunities\, upcoming topics\n* How to propose a guest / suggest topics / share resources for next week \n**1:10 – 1:28 | Open Q&A / Office Hours** \n* Live questions (chat + audio)\n* “Bring your messy problem” time: inventory\, vendor claims\, timeline pressure\, governance\, metrics\n* Optional: rapid-fire “yes/no + why” on 5–8 quick questions if the room is lively \n**1:28 – 1:30 | Wrap + next week preview** \n* 3 takeaways in 30 seconds\n* What we’re tracking next week\n* Speaker/volunteer reminder (“If you’ve shipped something\, we want the story.”) \n### **Who should join** \nIf you’re responsible for security strategy\, cryptography\, identity\, platform security\, resilience\, compliance\, or product security – and quantum is on your roadmap – this is for you. \n### **What you’ll leave with** \n* Clear visibility into what changed this week\n* Better judgment on what’s noise vs. actionable signal\n* Practical framing for decisions you may need to revisit (inventory\, standards alignment\, vendor dependencies\, rollout sequencing)\n* A community you can learn from (and contribute to)
URL:https://appliedquantum.com/event/quantum-security-community-online-fortnightly-update-america-emea-18
LOCATION:Online event
CATEGORIES:Community
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/03/1024x576-bya3VY.jpg
GEO:-8.521147;179.1962
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=+01:00:20261203T090000
DTEND;TZID=+01:00:20261203T103000
DTSTAMP:20260404T134519
CREATED:20260316T100020Z
LAST-MODIFIED:20260404T103028Z
UID:10000061-1796288400-1796293800@appliedquantum.com
SUMMARY:Quantum Security Community - Online Fortnightly Update (EMEA\, APAC)
DESCRIPTION:***Quantum Security Community*** *is a free\, global\, practitioner-led network sharing real-world PQC insights and supporting one another through the most complex IT/OT security transformation of our time. Explore the channels at* ***[Quantum.Security](https://quantum.security)*** \n—————— \n**A weekly\, online community meetup for quantum security practitioners — focused on signal\, not hype.** \nPost-quantum cryptography (PQC)\, crypto agility\, quantum threat models\, and standards timelines are all evolving quickly. For security teams\, the challenge isn’t “finding information” — it’s deciding **what matters**\, **what changed**\, and **what to do next**. Quantum Security Weekly exists to make that easier. \nWe run the **same meetup twice each week** to cover global time zones: \n* **Session 1:** Europe / Middle East / APAC-friendly\n* **Session 2:** Europe / Americas-friendly\n(Choose the one that fits your schedule – content is aligned across both.) \n### **What happens each week** \nYou’ll get a curated update across the four categories that consistently drive real-world decisions: \n**1) Regulation & policy signals**\nNew requirements\, supervisory guidance\, national strategies\, procurement rules\, sector-specific expectations – and what they imply for timelines and planning. \n**2) Standards and “rules of the road”**\nUpdates to cryptographic standards and related ecosystems (protocols\, identity\, secure elements\, industry frameworks). We focus on what changes adoption feasibility\, interoperability\, or audit/compliance expectations. \n**3) Technical developments**\nCredible signals about quantum computing capability\, relevant cryptanalysis\, and meaningful algorithmic/security research (including “RSA-breaking” or signature-related developments) – explained in terms of security impact\, not headlines. \n**4) Practical implementation reality**\nThe stuff that makes or breaks programs: where crypto actually lives\, dependency chains\, vendor readiness\, device constraints\, performance tradeoffs\, rollout sequencing\, and “what we learned the hard way.” \n### **Speakers and community contributions** \nWe often invite a guest speaker to share practical experience (implementation lessons\, program strategy\, technical deep dives). Sometimes we’ll host short product introductions – but the default posture is educational and experience-driven\, not salesy. When there’s no guest\, we go deeper on the week’s most important developments and prioritize Q&A. \n### **Typical Agenda** \n**0:00 – 0:05 | Welcome + how to engage (fast)** \n* What this meetup is: **signal > hype**\, practical implications\, community-first\n* How to participate today: chat\, Q&A flow\, how to drop links/resources\n* Quick reminder of community channels (Forum / Slack / LinkedIn group) and how to continue the conversation after the call \n**0:05 – 0:25 | The Weekly Signal Brief (what actually changed)**\nA structured scan in four buckets\, with a “so what?” for each: \n* **Policy & regulation:** new drafts\, mandates\, enforcement signals\, procurement rules\n* **Standards & frameworks:** PQC standards movement\, protocol ecosystem changes\, guidance updates\n* **Quantum capability signals:** credible progress indicators (hardware\, error correction\, scaling)\, what to ignore\n* **Cryptography/cryptanalysis:** meaningful research developments\, “RSA/ECC breaking” signals\, security relevance \n**0:25 – 0:35 | Myth‑Busting / Reality Check (the hype audit)**\nIf something got hyped this week\, we’ll do a quick\, repeatable teardown: \n* **What happened** (one sentence)\n* **What didn’t happen** (the misconception)\n* **What it means for defenders** (real impact)\n* **What changes / what doesn’t** in PQC planning this year \n*Goal:* keep the community calibrated\, reduce panic\, and prevent misallocation of effort. \n**0:35 – 0:50 | One Topic\, Deeper (the week’s main story)**\nA focused deep dive on one theme that affects real programs\, such as: \n* crypto-agility patterns and failure modes\n* hybrid deployment realities (where it works / where it’s a trap)\n* migration sequencing and vendor dependency bottlenecks\n* what a standards change means for architects and CISOs\n* integrity-first thinking (e.g.\, signatures\, trust anchors\, long-lived evidence) \n**0:50 – 1:05 | Guest Spotlight (most weeks) OR Community Lightning Round** \n* **Guest Spotlight (preferred when available):**\n* 10–12 min: experience share / lessons learned / case study / product walkthrough (kept educational)\n* 3–5 min: moderated Q&A (“what surprised you / what broke / what you’d do differently”)\n* **If no guest:**\n* 3 lightning shares (3–4 min each): “one paper / one tool / one lesson / one vendor signal” \n**1:05 – 1:10 | Community Pulse (cross‑channel highlights)** \n* “Top 3 threads” from various community channels this week\n* Quick call-outs: members looking for feedback\, volunteer opportunities\, upcoming topics\n* How to propose a guest / suggest topics / share resources for next week \n**1:10 – 1:28 | Open Q&A / Office Hours** \n* Live questions (chat + audio)\n* “Bring your messy problem” time: inventory\, vendor claims\, timeline pressure\, governance\, metrics\n* Optional: rapid-fire “yes/no + why” on 5–8 quick questions if the room is lively \n**1:28 – 1:30 | Wrap + next week preview** \n* 3 takeaways in 30 seconds\n* What we’re tracking next week\n* Speaker/volunteer reminder (“If you’ve shipped something\, we want the story.”) \n### **Who should join** \nIf you’re responsible for security strategy\, cryptography\, identity\, platform security\, resilience\, compliance\, or product security – and quantum is on your roadmap – this is for you. \n### **What you’ll leave with** \n* Clear visibility into what changed this week\n* Better judgment on what’s noise vs. actionable signal\n* Practical framing for decisions you may need to revisit (inventory\, standards alignment\, vendor dependencies\, rollout sequencing)\n* A community you can learn from (and contribute to)
URL:https://appliedquantum.com/event/quantum-security-community-online-fortnightly-update-emea-apac-19
LOCATION:Online event
CATEGORIES:Community
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/03/1024x576-anROVz.jpg
GEO:-8.521147;179.1962
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=+01:00:20261203T170000
DTEND;TZID=+01:00:20261203T183000
DTSTAMP:20260404T134519
CREATED:20260316T100020Z
LAST-MODIFIED:20260404T103028Z
UID:10000062-1796317200-1796322600@appliedquantum.com
SUMMARY:Quantum Security Community - Online Fortnightly Update (America\, EMEA)
DESCRIPTION:***Quantum Security Community*** *is a free\, global\, practitioner-led network sharing real-world PQC insights and supporting one another through the most complex IT/OT security transformation of our time. Explore the channels at* ***[Quantum.Security](https://quantum.security)*** \n—————— \n**A weekly\, online community meetup for quantum security practitioners — focused on signal\, not hype.** \nPost-quantum cryptography (PQC)\, crypto agility\, quantum threat models\, and standards timelines are all evolving quickly. For security teams\, the challenge isn’t “finding information” — it’s deciding **what matters**\, **what changed**\, and **what to do next**. Quantum Security Weekly exists to make that easier. \nWe run the **same meetup twice each week** to cover global time zones: \n* **Session 1:** Europe / Middle East / APAC-friendly\n* **Session 2:** Europe / Americas-friendly\n(Choose the one that fits your schedule – content is aligned across both.) \n### **What happens each week** \nYou’ll get a curated update across the four categories that consistently drive real-world decisions: \n**1) Regulation & policy signals**\nNew requirements\, supervisory guidance\, national strategies\, procurement rules\, sector-specific expectations – and what they imply for timelines and planning. \n**2) Standards and “rules of the road”**\nUpdates to cryptographic standards and related ecosystems (protocols\, identity\, secure elements\, industry frameworks). We focus on what changes adoption feasibility\, interoperability\, or audit/compliance expectations. \n**3) Technical developments**\nCredible signals about quantum computing capability\, relevant cryptanalysis\, and meaningful algorithmic/security research (including “RSA-breaking” or signature-related developments) – explained in terms of security impact\, not headlines. \n**4) Practical implementation reality**\nThe stuff that makes or breaks programs: where crypto actually lives\, dependency chains\, vendor readiness\, device constraints\, performance tradeoffs\, rollout sequencing\, and “what we learned the hard way.” \n### **Speakers and community contributions** \nWe often invite a guest speaker to share practical experience (implementation lessons\, program strategy\, technical deep dives). Sometimes we’ll host short product introductions – but the default posture is educational and experience-driven\, not salesy. When there’s no guest\, we go deeper on the week’s most important developments and prioritize Q&A. \n### **Typical Agenda** \n**0:00 – 0:05 | Welcome + how to engage (fast)** \n* What this meetup is: **signal > hype**\, practical implications\, community-first\n* How to participate today: chat\, Q&A flow\, how to drop links/resources\n* Quick reminder of community channels (Forum / Slack / LinkedIn group) and how to continue the conversation after the call \n**0:05 – 0:25 | The Weekly Signal Brief (what actually changed)**\nA structured scan in four buckets\, with a “so what?” for each: \n* **Policy & regulation:** new drafts\, mandates\, enforcement signals\, procurement rules\n* **Standards & frameworks:** PQC standards movement\, protocol ecosystem changes\, guidance updates\n* **Quantum capability signals:** credible progress indicators (hardware\, error correction\, scaling)\, what to ignore\n* **Cryptography/cryptanalysis:** meaningful research developments\, “RSA/ECC breaking” signals\, security relevance \n**0:25 – 0:35 | Myth‑Busting / Reality Check (the hype audit)**\nIf something got hyped this week\, we’ll do a quick\, repeatable teardown: \n* **What happened** (one sentence)\n* **What didn’t happen** (the misconception)\n* **What it means for defenders** (real impact)\n* **What changes / what doesn’t** in PQC planning this year \n*Goal:* keep the community calibrated\, reduce panic\, and prevent misallocation of effort. \n**0:35 – 0:50 | One Topic\, Deeper (the week’s main story)**\nA focused deep dive on one theme that affects real programs\, such as: \n* crypto-agility patterns and failure modes\n* hybrid deployment realities (where it works / where it’s a trap)\n* migration sequencing and vendor dependency bottlenecks\n* what a standards change means for architects and CISOs\n* integrity-first thinking (e.g.\, signatures\, trust anchors\, long-lived evidence) \n**0:50 – 1:05 | Guest Spotlight (most weeks) OR Community Lightning Round** \n* **Guest Spotlight (preferred when available):**\n* 10–12 min: experience share / lessons learned / case study / product walkthrough (kept educational)\n* 3–5 min: moderated Q&A (“what surprised you / what broke / what you’d do differently”)\n* **If no guest:**\n* 3 lightning shares (3–4 min each): “one paper / one tool / one lesson / one vendor signal” \n**1:05 – 1:10 | Community Pulse (cross‑channel highlights)** \n* “Top 3 threads” from various community channels this week\n* Quick call-outs: members looking for feedback\, volunteer opportunities\, upcoming topics\n* How to propose a guest / suggest topics / share resources for next week \n**1:10 – 1:28 | Open Q&A / Office Hours** \n* Live questions (chat + audio)\n* “Bring your messy problem” time: inventory\, vendor claims\, timeline pressure\, governance\, metrics\n* Optional: rapid-fire “yes/no + why” on 5–8 quick questions if the room is lively \n**1:28 – 1:30 | Wrap + next week preview** \n* 3 takeaways in 30 seconds\n* What we’re tracking next week\n* Speaker/volunteer reminder (“If you’ve shipped something\, we want the story.”) \n### **Who should join** \nIf you’re responsible for security strategy\, cryptography\, identity\, platform security\, resilience\, compliance\, or product security – and quantum is on your roadmap – this is for you. \n### **What you’ll leave with** \n* Clear visibility into what changed this week\n* Better judgment on what’s noise vs. actionable signal\n* Practical framing for decisions you may need to revisit (inventory\, standards alignment\, vendor dependencies\, rollout sequencing)\n* A community you can learn from (and contribute to)
URL:https://appliedquantum.com/event/quantum-security-community-online-fortnightly-update-america-emea-19
LOCATION:Online event
CATEGORIES:Community
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/03/1024x576-bya3VY.jpg
GEO:-8.521147;179.1962
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=+01:00:20261217T090000
DTEND;TZID=+01:00:20261217T103000
DTSTAMP:20260404T134519
CREATED:20260316T100020Z
LAST-MODIFIED:20260404T103028Z
UID:10000063-1797498000-1797503400@appliedquantum.com
SUMMARY:Quantum Security Community - Online Fortnightly Update (EMEA\, APAC)
DESCRIPTION:***Quantum Security Community*** *is a free\, global\, practitioner-led network sharing real-world PQC insights and supporting one another through the most complex IT/OT security transformation of our time. Explore the channels at* ***[Quantum.Security](https://quantum.security)*** \n—————— \n**A weekly\, online community meetup for quantum security practitioners — focused on signal\, not hype.** \nPost-quantum cryptography (PQC)\, crypto agility\, quantum threat models\, and standards timelines are all evolving quickly. For security teams\, the challenge isn’t “finding information” — it’s deciding **what matters**\, **what changed**\, and **what to do next**. Quantum Security Weekly exists to make that easier. \nWe run the **same meetup twice each week** to cover global time zones: \n* **Session 1:** Europe / Middle East / APAC-friendly\n* **Session 2:** Europe / Americas-friendly\n(Choose the one that fits your schedule – content is aligned across both.) \n### **What happens each week** \nYou’ll get a curated update across the four categories that consistently drive real-world decisions: \n**1) Regulation & policy signals**\nNew requirements\, supervisory guidance\, national strategies\, procurement rules\, sector-specific expectations – and what they imply for timelines and planning. \n**2) Standards and “rules of the road”**\nUpdates to cryptographic standards and related ecosystems (protocols\, identity\, secure elements\, industry frameworks). We focus on what changes adoption feasibility\, interoperability\, or audit/compliance expectations. \n**3) Technical developments**\nCredible signals about quantum computing capability\, relevant cryptanalysis\, and meaningful algorithmic/security research (including “RSA-breaking” or signature-related developments) – explained in terms of security impact\, not headlines. \n**4) Practical implementation reality**\nThe stuff that makes or breaks programs: where crypto actually lives\, dependency chains\, vendor readiness\, device constraints\, performance tradeoffs\, rollout sequencing\, and “what we learned the hard way.” \n### **Speakers and community contributions** \nWe often invite a guest speaker to share practical experience (implementation lessons\, program strategy\, technical deep dives). Sometimes we’ll host short product introductions – but the default posture is educational and experience-driven\, not salesy. When there’s no guest\, we go deeper on the week’s most important developments and prioritize Q&A. \n### **Typical Agenda** \n**0:00 – 0:05 | Welcome + how to engage (fast)** \n* What this meetup is: **signal > hype**\, practical implications\, community-first\n* How to participate today: chat\, Q&A flow\, how to drop links/resources\n* Quick reminder of community channels (Forum / Slack / LinkedIn group) and how to continue the conversation after the call \n**0:05 – 0:25 | The Weekly Signal Brief (what actually changed)**\nA structured scan in four buckets\, with a “so what?” for each: \n* **Policy & regulation:** new drafts\, mandates\, enforcement signals\, procurement rules\n* **Standards & frameworks:** PQC standards movement\, protocol ecosystem changes\, guidance updates\n* **Quantum capability signals:** credible progress indicators (hardware\, error correction\, scaling)\, what to ignore\n* **Cryptography/cryptanalysis:** meaningful research developments\, “RSA/ECC breaking” signals\, security relevance \n**0:25 – 0:35 | Myth‑Busting / Reality Check (the hype audit)**\nIf something got hyped this week\, we’ll do a quick\, repeatable teardown: \n* **What happened** (one sentence)\n* **What didn’t happen** (the misconception)\n* **What it means for defenders** (real impact)\n* **What changes / what doesn’t** in PQC planning this year \n*Goal:* keep the community calibrated\, reduce panic\, and prevent misallocation of effort. \n**0:35 – 0:50 | One Topic\, Deeper (the week’s main story)**\nA focused deep dive on one theme that affects real programs\, such as: \n* crypto-agility patterns and failure modes\n* hybrid deployment realities (where it works / where it’s a trap)\n* migration sequencing and vendor dependency bottlenecks\n* what a standards change means for architects and CISOs\n* integrity-first thinking (e.g.\, signatures\, trust anchors\, long-lived evidence) \n**0:50 – 1:05 | Guest Spotlight (most weeks) OR Community Lightning Round** \n* **Guest Spotlight (preferred when available):**\n* 10–12 min: experience share / lessons learned / case study / product walkthrough (kept educational)\n* 3–5 min: moderated Q&A (“what surprised you / what broke / what you’d do differently”)\n* **If no guest:**\n* 3 lightning shares (3–4 min each): “one paper / one tool / one lesson / one vendor signal” \n**1:05 – 1:10 | Community Pulse (cross‑channel highlights)** \n* “Top 3 threads” from various community channels this week\n* Quick call-outs: members looking for feedback\, volunteer opportunities\, upcoming topics\n* How to propose a guest / suggest topics / share resources for next week \n**1:10 – 1:28 | Open Q&A / Office Hours** \n* Live questions (chat + audio)\n* “Bring your messy problem” time: inventory\, vendor claims\, timeline pressure\, governance\, metrics\n* Optional: rapid-fire “yes/no + why” on 5–8 quick questions if the room is lively \n**1:28 – 1:30 | Wrap + next week preview** \n* 3 takeaways in 30 seconds\n* What we’re tracking next week\n* Speaker/volunteer reminder (“If you’ve shipped something\, we want the story.”) \n### **Who should join** \nIf you’re responsible for security strategy\, cryptography\, identity\, platform security\, resilience\, compliance\, or product security – and quantum is on your roadmap – this is for you. \n### **What you’ll leave with** \n* Clear visibility into what changed this week\n* Better judgment on what’s noise vs. actionable signal\n* Practical framing for decisions you may need to revisit (inventory\, standards alignment\, vendor dependencies\, rollout sequencing)\n* A community you can learn from (and contribute to)
URL:https://appliedquantum.com/event/quantum-security-community-online-fortnightly-update-emea-apac-20
LOCATION:Online event
CATEGORIES:Community
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/03/1024x576-anROVz.jpg
GEO:-8.521147;179.1962
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=+01:00:20261217T170000
DTEND;TZID=+01:00:20261217T183000
DTSTAMP:20260404T134519
CREATED:20260320T103014Z
LAST-MODIFIED:20260404T103028Z
UID:10000064-1797526800-1797532200@appliedquantum.com
SUMMARY:Quantum Security Community - Online Fortnightly Update (America\, EMEA)
DESCRIPTION:***Quantum Security Community*** *is a free\, global\, practitioner-led network sharing real-world PQC insights and supporting one another through the most complex IT/OT security transformation of our time. Explore the channels at* ***[Quantum.Security](https://quantum.security)*** \n—————— \n**A weekly\, online community meetup for quantum security practitioners — focused on signal\, not hype.** \nPost-quantum cryptography (PQC)\, crypto agility\, quantum threat models\, and standards timelines are all evolving quickly. For security teams\, the challenge isn’t “finding information” — it’s deciding **what matters**\, **what changed**\, and **what to do next**. Quantum Security Weekly exists to make that easier. \nWe run the **same meetup twice each week** to cover global time zones: \n* **Session 1:** Europe / Middle East / APAC-friendly\n* **Session 2:** Europe / Americas-friendly\n(Choose the one that fits your schedule – content is aligned across both.) \n### **What happens each week** \nYou’ll get a curated update across the four categories that consistently drive real-world decisions: \n**1) Regulation & policy signals**\nNew requirements\, supervisory guidance\, national strategies\, procurement rules\, sector-specific expectations – and what they imply for timelines and planning. \n**2) Standards and “rules of the road”**\nUpdates to cryptographic standards and related ecosystems (protocols\, identity\, secure elements\, industry frameworks). We focus on what changes adoption feasibility\, interoperability\, or audit/compliance expectations. \n**3) Technical developments**\nCredible signals about quantum computing capability\, relevant cryptanalysis\, and meaningful algorithmic/security research (including “RSA-breaking” or signature-related developments) – explained in terms of security impact\, not headlines. \n**4) Practical implementation reality**\nThe stuff that makes or breaks programs: where crypto actually lives\, dependency chains\, vendor readiness\, device constraints\, performance tradeoffs\, rollout sequencing\, and “what we learned the hard way.” \n### **Speakers and community contributions** \nWe often invite a guest speaker to share practical experience (implementation lessons\, program strategy\, technical deep dives). Sometimes we’ll host short product introductions – but the default posture is educational and experience-driven\, not salesy. When there’s no guest\, we go deeper on the week’s most important developments and prioritize Q&A. \n### **Typical Agenda** \n**0:00 – 0:05 | Welcome + how to engage (fast)** \n* What this meetup is: **signal > hype**\, practical implications\, community-first\n* How to participate today: chat\, Q&A flow\, how to drop links/resources\n* Quick reminder of community channels (Forum / Slack / LinkedIn group) and how to continue the conversation after the call \n**0:05 – 0:25 | The Weekly Signal Brief (what actually changed)**\nA structured scan in four buckets\, with a “so what?” for each: \n* **Policy & regulation:** new drafts\, mandates\, enforcement signals\, procurement rules\n* **Standards & frameworks:** PQC standards movement\, protocol ecosystem changes\, guidance updates\n* **Quantum capability signals:** credible progress indicators (hardware\, error correction\, scaling)\, what to ignore\n* **Cryptography/cryptanalysis:** meaningful research developments\, “RSA/ECC breaking” signals\, security relevance \n**0:25 – 0:35 | Myth‑Busting / Reality Check (the hype audit)**\nIf something got hyped this week\, we’ll do a quick\, repeatable teardown: \n* **What happened** (one sentence)\n* **What didn’t happen** (the misconception)\n* **What it means for defenders** (real impact)\n* **What changes / what doesn’t** in PQC planning this year \n*Goal:* keep the community calibrated\, reduce panic\, and prevent misallocation of effort. \n**0:35 – 0:50 | One Topic\, Deeper (the week’s main story)**\nA focused deep dive on one theme that affects real programs\, such as: \n* crypto-agility patterns and failure modes\n* hybrid deployment realities (where it works / where it’s a trap)\n* migration sequencing and vendor dependency bottlenecks\n* what a standards change means for architects and CISOs\n* integrity-first thinking (e.g.\, signatures\, trust anchors\, long-lived evidence) \n**0:50 – 1:05 | Guest Spotlight (most weeks) OR Community Lightning Round** \n* **Guest Spotlight (preferred when available):**\n* 10–12 min: experience share / lessons learned / case study / product walkthrough (kept educational)\n* 3–5 min: moderated Q&A (“what surprised you / what broke / what you’d do differently”)\n* **If no guest:**\n* 3 lightning shares (3–4 min each): “one paper / one tool / one lesson / one vendor signal” \n**1:05 – 1:10 | Community Pulse (cross‑channel highlights)** \n* “Top 3 threads” from various community channels this week\n* Quick call-outs: members looking for feedback\, volunteer opportunities\, upcoming topics\n* How to propose a guest / suggest topics / share resources for next week \n**1:10 – 1:28 | Open Q&A / Office Hours** \n* Live questions (chat + audio)\n* “Bring your messy problem” time: inventory\, vendor claims\, timeline pressure\, governance\, metrics\n* Optional: rapid-fire “yes/no + why” on 5–8 quick questions if the room is lively \n**1:28 – 1:30 | Wrap + next week preview** \n* 3 takeaways in 30 seconds\n* What we’re tracking next week\n* Speaker/volunteer reminder (“If you’ve shipped something\, we want the story.”) \n### **Who should join** \nIf you’re responsible for security strategy\, cryptography\, identity\, platform security\, resilience\, compliance\, or product security – and quantum is on your roadmap – this is for you. \n### **What you’ll leave with** \n* Clear visibility into what changed this week\n* Better judgment on what’s noise vs. actionable signal\n* Practical framing for decisions you may need to revisit (inventory\, standards alignment\, vendor dependencies\, rollout sequencing)\n* A community you can learn from (and contribute to)
URL:https://appliedquantum.com/event/quantum-security-community-online-fortnightly-update-america-emea-20
LOCATION:Online event
CATEGORIES:Community
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/03/1024x576-bya3VY.jpg
GEO:-8.521147;179.1962
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=+01:00:20261231T090000
DTEND;TZID=+01:00:20261231T103000
DTSTAMP:20260404T134519
CREATED:20260327T091757Z
LAST-MODIFIED:20260404T103028Z
UID:10000066-1798707600-1798713000@appliedquantum.com
SUMMARY:Quantum Security Community - Online Fortnightly Update (EMEA\, APAC)
DESCRIPTION:***Quantum Security Community*** *is a free\, global\, practitioner-led network sharing real-world PQC insights and supporting one another through the most complex IT/OT security transformation of our time. Explore the channels at* ***[Quantum.Security](https://quantum.security)*** \n—————— \n**A weekly\, online community meetup for quantum security practitioners — focused on signal\, not hype.** \nPost-quantum cryptography (PQC)\, crypto agility\, quantum threat models\, and standards timelines are all evolving quickly. For security teams\, the challenge isn’t “finding information” — it’s deciding **what matters**\, **what changed**\, and **what to do next**. Quantum Security Weekly exists to make that easier. \nWe run the **same meetup twice each week** to cover global time zones: \n* **Session 1:** Europe / Middle East / APAC-friendly\n* **Session 2:** Europe / Americas-friendly\n(Choose the one that fits your schedule – content is aligned across both.) \n### **What happens each week** \nYou’ll get a curated update across the four categories that consistently drive real-world decisions: \n**1) Regulation & policy signals**\nNew requirements\, supervisory guidance\, national strategies\, procurement rules\, sector-specific expectations – and what they imply for timelines and planning. \n**2) Standards and “rules of the road”**\nUpdates to cryptographic standards and related ecosystems (protocols\, identity\, secure elements\, industry frameworks). We focus on what changes adoption feasibility\, interoperability\, or audit/compliance expectations. \n**3) Technical developments**\nCredible signals about quantum computing capability\, relevant cryptanalysis\, and meaningful algorithmic/security research (including “RSA-breaking” or signature-related developments) – explained in terms of security impact\, not headlines. \n**4) Practical implementation reality**\nThe stuff that makes or breaks programs: where crypto actually lives\, dependency chains\, vendor readiness\, device constraints\, performance tradeoffs\, rollout sequencing\, and “what we learned the hard way.” \n### **Speakers and community contributions** \nWe often invite a guest speaker to share practical experience (implementation lessons\, program strategy\, technical deep dives). Sometimes we’ll host short product introductions – but the default posture is educational and experience-driven\, not salesy. When there’s no guest\, we go deeper on the week’s most important developments and prioritize Q&A. \n### **Typical Agenda** \n**0:00 – 0:05 | Welcome + how to engage (fast)** \n* What this meetup is: **signal > hype**\, practical implications\, community-first\n* How to participate today: chat\, Q&A flow\, how to drop links/resources\n* Quick reminder of community channels (Forum / Slack / LinkedIn group) and how to continue the conversation after the call \n**0:05 – 0:25 | The Weekly Signal Brief (what actually changed)**\nA structured scan in four buckets\, with a “so what?” for each: \n* **Policy & regulation:** new drafts\, mandates\, enforcement signals\, procurement rules\n* **Standards & frameworks:** PQC standards movement\, protocol ecosystem changes\, guidance updates\n* **Quantum capability signals:** credible progress indicators (hardware\, error correction\, scaling)\, what to ignore\n* **Cryptography/cryptanalysis:** meaningful research developments\, “RSA/ECC breaking” signals\, security relevance \n**0:25 – 0:35 | Myth‑Busting / Reality Check (the hype audit)**\nIf something got hyped this week\, we’ll do a quick\, repeatable teardown: \n* **What happened** (one sentence)\n* **What didn’t happen** (the misconception)\n* **What it means for defenders** (real impact)\n* **What changes / what doesn’t** in PQC planning this year \n*Goal:* keep the community calibrated\, reduce panic\, and prevent misallocation of effort. \n**0:35 – 0:50 | One Topic\, Deeper (the week’s main story)**\nA focused deep dive on one theme that affects real programs\, such as: \n* crypto-agility patterns and failure modes\n* hybrid deployment realities (where it works / where it’s a trap)\n* migration sequencing and vendor dependency bottlenecks\n* what a standards change means for architects and CISOs\n* integrity-first thinking (e.g.\, signatures\, trust anchors\, long-lived evidence) \n**0:50 – 1:05 | Guest Spotlight (most weeks) OR Community Lightning Round** \n* **Guest Spotlight (preferred when available):**\n* 10–12 min: experience share / lessons learned / case study / product walkthrough (kept educational)\n* 3–5 min: moderated Q&A (“what surprised you / what broke / what you’d do differently”)\n* **If no guest:**\n* 3 lightning shares (3–4 min each): “one paper / one tool / one lesson / one vendor signal” \n**1:05 – 1:10 | Community Pulse (cross‑channel highlights)** \n* “Top 3 threads” from various community channels this week\n* Quick call-outs: members looking for feedback\, volunteer opportunities\, upcoming topics\n* How to propose a guest / suggest topics / share resources for next week \n**1:10 – 1:28 | Open Q&A / Office Hours** \n* Live questions (chat + audio)\n* “Bring your messy problem” time: inventory\, vendor claims\, timeline pressure\, governance\, metrics\n* Optional: rapid-fire “yes/no + why” on 5–8 quick questions if the room is lively \n**1:28 – 1:30 | Wrap + next week preview** \n* 3 takeaways in 30 seconds\n* What we’re tracking next week\n* Speaker/volunteer reminder (“If you’ve shipped something\, we want the story.”) \n### **Who should join** \nIf you’re responsible for security strategy\, cryptography\, identity\, platform security\, resilience\, compliance\, or product security – and quantum is on your roadmap – this is for you. \n### **What you’ll leave with** \n* Clear visibility into what changed this week\n* Better judgment on what’s noise vs. actionable signal\n* Practical framing for decisions you may need to revisit (inventory\, standards alignment\, vendor dependencies\, rollout sequencing)\n* A community you can learn from (and contribute to)
URL:https://appliedquantum.com/event/quantum-security-community-online-fortnightly-update-emea-apac-21
LOCATION:Online event
CATEGORIES:Community
ATTACH;FMTTYPE=image/jpeg:https://appliedquantum.com/wp-content/uploads/2026/03/1024x576-anROVz.jpg
GEO:-8.521147;179.1962
END:VEVENT
END:VCALENDAR