The Quantum-Safe Era starts NOW!
As quantum computing rapidly advances, the security of several classical cryptographic systems is increasingly at risk. This course will explain the root cause of the "Quantum Threat” and the impact on our digital and operational technologies, that are critical for business and society. The participants will learn about Post-Quantum Cryptography, developed to counter this threat. This includes the invention of new encryption algorithms, as well as the specification of new encryption standards, applicable across industries. Furthermore, they will discover how to find the right remedy and how to conduct a Quantum-Safe Journey.
Content
This course will cover:
- Understanding the Quantum Computing Threat: A concise introduction to quantum computing's capabilities.
- The Quantum Cryptography Risk: Why quantum computers pose an imminent danger to today's encryption.
- Post-Quantum Cryptography (PQC) Explained: Discover the new algorithms designed to resist quantum attacks.
- Evolving Standards & Regulations: Learn about the new global PQC standards and compliance requirements.
- Why Act NOW: Understand the urgency and compelling reasons to begin your quantum-safe transition today.
- Industry & Government Response: Explore how organizations and governments are preparing for the quantum era.
- Crafting Your Quantum-Safe Journey: A practical roadmap for assessing, planning, and implementing quantum-resilient solutions.
- Tools for the Transition: Discover software and solutions that facilitate your quantum-safe journey.
- Evolving IT Infrastructure for PQC: Understand how current IT systems will adapt to new cryptographic demands.
- Real-World Quantum-Safe Journeys: Learn from practical examples and case studies of organizations making the transition.
Learning Outcomes
At the end of the course, students are able to:
- Explain the impact of Quantum Computing on current cryptographic systems.
- Explain the necessity of Post Quantum Cryptography.
- Describe to ingredients of a Quantum-Safe journey.
- Know about sources that allow to learn more about Post Quantum Cryptography.
Training Method
This intensive 3-hour session provides a focused and interactive learning experience. The course combines engaging theoretical insights with practical examples, designed to equip you with actionable strategies for building quantum-safe systems.
Certification
Participation OnlyPrerequisites
None
Planning and location
14:00 - 17:00
Your trainer(s) for this course

Eric Michiels
