SandboxAQ is at the World Economic Forum Annual Meeting to discuss the impact of AI and quantum technologies on the world. In addition to presenting our collaboration with WEF on the National Quantum Blueprint to address the growing Quantum Divide, SandboxAQ CEO Jack Hidary also joined Deb Golden (Cyber & Strategic Risk Leader, Deloitte) and Akshay Joshi (Head of Operations, Centre of Cybersecurity, WEF) to discuss current and emerging cybersecurity threats. If you missed the livestream of Preparing for a Secure Quantum Transition, you can still view the webinar on LinkedIn.
Artificial intelligence and quantum technologies are accelerating, and governments and businesses are facing a lot of ambiguity. On one hand, these technologies promise transformational benefits, while on the other hand, quantum computers will pose a significant threat to current cryptography. Organizations are already experiencing those threats with SNDL attacks, in which encrypted data is harvested and stored now so that it can be decrypted later, when a fault-tolerant quantum computer is available. Amidst all of this rapid change, business leaders are trying to make sense of uncertain timelines, pending regulations, and no shortage of doomsday scenarios.
In this discussion, our panel of cybersecurity experts lay out why quantum computers will break current cryptography, what exactly that means for businesses, and how they can effectively prepare now to meet these threats. At risk is the ability to have secure communications, and protect customer data, business transactions, and intellectual property–all of which are increasingly vulnerable to attacks.
After breaking down what’s at stake, the discussion turns to future-proofing organizations–what decision-makers can do today to begin planning and implementing a transition to quantum readiness by becoming crypto-agile. In many cases, that process will be complex, time-intensive, and costly. It is also necessary. In fact, Jack details how, quantum threats aside, many organizations’ current cryptographic architectures have been assembled piecemeal and still include protocols that have already been broken by currently available computers. Migrating to crypto-agility, beginning with a full security audit, is an opportunity to start with a clean slate and be ready to meet any threat.
Only by first protecting key assets, while maintaining customer trust and loyalty, can businesses hope to capitalize on the immense promise of quantum technologies. For more information about what’s at stake with your cybersecurity and how to become quantum-ready, don’t miss the full webinar.