<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Post Quantum Cryptography guidance and suggestions in Industry News</title>
    <link>https://community.isc2.org/t5/Industry-News/Post-Quantum-Cryptography-guidance-and-suggestions/m-p/82849#M7597</link>
    <description>&lt;P&gt;Great read. There's a lot of buzz around this topic lately. What are your thoughts on &lt;A href="https://cheapsslweb.com/blog/post-quantum-cryptography-migration-security-against-quantum-threats/#:~:text=In%20July%202022%2C%20NIST%20announced%20the%20first%20four%20PQC%20algorithms%20as%20acceptable%20for%20general%20use" target="_blank" rel="noopener"&gt;NIST algorithms on PQC&lt;/A&gt;?&lt;/P&gt;</description>
    <pubDate>Tue, 05 Aug 2025 10:14:33 GMT</pubDate>
    <dc:creator>wilson3adams</dc:creator>
    <dc:date>2025-08-05T10:14:33Z</dc:date>
    <item>
      <title>Post Quantum Cryptography guidance and suggestions</title>
      <link>https://community.isc2.org/t5/Industry-News/Post-Quantum-Cryptography-guidance-and-suggestions/m-p/82667#M7588</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now that US, EU and Australia have now publicly stated that critical infrastructure must migrate to Quantum cryptography algorithms by 203, this is less than five years away.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Most non technical people head for the hills or run away due to the fact it is a compliance situation and run away from it all.&amp;nbsp; &amp;nbsp;Let the technical specialist sort it out.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have seen plenty of you tube videos, so called simple explanations which rapidly turn into technical diatribes on Quantum Cryptography.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But in reality we need stories that non technical people including CEO's can understand without the mathematics and technical what will happen if you do not migrate expose.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any one have suggestions, stories to share or do we have to break this down for each industrial sector, health care, financial, Energy, Water, and others?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The reality is that it took 10 years to migrate from DES to AES and there are still some pockets of resistance even in 2025!&amp;nbsp; It took the Payments Industry 6 years after resistance to migrate to TLS 1.2 from TLS 1.0 and SSL V3.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have to pitch a message that tells a story, that is understandable and relates to what organisations need to do and commence publishing it widely.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes, Browsers like Chrome and Firefox are ready getting ready to migrate to TLS V1.3 by default, but there is so much more that needs to be done to make this transition smooth.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There is no point giving it to an AI, because you don't know for sure where that information came from and that it is accurate.&amp;nbsp; Especially if you can hi-jack Gen-AI with a Prompt and root the system which occurred to Microsoft Co-Pilot recently.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Suggestions folks that can assist the community get the message out, Post Quantum Cryptography is coming, and the runway is getting shorter every year.&amp;nbsp; &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thoughts, comments, lets get a dialogue started.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 29 Jul 2025 20:49:25 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Post-Quantum-Cryptography-guidance-and-suggestions/m-p/82667#M7588</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2025-07-29T20:49:25Z</dc:date>
    </item>
    <item>
      <title>Re: Post Quantum Cryptography guidance and suggestions</title>
      <link>https://community.isc2.org/t5/Industry-News/Post-Quantum-Cryptography-guidance-and-suggestions/m-p/82849#M7597</link>
      <description>&lt;P&gt;Great read. There's a lot of buzz around this topic lately. What are your thoughts on &lt;A href="https://cheapsslweb.com/blog/post-quantum-cryptography-migration-security-against-quantum-threats/#:~:text=In%20July%202022%2C%20NIST%20announced%20the%20first%20four%20PQC%20algorithms%20as%20acceptable%20for%20general%20use" target="_blank" rel="noopener"&gt;NIST algorithms on PQC&lt;/A&gt;?&lt;/P&gt;</description>
      <pubDate>Tue, 05 Aug 2025 10:14:33 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Post-Quantum-Cryptography-guidance-and-suggestions/m-p/82849#M7597</guid>
      <dc:creator>wilson3adams</dc:creator>
      <dc:date>2025-08-05T10:14:33Z</dc:date>
    </item>
    <item>
      <title>Re: Post Quantum Cryptography guidance and suggestions</title>
      <link>https://community.isc2.org/t5/Industry-News/Post-Quantum-Cryptography-guidance-and-suggestions/m-p/82871#M7598</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1282346449"&gt;@wilson3adams&lt;/a&gt;&amp;nbsp; &amp;nbsp; My thoughts, is start the discovery process now, and create an cryptography inventory of your existing applications, authentication methods, communications methods, and any embedded systems including devices.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Organisations should approach post-quantum cryptography migration systematically:&lt;BR /&gt;1. Start with an inventory Map out everywhere encryption is currently used - applications, databases,&lt;BR /&gt;communication systems, certificates, VPNs, APIs, and third-party services. Many organisations are&lt;BR /&gt;surprised by how extensively they rely on encryption.&lt;BR /&gt;2. Assess risk and prioritize Identify which systems handle the most sensitive data or are most critical&lt;BR /&gt;to operations. These should be migrated first. Consider what would happen if each system's encryption&lt;BR /&gt;was compromised.&lt;BR /&gt;3. Choose standardised algorithms Use the post-quantum cryptographic algorithms that NIST has&lt;BR /&gt;already approved and standardised, such as ML-KEM, ML-DSA, and SLH-DSA. Avoid experimental&lt;BR /&gt;or non-standardised approaches.&lt;BR /&gt;4. Plan for hybrid approaches During the transition, use both traditional and post-quantum encryption&lt;BR /&gt;together. This provides protection even if one method has unexpected weaknesses.&lt;BR /&gt;5. Update in phases Start with the highest-risk systems and work systematically through your&lt;BR /&gt;infrastructure. Don't try to change everything at once, as this increases the chance of errors or&lt;BR /&gt;downtime.&lt;BR /&gt;6. Test thoroughly Post-quantum algorithms often require more processing power and create larger&lt;BR /&gt;data sizes. Test performance impacts and ensure systems can handle the changes before full&lt;BR /&gt;deployment.&lt;BR /&gt;7. Work with vendors Coordinate with software and hardware vendors to understand their post quantum&lt;BR /&gt;roadmaps. Some systems may need vendor updates before you can migrate.&lt;BR /&gt;8. Train your team Ensure IT and security staff understand the new algorithms and how to implement&lt;BR /&gt;them properly.&lt;BR /&gt;9. Create a timeline Start now and plan to complete migration well before quantum computers become&lt;BR /&gt;a real threat. The process typically takes 2-5 years for large organisations.&lt;BR /&gt;10. Monitor and maintain Cryptographic standards may evolve, so plan for ongoing updates and&lt;BR /&gt;monitoring of new developments in the field.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The main issue is start the process now, I have put together a draft explanation in non technical terms for organisations who will run a mile, if the subject is raised and they think they can mitigate the problem by passing to the compliance and audit team.&amp;nbsp; &amp;nbsp;The entire organisation needs to be made aware, it is coming and is inevitable.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 05 Aug 2025 21:38:30 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Post-Quantum-Cryptography-guidance-and-suggestions/m-p/82871#M7598</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2025-08-05T21:38:30Z</dc:date>
    </item>
    <item>
      <title>Re: Post Quantum Cryptography guidance and suggestions</title>
      <link>https://community.isc2.org/t5/Industry-News/Post-Quantum-Cryptography-guidance-and-suggestions/m-p/82878#M7599</link>
      <description>&lt;P&gt;Insightful. Thanks&lt;/P&gt;</description>
      <pubDate>Wed, 06 Aug 2025 05:13:42 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Post-Quantum-Cryptography-guidance-and-suggestions/m-p/82878#M7599</guid>
      <dc:creator>wilson3adams</dc:creator>
      <dc:date>2025-08-06T05:13:42Z</dc:date>
    </item>
  </channel>
</rss>

