increasingly embracing post-quantum cryptography standards which seemingly provide a good defense in both classical and quantum computers. “In August 2024, NIST updated their encryption standards to post-quantum cryptography, which federal agencies are already creating roadmaps to adopt,” Riaz explained. “In the coming months, we’ll see additional guidance from bodies like ISO and IETF and 3GPP. Others will not be far behind.” TAs Need to Take Charge While business leaders are becoming more aware of quantum computing as a buzzword, many are still in the dark about the steps they need to take to secure their environments. A recent ISACA study found that just 5 percent of organizations have a defined strategy to address quantum concerns. In addition, only 5 percent consider it a high priority – making them sitting ducks for the first wave of quantum-enabled cyberattacks. Technology advisors have a critical role to play, by spreading awareness and education around quantum readiness and helping customers develop security modernization roadmaps. Simply putting pressure on customers to take action may be enough to get them moving in the right direction. As Riaz pointed out, many companies are waiting for major vendors and service providers to update their cryptographic and compliance frameworks to post-quantum standards before they take action – a sub-standard strategy, according to Riaz. “Client data doesn’t belong to a vendor like Microsoft, Google, Salesforce or any other ERM or CRM out there. It belongs to the company. And as a result, companies must take responsibility to safeguard their customers and their data,” Riaz continued. According to Riaz, the biggest opportunities in quantum cybersecurity currently exist in the public sector, data critical to national security specifically within government agencies, FedRAMPcertified vendors, CMMC-compliant entities and the broader state, local and education (SLED) market. “Banking is a close second, and then I believe we’re going to see a ripple effect from healthcare, manufacturing and so on,” Riaz said. Organizations in these high-impact sectors should now focus on developing post-quantum cryptography (PQC) migration strategies by inventorying cryptographic assets, assessing internal and supply chain vulnerabilities and implementing the latest algorithms as recommended by NIST and other standards bodies. “Those who have the most valuable records and are the least armed will be the most susceptible to attacks,” Riaz warned. It’s important to keep in mind that there is no single solution that companies can deploy to become quantum ready. Given this complexity, technology advisors should focus on understanding exactly where each customer stands in terms of awareness, preparedness and overall quantum readiness. This is essential for guiding customers through the next wave of technology transformation 29 FALL 2025 | CHANNELVISION
RkJQdWJsaXNoZXIy NTg4Njc=