Consulting / Cyber Defence

Quantum Education Workshops for Cyber Defence Teams

Post-quantum cryptography is not a future concern. Adversaries are collecting encrypted traffic now. Six practitioner-led sessions for CISOs, security architects, and cyber defence teams who need to act before the timeline closes.

Proud to recommend our expert members

Qrypto Cyber
Eclypses
Arqit
QuantBond
Krown
Applied Quantum
Quantum Bitcoin
Venari Security
QuStream
BHO Legal
Census
QSP
IDQ
Patero
Entopya
Belden
Atlant3D
Zenith Studio
Qudef
Aries Partners
GQI
Upperside Conferences
Austrade
Arrise Innovations
CyberRST
Triarii Research
QSysteme
WizzWang
DeepTech DAO
Xyberteq
Viavi
Entrust
Qsentinel
Nokia
Gopher Security
Quside
Qrypto Cyber
Eclypses
Arqit
QuantBond
Krown
Applied Quantum
Quantum Bitcoin
Venari Security
QuStream
BHO Legal
Census
QSP
IDQ
Patero
Entopya
Belden
Atlant3D
Zenith Studio
Qudef
Aries Partners
GQI
Upperside Conferences
Austrade
Arrise Innovations
CyberRST
Triarii Research
QSysteme
WizzWang
DeepTech DAO
Xyberteq
Viavi
Entrust
Qsentinel
Nokia
Gopher Security
Quside
PQC migration planning
Cryptographic inventory and discovery
Quantum-safe architecture design
Harvest-now-decrypt-later risk
Quantum incident response

Workshop Topics

All sessions are delivered by practitioners with direct experience in quantum security, critical infrastructure protection, and enterprise cryptography programmes. Content is configured to your team's technical level and sector context.

01
PQC Migration Planning and Cryptographic Inventory workshop

PQC Migration Planning and Cryptographic Inventory

Half day In person or online

A structured programme for security architects and CISOs leading post-quantum cryptography migrations. Covers how to build a cryptographic inventory across enterprise systems, prioritise assets by risk exposure, and produce a roadmap that aligns with NIST PQC standards and regulatory timelines.

  • Building a complete cryptographic asset inventory across systems and protocols
  • Prioritising migration candidates by data sensitivity and threat exposure
  • NIST PQC standards: ML-KEM, ML-DSA, SLH-DSA and what each replaces
  • Dependency mapping: TLS, PKI, code signing, and secure messaging stacks
  • Producing a migration roadmap with executive sign-off criteria
02
Quantum Threat Modelling for Enterprise Security workshop

Quantum Threat Modelling for Enterprise Security

Half day In person or online

Practical threat modelling methodology for security teams assessing quantum-era risk. Covers cryptanalytic timelines, attack surface analysis, and how to integrate quantum threat vectors into existing STRIDE and PASTA frameworks. Designed for security architects and red team leads.

  • Cryptanalytic timeline estimates: when RSA and ECC become vulnerable
  • Integrating quantum threat vectors into STRIDE and PASTA models
  • Attack surface analysis: identifying quantum-vulnerable entry points
  • Threat intelligence sources for quantum-era adversary behaviour
  • Communicating quantum risk to boards and non-technical stakeholders
03
Quantum-Safe Network Architecture workshop

Quantum-Safe Network Architecture

Half day In person or online

Network security teams learn how to redesign perimeter and internal architectures for the quantum era. Covers TLS 1.3 hybrid modes, quantum-safe VPN configurations, certificate lifecycle management under PQC, and the practical engineering steps to retrofit existing infrastructure.

  • TLS 1.3 hybrid key exchange: combining classical and PQC algorithms
  • Quantum-safe VPN: IPsec with ML-KEM and configuration requirements
  • PKI migration: certificate authority updates, key sizes, and rollout planning
  • Zero-trust architecture considerations under post-quantum cryptography
  • Retrofitting on-premises versus cloud-native network stacks
04
QRNG and QKD for Cyber Defence Applications workshop

QRNG and QKD for Cyber Defence Applications

Half day In person or online

Covers the operational and technical case for quantum random number generation and quantum key distribution in defence and critical infrastructure contexts. Examines vendor landscape, deployment models, and where these technologies add genuine security value versus where software-based PQC is sufficient.

  • QRNG: how quantum entropy sources compare to CSPRNG in practice
  • QKD network topologies: point-to-point, trusted node, and satellite links
  • Standards and certification: ETSI, ITU-T, and government procurement criteria
  • Integration with existing key management infrastructure
  • Decision framework: when QRNG and QKD justify the deployment cost
05
Harvest-Now-Decrypt-Later Risk Assessment workshop

Harvest-Now-Decrypt-Later Risk Assessment

Half day In person or online

Addresses one of the most immediate quantum threats: adversaries collecting encrypted data today for decryption once cryptographically relevant quantum computers exist. Covers data classification, retention risk scoring, and practical mitigations including forward secrecy and early PQC adoption.

  • Understanding the harvest-now-decrypt-later attack model and timeline estimates
  • Data classification: identifying assets at risk from long-term interception
  • Retention risk scoring: mapping data sensitivity to expected quantum timelines
  • Forward secrecy implementation across communications infrastructure
  • Early PQC adoption as a near-term mitigation for high-value data
06
Quantum Incident Response and Recovery Planning workshop

Quantum Incident Response and Recovery Planning

Half day In person or online

Prepares security operations and incident response teams for quantum-era breach scenarios. Covers detection of cryptographic compromise, playbook design for PQC-related failures, key revocation at scale, and how to update business continuity plans for a post-quantum threat environment.

  • Detecting cryptographic compromise: indicators and forensic approaches
  • IR playbook design for PQC algorithm failures and key compromise
  • Mass key revocation procedures across PKI and symmetric systems
  • Business continuity planning for quantum-triggered outages
  • Tabletop exercise structure for quantum incident scenarios

Membership Access

All workshop participants benefit from QSECDEF membership. Members receive a 20% discount on in-person sessions and full access to the lecture archive and certification programmes.

Expert Vendor Membership

$399 per month
  • 10 hours advisory per month
  • 10-user access licence
  • Dedicated client manager
  • Business amplification
  • Informal peer review
  • Membership press release
  • Partnership introductions
  • Collaboration opportunities
Contact Us
Limited Time — 2026 Only

Lifetime Individual Membership

$149 lifetime
  • Free webinar events
  • 80 hours of quantum education
  • Quantum Cybersecurity Certificate
  • Quantum Blockchain Certificate
  • Members-only events
  • Executive training discounts
  • Priority QSECDEF 2026 access
  • Newsletter and community
Join Now

Enterprise Up-skilling

$499 per year / 10 users
  • Access to all training and lectures
  • 10-user access licence
  • Workforce certifications
  • Discounts on events
  • Weekly events attendance
Get Started

Book a Cyber Defence Workshop

Sessions are configured around your team's technical level and current cryptographic exposure. Get in touch to discuss requirements and schedule a date.