Quantum Technologies

Post-Quantum Cryptography

Expert lectures covering PQC algorithms, migration strategy, cryptographic agility, and vendor landscape. Delivered by practitioners who have led production PQC deployments across government, finance, and enterprise.

Proud to recommend our expert members

Qrypto Cyber
Eclypses
Arqit
QuantBond
Krown
Applied Quantum
Quantum Bitcoin
Venari Security
QuStream
BHO Legal
Census
QSP
IDQ
Patero
Entopya
Belden
Atlant3D
Zenith Studio
Qudef
Aries Partners
GQI
Upperside Conferences
Austrade
Arrise Innovations
CyberRST
Triarii Research
QSysteme
WizzWang
DeepTech DAO
Xyberteq
Viavi
Entrust
Qsentinel
Nokia
Gopher Security
Quside
Qrypto Cyber
Eclypses
Arqit
QuantBond
Krown
Applied Quantum
Quantum Bitcoin
Venari Security
QuStream
BHO Legal
Census
QSP
IDQ
Patero
Entopya
Belden
Atlant3D
Zenith Studio
Qudef
Aries Partners
GQI
Upperside Conferences
Austrade
Arrise Innovations
CyberRST
Triarii Research
QSysteme
WizzWang
DeepTech DAO
Xyberteq
Viavi
Entrust
Qsentinel
Nokia
Gopher Security
Quside

What the Lectures Cover

Each lecture runs approximately 20 minutes. Delivered by cryptographers, security architects, and project leads with direct PQC deployment experience. The series covers both technical depth and practical implementation steps.

PQC Algorithms

The NIST-standardised post-quantum algorithms: ML-KEM (CRYSTALS-Kyber), ML-DSA (CRYSTALS-Dilithium), SLH-DSA (SPHINCS+), and FN-DSA (FALCON). Lattice-based, hash-based, and code-based approaches explained for practitioners.

Cryptographic Discovery

Why cryptographic inventory is the first step in any PQC migration. How to discover and catalogue cryptographic dependencies across systems, libraries, and protocols. SBOM and CBOM creation methodologies.

Cryptographic Agility

Designing systems to swap cryptographic algorithms without significant re-architecture. Why agility is a requirement for long-term security posture and how to build it into new and existing systems.

PQC Migration Planning

The practical steps of a PQC project: prioritisation frameworks, migration sequencing, risk assessment, and timeline estimation. Case studies from organisations that have completed production migrations.

PQC Vendors and Solutions

The landscape of PQC solution providers: libraries, HSM support, TLS implementations, and PKI tooling. Evaluation criteria for selecting vendors aligned to your specific compliance and operational requirements.

Regulatory and Standards Context

NIST PQC standardisation, NSA CNSA 2.0, BSI recommendations, and NCSC guidance. How regulatory timelines map to organisational migration planning in defence, finance, and critical infrastructure.

Recent Expert Lectures

Speakers include cryptographers, security consultants, and senior practitioners from banking, cloud security, and applied quantum security. All lectures are included in your QSECDEF membership.

Owen O'Donnell
Marketing Manager
Why Continuous Testing Is Critical in the Shift to Post-Quantum Cryptography
Ashish Janghel
Founder and CEO
Post-Quantum Authorisation Layer for DApps and Stablecoins
Ignazio Pedone
CEO
Cloud Security in the Post-Quantum Era
Francis Gorman
Head of Security COE, Bank of Ireland
Implementing Cryptographic Agility for Security at Scale
Cierra Choucair
Strategic Content Director
Detangling QKD vs PQC: Market Trends, Strategic Tradeoffs, and What Comes Next
Marin Ivezic
CEO, Applied Quantum
Practical Cryptographic Inventory and Quantum Readiness Strategy

The Case for Acting Now

NIST finalised the first three post-quantum cryptographic standards in August 2024. NSA's CNSA 2.0 sets hard deadlines for national security systems: quantum-resistant algorithms required for new systems by 2025, full migration by 2030 to 2033 depending on the system class.

The threat is not just future quantum computers. Adversaries are conducting harvest-now-decrypt-later attacks today. Data encrypted with RSA or ECC and intercepted now can be decrypted once a sufficiently capable quantum computer exists. For data with a sensitivity lifetime measured in years or decades, the migration timeline starts immediately.

Most organisations do not know where all their cryptography is. Cryptographic inventory, discovery tooling, and SBOM/CBOM processes are the practical first step. QSECDEF's PQC lecture series covers the full migration lifecycle, from discovery through to production deployment and ongoing cryptographic agility.

PQC Fundamentals Course

QSECDEF members have access to a structured PQC learning path: lattice-based, hash-based, code-based, and multivariate schemes. From theory to NIST standardisation and practical migration planning. 12 modules, hands-on labs, and professional certification.

View the Course

Access the Full PQC Archive

All PQC lectures, vendor presentations, and the structured certification course are included in QSECDEF membership. Individual lifetime membership starts at $149. Corporate access for up to 10 users from $499 per year.