PQC Algorithms
The NIST-standardised post-quantum algorithms: ML-KEM (CRYSTALS-Kyber), ML-DSA (CRYSTALS-Dilithium), SLH-DSA (SPHINCS+), and FN-DSA (FALCON). Lattice-based, hash-based, and code-based approaches explained for practitioners.
Quantum Technologies
Expert lectures covering PQC algorithms, migration strategy, cryptographic agility, and vendor landscape. Delivered by practitioners who have led production PQC deployments across government, finance, and enterprise.
Each lecture runs approximately 20 minutes. Delivered by cryptographers, security architects, and project leads with direct PQC deployment experience. The series covers both technical depth and practical implementation steps.
The NIST-standardised post-quantum algorithms: ML-KEM (CRYSTALS-Kyber), ML-DSA (CRYSTALS-Dilithium), SLH-DSA (SPHINCS+), and FN-DSA (FALCON). Lattice-based, hash-based, and code-based approaches explained for practitioners.
Why cryptographic inventory is the first step in any PQC migration. How to discover and catalogue cryptographic dependencies across systems, libraries, and protocols. SBOM and CBOM creation methodologies.
Designing systems to swap cryptographic algorithms without significant re-architecture. Why agility is a requirement for long-term security posture and how to build it into new and existing systems.
The practical steps of a PQC project: prioritisation frameworks, migration sequencing, risk assessment, and timeline estimation. Case studies from organisations that have completed production migrations.
The landscape of PQC solution providers: libraries, HSM support, TLS implementations, and PKI tooling. Evaluation criteria for selecting vendors aligned to your specific compliance and operational requirements.
NIST PQC standardisation, NSA CNSA 2.0, BSI recommendations, and NCSC guidance. How regulatory timelines map to organisational migration planning in defence, finance, and critical infrastructure.
Speakers include cryptographers, security consultants, and senior practitioners from banking, cloud security, and applied quantum security. All lectures are included in your QSECDEF membership.
NIST finalised the first three post-quantum cryptographic standards in August 2024. NSA's CNSA 2.0 sets hard deadlines for national security systems: quantum-resistant algorithms required for new systems by 2025, full migration by 2030 to 2033 depending on the system class.
The threat is not just future quantum computers. Adversaries are conducting harvest-now-decrypt-later attacks today. Data encrypted with RSA or ECC and intercepted now can be decrypted once a sufficiently capable quantum computer exists. For data with a sensitivity lifetime measured in years or decades, the migration timeline starts immediately.
Most organisations do not know where all their cryptography is. Cryptographic inventory, discovery tooling, and SBOM/CBOM processes are the practical first step. QSECDEF's PQC lecture series covers the full migration lifecycle, from discovery through to production deployment and ongoing cryptographic agility.
QSECDEF members have access to a structured PQC learning path: lattice-based, hash-based, code-based, and multivariate schemes. From theory to NIST standardisation and practical migration planning. 12 modules, hands-on labs, and professional certification.
All PQC lectures, vendor presentations, and the structured certification course are included in QSECDEF membership. Individual lifetime membership starts at $149. Corporate access for up to 10 users from $499 per year.