Workshop Description
Defence organisations face a specific quantum cyber risk: adversaries collecting encrypted traffic today for decryption once quantum computers become capable. This is not a future threat. Intelligence agencies have publicly acknowledged HNDL collection as an active operation. The question for cyber response teams is whether their detection capabilities can identify anomalous data exfiltration patterns consistent with HNDL campaigns, and whether their incident response procedures account for the delayed-impact nature of these attacks.
This audit session examines four areas of quantum-era cyber readiness: detection (can you identify HNDL exfiltration?), response (do your playbooks include quantum-era scenarios?), recovery (can you re-encrypt exposed data with PQC algorithms?), and prevention (how crypto-agile are your systems?). Participants work through a structured assessment framework calibrated to NIST CSF 2.0, NCSC CAF, and the MITRE ATT&CK framework, identifying specific gaps and producing a prioritised remediation plan.
What participants cover
- HNDL threat assessment: identifying anomalous exfiltration patterns consistent with harvest-now-decrypt-later
- Incident response playbook audit: adding quantum-era scenarios to existing IR procedures
- Crypto-agility assessment: evaluating system readiness for algorithm substitution under operational pressure
- Recovery procedure validation: re-encryption workflows for data exposed to HNDL collection
- Framework alignment: NIST CSF 2.0, NCSC CAF, and MITRE ATT&CK mapping for quantum threats
- Prioritised remediation planning with timeline alignment to CNSA 2.0 migration deadlines