Workshops Defence Validating the Quantum Supply Chain
Defence Deep Dive Session

Validating the Quantum Supply Chain

The quantum technology vendor landscape includes credible organisations building real hardware alongside companies making claims that exceed their demonstrated capabilities. Defence procurement officers need a rigorous framework for distinguishing between the two. This session provides practical tools for validating quantum vendor claims, assessing technology readiness levels, and conducting due diligence on quantum computing and sensing acquisitions.

Half day (3 hours)
In person or online
Max 30 delegates

Proud to recommend our expert members

Qrypto Cyber
Eclypses
Arqit
QuantBond
Krown
Applied Quantum
Quantum Bitcoin
Venari Security
QuStream
BHO Legal
Census
QSP
IONQ - ID Quantique
Patero
Entopya
Belden
Atlant3D
Zenith Studio
Qudef
Aries Partners
GQI
Upperside Conferences
Austrade
Arrise Innovations
CyberRST
Triarii Research
QSysteme
WizzWang
DeepTech DAO
Xyberteq
Viavi
Entrust
Qsentinel
Nokia
Gopher Security
Quside
QIZ
Global Quantum Intelligence
Qrypto Cyber
Eclypses
Arqit
QuantBond
Krown
Applied Quantum
Quantum Bitcoin
Venari Security
QuStream
BHO Legal
Census
QSP
IONQ - ID Quantique
Patero
Entopya
Belden
Atlant3D
Zenith Studio
Qudef
Aries Partners
GQI
Upperside Conferences
Austrade
Arrise Innovations
CyberRST
Triarii Research
QSysteme
WizzWang
DeepTech DAO
Xyberteq
Viavi
Entrust
Qsentinel
Nokia
Gopher Security
Quside
QIZ
Global Quantum Intelligence

Workshop Description

Quantum technology marketing frequently overstates capability. Vendors claim quantum advantage without peer-reviewed evidence, quote qubit counts without specifying error rates, and project timelines based on engineering optimism rather than demonstrated progress. For defence procurement, the consequences of purchasing overstated quantum technology range from wasted budget to dependence on systems that fail to deliver promised capability.

This workshop equips procurement teams with specific evaluation techniques. Participants learn to interrogate quantum computing performance claims using metrics that matter (gate fidelity, coherence time, circuit volume) rather than headline qubit counts. For quantum sensing, the session covers how to evaluate sensitivity claims against environmental noise, SWaP specifications, and field-versus-laboratory performance gaps. The session includes a structured vendor assessment framework calibrated to defence Technology Readiness Levels (TRL 1-9) with specific quantum technology benchmarks at each level.

What participants cover

  • Quantum computing performance metrics: gate fidelity, coherence time, circuit volume, and quantum volume limitations
  • Quantum sensing evaluation: sensitivity specifications versus operational environment performance
  • TRL framework for quantum technologies: specific benchmarks and evidence requirements at each level
  • Red flag identification: common overclaims in quantum vendor presentations and proposals
  • Due diligence methodology: technical, financial, and supply chain assessment for quantum acquisitions
  • Structured vendor comparison framework for defence quantum technology procurement

Preliminary Agenda

Deep Dive Session structure with scheduled breaks. Content is configurable to your organisation's technical level and operational environment.

# Session Topics
1 The Quantum Vendor Landscape Credible players, overclaims, and red flags
  • Market segmentation: quantum computing, sensing, communications, and software vendors
  • Common overclaim patterns: qubit counts without error rates, advantage claims without peer review
  • Financial viability signals: funding rounds, burn rates, and revenue generation in quantum startups
2 Technical Evaluation Frameworks Metrics that matter for defence procurement
  • Quantum computing: gate fidelity, T1/T2 coherence, circuit volume, and quantum volume (with caveats)
  • Quantum sensing: sensitivity, bandwidth, SWaP, and field-versus-laboratory performance ratios
  • Quantum communications: key rate, distance, error rate, and security proof completeness
  • TRL mapping: specific evidence requirements for quantum technologies at each readiness level
Break, after 60 min
3 Procurement Due Diligence Process From technical assessment to acquisition decision
  • Structured vendor assessment: technical capability, team credentials, IP portfolio, and supply chain dependencies
  • Reference site evaluation: how to verify vendor performance claims against actual deployments
  • Risk assessment: single-source dependency, technology lock-in, and obsolescence planning for quantum acquisitions
4 Discussion and Framework Application Applying the assessment to your current pipeline
  • Working through a quantum vendor evaluation using the TRL framework on a representative example
  • Identifying the questions that separate credible vendors from overclaimed capabilities

Designed and Delivered By

Workshops are designed and delivered by QSECDEF in collaboration with sector specialists. All facilitators have direct experience in both quantum technologies and defence systems.

QD

Quantum Security Defence

Workshop design and delivery

QSECDEF brings world-leading expertise in post-quantum cryptography, quantum computing strategy, and defence-grade security assessment. Our advisory membership spans 600+ organisations and 1,200+ professionals working at the intersection of quantum technologies and critical infrastructure security.

DE

Defence Sector Partners

Domain expertise and operational validation

Defence workshops are co-delivered with sector specialists who bring direct operational experience in defence organisations. This ensures workshop content is grounded in regulatory, operational, and technical realities specific to the sector.

Commission This Workshop

Sessions are configured around your organisation's technical level, operational environment, and regulatory jurisdiction. Get in touch to discuss requirements and schedule a date.

Contact Us

Quantum technologies are evolving quickly and new developments emerge regularly. This page was last updated on 15/03/2026. For the most current information about course content and suitability for your organisation, we recommend contacting us directly.