Miroslav Čerkez and Igor Sokač walked through why the shift to quantum-safe cryptography cannot wait, how “harvest now, decrypt later” changes long-term data protection, and what NIST’s standardized post-quantum algorithms mean for real-world systems. They also covered regulatory expectations, including the EU’s coordinated roadmap for PQC adoption, and demonstrated how Guardium Cryptography Manager enables visibility, compliance, and automated remediation.
Check the full webinar here:
Highlights from the Webinar
We opened the session with a discussion about the coming quantum disruption and its impact on current cryptographic systems. While people have historically been considered the weakest link in security, quantum computing poses a direct challenge to the technology pillar by undermining the mathematical foundations of today’s encryption. Shor’s and Grover’s algorithms were explained in the context of real-world vulnerabilities that will emerge once practical quantum computers arrive.
The session clarified key concepts such as quantum-safe cryptography, post-quantum cryptography, and quantum cryptography, outlining where each fits in the broader security conversation. We also walked through the NIST-approved PQC algorithms — ML-KEM, ML-DSA, Falcon, and SLH-DSA — and what their standardization means for organizations planning their long-term cryptographic strategy.
A detailed overview of the EU’s Coordinated Implementation Roadmap for PQC gave attendees a concrete understanding of the three major milestones leading up to 2035. We covered how to perform quantum risk assessments, identify high-risk use cases, involve stakeholders, and create cryptographic dependency maps that support informed decision-making.
IBM Guardium Quantum Safe Overview
The webinar included a deep dive into how IBM Guardium Cryptography Manager enables crypto agility across complex environments. We explored four core capability areas:
• Discovery and Inventory of certificates, keys, algorithms, cryptographic libraries, and datastores
• Risk Assessment and Compliance, including PQC readiness evaluation and policy enforcement
• Cryptographic Posture Visibility through consolidated dashboards and violation summaries
• Remediation support, including integration with Jira, ServiceNow, and other governance workflows
These capabilities help organizations prepare for PQC adoption by ensuring that cryptographic assets are visible, policies are enforced, and risks are addressed proactively rather than reactively.
We closed the session with an open Q&A,
Falls Sie Fragen haben, sind wir nur einen Klick entfernt.