Course outline
The technological world is standing on the precipice of a revolution. While quantum computing unlocks immense opportunities, it presents an existential threat to the classical encryption systems currently protecting your organization's most sensitive data. This executive-level course provides CISOs and technology leaders with critical knowledge and practical tools to prepare for the "Q-Day"—the moment current encryption is breached. Focusing on the immediate "Harvest Now, Decrypt Later" threat and the upcoming NIST 2030 regulations, this program delivers a structured methodology for building an organizational roadmap toward Post-Quantum Cryptography (PQC).
Upon completion, participants will emerge with: • Develop a Strategic Defense Strategy: Gain a comprehensive understanding of the quantum threat landscape and the "Harvest Now, Decrypt Later" risk to effectively lead the organizational transition to Post-Quantum Cryptography (PQC). • Navigate Emerging Regulations: Master the new NIST 2030 standards and understand how to align your organization’s security posture with international compliance requirements (GDPR, HIPAA) in a post-quantum world. • Practice Real-World Scenarios: The curriculum includes practical challenges and scenarios, providing insights into real-world applications of penetration testing. • Lead Board-Level Decisions: Acquire the knowledge and terminology needed to articulate the business risk to executive leadership and build a solid business case for PQC investment. • Implement Advanced PQC Methodologies: Get hands-on exposure to the latest cryptographic algorithms (such as Kyber and Dilithium) and tools for managing cryptographic inventory and risk.
Upcoming meetings
10/03/2026
17/03/2026
24/03/2026
31/03/2026
Modules
- Introduction to Quantum Computing and the Threat to Classical Encryption
- The Technological Timeline and "Q-Day" Forecasts
- Understanding the "Harvest Now, Decrypt Later" Risk
- Cost Analysis: Non-Compliance vs. Early Preparation
- NIST Guidelines and 2030 Readiness Standards
- International Compliance Implications (GDPR, HIPAA, PCI-DSS)
- Global Regulatory Perspectives (CISA, ENISA)
- Discovery: Mapping Critical Assets and Sensitive Data
- Gap Analysis of Existing Encryption Mechanisms
- Building a Roadmap for Post-Quantum Cryptography (PQC)
- Defining and Implementing a Crypto Agility Policy
- Executive Communication: Presenting to the Board & Building a Business Case
- Audit & Control: Conducting Organizational Readiness Assessments
- Tools for Crypto Posture Management and PQC Solutions
- Practical Implementation: Risk Registers and POCs with New Algorithms
Prerequisites
- 01 IT & Security Background Experience in Information Security Management (CISO/IS Manager) or Senior IT Infrastructure roles.
- 02 Risk Management Knowledge Familiarity with organizational Risk Management processes and GRC (Governance, Risk, and Compliance) concepts.
- 03 Cyber Security Fundamentals Understanding of the current cyber threat landscape and basic defense methodologies.
- 04 Encryption Infrastructure Basic understanding of encryption protocols (PKI, SSL/TLS) and cryptographic concepts – An Advantage.