Skip to content
Tiatra, LLCTiatra, LLC
Tiatra, LLC
Information Technology Solutions for Washington, DC Government Agencies
  • Home
  • About Us
  • Services
    • IT Engineering and Support
    • Software Development
    • Information Assurance and Testing
    • Project and Program Management
  • Clients & Partners
  • Careers
  • News
  • Contact
 
  • Home
  • About Us
  • Services
    • IT Engineering and Support
    • Software Development
    • Information Assurance and Testing
    • Project and Program Management
  • Clients & Partners
  • Careers
  • News
  • Contact

Why security leaders must prepare now for the quantum threat

Many businesses face being exposed to serious cyber threats because quantum computing is set to arrive far more quickly than expected.

The threat quantum computers pose to asymmetric encryption has been known about since 1994 when Peter Shor developed Shor’s algorithm.

But given the immense compute power required, it’s long been seen as a challenge for another day.

Fast forward thirty years, and the age of quantum computing is approaching fast.

With first-movers already actively experimenting, PwC estimates it could be as little as five years before adoption begins to ramp up more broadly.[1]

However, with quantum processing power potentially quadrupling every year, the timeline for quantum rollout could shrink further.[2]

Anton Tkachov, Managing Director and Cybersecurity Transformation Lead at PwC UK, states: “We once believed the post-quantum era was a generation away. Today, it’s five years off; it may be even closer next year.”

The quantum encryption threat

As quantum computing advances, today’s asymmetric encryption will in time become obsolete and cannot be protected by just continuing to increase the key length.

Since cryptography underpins much of today’s digital infrastructure, this shift poses a serious threat.

“Cryptography underpins both – security of data at rest and authentication,” says Tkachov. “In the post-quantum era, both will be vulnerable.”

It’s not just future breaches that organisations need to worry about.

“Encrypted data stolen today is still safe—for now,” warns Tkachov. “But once quantum machines arrive, attackers will be able to crack that encryption, exposing sensitive information, intellectual property, and eroding customer trust.”

Data, such as mortgage approvals and medical records still hold huge value to bad actors, even years after it was first collected.

Knowing this, threat actors can stockpile stolen data and plan to unlock it the moment quantum technology catches up.

Barriers to modernising cryptography

In the face of this threat, organisations must start transforming their approach to cryptography.

“We know cryptography modernisation takes time,” explains Clinton Firth, Partner, Cybersecurity, PwC Middle East. “When the Data Encryption Standard (DES) was broken in 1997, it took many businesses nearly a decade to fully transition to the Advanced Encryption Standard (AES). This time, they don’t have such time to spare.”

Organisations face several critical challenges in preparing for the post-quantum era.

For example, recruiting talent is difficult due to the skillset required while implementing quantum-safe technologies. Having to rely on multiple vendors for quantum-ready technologies is another complicating factor.

Building quantum resilience

According to PwC, raising awareness of the quantum threat is the first step towards remediation.

“CISOs need to recognise that this is a real and immediate risk—not a problem for tomorrow. This needs to be clearly understood, elevated to the risk management function, and placed on the board’s radar and the organisation’s risk register,” says Firth.

From there, PwC recommends that organisations take the following actions:

  • Appoint a quantum resilience officer to lead the post-quantum transformation. This role should drive capability development, engage with regulators, and champion the organisation’s encryption strategy.
  • Revamp procurement processes to clearly define encryption requirements for all third-party vendors and partners.
  • Develop a cryptographic inventory to map out the types, volumes, and locations of cryptographic algorithms in use. This baseline is essential for assessing risk and building a strategic transition roadmap.
  • Analyse historical data loss to evaluate the potential future risk posed by compromised datasets in a post-quantum world.

These immediate priorities will help organisations build a foundation for the post-quantum world, with agility at its core.  

Tkachov explains: “In the age of quantum computing, enterprises must be ready for a landscape where cryptographic algorithms may be broken repeatedly. The goal should be crypto agility—the ability to quickly adapt and transition to new encryption methods as threats evolve and standards emerge.”

To learn more about how organisations can prepare for the post-quantum world, register for PwC’s new webinar here.

To find out more about Clinton Firth, click here.

To find out more about Anton Tkachov, click here.

To learn more visit us here

This is for general information purposes only.

2025 PwC. All rights reserved


[1] PwC, “Quantum computing: is our data still safe?” January 2025 https://www.pwc.nl/en/topics/blogs/quantum-computing-is-our-data-still-safe.html

[2] Neven’s Law suggests that quantum computers are improving at a “doubly exponential” rate relative to classical computers. See: “A New Law to Describe Quantum Computing’s Rise?”


Read More from This Article: Why security leaders must prepare now for the quantum threat
Source: News

Category: NewsSeptember 29, 2025
Tags: art

Post navigation

PreviousPrevious post:Increasing digital footprints demand improved reporting toolsNextNext post:Quantum computing: unravelling the myths

Related posts

Rethinking IT leadership to unlock the agility of ‘teamship’
January 22, 2026
La agenda del CIO en 2026: de la exploración a la responsabilidad
January 22, 2026
GreenlandMX acelera su transformación digital para asegurar la escalabilidad del comercio electrónico
January 22, 2026
“운영 인력 내재화·AI 대응 냉각 기술로 승부” STT GDC, 6월 서울서 고층형 데이터센터 가동
January 22, 2026
칼럼 | 영구 라이선스 소프트웨어의 종말을 준비해야 할 이유
January 22, 2026
하드웨어 넘어 소프트웨어로…소프트뱅크, AI 데이터센터 운영 플랫폼 공개
January 22, 2026
Recent Posts
  • Rethinking IT leadership to unlock the agility of ‘teamship’
  • La agenda del CIO en 2026: de la exploración a la responsabilidad
  • GreenlandMX acelera su transformación digital para asegurar la escalabilidad del comercio electrónico
  • “운영 인력 내재화·AI 대응 냉각 기술로 승부” STT GDC, 6월 서울서 고층형 데이터센터 가동
  • 칼럼 | 영구 라이선스 소프트웨어의 종말을 준비해야 할 이유
Recent Comments
    Archives
    • January 2026
    • December 2025
    • November 2025
    • October 2025
    • September 2025
    • August 2025
    • July 2025
    • June 2025
    • May 2025
    • April 2025
    • March 2025
    • February 2025
    • January 2025
    • December 2024
    • November 2024
    • October 2024
    • September 2024
    • August 2024
    • July 2024
    • June 2024
    • May 2024
    • April 2024
    • March 2024
    • February 2024
    • January 2024
    • December 2023
    • November 2023
    • October 2023
    • September 2023
    • August 2023
    • July 2023
    • June 2023
    • May 2023
    • April 2023
    • March 2023
    • February 2023
    • January 2023
    • December 2022
    • November 2022
    • October 2022
    • September 2022
    • August 2022
    • July 2022
    • June 2022
    • May 2022
    • April 2022
    • March 2022
    • February 2022
    • January 2022
    • December 2021
    • November 2021
    • October 2021
    • September 2021
    • August 2021
    • July 2021
    • June 2021
    • May 2021
    • April 2021
    • March 2021
    • February 2021
    • January 2021
    • December 2020
    • November 2020
    • October 2020
    • September 2020
    • August 2020
    • July 2020
    • June 2020
    • May 2020
    • April 2020
    • January 2020
    • December 2019
    • November 2019
    • October 2019
    • September 2019
    • August 2019
    • July 2019
    • June 2019
    • May 2019
    • April 2019
    • March 2019
    • February 2019
    • January 2019
    • December 2018
    • November 2018
    • October 2018
    • September 2018
    • August 2018
    • July 2018
    • June 2018
    • May 2018
    • April 2018
    • March 2018
    • February 2018
    • January 2018
    • December 2017
    • November 2017
    • October 2017
    • September 2017
    • August 2017
    • July 2017
    • June 2017
    • May 2017
    • April 2017
    • March 2017
    • February 2017
    • January 2017
    Categories
    • News
    Meta
    • Log in
    • Entries feed
    • Comments feed
    • WordPress.org
    Tiatra LLC.

    Tiatra, LLC, based in the Washington, DC metropolitan area, proudly serves federal government agencies, organizations that work with the government and other commercial businesses and organizations. Tiatra specializes in a broad range of information technology (IT) development and management services incorporating solid engineering, attention to client needs, and meeting or exceeding any security parameters required. Our small yet innovative company is structured with a full complement of the necessary technical experts, working with hands-on management, to provide a high level of service and competitive pricing for your systems and engineering requirements.

    Find us on:

    FacebookTwitterLinkedin

    Submitclear

    Tiatra, LLC
    Copyright 2016. All rights reserved.