使用Player FM应用程序离线!
Episode 118: Preparing for Post-Quantum Cryptography
Manage episode 461244040 series 3382533
In episode 118 of Cybersecurity Where You Are, Sean Atkinson is joined by Andy Smith, Security Architect for BP and Instructor at the SANS Institute. Together, they review the state of post-quantum cryptography as well as share recommendations for how organizations and individuals can prepare to move into the post-quantum era.
Here are some highlights from our episode:
- 02:55. What post-quantum cryptography is and why we need to pay attention
- 04:11. The impact of a cryptographically relevant quantum computer on symmetric vs. asymmetric cryptography
- 08:58. How media attention contributes to preparedness from an infrastructure perspective
- 14:30. The importance of a cryptography bill of materials (CBOM)
- 21:58. How organizations can prepare against quantum-enabled cyber attacks
- 29:05. How individuals need to understand quantum infrastructure in order to protect it
- 32:24. Optimism for the future of post-quantum cryptography
Resources
- Episode 48: 3 Trends to Watch in the Cybersecurity Industry
- Post Quantum Cryptography by Attack Detect Defend (rot169)
- NIST Releases First 3 Finalized Post-Quantum Encryption Standards
- Episode 75: How GenAI Continues to Reshape Cybersecurity
- Internet of Things: Embedded Security Guidance
If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org.
118集单集
Manage episode 461244040 series 3382533
In episode 118 of Cybersecurity Where You Are, Sean Atkinson is joined by Andy Smith, Security Architect for BP and Instructor at the SANS Institute. Together, they review the state of post-quantum cryptography as well as share recommendations for how organizations and individuals can prepare to move into the post-quantum era.
Here are some highlights from our episode:
- 02:55. What post-quantum cryptography is and why we need to pay attention
- 04:11. The impact of a cryptographically relevant quantum computer on symmetric vs. asymmetric cryptography
- 08:58. How media attention contributes to preparedness from an infrastructure perspective
- 14:30. The importance of a cryptography bill of materials (CBOM)
- 21:58. How organizations can prepare against quantum-enabled cyber attacks
- 29:05. How individuals need to understand quantum infrastructure in order to protect it
- 32:24. Optimism for the future of post-quantum cryptography
Resources
- Episode 48: 3 Trends to Watch in the Cybersecurity Industry
- Post Quantum Cryptography by Attack Detect Defend (rot169)
- NIST Releases First 3 Finalized Post-Quantum Encryption Standards
- Episode 75: How GenAI Continues to Reshape Cybersecurity
- Internet of Things: Embedded Security Guidance
If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org.
118集单集
所有剧集
×欢迎使用Player FM
Player FM正在网上搜索高质量的播客,以便您现在享受。它是最好的播客应用程序,适用于安卓、iPhone和网络。注册以跨设备同步订阅。