Defending Against the Quantum Threat: Future Proofing Data Transmissions with Post-Quantum VPN



The day a cryptographically-relevant quantum computer (QRQC) with enough power to break modern encryption is coming and world governments are taking action and advising agencies and commercial entities to start taking action now.  Although these powerful quantum computers won't exist for another 5 to 15 years, attackers are already taking advantage of the opportunity to steal valuable secrets through harvesting attacks - where a copy of the data transmission is kept until a CRQC is available to break the encryption keys.

 

NIST and industry leaders are busy working on post-quantum security solutions to prevent harvesting attacks, and solutions based on open standards are already here with more on the way.  This session will show where the quantum threat is today and the popular use cases of how to defend against it.

 

During this webinar, our speakers, Thomas Walker and Philip Kwan, helped attendees:

  • Understand Quantum Threats:
    • Learn to explain the concept and timeline of cryptographically-relevant quantum computers (CRQCs).
  • Identify Harvesting Attacks:
    • Identify harvesting attacks and their implications for encrypted data.
  • Analyze Use Cases:
    • Discuss two use cases for applying post-quantum security measures against quantum threats.

Speaker and Presenter Information

Philip Kwan, Director, Project Line Manager, Palo Alto Networks 

 

Thomas Walker, Systems Engineer, Palo Alto Networks

Relevant Government Agencies

Other Federal Agencies, Federal Government, State & Local Government


Register


Register


Event Type
On-Demand Webcast


This event has no exhibitor/sponsor opportunities


Cost
Complimentary:    $ 0.00


Website
Click here to visit event website


Event Sponsors

Palo Alto Networks


Organizer
Palo Alto Networks Government Team at Carahsoft


Contact Event Organizer



Return to search results