How to Build Your 12-Month Post-Quantum Strategy With NIST's Dustin Moody
Fetch error
Hmmm there seems to be a problem fetching this series right now. Last successful fetch was on November 06, 2025 13:08 ()
What now? This series will be checked again in the next hour. If you believe it should be working, please verify the publisher's feed link below is valid and includes actual episode links. You can contact support to request the feed be immediately fetched.
Manage episode 474950490 series 3652091
What You'll Learn:
- How to build an effective PQC migration roadmap starting with a cryptographic inventory assessment.
- Why the 2035 deadline is just the end of the journey, not the beginning, of quantum-safe implementation.
- The essential role of crypto agility in maintaining long-term security resilience.
- How to evaluate whether hybrid cryptography schemes are right for your organization.
- Why "harvest now, decrypt later" attacks pose an immediate threat to sensitive data.
- Practical steps organizations can take in the next 12 months to begin PQC migration.
- How NIST’s standardization process is creating a toolbox of algorithms for different use cases.
- Why collaboration between government agencies, industry, and vendors is crucial for a successful transition.
[03:55] Step 1: Appoint a PQC Taskforce and Map Your Migration -
2035 marks the end of your post-quantum transition, not the beginning. Large organizations may need a decade or more to migrate fully, meaning the planning must start immediately. Moody recommends building a dedicated internal team to lead the charge, assigning ownership, and developing a migration roadmap tailored to your systems and dependencies. The first foundational task is a cryptographic inventory, a deep dive into all the ways cryptography is used in your infrastructure. This includes both internally developed systems and supply chain components. Engaging with vendors, suppliers, and customers early ensures alignment and reduces friction later in the transition. Key Question: Have you built a dedicated team and started your roadmap, including a cryptographic inventory?
[13:22] Step 2: Design for Agility from Day One -
Crypto agility isn’t a future nice-to-have; it’s a current necessity. Organizations need the ability to adapt cryptographic algorithms over time, responding to new threats and evolving standards without disrupting live systems. NIST’s formal definition of crypto agility includes the flexibility to update cryptographic components across software, hardware, protocols, and infrastructure—seamlessly. Implementing agility now ensures you’re not locked into today’s choices and gives you options to respond quickly if vulnerabilities are discovered down the road. Key Question: Are your systems built to evolve or will they need to be rebuilt the next time the landscape shifts?
[18:24] Step 3: Protect Long-Lived Data from Quantum Exposure -
Quantum threats aren’t theoretical; they’re already impacting data security. According to Dustin, adversaries are actively collecting encrypted data today with the intent of decrypting it later, once quantum computing reaches maturity. This makes post-quantum readiness especially urgent for industries that manage data with long shelf lives—such as healthcare, finance, critical infrastructure, and national security systems. Even if your data is secure now, if it’s still sensitive a decade from now, it’s already vulnerable. While symmetric encryption like AES offers partial protection, the public-key encryption methods used to exchange keys are often the weakest link. Organizations must begin assessing where these vulnerabilities exist and how to mitigate them. Key Question: Are you still treating quantum threats as a future problem or are you protecting your data from being decrypted tomorrow?
[25:00] Step 4: Build Momentum with a 12-Month Action Plan -
You don’t need to solve everything in a year, but you do need to start. The next 12 months should be focused on building momentum: resourcing your PQC strategy, launching your inventory, and plugging into real-world guidance from initiatives like NIST’s National Cybersecurity Center of Excellence. Use this time to learn from early adopters, experiment safely, and begin aligning teams around risk, infrastructure, and timelines. The transition may span a decade, but your first steps start today. Key Question: What progress will your organization be able to show by this time next year?
Want exclusive insights on post-quantum security? Stay ahead of the curve—subscribe to Shielded: The Last Line of Cyber Defense on Apple Podcasts, Spotify, and YouTube Podcasts.
Need help subscribing? Click here for step-by-step instructions.
22 episodes