Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ColumnsCybersecurityCyber Tactics ColumnLogical SecuritySecurity & Business Resilience

Cyber Tactics

Quantum Computing: A Call to Action for Security Professionals

There are significant security challenges and opportunities ahead in the era of quantum computing.

By Pam Nigro, Contributing Writer
Ribbon of data

AlexSecret / iStock / Getty Images Plus via Getty Images

June 25, 2025

While quantum computing holds the promise of revolutionary breakthroughs across various industries, especially those such as financial, medical and governmental sectors that store large amounts of sensitive data, its vast computational power also presents a critical threat to the security of our digital world.

ISACA’s recent Quantum Computing Pulse Poll reveals a compelling picture of both the immense potential and the significant challenges associated with this emerging technology. One of the most concerning findings is the widespread lack of preparedness among organizations. Despite 62% of respondents expressing concerns about the ability of quantum computing to break today's internet encryption, only 5% consider it a high priority for the near future. Further, of the remaining 95%, the majority consider it a medium priority, indicating a significant gap between awareness and urgent action. This disconnect poses a serious risk to the security of sensitive information and long-term privacy. Potential reasons for this lack of preparedness may include a lack of resources, a belief that the threat is still too far in the future, or a lack of understanding of the potential impact.

Complicating the issue, the poll reveals that cybercriminals are already actively preparing for a future of quantum-enabled decryption. With 56% of respondents fearing “harvest now, decrypt later” attacks, the urgency to implement quantum-resistant encryption today becomes even more apparent. "Harvest now, decrypt later" attacks involve cybercriminals collecting encrypted data today, with the intention of decrypting it once sufficiently powerful quantum computers become available.

For years, the cybersecurity and cryptographic communities have been anticipating the release of post-quantum cryptographic standards by the National Institute of Standards and Technology (NIST). Their standards are now published, marking a crucial turning point in the race to secure our data in the quantum era. It is important to remember that the NIST standards process has been ongoing, and the standards are being released in phases. Some algorithms have already been standardized and others are still under evaluation. These new standards include algorithms like lattice-based cryptography and hash-based signatures.

However, a surprising finding of the poll is that only 7% of respondents have a strong understanding of the new NIST standards, despite the years of anticipation. This gap in knowledge emphasizes the need for thorough education and awareness campaigns through the industry and within organizations.

Now is the Time for Action

Many respondents underestimate the rapid pace at which quantum computing could become widespread. With 57% acknowledging the increased business risks associated with this technology and 40% lacking awareness of their company's quantum computing plans, it is evident that time is of the essence.

Potential reasons for this lack of preparedness may include a lack of resources, a belief that the threat is still too far in the future, or a lack of understanding of the potential impact.

The poll reveals a troubling statistic: 55% of organizations have not taken any steps to prepare for quantum computing. This inaction, despite 46% acknowledging the technology's potential for revolutionary innovation and 52% recognizing its impact on skills needs, further highlights the need for proactive measures.

The poll serves as a wake-up call for risk, audit and cybersecurity professionals. Urgent action is required on several fronts:

  • Educate Stakeholders: Raising awareness among decision-makers about the imminent threats and the need for quantum-resistant encryption is paramount. This involves creating comprehensive educational programs, conducting workshops and providing real-world attack scenarios to demonstrate the impact. 
  • Assess Vulnerabilities: Identifying and prioritizing critical data and systems for protection is crucial. This requires thorough data inventories, risk assessments, and vulnerability scans to pinpoint sensitive information and vulnerable systems. 
  • Transition to Quantum-Resistant Encryption: Organizations must begin the immediate migration of essential data and systems to quantum-resistant encryption solutions. This involves developing migration plans, pilot testing new algorithms and ensuring compatibility with existing systems. 
  • Upgrade Digital Infrastructure: Continuous improvement and securing of internet-connected systems are essential for a robust defense against quantum-enabled attacks. This includes implementing strong access controls, patching systems, deploying intrusion detection and conducting regular security audits.

Leveraging AI

Incorporating AI into the strategy for mitigating the risks of quantum computing can pay be useful in multiple ways:

  • Predictive Analytics: AI can forecast potential quantum-related threats by analyzing trends and patterns, allowing organizations to proactively address vulnerabilities. 
  • Automated Incident Response: AI-driven systems can provide swift and effective responses to quantum-enabled cyber-attacks, reducing the window of exploitation. 
  • Continuous Learning: AI systems can continuously learn from emerging threats, automatically updating and enhancing security protocols to adapt to new quantum computing developments.

By integrating AI into risk mitigation, organizations can leverage its capabilities to enhance their cybersecurity posture, making them more resilient against the unique challenges posed by quantum computing.

A New Era of Cybersecurity

While blockchain-based cryptocurrencies are not immediately vulnerable to quantum computing, the poll suggests an eventual impact. The cryptocurrency industry must anticipate this future threat and actively develop quantum-resistant solutions to safeguard the security and integrity of transactions.

These poll insights paint a clear picture of the significant challenges and opportunities that lie ahead in the era of quantum computing. The development and deployment of quantum-resistant encryption, education and awareness campaigns, and a collaborative effort to secure our digital world are essential steps for navigating the risks and harnessing the potential of this transformative technology. The costs associated with these new security measures must also be considered and factored into long-term security budgets.

KEYWORDS: data protection digital security quantum computing security information sharing

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Nigro headshot

Pam Nigro is the Vice President of Security and Security Officer at Medecision. She also is an ISACA Board Director and was the 2022-23 ISACA Board Chair. Image courtesy of Nigro

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security camera

40,000 IoT Security Cameras Are Exposed Online

Fountain pen

Trump Administration Executive Order Changes Cybersecurity Policy

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

From animal habitats to bustling crowds of visitors, a zoo is a one-of-a-kind environment for deploying modern security technologies.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • quantum

    A call to arms: Preparing for the quantum apocalypse

    See More
  • Stand Out in a Tighter Market

    How security professionals can stand out in a tighter market

    See More
  • gold computer chip

    It's time to prepare for quantum computing’s impact on DNS security

    See More

Events

View AllSubmit An Event
  • August 27, 2025

    Risk Mitigation as a Competitive Edge

    In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!