Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
    • Compliance & GRC
    • Endpoint Security
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs
  • AI & Machine Learning

Post-Quantum Cryptography: Preparing for the Quantum Threat

Commvault
03/20/2026
0
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


TL;DR

  • Post-quantum cryptography is an accelerated threat arriving in 5-10 years, yet most organizations haven't begun planning for quantum-resistant security despite active cyber-resilience initiatives.
  • Crypto agility—the ability to quickly switch between cryptographic algorithms—is essential for adapting to evolving quantum threats and NIST recommendations while balancing security with performance costs.
  • Organizations should start by discovering and classifying long-term sensitive data, then implement hybrid cryptographic architectures that allow selective application of post-quantum encryption where it matters most.

Summary

This discussion addresses the urgent need for organizations to prepare for post-quantum cryptography (PQC) threats, which experts predict will materialize within 5 to 10 years. Despite widespread focus on cyber-resilience strategies, most organizations have not yet considered quantum computing risks. Commvault experts explain that the quantum threat timeline is accelerating, making it critical for IT and security leaders to evaluate their readiness now. The conversation covers the performance challenges of post-quantum encryption algorithms, the importance of crypto agility for seamless transitions between classical and quantum-resistant security, and practical implementation steps including data discovery, classification, and risk analysis. The experts emphasize that hybrid cryptographic architectures—where classical encryption coexists with post-quantum solutions—will become the standard approach, allowing organizations to balance security requirements with computational costs while maintaining flexibility as the quantum landscape evolves.

Chapters

0:00 - The Post-Quantum Readiness Gap
0:52 - Vendor Ecosystem Responsibilities
2:06 - Crypto Agility and Implementation
3:27 - Practical Steps for Organizations

Key Quotes

0:20 "Not many seem to have given the risk exposure from post-quantum computing much thought yet."
0:34 "The stark reality is that post-quantum cryptography is definitely on an accelerated timeline."
1:52 "I can definitely see a hybrid cryptographic architectural deployment taking place where you would have the classical side coexisting with the post-quantum cryptography architectures."

Categories:
  • » Webinar Library » Commvault
  • » Data Protection » Backup & Recovery
  • » Cybersecurity » Data Security
  • » Data Protection
Channels:
News:
Events:
Tags:
  • Data Protection
  • Compliance & Governance
  • Technical Deep Dive
  • Best Practices
  • Post-Quantum Cryptography
  • Crypto Agility
  • Quantum Computing Threats
  • Data Classification
  • Hybrid Cryptographic Architecture
  • NIST Standards
  • Cyber Resilience
  • Encryption Performance
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Post-Quantum Cryptography: Preparing for the Quantum Threat

              Upcoming Webinar Calendar

              • 03/26/2026
                01:00 AM
                03/26/2026
                Reclaim Network Clarity and Accountability with Netskope DEM
                https://www.truthinit.com/index.php/channel/1846/reclaim-network-clarity-and-accountability-with-netskope-dem/
              • 03/26/2026
                05:00 AM
                03/26/2026
                ITDR's Role in Strengthening Critical Security Architecture
                https://www.truthinit.com/index.php/channel/1863/itdrs-role-in-strengthening-critical-security-architecture/
              • 03/26/2026
                01:00 PM
                03/26/2026
                HUMAN Dialogue: Transforming Municipal Risk through AI and City-Scale Cyber Resilience
                https://www.truthinit.com/index.php/channel/1835/human-dialogue-transforming-municipal-risk-through-ai-and-city-scale-cyber-resilience/
              • 03/26/2026
                01:00 PM
                03/26/2026
                Making GPUs Available On Demand (Without Breaking the Budget)
                https://www.truthinit.com/index.php/channel/1858/making-gpus-available-on-demand-without-breaking-the-budget/
              • 04/08/2026
                01:00 PM
                04/08/2026
                Managing Configuration at Scale Across Group Policy and Intune
                https://www.truthinit.com/index.php/channel/1865/managing-configuration-at-scale-across-group-policy-and-intune/
              • 04/15/2026
                01:00 PM
                04/15/2026
                Service Account Security in the Age of AI: From Legacy Accounts to Agentic Identities
                https://www.truthinit.com/index.php/channel/1866/service-account-security-in-the-age-of-ai-from-legacy-accounts-to-agentic-identities/
              • 04/30/2026
                10:00 AM
                04/30/2026
                SaaS Data Protection Insights: Key Findings from the 2026 Keepit Annual Report
                https://www.truthinit.com/index.php/channel/1868/saas-data-protection-insights-key-findings-from-the-2026-keepit-annual-report/

              Upcoming Events

              • Mar
                26

                Reclaim Network Clarity and Accountability with Netskope DEM

                03/26/202601:00 AM ET
                • Mar
                  26

                  ITDR's Role in Strengthening Critical Security Architecture

                  03/26/202605:00 AM ET
                  • Mar
                    26

                    HUMAN Dialogue: Transforming Municipal Risk through AI and City-Scale Cyber Resilience

                    03/26/202601:00 PM ET
                    • Mar
                      26

                      Making GPUs Available On Demand (Without Breaking the Budget)

                      03/26/202601:00 PM ET
                      • Apr
                        08

                        Managing Configuration at Scale Across Group Policy and Intune

                        04/08/202601:00 PM ET
                        More events
                        Truth in IT
                        • Sponsor
                        • About Us
                        • Terms of Service
                        • Privacy Policy
                        • Contact Us
                        • Preference Management
                        Desktop version
                        Standard version