Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
    • Compliance & GRC
    • Endpoint Security
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs

Post-Quantum Cryptography: Preparing for the Quantum Threat

Commvault
03/20/2026
19
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


TL;DR

  • Post-quantum cryptography is an accelerated threat arriving in 5-10 years, yet most organizations haven't begun planning for quantum-resistant security despite active cyber-resilience initiatives.
  • Crypto agility—the ability to quickly switch between cryptographic algorithms—is essential for adapting to evolving quantum threats and NIST recommendations while balancing security with performance costs.
  • Organizations should start by discovering and classifying long-term sensitive data, then implement hybrid cryptographic architectures that allow selective application of post-quantum encryption where it matters most.

Summary

This discussion addresses the urgent need for organizations to prepare for post-quantum cryptography (PQC) threats, which experts predict will materialize within 5 to 10 years. Despite widespread focus on cyber-resilience strategies, most organizations have not yet considered quantum computing risks. Commvault experts explain that the quantum threat timeline is accelerating, making it critical for IT and security leaders to evaluate their readiness now. The conversation covers the performance challenges of post-quantum encryption algorithms, the importance of crypto agility for seamless transitions between classical and quantum-resistant security, and practical implementation steps including data discovery, classification, and risk analysis. The experts emphasize that hybrid cryptographic architectures—where classical encryption coexists with post-quantum solutions—will become the standard approach, allowing organizations to balance security requirements with computational costs while maintaining flexibility as the quantum landscape evolves.

Chapters

0:00 - The Post-Quantum Readiness Gap
0:52 - Vendor Ecosystem Responsibilities
2:06 - Crypto Agility and Implementation
3:27 - Practical Steps for Organizations

Key Quotes

0:20 "Not many seem to have given the risk exposure from post-quantum computing much thought yet."
0:34 "The stark reality is that post-quantum cryptography is definitely on an accelerated timeline."
1:52 "I can definitely see a hybrid cryptographic architectural deployment taking place where you would have the classical side coexisting with the post-quantum cryptography architectures."

Categories:
  • » Webinar Library » Commvault
  • » Data Protection » Backup & Recovery
  • » Cybersecurity » Data Security
  • » Data Protection
Channels:
News:
Events:
Tags:
  • Data Protection
  • Compliance & Governance
  • Technical Deep Dive
  • Best Practices
  • Post-Quantum Cryptography
  • Crypto Agility
  • Quantum Computing Threats
  • Data Classification
  • Hybrid Cryptographic Architecture
  • NIST Standards
  • Cyber Resilience
  • Encryption Performance
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Post-Quantum Cryptography: Preparing for the Quantum Threat

              Upcoming Webinar Calendar

              • 04/15/2026
                01:00 PM
                04/15/2026
                Service Account Security in the Age of AI: From Legacy Accounts to Agentic Identities
                https://www.truthinit.com/index.php/channel/1866/service-account-security-in-the-age-of-ai-from-legacy-accounts-to-agentic-identities/
              • 04/16/2026
                11:00 AM
                04/16/2026
                Beyond the Alert – Building the Human Centric Agentic SOC
                https://www.truthinit.com/index.php/channel/1372/beyond-the-alert-–-building-the-human-centric-agentic-soc/
              • 04/21/2026
                02:00 PM
                04/21/2026
                How Purpose Brands scales IT with Zendesk ITAM
                https://www.truthinit.com/index.php/channel/1881/how-purpose-brands-scales-it-with-zendesk-itam/
              • 04/30/2026
                10:00 AM
                04/30/2026
                Insights from the 2026 Keepit Annual Data Report on SaaS Data Protection
                https://www.truthinit.com/index.php/channel/1868/insights-from-the-2026-keepit-annual-data-report-on-saas-data-protection/
              • 04/30/2026
                01:00 PM
                04/30/2026
                The New Economics of VMware Exit
                https://www.truthinit.com/index.php/channel/1880/the-new-economics-of-vmware-exit/

              Upcoming Events

              • Apr
                15

                Service Account Security in the Age of AI: From Legacy Accounts to Agentic Identities

                04/15/202601:00 PM ET
                • Apr
                  16

                  Beyond the Alert – Building the Human Centric Agentic SOC

                  04/16/202611:00 AM ET
                  • Apr
                    21

                    How Purpose Brands scales IT with Zendesk ITAM

                    04/21/202602:00 PM ET
                    • Apr
                      30

                      Insights from the 2026 Keepit Annual Data Report on SaaS Data Protection

                      04/30/202610:00 AM ET
                      • Apr
                        30

                        The New Economics of VMware Exit

                        04/30/202601:00 PM ET
                        More events
                        Truth in IT
                        • Sponsor
                        • About Us
                        • Terms of Service
                        • Privacy Policy
                        • Contact Us
                        • Preference Management
                        Desktop version
                        Standard version