Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
    • Compliance & GRC
    • Endpoint Security
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs
  • DRAW

Post-Quantum Cryptography: Preparing for the Quantum Threat

Commvault
03/20/2026
30
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


TL;DR

  • Post-quantum cryptography is an accelerated threat arriving in 5-10 years, yet most organizations haven't begun planning for quantum-resistant security despite active cyber-resilience initiatives.
  • Crypto agility—the ability to quickly switch between cryptographic algorithms—is essential for adapting to evolving quantum threats and NIST recommendations while balancing security with performance costs.
  • Organizations should start by discovering and classifying long-term sensitive data, then implement hybrid cryptographic architectures that allow selective application of post-quantum encryption where it matters most.

Summary

This discussion addresses the urgent need for organizations to prepare for post-quantum cryptography (PQC) threats, which experts predict will materialize within 5 to 10 years. Despite widespread focus on cyber-resilience strategies, most organizations have not yet considered quantum computing risks. Commvault experts explain that the quantum threat timeline is accelerating, making it critical for IT and security leaders to evaluate their readiness now. The conversation covers the performance challenges of post-quantum encryption algorithms, the importance of crypto agility for seamless transitions between classical and quantum-resistant security, and practical implementation steps including data discovery, classification, and risk analysis. The experts emphasize that hybrid cryptographic architectures—where classical encryption coexists with post-quantum solutions—will become the standard approach, allowing organizations to balance security requirements with computational costs while maintaining flexibility as the quantum landscape evolves.

Chapters

0:00 - The Post-Quantum Readiness Gap
0:52 - Vendor Ecosystem Responsibilities
2:06 - Crypto Agility and Implementation
3:27 - Practical Steps for Organizations

Key Quotes

0:20 "Not many seem to have given the risk exposure from post-quantum computing much thought yet."
0:34 "The stark reality is that post-quantum cryptography is definitely on an accelerated timeline."
1:52 "I can definitely see a hybrid cryptographic architectural deployment taking place where you would have the classical side coexisting with the post-quantum cryptography architectures."

Categories:
  • » Webinar Library » Commvault
  • » Data Protection » Backup & Recovery
  • » Cybersecurity » Data Security
  • » Data Protection
Channels:
News:
Events:
Tags:
  • Data Protection
  • Compliance & Governance
  • Technical Deep Dive
  • Best Practices
  • Post-Quantum Cryptography
  • Crypto Agility
  • Quantum Computing Threats
  • Data Classification
  • Hybrid Cryptographic Architecture
  • NIST Standards
  • Cyber Resilience
  • Encryption Performance
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Post-Quantum Cryptography: Preparing for the Quantum Threat

              Upcoming Webinar Calendar

              • 05/06/2026
                10:00 PM
                05/06/2026
                World Password Day: What to Do Now That You Still Have Passwords
                https://www.truthinit.com/index.php/channel/1913/world-password-day-what-to-do-now-that-you-still-have-passwords/
              • 05/07/2026
                05:00 AM
                05/07/2026
                World Password Day: Strategies for Managing Your Passwords Effectively.
                https://www.truthinit.com/index.php/channel/1914/world-password-day-strategies-for-managing-your-passwords-effectively/
              • 05/07/2026
                01:00 PM
                05/07/2026
                World Password Day: Strategies for Managing Your Existing Passwords.
                https://www.truthinit.com/index.php/channel/1915/world-password-day-strategies-for-managing-your-existing-passwords/
              • 05/12/2026
                01:00 PM
                05/12/2026
                Transforming Black Box to Glass Box: Revealing Hidden Threats and AI Risks through Data Lineage
                https://www.truthinit.com/index.php/channel/1895/transforming-black-box-to-glass-box-revealing-hidden-threats-and-ai-risks-through-data-lineage/
              • 05/12/2026
                11:30 PM
                05/12/2026
                Effective Strategies for Safeguarding Active Directory and Minimizing Data Risks
                https://www.truthinit.com/index.php/channel/1888/effective-strategies-for-safeguarding-active-directory-and-minimizing-data-risks/
              • 05/13/2026
                01:00 AM
                05/13/2026
                Transforming the Black Box: Revealing AI Risks and Hidden Threats through Data Lineage
                https://www.truthinit.com/index.php/channel/1890/transforming-the-black-box-revealing-ai-risks-and-hidden-threats-through-data-lineage/
              • 05/13/2026
                05:00 AM
                05/13/2026
                Transforming Black Box to Glass Box: Revealing AI Risks and Hidden Threats through Data Lineage
                https://www.truthinit.com/index.php/channel/1894/transforming-black-box-to-glass-box-revealing-ai-risks-and-hidden-threats-through-data-lineage/
              • 05/19/2026
                01:00 PM
                05/19/2026
                Establishing AI Governance Foundations for GenAI at Every Deployment Stage
                https://www.truthinit.com/index.php/channel/1936/establishing-ai-governance-foundations-for-genai-at-every-deployment-stage/
              • 05/21/2026
                11:00 AM
                05/21/2026
                The Autonomous Era: Orchestrating a Resilient Enterprise
                https://www.truthinit.com/index.php/channel/1372/the-autonomous-era-orchestrating-a-resilient-enterprise/
              • 05/27/2026
                04:00 AM
                05/27/2026
                Rivoluziona i rischi dell'AI in opportunità con Netskope AI Security
                https://www.truthinit.com/index.php/channel/1925/rivoluziona-i-rischi-dellai-in-opportunità-con-netskope-ai-security/
              • 05/28/2026
                10:00 AM
                05/28/2026
                Harnessing AI: Transforming Perception into Purposeful Mastery
                https://www.truthinit.com/index.php/channel/1924/harnessing-ai-transforming-perception-into-purposeful-mastery/
              • 06/02/2026
                01:00 PM
                06/02/2026
                Spring of Satori: Insights into Our New Findings and the 2026 Threat Landscape
                https://www.truthinit.com/index.php/channel/1930/spring-of-satori-insights-into-our-new-findings-and-the-2026-threat-landscape/
              • 06/04/2026
                02:00 AM
                06/04/2026
                Mastering the Unseen: Managing Shadow AI and Agentic MCP Traffic
                https://www.truthinit.com/index.php/channel/1948/mastering-the-unseen-managing-shadow-ai-and-agentic-mcp-traffic/

              Upcoming Events

              • May
                06

                World Password Day: What to Do Now That You Still Have Passwords

                05/06/202610:00 PM ET
                • May
                  07

                  World Password Day: Strategies for Managing Your Passwords Effectively.

                  05/07/202605:00 AM ET
                  • May
                    07

                    World Password Day: Strategies for Managing Your Existing Passwords.

                    05/07/202601:00 PM ET
                    • May
                      12

                      Transforming Black Box to Glass Box: Revealing Hidden Threats and AI Risks through Data Lineage

                      05/12/202601:00 PM ET
                      • May
                        12

                        Effective Strategies for Safeguarding Active Directory and Minimizing Data Risks

                        05/12/202611:30 PM ET
                        More events
                        Truth in IT
                        • Sponsor
                        • About Us
                        • Terms of Service
                        • Privacy Policy
                        • Contact Us
                        • Preference Management
                        Desktop version
                        Standard version