Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
    • Compliance & GRC
    • Endpoint Security
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs
  • DRAW

2025 Security Trends: Quantum Threats & Supply Chain Risks

Zscaler
05/19/2026
0
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


TL;DR

  • Nation-state actors are actively harvesting encrypted data now, betting quantum computers will soon enable decryption—making quantum-safe cryptography planning essential for 2025.
  • Supply chain attacks targeting third-party vendors, contractors, and CI/CD environments continue to grow more sophisticated and remain a top security concern.
  • Zero-trust architecture, including segmentation of critical systems like CI/CD pipelines, is essential for reducing supply chain and third-party risk exposure.

Summary

Zscaler CSO Deepen Desai presents two critical cybersecurity predictions for 2025, focusing on emerging quantum computing threats and persistent supply chain vulnerabilities. The discussion highlights that nation-state actors are already harvesting TLS-encrypted data with the expectation that quantum computers will eventually enable decryption, making the transition to quantum-safe cryptography an urgent priority. Supply chain attacks continue to evolve in sophistication, with threat actors targeting third-party vendors, contractors, and CI/CD environments as entry points into organizations. Desai emphasizes that these threats are not future concerns but present realities requiring immediate action. The recommended defensive posture centers on zero-trust architecture implementation, AI-powered threat detection to counter AI-driven attacks, phishing-resistant multi-factor authentication, and robust third-party risk management programs that include segmentation of critical systems like CI/CD pipelines. Organizations that prioritize these measures will be better positioned to maintain resilience against the evolving threat landscape throughout 2025.

Chapters

0:00 - Series Context
0:26 - Quantum Computing Risks
1:05 - Supply Chain Threats
1:41 - Defensive Recommendations

Key Quotes

0:38 "We are already seeing nation-state threat actors stealing TLS-encrypted data with plans to decrypt it, betting that the Quantum computers will soon have the power to do so."
1:41 "To close, these threats aren't just on the horizon, they're already here."

Categories:
  • » Webinar Library » Zscaler
  • » Cybersecurity » Application Security
  • » Cybersecurity » Zero Trust
  • » Data Protection
Channels:
News:
Events:
Tags:
  • Zero Trust
  • Threat Intelligence
  • Application Security
  • Executive Briefing
  • Quantum Computing Security
  • Quantum-Safe Cryptography
  • Supply Chain Attacks
  • Third-Party Risk Management
  • Zero Trust Architecture
  • CI
  • CD Security
  • Nation-State Threats
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: 2025 Security Trends: Quantum Threats & Supply Chain Risks

              Upcoming Webinar Calendar

              • 05/20/2026
                10:00 PM
                05/20/2026
                Establishing a Robust AI Governance Framework for GenAI Throughout Deployment Stages
                https://www.truthinit.com/index.php/channel/1953/establishing-a-robust-ai-governance-framework-for-genai-throughout-deployment-stages/
              • 05/21/2026
                11:00 AM
                05/21/2026
                Risk in Real Time Demo Series: The Autonomous Era - Orchestrating a Resilient Enterprise
                https://www.truthinit.com/index.php/channel/1372/risk-in-real-time-demo-series-the-autonomous-era-orchestrating-a-resilient-enterprise/
              • 05/27/2026
                10:00 AM
                05/27/2026
                Adopting AI: From Illusion to Intentional Control
                https://www.truthinit.com/index.php/channel/1924/harnessing-ai-transitioning-from-illusion-to-purposeful-mastery/
              • 05/28/2026
                01:00 PM
                05/28/2026
                Harnessing AI for Smaller Teams: Strategies for Secure Implementation
                https://www.truthinit.com/index.php/channel/1951/harnessing-ai-for-smaller-teams-strategies-for-secure-implementation/
              • 06/02/2026
                01:00 PM
                06/02/2026
                Spring of Satori: Delving into Recent Findings and 2026's Threat Landscape
                https://www.truthinit.com/index.php/channel/1930/spring-of-satori-delving-into-recent-findings-and-2026s-threat-landscape/
              • 06/16/2026
                07:00 AM
                06/16/2026
                Transforming Data Risk into Actionable Priorities: Which Issues to Address First?
                https://www.truthinit.com/index.php/channel/1952/transforming-data-risk-into-actionable-priorities-which-issues-to-address-first/

              Upcoming Events

              • May
                20

                Establishing a Robust AI Governance Framework for GenAI Throughout Deployment Stages

                05/20/202610:00 PM ET
                • May
                  21

                  Risk in Real Time Demo Series: The Autonomous Era - Orchestrating a Resilient Enterprise

                  05/21/202611:00 AM ET
                  • May
                    27

                    Adopting AI: From Illusion to Intentional Control

                    05/27/202610:00 AM ET
                    • May
                      28

                      Harnessing AI for Smaller Teams: Strategies for Secure Implementation

                      05/28/202601:00 PM ET
                      • Jun
                        02

                        Spring of Satori: Delving into Recent Findings and 2026's Threat Landscape

                        06/02/202601:00 PM ET
                        More events
                        Truth in IT
                        • Sponsor
                        • About Us
                        • Terms of Service
                        • Privacy Policy
                        • Contact Us
                        • Preference Management
                        Desktop version
                        Standard version