Louis Zezeran
7. mai 2026
Quantum Computing Is Coming—But What Does It Actually Mean for Your Business?
Quantum computing has been surrounded by hype, uncertainty, and bold predictions. Some claim it will instantly break all encryption. Others dismiss it as a distant future concern.
In this NEVERHACK webinar, Louis Zezeran (Host, NEVERHACK Estonia) brings together three experts to provide clarity—cutting through the noise and focusing on what truly matters for organizations today.
Joining him are:
- Marco Berardi (Business Unit Manager, Data Security, NEVERHACK Italy)
Together, they explore quantum computing from three critical angles: understanding the technology, assessing real-world risk, and building a practical roadmap for readiness.
Understanding Quantum Computing: A New Paradigm
The conversation begins with Guillaume Tassin, who provides a clear and accessible explanation of quantum computing.
Rather than positioning it as just a faster computer, Guillaume emphasizes that it is fundamentally different. While classical computers process information step by step, quantum computers can evaluate multiple possibilities simultaneously. This allows them to solve certain problems exponentially faster than today’s systems.
One of the most important implications of this capability is its impact on cryptography. Encryption methods that would take classical computers hundreds of years to break could, in theory, be solved in minutes with a sufficiently powerful quantum machine .
However, Guillaume also grounds the discussion in reality. Today’s quantum computers are:
They are not yet ready to disrupt global cybersecurity.
But that doesn’t mean organizations can ignore them.
The Real Risk Today: Planning for Tomorrow’s Breakthrough
Guillaume introduces the concept of “harvest now, decrypt later,” which becomes a central theme throughout the session.
The idea is simple:
- Data is intercepted and stored today
- It is decrypted years later when quantum capabilities mature
This is particularly relevant for data that must remain secure over long periods—such as government communications, intellectual property, and personal data.
The risk is not immediate—but it is already in motion.
A Reality Check from the Front Lines
The discussion then shifts to Kalev Pihl, who brings decades of experience in digital identity and cryptographic systems.
Kalev provides a critical counterbalance to the hype, emphasizing that quantum risk is often overstated in popular discussions.
He explains that:
- Symmetric encryption (like AES) is relatively resilient
- The real vulnerability lies in asymmetric cryptography
- Attacks require precise targeting, not mass collection
Kalev also highlights the complexity of real-world systems. For example, breaking a digital signature is not as simple as cracking a key—there are multiple layers of validation, including hashing, timestamping, and legal context.
One of his most valuable insights is that security is not purely technical—it is also societal.
Even if cryptographic systems are compromised:
- Legal frameworks still validate intent
- Courts still evaluate evidence
This perspective reframes the discussion from pure technical risk to broader system resilience.
From Theory to Action: A Practical Roadmap
In the final segment, Marco Berardi focuses on what organizations should actually do.
His message is clear:
Post-quantum readiness is a process—not a product.
Marco outlines a structured three-phase approach:
Phase 1: Understand Your Environment
Organizations must identify:
This includes evaluating:
Phase 2: Build a Cryptographic Inventory
This is often the most overlooked step.
Organizations need to map:
Without this visibility, migration cannot succeed.
Phase 3: Define a Migration Strategy
This involves:
- Adoption of post-quantum algorithms
- Governance and monitoring
Marco emphasizes the importance of:
Why Organizations Struggle
A key theme across the discussion is that the biggest challenge is not technology—it’s visibility and maturity.
Organizations that already have:
will be far better positioned to adapt.
Those without these foundations will face a much steeper challenge.
Lessons from the Past
Kalev adds an important historical perspective: this is not the first time cryptography has evolved.
The industry has already gone through multiple transitions:
- Weak algorithms have been replaced
And while these transitions were not perfect, they were successful.
The same will happen with post-quantum cryptography.
Timing: Urgent, But Not Immediate
A consistent message across all speakers is the importance of timing.
This is not an emergency—but it is not something to delay.
Regulatory guidance and industry expectations suggest:
- Preparation should start now
- Critical systems should be updated by around 2030
Given the complexity of enterprise environments, this timeline is closer than it appears.
Final Takeaways
This webinar delivers a clear, balanced message:
- Quantum computing is real—but not immediate
- The biggest risk is long-term data exposure
- The challenge is organizational, not just technical
- Preparation must start now
Above all, success will depend on:
👉 Listen to the full webinar now to hear directly from Louis Zezeran, Guillaume Tassin, Kalev Pihl, and Marco Berardi
👉 Visit NEVERHACK for more insights on post-quantum cybersecurity
👉 Subscribe to NEVERHACK CyberCast for expert discussions on the future of security