Quantum Computing & Cybersecurity: Real Risks, Post-Quantum Readiness, and What Businesses Must Do Now | NEVERHACK Webinar Replay

Louis Zezeran 7. mai 2026

Quantum Computing Is Coming—But What Does It Actually Mean for Your Business? 

Quantum computing has been surrounded by hype, uncertainty, and bold predictions. Some claim it will instantly break all encryption. Others dismiss it as a distant future concern. 

In this NEVERHACK webinar, Louis Zezeran (Host, NEVERHACK Estonia) brings together three experts to provide clarity—cutting through the noise and focusing on what truly matters for organizations today. 

Joining him are: 

  • Marco Berardi (Business Unit Manager, Data Security, NEVERHACK Italy) 

Together, they explore quantum computing from three critical angles: understanding the technology, assessing real-world risk, and building a practical roadmap for readiness. 

 

Understanding Quantum Computing: A New Paradigm 

The conversation begins with Guillaume Tassin, who provides a clear and accessible explanation of quantum computing. 

Rather than positioning it as just a faster computer, Guillaume emphasizes that it is fundamentally different. While classical computers process information step by step, quantum computers can evaluate multiple possibilities simultaneously. This allows them to solve certain problems exponentially faster than today’s systems. 

One of the most important implications of this capability is its impact on cryptography. Encryption methods that would take classical computers hundreds of years to break could, in theory, be solved in minutes with a sufficiently powerful quantum machine . 

However, Guillaume also grounds the discussion in reality. Today’s quantum computers are: 

  • Fragile 
  • Expensive 
  • Limited in scale 

They are not yet ready to disrupt global cybersecurity. 

But that doesn’t mean organizations can ignore them. 

 

The Real Risk Today: Planning for Tomorrow’s Breakthrough 

Guillaume introduces the concept of “harvest now, decrypt later,” which becomes a central theme throughout the session. 

The idea is simple: 

  • Data is intercepted and stored today 
  • It is decrypted years later when quantum capabilities mature 

This is particularly relevant for data that must remain secure over long periods—such as government communications, intellectual property, and personal data. 

The risk is not immediate—but it is already in motion. 

 

A Reality Check from the Front Lines 

The discussion then shifts to Kalev Pihl, who brings decades of experience in digital identity and cryptographic systems. 

Kalev provides a critical counterbalance to the hype, emphasizing that quantum risk is often overstated in popular discussions. 

He explains that: 

  • Symmetric encryption (like AES) is relatively resilient 
  • The real vulnerability lies in asymmetric cryptography 
  • Attacks require precise targeting, not mass collection 

Kalev also highlights the complexity of real-world systems. For example, breaking a digital signature is not as simple as cracking a key—there are multiple layers of validation, including hashing, timestamping, and legal context. 

One of his most valuable insights is that security is not purely technical—it is also societal. 

Even if cryptographic systems are compromised: 

  • Legal frameworks still validate intent 
  • Courts still evaluate evidence 
  • Context still matters 

This perspective reframes the discussion from pure technical risk to broader system resilience. 

 

From Theory to Action: A Practical Roadmap 

In the final segment, Marco Berardi focuses on what organizations should actually do. 

His message is clear: 

Post-quantum readiness is a process—not a product. 

Marco outlines a structured three-phase approach: 

Phase 1: Understand Your Environment 

Organizations must identify: 

  • Critical data 
  • Key processes 
  • Systems at risk 

This includes evaluating: 

  • Data sensitivity 
  • Data longevity 
  • Business impact 

 

Phase 2: Build a Cryptographic Inventory 

This is often the most overlooked step. 

Organizations need to map: 

  • Certificates 
  • Encryption algorithms 
  • Key management systems 
  • Hardware dependencies 

Without this visibility, migration cannot succeed. 

 

Phase 3: Define a Migration Strategy 

This involves: 

  • Budget planning 
  • Infrastructure upgrades 
  • Adoption of post-quantum algorithms 
  • Governance and monitoring 

Marco emphasizes the importance of: 

  • Clear milestones 
  • Defined priorities 
  • Ongoing oversight 

 

Why Organizations Struggle 

A key theme across the discussion is that the biggest challenge is not technology—it’s visibility and maturity. 

Organizations that already have: 

  • Strong governance 
  • Clear processes 
  • Good asset visibility 

will be far better positioned to adapt. 

Those without these foundations will face a much steeper challenge. 

 

Lessons from the Past 

Kalev adds an important historical perspective: this is not the first time cryptography has evolved. 

The industry has already gone through multiple transitions: 

  • Weak algorithms have been replaced 
  • Standards have evolved 
  • Systems have adapted 

And while these transitions were not perfect, they were successful. 

The same will happen with post-quantum cryptography. 

 

Timing: Urgent, But Not Immediate 

A consistent message across all speakers is the importance of timing. 

This is not an emergency—but it is not something to delay. 

Regulatory guidance and industry expectations suggest: 

  • Preparation should start now 
  • Critical systems should be updated by around 2030 

Given the complexity of enterprise environments, this timeline is closer than it appears. 

 

Final Takeaways 

This webinar delivers a clear, balanced message: 

  • Quantum computing is real—but not immediate 
  • The biggest risk is long-term data exposure 
  • The challenge is organizational, not just technical 
  • Preparation must start now 

Above all, success will depend on: 

  • Visibility 
  • Governance 
  • Strategic planning 

 

👉 Listen to the full webinar now to hear directly from Louis Zezeran, Guillaume Tassin, Kalev Pihl, and Marco Berardi 

👉 Visit NEVERHACK for more insights on post-quantum cybersecurity 

👉 Subscribe to NEVERHACK CyberCast for expert discussions on the future of security 

Jaga

Märksõnad

Märksõnad

Jaga

Viimased postitused

14. apr. 2026

Kui sa ei tea, kuidas sind rünnata saab, siis sa ei tea ka, kuidas end kaitsta

Neverhacki ründava turbe teenuse juhina küsitakse minult üsna tihti üks ja sama küsimus: “Kas te siis päriselt häkite ettevõtteid?” Lühike vastus on jah. Aga mitte päris nii, nagu inimesed arvavad. Me ei häki selleks, et kahju teha. Me häkime selleks, et kahju ära hoida. Eetiline häkkimine tähendab seda, et me võtame teadlikult ründaja rolli-  kontrollitud [...]

Loe edasi
21. jaan. 2025

Küberjulgeolek 2025: Väljakutsed ja strateegiad

Küberturvalisus on muutunud oluliseks äristrateegia osaks, mis määrab organisatsioonide suutlikkuse kaitsta oma digitaalseid varasid ja jätkata tegevust ka kriisiolukordades. Küberrünnakute majanduslik mõju ulatub hinnanguliselt 1,5%-ni maailma SKP-st, mistõttu 2025. aasta toob kaasa märkimisväärseid väljakutseid ja vajadust pidevale arengule kaitse strateegiates. Eriti oluline on see ka Eestis, kus digilahendused on laialdaselt kasutusel nii avalikus kui erasektoris. […]

Loe edasi
4. juuni 2024

Küberturvalisus tootmisettevõttes – väljakutsed ja õppetunnid Hanza Grupi näitel

Kiirelt areneval digiajastul seisab tootmissektor silmitsi üha suurema hulga küberjulgeoleku ohtudega. Rahvusvaheliste ning keerukate operatsioonidega ettevõtted peavad need ohud juba eos maandama, et kaitsta kriitilist infrastruktuuri. Loe blogist ja kuula saadet, kuidas Hanza Grupp sellele kõigele lähenenud on.

Loe edasi