homepage
Menu
Open menu
  • Training
    Go one level top Back

    Training

    • Courses

      Build cyber prowess with training from renowned experts

    • Hands-On Simulations

      Hands-on learning exercises keep you at the top of your cyber game

    • Certifications

      Demonstrate cybersecurity expertise with GIAC certifications

    • Ways to Train

      Multiple training options to best fit your schedule and preferred learning style

    • Training Events & Summits

      Expert-led training at locations around the world

    • Free Training Events

      Upcoming workshops, webinars and local events

    • Security Awareness

      Harden enterprise security with end-user and role-based training

    Featured: Solutions for Emerging Risks

    Discover tailored resources that translate emerging threats into actionable strategies

    Risk-Based Solutions

    Can't find what you are looking for?

    Let us help.
    Contact us
  • Learning Paths
    Go one level top Back

    Learning Paths

    • By Focus Area

      Chart your path to job-specific training courses

    • By NICE Framework

      Navigate cybersecurity training through NICE framework roles

    • DoDD 8140 Work Roles

      US DoD 8140 Directive Frameworks

    • By European Skills Framework

      Align your enterprise cyber skills with ECSF profiles

    • By Skills Roadmap

      Find the right training path based on critical skills

    • New to Cyber

      Give your cybersecurity career the right foundation for success

    • Leadership

      Training designed to help security leaders reduce organizational risk

    • Degree and Certificate Programs

      Gain the skills, certifications, and confidence to launch or advance your cybersecurity career.

    Featured

    New to Cyber resources

    Start your career
  • Community Resources
    Go one level top Back

    Community Resources

    Watch & Listen

    • Webinars
    • Live Streams
    • Podcasts

    Read

    • Blog
    • Newsletters
    • White Papers
    • Internet Storm Center

    Download

    • Open Source Tools
    • Posters & Cheat Sheets
    • Policy Templates
    • Summit Presentations
    • SANS Community Benefits

      Connect, learn, and share with other cybersecurity professionals

    • CISO Network

      Engage, challenge, and network with fellow CISOs in this exclusive community of security leaders

  • For Organizations
    Go one level top Back

    For Organizations

    Team Development

    • Why Partner with SANS
    • Group Purchasing
    • Skills & Talent Assessments
    • Private & Custom Training

    Leadership Development

    • Leadership Courses & Accreditation
    • Executive Cybersecurity Exercises
    • CISO Network

    Security Awareness

    • End-User Training
    • Phishing Simulation
    • Specialized Role-Based Training
    • Risk Assessments
    • Public Sector Partnerships

      Explore industry-specific programming and customized training solutions

    • Sponsorship Opportunities

      Sponsor a SANS event or research paper

    Interested in developing a training plan to fit your organization’s needs?

    We're here to help.
    Contact us
  • Talk with an expert
  • Log In
  • Join - it's free
  • Account
    • Account Dashboard
    • Log Out
  1. Home >
  2. Blog >
  3. 2025 SANS Emerging Threats Summit Recap: Unpacking the Quantum Revolution (and How to Defend Against It)
SANS_social_88x82.jpg
SANS Institute

2025 SANS Emerging Threats Summit Recap: Unpacking the Quantum Revolution (and How to Defend Against It)

Learn the seven key takeaways that security leaders should prioritize to prepare for the quantum era

June 2, 2025

The 2025 SANS Emerging Threats Summit delivered a powerful message: the era of quantum computing is rapidly approaching, and its impact on cybersecurity, while profound, is just one facet of its transformative potential. The summit highlighted many emerging developments across the cyber threat landscape, but quantum computing stood out as the clear strategic priority—from its foundations and disruptive power to the urgent need for defensive readiness.

Recent analyses underscore the urgency of quantum threats. According to the Global Risk Institute's 2024 Quantum Threat Timeline Report, experts estimate that within 5-15 years, a cryptographically relevant quantum computer (CRQC) could break standard encryptions in under 24 hours. Meanwhile, Deloitte’s Global Future of Cyber survey found that 52% of organizations are currently measuring their exposure to quantum-related risks and developing corresponding strategies, and an additional 30% are taking decisive actions to implement solutions addressing these risks. This indicates a growing awareness and proactive stance among enterprises regarding the cybersecurity challenges posed by quantum computing.

Building on that theme, discussions at the summit coalesced around seven key takeaways that security leaders should prioritize to prepare for the quantum era:

7 Quantum Takeaways from the SANS Emerging Threats Summit

1. Quantum computers are imminent and will break current encryption.

Quantum computing is on track to fundamentally disrupt cryptographic security. Experts estimate that by the early 2030s, quantum systems will enable threat actors to bypass widely used public key infrastructure algorithms like RSA and ECC—rendering them ineffective for protecting sensitive data. In response, NIST released its first set of finalized Post-Quantum Cryptography (PQC) standards in August 2024. These quantum-resistant algorithms, including CRYSTALS-Kyber, CRYSTALS-Dilithium, and SPHINCS+, have been vetted for long-term resilience and are ready for implementation across government and industry.

“If attackers get a cryptographically relevant quantum computer and can start factoring 2048-bit RSA or breaking ECC keys quickly… that’s the moment everything changes.”

2. PQC is the defensive priority.

The introduction of PQC standards marks a major shift in cybersecurity strategy. The new algorithms are specifically designed to withstand the capabilities of quantum brute force attacks and will serve as the foundation of secure communications in the post-quantum era. Organizations are encouraged to begin facilitating PQC migration across their systems now. Full adoption will take considerable time, and early movers will have a distinct advantage in maintaining trust, compliance, and operational continuity as the cryptographic landscape evolves.

“All new hardware will support post-quantum cryptography… and if your old systems can’t, they’re not going to belong in the 2030s anyway.”

3. Data encrypted today could be vulnerable tomorrow.

The quantum threat isn't just about the future—data encrypted today is already at risk. Nation-states adversaries and other bad actors are stealing sensitive information now, with the intent to decrypt it later using quantum tools once available. This tactic, known as "harvest now, decrypt later" (HNDL) attacks, targets data with long-term sensitivity. To counter this, security leaders should prioritize protecting assets with enduring confidentiality requirements. Identifying and securing that data with quantum-resistant encryption is one of the most immediate and impactful steps organizations can take.

“Nation-states have already been harvesting our pockets for years… and once they get the quantum tools, they’ll use them.”

4. The quantum shift will affect every sector.

Quantum computing will impact more than encryption. Its arrival will reshape industries that depend on digital trust, from finance and healthcare to defense and manufacturing. These sectors must plan for ripple effects across compliance, supply chains, and operational security. Building cross-functional awareness is crucial. CISOs and security teams should work closely with leadership to ensure quantum readiness is included in strategic planning, not just technical roadmaps.

“We have real-world lives protected by cryptography… not just credit cards or identity, but actual physical impacts.”

5. Migrating to quantum-safe systems is challenging but essential.

PQC migration is a large-scale effort. It starts with discovering where vulnerable cryptography exists, then evolves into planning how to replace or augment those systems with quantum-safe alternatives. Complexity varies across infrastructure, and performance tradeoffs may emerge. To navigate this, many organizations are using hybrid approaches that pair classical and PQC algorithms to minimize disruption. Engaging vendor partners early, building migration roadmaps, and prioritizing agility in security architecture will help ease the transition.

“It’s not going to be one big change—things are already happening. The shift is underway.”

6. Regulatory momentum is building.

Public-sector regulatory action is accelerating. Agencies like NIST, CISA, and the NSA have issued detailed guidance to support the transition to quantum-resistant cryptography. These directives outline expectations for cryptographic inventory, system readiness, and future-proofing security architectures. Private organizations should view this as both a policy signal and a strategic mandate. Aligning early with government recommendations will position them to reduce compliance risk and meet future standards with less disruption.

“Regulatory pressure is mounting. Organizations need to initiate quantum readiness plans. A comprehensive and accurate cryptographic inventory remains the indispensable first step.”

7. The time to act is now.

Quantum threats are advancing on a known timeline. Delaying action creates risk that will be harder and more expensive to manage later. The most resilient organizations are already mapping their cryptographic environments and aligning with NIST’s standards and roadmaps. Getting ahead means more than technical fixes. It requires education, risk modeling, and coordinated execution. Teams that build this readiness now will be far better positioned for what is coming next.

“Quantum is coming, whether it’s in seven years or in 15. Now is the time to act. If you wait until quantum arrives, it’s already too late.”

Expert Perspectives from the SANS Emerging Threats Summit

While the seven key takeaways provide a high-level roadmap for preparing for quantum risk, the real value of the SANS Emerging Threats Summit was in hearing from practitioners and experts who are navigating this transformation in real time. The following presentations offered a closer look at how different sectors are tackling the challenge from theoretical grounding to real-world implementation.

Understanding the Landscape: The Nature of the Quantum Shift

Dr. Kawin Boonyapredee (LinkedIn), Chief Strategy Officer of Applied Quantum, set the stage with a primer on how quantum computing works, and more importantly, why it matters. His session provided context for quantum’s computational potential beyond security—highlighting breakthroughs in fields like health and materials science—and connected that promise back to the very real risk to today’s encryption. This reminded attendees that quantum is not just a threat vector, but a technology shift with broad implications.

Moving from Awareness to Action

In a session focused on preparedness, Marin Ivezic (LinkedIn), Founder of Applied Quantum, stressed that cryptographic readiness is a priority that cannot wait. He pointed to rising regulatory expectations and emphasized the importance of aligning cryptographic inventories with high-priority areas of your security environment. His message reinforced a recurring theme: the first step in defending against quantum threats is knowing what you need to protect most.

Why PQC Works—and Why It’s Ready

Konstantinos Karagiannis (LinkedIn), Director of Quantum Computing Services at Protiviti, took the conversation deeper into the science behind PQC. His explanation of lattice-based cryptography and the mathematical hardness behind “learning with errors” helped demystify why these new algorithms are considered secure, even against quantum attacks. His breakdown of ML-KEM’s performance also gave attendees a tangible sense of what PQC can deliver in current systems.

Lessons from the Field: PQC in Practice

Bringing a practical view from the financial sector, Mark Carney (LinkedIn) of Santander Global Tech walked attendees through his organization’s real-world approach to PQC migration. He detailed how his team approaches cryptographic discovery, aligns migration efforts with long-term risk exposure, and treats cryptographic governance as part of continuous DevSecOps workflows. His use of the “OODA loop” framework drove home a crucial point: adapting to quantum isn’t a one-time change. It’s an ongoing and evolving process.

Taken together, the actionable insights from various presentations signified the summit's core message: quantum-driven cyber risk is no longer theoretical. Whether from the vantage point of cryptographic science, regulatory urgency, or enterprise-scale strategy, the call to action was clear. Quantum readiness must be intentional, cross-functional, and underway now.

Fostering a Safer Future Together

The SANS Institute continues to support security professionals with training, research, and expert-led events that equip organizations with the skills needed to navigate evolving threats. As the cybersecurity landscape shifts with the rise of quantum computing and other advanced technologies, ongoing education and community engagement are more important than ever. SANS provides a trusted platform for security leaders and practitioners to stay ahead of emerging risks, refine their strategies, and connect with peers facing similar challenges.

Interested in attending a SANS Summit? We offer both live and online attendance options, making it easier than ever to stay informed and connected with the global security community. Find the full list of 2025 summits here.

Ready to deepen your cybersecurity knowledge or help position your security team for quantum readiness? Explore SANS courses and register for upcoming live instructor training or self-study options.

Disclaimer: To capture insights from four expert talks and a panel on Quantum technology, SANS combined advanced AI tools with human writing and editing. AI generated initial summaries to efficiently handle the volume and complexity, while our team refined the content to keep it accurate, engaging, and free from robotic tone.

Share:
TwitterLinkedInFacebook
Copy url Url was copied to clipboard
Subscribe to SANS Newsletters
Receive curated news, vulnerabilities, & security awareness tips
United States
Canada
United Kingdom
Spain
Belgium
Denmark
Norway
Netherlands
Australia
India
Japan
Singapore
Afghanistan
Aland Islands
Albania
Algeria
American Samoa
Andorra
Angola
Anguilla
Antarctica
Antigua and Barbuda
Argentina
Armenia
Aruba
Austria
Azerbaijan
Bahamas
Bahrain
Bangladesh
Barbados
Belarus
Belize
Benin
Bermuda
Bhutan
Bolivia
Bonaire, Sint Eustatius, and Saba
Bosnia And Herzegovina
Botswana
Bouvet Island
Brazil
British Indian Ocean Territory
Brunei Darussalam
Bulgaria
Burkina Faso
Burundi
Cambodia
Cameroon
Cape Verde
Cayman Islands
Central African Republic
Chad
Chile
China
Christmas Island
Cocos (Keeling) Islands
Colombia
Comoros
Cook Islands
Costa Rica
Cote D'ivoire
Croatia (Local Name: Hrvatska)
Curacao
Cyprus
Czech Republic
Democratic Republic of the Congo
Djibouti
Dominica
Dominican Republic
East Timor
Ecuador
Egypt
El Salvador
Equatorial Guinea
Eritrea
Estonia
Eswatini
Ethiopia
Falkland Islands (Malvinas)
Faroe Islands
Fiji
Finland
France
French Guiana
French Polynesia
French Southern Territories
Gabon
Gambia
Georgia
Germany
Ghana
Gibraltar
Greece
Greenland
Grenada
Guadeloupe
Guam
Guatemala
Guernsey
Guinea
Guinea-Bissau
Guyana
Haiti
Heard And McDonald Islands
Honduras
Hong Kong
Hungary
Iceland
Indonesia
Iraq
Ireland
Isle of Man
Israel
Italy
Jamaica
Jersey
Jordan
Kazakhstan
Kenya
Kiribati
Korea, Republic Of
Kosovo
Kuwait
Kyrgyzstan
Lao People's Democratic Republic
Latvia
Lebanon
Lesotho
Liberia
Liechtenstein
Lithuania
Luxembourg
Macau
Madagascar
Malawi
Malaysia
Maldives
Mali
Malta
Marshall Islands
Martinique
Mauritania
Mauritius
Mayotte
Mexico
Micronesia, Federated States Of
Moldova, Republic Of
Monaco
Mongolia
Montenegro
Montserrat
Morocco
Mozambique
Myanmar
Namibia
Nauru
Nepal
Netherlands Antilles
New Caledonia
New Zealand
Nicaragua
Niger
Nigeria
Niue
Norfolk Island
North Macedonia
Northern Mariana Islands
Oman
Pakistan
Palau
Palestine
Panama
Papua New Guinea
Paraguay
Peru
Philippines
Pitcairn
Poland
Portugal
Puerto Rico
Qatar
Reunion
Romania
Russian Federation
Rwanda
Saint Bartholemy
Saint Kitts And Nevis
Saint Lucia
Saint Martin
Saint Vincent And The Grenadines
Samoa
San Marino
Sao Tome And Principe
Saudi Arabia
Senegal
Serbia
Seychelles
Sierra Leone
Sint Maarten
Slovakia
Slovenia
Solomon Islands
South Africa
South Georgia and the South Sandwich Islands
South Sudan
Sri Lanka
St. Helena
St. Pierre And Miquelon
Suriname
Svalbard And Jan Mayen Islands
Sweden
Switzerland
Taiwan
Tajikistan
Tanzania, United Republic Of
Thailand
Togo
Tokelau
Tonga
Trinidad And Tobago
Tunisia
Turkey
Turkmenistan
Turks And Caicos Islands
Tuvalu
Uganda
Ukraine
United Arab Emirates
United States Minor Outlying Islands
Uruguay
Uzbekistan
Vanuatu
Vatican City State
Venezuela
Vietnam
Virgin Islands (British)
Virgin Islands (U.S.)
Wallis And Futuna Islands
Western Sahara
Yemen
Zambia
Zimbabwe

By providing this information, you agree to the processing of your personal data by SANS as described in our Privacy Policy.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Tags:
  • Cybersecurity Leadership

Related Content

Blog
Stay Ahead Ransomware Incident Communications 340x340
Cybersecurity Leadership
June 4, 2025
Stay Ahead of Ransomware: Communication During a Cyber Incident
Learn the critical role of communications during cyber incidents
Mari DeGrazia
Mari DeGrazia
read more
Blog
Cybersecurity Leadership
May 30, 2025
SANS Cyber Leaders Podcast Season 2: Empowering CISOs to Navigate a Perfect Storm of Complexity
The SANS Institute’s Cyber Leaders Podcast is back with a second season.
SANS_social_88x82.jpg
SANS Institute
read more
Blog
Navigating DORA NIS2 Compliance EU Financial Organisations 340x340
Cybersecurity Leadership
May 27, 2025
Navigating DORA and NIS2 Compliance for Financial Sector Organisations in the EU
Practical insights on both DORA and NIS2 regulations. If you haven't started implementing measures yet, you're already late.
Jurgita Skritaite
Jurgita Skritaite
read more
  • Company
  • Mission
  • Instructors
  • About
  • FAQ
  • Press
  • Contact Us
  • Careers
  • Policies
  • Training Programs
  • Work Study
  • Academies & Scholarships
  • Public Sector Partnerships
  • Law Enforcement
  • SkillsFuture Singapore
  • Degree Programs
  • Get Involved
  • Join the Community
  • Become an Instructor
  • Become a Sponsor
  • Speak at a Summit
  • Join the CISO Network
  • Award Programs
  • Partner Portal
Subscribe to SANS Newsletters
Receive curated news, vulnerabilities, & security awareness tips
United States
Canada
United Kingdom
Spain
Belgium
Denmark
Norway
Netherlands
Australia
India
Japan
Singapore
Afghanistan
Aland Islands
Albania
Algeria
American Samoa
Andorra
Angola
Anguilla
Antarctica
Antigua and Barbuda
Argentina
Armenia
Aruba
Austria
Azerbaijan
Bahamas
Bahrain
Bangladesh
Barbados
Belarus
Belize
Benin
Bermuda
Bhutan
Bolivia
Bonaire, Sint Eustatius, and Saba
Bosnia And Herzegovina
Botswana
Bouvet Island
Brazil
British Indian Ocean Territory
Brunei Darussalam
Bulgaria
Burkina Faso
Burundi
Cambodia
Cameroon
Cape Verde
Cayman Islands
Central African Republic
Chad
Chile
China
Christmas Island
Cocos (Keeling) Islands
Colombia
Comoros
Cook Islands
Costa Rica
Cote D'ivoire
Croatia (Local Name: Hrvatska)
Curacao
Cyprus
Czech Republic
Democratic Republic of the Congo
Djibouti
Dominica
Dominican Republic
East Timor
Ecuador
Egypt
El Salvador
Equatorial Guinea
Eritrea
Estonia
Eswatini
Ethiopia
Falkland Islands (Malvinas)
Faroe Islands
Fiji
Finland
France
French Guiana
French Polynesia
French Southern Territories
Gabon
Gambia
Georgia
Germany
Ghana
Gibraltar
Greece
Greenland
Grenada
Guadeloupe
Guam
Guatemala
Guernsey
Guinea
Guinea-Bissau
Guyana
Haiti
Heard And McDonald Islands
Honduras
Hong Kong
Hungary
Iceland
Indonesia
Iraq
Ireland
Isle of Man
Israel
Italy
Jamaica
Jersey
Jordan
Kazakhstan
Kenya
Kiribati
Korea, Republic Of
Kosovo
Kuwait
Kyrgyzstan
Lao People's Democratic Republic
Latvia
Lebanon
Lesotho
Liberia
Liechtenstein
Lithuania
Luxembourg
Macau
Madagascar
Malawi
Malaysia
Maldives
Mali
Malta
Marshall Islands
Martinique
Mauritania
Mauritius
Mayotte
Mexico
Micronesia, Federated States Of
Moldova, Republic Of
Monaco
Mongolia
Montenegro
Montserrat
Morocco
Mozambique
Myanmar
Namibia
Nauru
Nepal
Netherlands Antilles
New Caledonia
New Zealand
Nicaragua
Niger
Nigeria
Niue
Norfolk Island
North Macedonia
Northern Mariana Islands
Oman
Pakistan
Palau
Palestine
Panama
Papua New Guinea
Paraguay
Peru
Philippines
Pitcairn
Poland
Portugal
Puerto Rico
Qatar
Reunion
Romania
Russian Federation
Rwanda
Saint Bartholemy
Saint Kitts And Nevis
Saint Lucia
Saint Martin
Saint Vincent And The Grenadines
Samoa
San Marino
Sao Tome And Principe
Saudi Arabia
Senegal
Serbia
Seychelles
Sierra Leone
Sint Maarten
Slovakia
Slovenia
Solomon Islands
South Africa
South Georgia and the South Sandwich Islands
South Sudan
Sri Lanka
St. Helena
St. Pierre And Miquelon
Suriname
Svalbard And Jan Mayen Islands
Sweden
Switzerland
Taiwan
Tajikistan
Tanzania, United Republic Of
Thailand
Togo
Tokelau
Tonga
Trinidad And Tobago
Tunisia
Turkey
Turkmenistan
Turks And Caicos Islands
Tuvalu
Uganda
Ukraine
United Arab Emirates
United States Minor Outlying Islands
Uruguay
Uzbekistan
Vanuatu
Vatican City State
Venezuela
Vietnam
Virgin Islands (British)
Virgin Islands (U.S.)
Wallis And Futuna Islands
Western Sahara
Yemen
Zambia
Zimbabwe

By providing this information, you agree to the processing of your personal data by SANS as described in our Privacy Policy.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
  • Privacy Policy
  • Terms and Conditions
  • Do Not Sell/Share My Personal Information
  • Contact
  • Careers
© 2025 The Escal Institute of Advanced Technologies, Inc. d/b/a SANS Institute. Our Terms and Conditions detail our trademark and copyright rights. Any unauthorized use is expressly prohibited.
  • Twitter
  • Facebook
  • Youtube
  • LinkedIn