Services for Organizations

Using our research, best practices and expertise, we help you understand how to optimize your business processes using applications, information and technology. We provide advisory, education, and assessment services to rapidly identify and prioritize areas for improvement and perform vendor selection

Consulting & Strategy Sessions

Ventana On Demand

    Services for Investment Firms

    We provide guidance using our market research and expertise to significantly improve your marketing, sales and product efforts. We offer a portfolio of advisory, research, thought leadership and digital education services to help optimize market strategy, planning and execution.

    Consulting & Strategy Sessions

    Ventana On Demand

      Services for Technology Vendors

      We provide guidance using our market research and expertise to significantly improve your marketing, sales and product efforts. We offer a portfolio of advisory, research, thought leadership and digital education services to help optimize market strategy, planning and execution.

      Analyst Relations

      Demand Generation

      Product Marketing

      Market Coverage

      Request a Briefing



        Jeff Orr's Analyst Perspectives

        << Back to Blog Index

        Preparing for Q-Day: Safeguarding Enterprises Against Quantum Threats

        As quantum computing advances at an unprecedented pace, the concept of Q-Day—a day when quantum computers can fundamentally undermine our current encryption methods—has entered discussions among cybersecurity professionals and business leaders alike. While there is no definitive date set for Q-Day, we are approaching a critical juncture where traditional cryptographic techniques may no longer suffice to protect sensitive data, digital communications and transactions. This impending shift not only poses significant risks for individuals but also presents a high-stakes event that every enterprise must anticipate and prepare for; inadequate preparation could lead to substantial data breaches, compromised systems and irrevocable damage to customer trust and organizational reputation.

        Drawing parallels between Q-Day and the Y2K crisis provides insights into the urgency of preparing for technological shifts. The turn of the millennium posed a significant threat to IT systems due to inadequate date representation in software—an issue that many organizations underestimated. Similarly, Q-Day represents a systemic risk to digital security, eroding the foundation on which secure communication is built.

        While Y2K presented a clear and predictable deadline, Q-Day’s precipice remains uncertain and unpredictable. However, both scenarios necessitate a proactive approach that prioritizes risk management strategies and cross-departmental collaboration. Just as Y2K prompted widespread audits and remediation efforts across industries, Q-Day should galvanize organizations to assess their cryptographic practices and prepare for a transformed security landscape.

        The ideal outcome in addressing Q-Day involves a strategic shift in enterprise security, characterized by the widespread adoption of quantum-safe algorithms, the development of innovative quantum cyber tools and the implementation of automated detection and response systems that can swiftly mitigate risks. The use of cryptography algorithms across enterprise applications has grown in recent years. ISG Research asserts that by 2026, over one-half of enterprises will require password encryption in digital security to reduce the risk of unauthorized access to corporate systems. Unfortunately, the reality is stark: many enterprises today still operate under outdated encryption standards, such as DES (Data Encryption Standard) and 3DES (Triple Data Encryption Standard), which are vulnerable to quantum attacks.

        Moreover, organizations are likely to face cybersecurity threats in the interim before quantum-safe algorithms become widely available. This means that enterprises could experience significant vulnerabilities—not only in terms ofISG_Research_2024_Assertion_Security_Password_Encryption_47_S their data security but also with respect to operational integrity. As organizations cling to legacy encryption methods, they expose themselves to risks that could manifest as severe data breaches, compliance violations and reputational damage.

        Proactive measures are essential for enterprises aiming to safeguard against the impending Q-Day risks. Here are steps organizations can take today:

        1. Inventory Current Encryption Uses: Conduct a comprehensive audit that identifies all applications and services utilizing encryption protocols. This inventory serves as a critical first step to understand vulnerability exposure and prioritize remediation efforts.
        2. Build a Cryptographic Bill of Materials (CBOM): Taking inspiration from the Software Bill of Materials (SBOM), a CBOM will help organizations catalog all cryptographic algorithms, libraries and protocols in use. This structured inventory facilitates a deeper understanding of current dependencies and potential risks.
        3. Assess Risk to Q-Day Vulnerabilities: Evaluate the organization’s encryption landscape to identify any weaknesses stemming from outdated cryptographic methods. This risk assessment should include a thorough analysis of potential impacts on operations and data integrity.
        4. Develop a Business Case for Risk Mitigation: Communicate the significance of reducing risk exposure due to cryptographic vulnerabilities to stakeholders across different departments. Highlighting the consequences of inaction and the benefits of transitioning to quantum-safe practices will foster organization-wide support for necessary changes.

        The act of maintaining the current state of encryption poses a considerable risk to business operations. Outdated encryption methods like DES and 3DES invite breaches, regulatory scrutiny and potentially reputational damage. A desirable outcome is to implement quantum-safe encryption algorithms. However, they do not yet exist nor could they be tested. Until there are known quantum threats, the typical threat scanning methods serve no purpose. This reality leads to documenting enterprise encryption inventory as a step every organization can take today. As a Q-day preparation roundtable participant said, “Taking an inventory of encryption usage allows for knowing where all the fire exits are in the building without having to set the building on fire.” As quantum computing technologies evolve, the pressure on organizations to update their security protocols will only escalate.

        Failure to adapt could result in operational disruptions that hinder day-to-day activities, compromise customer data and damage stakeholder relationships. The longer that enterprises postpone necessary updates, the more significant the ramifications they will face when confronted with the quantum threat.

        To build a robust cybersecurity business case and prepare for Q-Day, enterprise leaders should prioritize the following steps:

        1. Establish Cross-Functional Teams: Create collaboration among IT, compliance, legal and operational departments to collectively address the impending quantum threats. Fostering collaboration will lead to comprehensive approaches that integrate various perspectives and concerns.
        2. Invest in Education and Awareness: Provide ongoing training and resources for key personnel to understand the ramifications of Q-Day and the critical need for transitioning to quantum-safe algorithms. Building awareness within the organization will enable everyone to contribute to a culture of security.
        3. Set Clear Milestones for Transition: Develop a roadmap that outlines clear action items, timelines and responsibilities for upgrading cryptographic systems. This structured approach will help organizations remain accountable and focused on their transition efforts.
        4. Engage with Cryptographic Providers: Partner with leading cryptographic solution providers that are actively researching and developing tools for quantum resilience. These partnerships can assist organizations in navigating the complexities of the transition toward quantum-safe infrastructures.

        As we stand on the brink of a new era in computing, it is imperative for enterprises to take proactive measures today to prepare for Q-Day. By evaluating current cryptographic practices, implementing a CBOM framework and communicating the importance of risk mitigation, businesses can enhance their security posture and ensure resilience in the face of emerging quantum threats. The time to act is now—organizations must lay the groundwork for a future where quantum resilience is not merely an option but an essential component of their cybersecurity strategy.

        Regards,

        Jeff Orr

        Jeff Orr
        Director of Research, Digital Technology

        Jeff Orr leads the research and advisory for the CIO and digital technology expertise at ISG Software Research, with a focus on modernization and transformation for IT. Jeff’s coverage spans cloud computing, DevOps and platforms, digital security, intelligent automation, ITOps and service management, intelligent automation and observation technologies across the enterprise.

        JOIN OUR COMMUNITY

        Our Analyst Perspective Policy

        • Ventana Research’s Analyst Perspectives are fact-based analysis and guidance on business, industry and technology vendor trends. Each Analyst Perspective presents the view of the analyst who is an established subject matter expert on new developments, business and technology trends, findings from our research, or best practice insights.

          Each is prepared and reviewed in accordance with Ventana Research’s strict standards for accuracy and objectivity and reviewed to ensure it delivers reliable and actionable insights. It is reviewed and edited by research management and is approved by the Chief Research Officer; no individual or organization outside of Ventana Research reviews any Analyst Perspective before it is published. If you have any issue with an Analyst Perspective, please email them to ChiefResearchOfficer@isg-research.net

        View Policy

        Subscribe to Email Updates



        Analyst Perspectives Archive

        See All