Picture
SEARCH
What are you looking for?
Need help finding what you are looking for? Contact Us
Compare

PUBLISHER: IDC | PRODUCT CODE: 1984265

Cover Image

PUBLISHER: IDC | PRODUCT CODE: 1984265

IDC PlanScape: Cybersecurity Preparations to Brace for Q-Day

PUBLISHED:
PAGES: 10 Pages
DELIVERY TIME: 1-2 business days
SELECT AN OPTION
PDF (Single User License)
USD 7500

Add to Cart

"It's a bit of an exaggeration to say that post-quantum security requires fundamentally new cybersecurity teams and processes," says Christopher Tozzi, adjunct research advisor with IDC's IT Executive Programs (IEP). "But it's a gross understatement to assume that nothing needs to change. To prepare for Q-Day, enterprises need to rethink core elements of cybersecurity team structure and operations."

IDC PlanScape figure

Executive summary

Why Are Cybersecurity preparations to brace for Q-Day important?

  • Unauthorized access to sensitive data
  • Unauthorized access to digital systems
  • Insecure network-based data
  • Novel authentication and authorization challenges
  • DDoS attacks on a novel scale

What are SOME cybersecurity preparations to brace for Q-Day?

Who are the key stakeholders?

How can my organization Prepare for Q-Day?

  • Perform quantum-centric risk assessments
  • Create quantum-centric security roles
  • Make quantum security expertise available
  • Expand data privacy toolsets
  • Incorporate quantum security risk monitoring into SOC workflows
  • Meeting quantum security compliance requirements

Advice for technology buyers

Related research

Product Code: US54371526

IDC PlanScape figure

Executive summary

Why Are Cybersecurity preparations to brace for Q-Day important?

  • Unauthorized access to sensitive data
  • Unauthorized access to digital systems
  • Insecure network-based data
  • Novel authentication and authorization challenges
  • DDoS attacks on a novel scale

What are SOME cybersecurity preparations to brace for Q-Day?

Who are the key stakeholders?

How can my organization Prepare for Q-Day?

  • Perform quantum-centric risk assessments
  • Create quantum-centric security roles
  • Make quantum security expertise available
  • Expand data privacy toolsets
  • Incorporate quantum security risk monitoring into SOC workflows
  • Meeting quantum security compliance requirements

Advice for technology buyers

Related research

Have a question?
Picture

Jeroen Van Heghe

Manager - EMEA

+32-2-535-7543

Picture

Christine Sirois

Manager - Americas

+1-860-674-8796

Questions? Please give us a call or visit the contact form.
Hi, how can we help?
Contact us!