09/22/2025 | Press release | Distributed by Public on 09/22/2025 07:09
CISOs possess a wide range of skill sets, but there are two in which we have been conditioned to excel. First, we're adept at understanding genuine risks that can impact our organizations. We are all used to assessing and navigating the risks posed by rapid digital transformation, the adoption of AI, the increasing attack surface, threat actors, and ransomware. Second, we're skilled at seeing through the latest overhyped issues and bandwagon-jumping technologies with the promise to fix all your problems that in actuality burn valuable cycles.
On the horizon is a topic that many CISOs struggle to quantify and accept as a risk: the incredibly complex and potentially disruptive technology of quantum computing. This technology promises revolutionary breakthroughs in science and industry, but at the same time, it also presents profound cybersecurity risks because of its potential to break today's encryption capabilities.
This begs the question: Why is this not triggering the alarm bells for CISOs?
Three reasons come to mind:
The reality, though, is that post-quantum world planning needs to begin now.
What Is Quantum Computing, and How Does it Impact Cybersecurity?
Quantum computing leverages the principles of quantum mechanics, such as superposition and entanglement, to perform computations exponentially faster than classical computers.
In practical terms, this means that quantum computers can perform multiple calculations simultaneously which could, in the future, solve problems in seconds that would normally take traditional systems centuries.
This is good news for computational modeling, which is used in various activities, including pharmaceutical drug discovery, logistics, financial modeling, and research and development. But for the cybersecurity industry, quantum computers have the potential to break the encryption algorithms that secure today's digital infrastructure.
The Quantum Threat: Breaking Public Key Cryptography
The core risk of quantum computing lies in its potential to break the cryptographywe use to protect many types of data, such as:
A sufficiently powerful quantum computer running Shor's algorithm could break the underlying algorithms like Rivest-Shamir-Adleman (RSA), Elliptic Curve Cryptography (ECC), and Diffie-Hellman (DH), rendering most existing secure communications vulnerable to decryption.
This isn't a theoretical risk-major nation-states and technology giants are investing billions in quantum computing. What is harder to prove are claims, such as the one made by Robert Hannigan, former director of the Government Communications Headquarters, that data is being harvested for later decryption once quantum computer power becomes a reality.
There are definitely unusual incidents that suggest it could be happening:
While there is no smoking gun here, these incidents pose real and growing concerns, especially for organizations with long-term data confidentiality requirements, as well as regulated industries and any business that stores intellectual property or personally identifiable information.
What Should CISOs Be Doing Today?
While organizations should absolutely be aware of and educated about quantum computing, there is no need to panic. A quantum computer capable of factoring RSA-2048 is thought by experts to be optimistically between eight and 15 years from viability.
That may sound distant-until you consider:
Preparing for Tomorrow's Quantum Computing Challenges Today
Although quantum computers capable of breaking encryption are realistically still years away, security leaders cannot afford to wait. Strategic preparation must begin now. Here are three steps organizations should take now to prepare for the post-quantum reality:
1. Understand your cryptographic assets
Start with a crypto-agility assessment. Inventory where and how cryptography is used across your systems, including:
Gaining this visibility is essential for crypto-agility and planning for future migrations to quantum-safe alternatives.
2. Engage with vendors early
Seek out vendors who proactively implement post-quantum cryptography, as this will become a critical trust differentiator as quantum computing technology advances. It's encouraging to see that many hardware and software vendors are beginning to offer quantum-resistant options or are at least sharing roadmaps for related offerings that they plan to develop.
Engage your vendors in discussions with questions like:
Make PQC support part of your procurement and vendor risk assessment criteria.
3. Educate your leadership and board of directors
Communicate the strategic nature of the quantum threat to executive leadership and the board. This isn't fearmongering; it's about managing a long-term, high-impact risk with potential multi-year mitigation requirements to ensure that these stakeholders understand:
Use this as an opportunity to align your organization's cybersecurity program more closely with the company's technology and innovation strategies.
Prepare. Don't Panic.
Quantum computing won't break your encryption tomorrow. But the steps you take today will determine your future resilience. As CISO, your role is to lead your organization toward quantum readinesswith a clear understanding of the threat, a roadmap for adopting post-quantum solutions, and a commitment to crypto-agility.
The quantum era is coming. Security leaders who prepare now will future-proof their defenses, while others will be stuck playing catch-up.
Learn more about how Fortinet can support you in your quantum computing journey with a post-quantum cryptography-enabled solution today.
References:
1 "Experts detailed how China Telecom used BGP hijacking to redirect traffic worldwide," Cyberdefense Magazine, November 12, 2018,https://www.cyberdefensemagazine.com/experts-detailed-how-china-telecom-used-bgp-hijacking-to-redirect-traffic-worldwide/
2 "Russian telco hijacks internet traffic for Google, AWS, Cloudflare, and others,"April 5, 2020,https://www.zdnet.com/article/russian-telco-hijacks-internet-traffic-for-google-aws-cloudflare-and-others/
3 "Undersea Internet Cables: Vulnerabilities and Espionage Risks for U.S. Security?," August 12, 2025, https://www.archyde.com/undersea-internet-cables-vulnerabilities-and-espionage-risks-for-u-s-security/#espionage-risks-tapping-into-the-data-stream