Episode 11: Quantum Computing
The threat and arrival of quantum computers is ever-present with physics breakthroughs, more Qubits, quantum “supremacy”, and cloud service providers designing quantum computers, but what does it really mean to data protection? Is it really the end of encryption as we know it?
In Episode 11 of the Thales Security Sessions, host Neira Jones is joined by Mike Brown, CTO at Isara, and Michael Gardiner, Solution Architect at Thales, to discuss the ways in which quantum computing will change the technology landscape, and how organizations can deal with the potential security threats that quantum brings.
Neira advises organisations of all sizes on payments, fintech, regtech, cybercrime, information security, regulations (e.g. PSD2, GDPR, AML) & digital innovation. With more than 20 years in financial services & technology, she believes in change through innovation & partnerships and always strives to demystify the hype surrounding current issues. She enjoys her work as a strategic board advisor and non-executive director. She also provides coaching, training/e-learning, speaking, payment security expert witness services, and helps with M&As cybersecurity due diligence. She likes engaging on social media & regularly addresses global audiences in person or virtually.
She is the 1st Advisory Committee member for PCI-Pal, a global leader in secure payments & chairs the Advisory Board for mobile innovator Ensygnia. She is proud to be an Ambassador for the Emerging Payments Association and a friend of the Global Cyber Alliance. You'll find her on the Refinitiv list of Top 100 Influencers in Financial Services, the Planet Compliance Top 50 RegTech Influencers, the SC Magazine list of the UK's 50 Most Influential Women in Cyber-Security 2019, the Cybersecurity Ventures Women Know Cyber 2019 (100 Fascinating Women Fighting Cybercrime), the Jax Finance Top 20 Social Influencers in Fintech 2017, the City AM Powerful Women in the City List, the Richtopia Top 100 Most Influential People in Fintech. Tripwire nominated her "Top Influencer in Security To Follow on Twitter" in January 2015, CEOWorld Magazine nominated her Top Chief Security Officer to Follow on Twitter in April 2014, she is the Merchant Payments Ecosystem Acquiring Personality of the Year 2013, the SC Magazine Information Security Person of the Year 2012 and is an InfoSecurity Europe Hall of Fame alumni. She was voted to the Top 10 Most Influential People in Information Security by SC Magazine & ISC2 in 2010 & has served on the PCI SSC Board of Advisors for 4 years. She is a British Computer Society Fellow.
Neira has previously worked for Barclaycard, Santander, Abbey National, Oracle Corp. and Unisys. Her clients span industry sectors, including financial services, fintech, retail, legal, consulting, information security & technology.
She loves technology and cars...
Our Guest Speakers
Mike is the CTO and co-founder of ISARA Corporation. He is focused on the technical vision and direction for the company. The ISARA Corporation vision is a world where consumers, enterprises and governments can benefit from the power of quantum computing with protection against quantum attacks.
Previous to ISARA, Mike was the Vice President of Security Product Management and Research at BlackBerry where he co-founded the product security practice and was responsible for the vision and execution of security for all BlackBerry products. Mike has spoken at global security events including RSA, GTEC, Bloomberg, and InfoSec Europe.
He holds a Masters of Mathematics from the University of Waterloo, focusing on cryptography.
Michael Gardiner has worn many hats over his 14 years with SafeNet/Gemalto/Thales. Currently he is the Solution Architect for Data Protection on Demand. In his spare time Michael tends a small orchard and a few colonies of bees.
About this Episode
When was the last time you considered the cryptography in your organization? Perhaps you had to encrypt your data as part of a regulatory requirement, or you voluntarily understood the value of encryption, and deployed it as a safeguard. Encryption is one of those technologies that, once it is implemented, is typically fairly easy to manage, as most organizations use cryptography supplied through a vendor. Key management can be the challenge, but the encryption itself is a low maintenance affair. However, as with all things technological, change is on the horizon.
In the latest episode of the Security Sessions podcasts, we discuss a major breakthrough in the field of quantum computing. Recently, a company named Oxford Quantum Circuits announced that it was offering quantum computing as a service (QCaaS). OQC’s first customer will be their current partner, Cambridge Quantum, who will use the product to demonstrate their IronBridge cybersecurity platform.
It is interesting that one of the first use of commercial quantum computing will be a cybersecurity product. Quantum computing can bring about some great advancements, solving problems that have previously been unsolvable. This can be a huge benefit. However, quantum computing can also challenge some of the safeguards to which we have grown so accustomed, that we now take them for granted; specifically, public-key cryptographic technology.
Quantum computing running Shor’s algorithm has the power to disentangle math problems, which were once considered computationally infeasible. It is predicted that the strongest cryptographic algorithms can be deciphered with Shor’s algorithm running on a large enough quantum computer. Is this a cause for concern, or are we sounding a premature tocsin?
On the one hand, we should be very concerned, especially when we consider the scale at which we use cryptography. Whether it is the lowest level of protocols that we use, to the highest levels of authentication, cryptography is so prevalent, and seamless, as to be invisible to the average person. Yet, on the other hand, the destruction of public-key cryptography is not on the immediate horizon. That is, we have time to work on a solution, but that time is fairly short when plotted against a product with a long-term lifespan.
One example of such a long-term product that uses current public-key cryptography is the automobile. The amount of time that it takes from when a car is first engineered, then built, sold, and finally retired, can be up to 20 years. Considering that a car is now essentially software on wheels, coupled with the idea that current public-key cryptography may be undone in as little as 10 years, this shows the need for careful foresight. Everything from code-signing the vehicle control software, to the keyless entry and ignition mechanisms, all rely on the same algorithms that could be neutered while the cars are still on the road.
We have an excellent opportunity to prepare, but are we equipped to do so, and is the rest of the security community aware of how fast this future opportunity will become a present reality? The good news about this harbinger of the future is that, unlike the inaccurate doomsday predictions of the Year 2000 bug, there is time to prepare, without the panic scenarios.
This does not imply that this preparation will be easy. Consider first, the often arduous task of any inventory of digital assets in an organization. If an organization is to fully prepare for the quantum evolution, cryptography must also be added to that inventory. This reaches into the realm of risk management, as the value of the cryptography must be added to the organizational risk register, and the process must be worked into a strategic vision for the software development lifecycle as well. As with all things in security, preparation is the first step.
Another step towards anticipating the change is to shorten the lifespan of various systems that use cryptography. For example, digital identity expirations are often set in long intervals. Setting a shorter time for renewal can ease the burden as new cryptographic technologies emerge. Also, the hardware lifespan of many systems can also be planned, not just to achieve the benefits of a tech refresh, but to also include the predicted cryptographic developments.
Just as quantum computing presents a threat to cryptography, it can also usher in a new era of even stronger cryptographic solutions. However, a wise security professional will not await that development, and it may be projected that neither will lawmakers. As an extension of the new developments of cryptography which will be brought about through quantum computing, we should also expect that new regulations will transpire that address these changes.
With the announcement by OQC, it is clear that, even if quantum computing is not fully realized, it is closer than many had forecasted. This is the next evolution in digital transformation, and not only will it help up to leap forward in unpredictable ways, it will bring some challenges to address with our existing technologies.
Security Sessions Podcast
For the latest on cloud & data security
This podcast series explores the technologies, people, and processes behind information security. We’ll delve into topics like data security, remote access and digital transformation, as well as the people and technology that make it all work behind the scenes. We’ll speak to Thales and industry experts to bring you fresh perspectives on how to navigate the world of cloud security.
We invite you to subscribe to Security Sessions, a podcast bringing you insights from industry experts on the latest cloud & data security news and trends.
Listen to Previous Podcasts
Episode 1: Real Threats for Real People – What has the pandemic taught us?
Are businesses being forced into digital transformation too quickly and therefore cutting corners? How to businesses adapt to the changing threat vectors as more valuable data gets pushed further out into the infrastructure due to remote working? These are some of the questions we are exploring with guests Rick Robinson and Todd Moore.
Episode 2: More digital, more risk: where is the trust?
More digital, means more ecommerce, more digital payments, more financial fraud and cybercrime and ultimately more risk. Many organisations within the payment sector are being pushed into digitisation more quickly as they move to operate online to keep cash flow – without doing necessary due diligence on the best solution or vendor and with security not really on their agenda. These are some of the issues we are exploring with guests Arthur van der Merwe and Simon Keates.
Episode 3: Do you know who I am? The digital identity challenge
More digital also means more interactions where the various parties are interacting without knowing each other. This is linked to the much needed focus on digital identity, IAM, CIAM, authentication, behavioural analytics. Has the pandemic forced people’s perception of digital identity to change as they have been forced to accept the digital transformation in their own lives? Our host Neira Jones discussed this topic with guests Sundaram Lakshmanan and Francois Lasnier.
Episode 4: Time for the crystal ball – What to expect in 2021
In this episode we are looking ahead at what we can expect in 2021 and reviewing how 2020’s remote working, separation from family and teams have changed us. Have a listen to some of the interesting insights from Neira’s guests, Troels Oerting, Chairman of the Board of the World Economic Forum’s Centre for Cybersecurity (C4C) and Ashvin Kamaraju, CTO and Vice President Engineering at Thales Cloud Protection & Licensing.
Episode 5: The Challenges of Digital Transformation
Many businesses have been forced to accelerate their digital transformation strategies due to the pandemic and doing it successfully has become a major challenge. What do organisations do to transform their infrastructure to where it needs to be from a technology standpoint? The new threats are here to stay – so what is the best DX practice from a technology point of view? How do you focus on the technology process and preservation of your infrastructure?
Episode 6: Data Beyond Borders: The Schrems II Aftermath
Are the current rules and regulations for securing information and maintaining privacy fit for purpose when you think about the future? Do you think work and lifestyle changes brought about by Covid-19 will have a regulatory impact that we need to plan for? Neira discusses these questions with Enza Iannopollo, Senior Analyst at Forrester and Thales’ own Mukesh Chandak, Business Development Director.
Episode 7: More digital, more cloud: To trust or not to trust
More digital will mean more cloud. Now in the second year, the Covid-19 coronavirus pandemic has prompted an acceleration in the adoption of cloud technologies by IT leaders worldwide, which looks set to continue for the foreseeable future. Previously organizations have primarily looked at new application development and deployment for cloud, taking a ‘cloud first’ approach. However many have now pivoted towards a ‘cloud now’ approach. In this two-part episode Neira talks to Chris Harris, EMEA Technical Director at Thales and Vaughn Stewart, VP of Technology Alliance Partners, Pure Storage.
Episode 8: 5G – With Great Power, Comes Great Responsibility
5G is poised to change how digital technology-based solutions are delivered and consumed across different industry verticals by connecting people and devices using high quality services whenever wherever. In this episode Neira is joined by Prashant Deo, Senior Information Security Consultant at Tata Consultancy Services and Chen Arbel, Vice President Business Development, 5G & Cloud Security and Thales.
Bonus Episode: The Shift to Passwordless Authentication
Passwordless and FIDO authentication is one of the hottest topics on the radar of identity and access management professionals. While passwordless authentication offers convenience for end users, not all methods offer the same level of protection. In this special bonus edition podcast, Garrett Bekker, principal cybersecurity analyst at from 451 Research and Asaf Lerner, Director of Product Management at Thales discuss the merits and various angles of moving to passwordless.
Episode 9: The 2021 Thales Data Threat Report
The shift to remote work and the acceleration of the shift to cloud-based infrastructure have profoundly impacted security teams. With the security risks and threats that these changes pose, most organizations have some work to do to improve their security posture, according to the new 2021 Thales Data Threat Report. In this episode, Neira Jones is joined by Todd Moore, VP Encryption Products at Thales, to talk through the key findings of the report. They’ll take a look back at the key trends seen in 2020 and the impacts of the pandemic that have carried over into 2021.
Episode 10: IoT Security Trends
Organizations have only just begun discovering and benefiting from the opportunities provided by the Internet of Things. The ability to capture and analyze data from distributed connected devices offers the potential to optimize processes, create new revenue streams, and improve customer service. However, the IoT also exposes organizations to new security vulnerabilities introduced by increased network connectivity and devices that are not secured by design. And advanced attackers have demonstrated the ability to pivot to other systems by leveraging vulnerabilities in IoT devices. For this episode, host Neira Jones is joined by Ellen Boehm, VP, IoT Strategy and Operations at Keyfactor, and Paul Hampton, Senior Product Manager at Thales.
Episode 11: Quantum Computing
The threat and arrival of quantum computers is ever-present with physics breakthroughs, more Qubits, quantum “supremacy”, and cloud service providers designing quantum computers, but what does it really mean to data protection? Is it really the end of encryption as we know it? In Episode 11 of the Thales Security Sessions, host Neira Jones is joined by Mike Brown, CTO at Isara, and Michael Gardiner, Solution Architect at Thales, to discuss the ways in which quantum computing will change the technology landscape, and how organizations can deal with the potential security threats that quantum brings.
Bonus Episode: Encryption in Quantum Resistant Networks
Network security encompasses the security tools, policies, and techniques used to monitor, prevent, and respond to unauthorized network access. Having such a broad definition and, therefore, challenging approach, it is important that businesses know what key areas to focus on and what enterprise tech solutions they should look to ensure appropriate, airtight protection. Dr. Eric Cole, Founder and CEO of Secure Anchor Consulting, speaks with Julian Fay, CTO at Senetas, a global partner of Thales. The pair explore the primary concerns of network security within the realm of data in motion with the help of key findings from our latest global survey on the encryption of public/private networks.
Bonus Episode: Adopting the Shared Security Management Model
Shared security, also known as shared responsibility, is a cloud security management model that describes the distribution of enterprise data security management and accountability between a company and its cloud service provider(s). The framework essentially enables improved productivity and unparalleled agility, so why isn't every organization adopting it? Dr. Eric continues with Chris Martin at Thales, delving into the main areas of organizational risk concerning cloud migration and vendor native decisions before shedding light on the limitations of a single service provider. The guests then discuss the shared security model - its benefits and the implementation process. Final thoughts centre on what organizations need to understand about control over all users and effectively build a best practice shared security strategy.
Episode 12: Building a Trusted World for Crypto Payments
Bitcoin and other cryptocurrencies have exploded in value—making them an ever-more attractive target for scammers and hackers. So is cryptocurrency secure? How can businesses and individuals make sure they protect their digital investments? And what are the key security measures that should be implemented to secure the cryptocurrency backend? In this episode, we’ll be exploring the current cryptocurrency landscape, and how we can make a trusted world for crypto payments. Joining our regular host Neira Jones for this episode, we have Nitin Gaur, Director, IBM Financial Sciences and Digital Assets and Krishna Ksheerabdhi, VP Product Marketing, Thales.