<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:spotify="https://www.spotify.com/ns/rss">
  <channel>
    <generator>Fame Host (https://fame.so)</generator>
    <title>Shielded: The Last Line of Cyber Defense</title>
    <link>https://podcasts.fame.so/shielded-the-last-line-of-cyber-defense</link>
    <itunes:new-feed-url>https://feeds.fame.so/shielded-the-last-line-of-cyber-defense</itunes:new-feed-url>
    <description>Shielded: The Last Line of Cyber Defense is your definitive guide to navigating the quantum era of cybersecurity. Hosted by experts from PQShield, a global leader in post-quantum cryptography (PQC), this podcast explores how industries can future-proof their defences against the imminent threat of quantum computing.

Each episode brings you actionable insights, real-world case studies, and expert interviews with cryptographers, industry leaders, and policymakers shaping the future of cybersecurity. From demystifying quantum-resistant protocols to addressing compliance challenges and implementation strategies, Shielded moves the conversation from why to how in building a quantum-safe world.

Whether you're a security engineer, IT professional, or business decision-maker, Shielded arms you with the knowledge and tools to stay ahead of the curve in securing your data. Join us as we decode the challenges of quantum readiness, foster collaborative solutions, and inspire confidence in a safer digital future.

Subscribe now to stay updated on the latest trends, standards, and breakthroughs in quantum-resilient cybersecurity.</description>
    <copyright>Copyrights © 2024 All Rights Reserved by PQShield</copyright>
    <language>en</language>
    <pubDate>Thu, 05 Dec 2024 09:39:38 +0000</pubDate>
    <lastBuildDate>Sat, 14 Mar 2026 10:04:28 +0000</lastBuildDate>
    <image>
      <url>https://content.fameapp.so/uploads/8l18kymq/7567b4f0-03db-11f0-aacf-556047cf795b/7567b600-03db-11f0-9bb6-b576fcb38635.png</url>
      <title>Shielded: The Last Line of Cyber Defense</title>
      <link>https://podcasts.fame.so/shielded-the-last-line-of-cyber-defense</link>
      <description>Shielded: The Last Line of Cyber Defense is your definitive guide to navigating the quantum era of cybersecurity. Hosted by experts from PQShield, a global leader in post-quantum cryptography (PQC), this podcast explores how industries can future-proof their defences against the imminent threat of quantum computing.

Each episode brings you actionable insights, real-world case studies, and expert interviews with cryptographers, industry leaders, and policymakers shaping the future of cybersecurity. From demystifying quantum-resistant protocols to addressing compliance challenges and implementation strategies, Shielded moves the conversation from why to how in building a quantum-safe world.

Whether you're a security engineer, IT professional, or business decision-maker, Shielded arms you with the knowledge and tools to stay ahead of the curve in securing your data. Join us as we decode the challenges of quantum readiness, foster collaborative solutions, and inspire confidence in a safer digital future.

Subscribe now to stay updated on the latest trends, standards, and breakthroughs in quantum-resilient cybersecurity.</description>
    </image>
    <googleplay:author>PQShield</googleplay:author>
    <googleplay:image href="https://content.fameapp.so/uploads/8l18kymq/7567b4f0-03db-11f0-aacf-556047cf795b/7567b600-03db-11f0-9bb6-b576fcb38635.png"/>
    <itunes:category text="News">
      <itunes:category text="Tech News"/>
    </itunes:category>
    <itunes:category text="Business"/>
    <itunes:category text="Technology"/>
    <googleplay:summary>Shielded: The Last Line of Cyber Defense is your definitive guide to navigating the quantum era of cybersecurity. Hosted by experts from PQShield, a global leader in post-quantum cryptography (PQC), this podcast explores how industries can future-proof their defences against the imminent threat of quantum computing.

Each episode brings you actionable insights, real-world case studies, and expert interviews with cryptographers, industry leaders, and policymakers shaping the future of cybersecurity. From demystifying quantum-resistant protocols to addressing compliance challenges and implementation strategies, Shielded moves the conversation from why to how in building a quantum-safe world.

Whether you're a security engineer, IT professional, or business decision-maker, Shielded arms you with the knowledge and tools to stay ahead of the curve in securing your data. Join us as we decode the challenges of quantum readiness, foster collaborative solutions, and inspire confidence in a safer digital future.

Subscribe now to stay updated on the latest trends, standards, and breakthroughs in quantum-resilient cybersecurity.</googleplay:summary>
    <googleplay:explicit>No</googleplay:explicit>
    <googleplay:block>No</googleplay:block>
    <itunes:type>episodic</itunes:type>
    <itunes:author>PQShield</itunes:author>
    <itunes:image href="https://content.fameapp.so/uploads/8l18kymq/7567b4f0-03db-11f0-aacf-556047cf795b/7567b600-03db-11f0-9bb6-b576fcb38635.png"/>
    <itunes:summary>Shielded: The Last Line of Cyber Defense is your definitive guide to navigating the quantum era of cybersecurity. Hosted by experts from PQShield, a global leader in post-quantum cryptography (PQC), this podcast explores how industries can future-proof their defences against the imminent threat of quantum computing.

Each episode brings you actionable insights, real-world case studies, and expert interviews with cryptographers, industry leaders, and policymakers shaping the future of cybersecurity. From demystifying quantum-resistant protocols to addressing compliance challenges and implementation strategies, Shielded moves the conversation from why to how in building a quantum-safe world.

Whether you're a security engineer, IT professional, or business decision-maker, Shielded arms you with the knowledge and tools to stay ahead of the curve in securing your data. Join us as we decode the challenges of quantum readiness, foster collaborative solutions, and inspire confidence in a safer digital future.

Subscribe now to stay updated on the latest trends, standards, and breakthroughs in quantum-resilient cybersecurity.</itunes:summary>
    <itunes:subtitle>Shielded: The Last Line of Cyber Defense is your definitive guide to navigating the quantum era of cybersecurity. Hosted by experts from PQShield, a global leader in post-quantum cryptography (PQC), this podcast explores how industries can future-proof their defences against the imminent threat of quantum computing.

Each episode brings you actionable insights, real-world case studies, and expert interviews with cryptographers, industry leaders, and policymakers shaping the future of cybersecurity. From demystifying quantum-resistant protocols to addressing compliance challenges and implementation strategies, Shielded moves the conversation from why to how in building a quantum-safe world.

Whether you're a security engineer, IT professional, or business decision-maker, Shielded arms you with the knowledge and tools to stay ahead of the curve in securing your data. Join us as we decode the challenges of quantum readiness, foster collaborative solutions, and inspire confidence in a safer digital future.

Subscribe now to stay updated on the latest trends, standards, and breakthroughs in quantum-resilient cybersecurity.</itunes:subtitle>
    <itunes:keywords>Post-Quantum Cryptography, Quantum-Ready Security, Cybersecurity Innovation, Quantum Threat Mitigation, PQC Implementation, Quantum-Safe Standards, Compliance and Data Protection</itunes:keywords>
    <itunes:owner>
      <itunes:name>Cath Firmin</itunes:name>
      <itunes:email>team@fame.so</itunes:email>
    </itunes:owner>
    <itunes:complete>No</itunes:complete>
    <itunes:explicit>No</itunes:explicit>
    <itunes:block>No</itunes:block>
    <item>
      <title>Why AI is accelerating both attackers and defenders: From MWC Barcelona</title>
      <link>https://podcasts.fame.so/e/v85jk5mn-why-ai-is-accelerating-both-attackers-and-defenders-from-mwc-barcelona</link>
      <itunes:title>Why AI is accelerating both attackers and defenders: From MWC Barcelona</itunes:title>
      <itunes:episode>29</itunes:episode>
      <itunes:season>1</itunes:season>
      <itunes:block>No</itunes:block>
      <googleplay:block>No</googleplay:block>
      <guid isPermaLink="false">81q3rqz1</guid>
      <description>Artificial intelligence is reshaping cybersecurity on both sides of the battlefield. In this episode of Shielded: The Last Line of Cyber Defense, host Jo Lintzen speaks with two experts at Mobile World Conference in Barcelona. Amidst the buzz of the industry being in one place, they discuss the security landscape in the AI era. The guests are working at different layers; Geri Revay, Principal Security Researcher at Fortinet’s FortiGuard Labs, explains how cybercrime has evolved into a structured ecosystem where attackers specialize in different roles and services. Later in the episode, Haon Park, Co-Founder and CTO of AIM Intelligence, focuses on the emerging risks around AI systems themselves. As organizations rapidly deploy AI models, agents, and autonomous technologies, these systems introduce an entirely new category of attack surface.  Together, the conversation highlights a critical shift in the security landscape. Attackers are moving faster through automation and specialization, while defenders must adapt to new forms of risk created by the technologies they are deploying.</description>
      <content:encoded><![CDATA[<div>Cybersecurity threats have evolved significantly from the early days of individual hackers experimenting independently. In their conversation at Mobile World Conference 2026, Geri Revay explains how cybercrime has matured into a structured and profitable ecosystem that resembles a business supply chain. Instead of one attacker performing every step of an intrusion, the work is now divided across specialized groups. Some actors focus on gaining initial access to corporate networks and then sell that access to others. Other groups build ransomware tools, while separate teams manage ransom negotiations or distribute stolen data.<br><br></div><div><br>This division of labor dramatically lowers the barrier to entry for cybercriminals. Attackers no longer need deep technical expertise to carry out an operation. Many tools and services can now be purchased directly from underground marketplaces. As a result, cybercrime has become more opportunistic, more scalable, and more accessible than it was even a few years ago.<br><br></div><div><br>However, defenders also have access to AI driven capabilities. Security teams already collect enormous amounts of telemetry through logs, network monitoring, and endpoint detection tools. AI systems can analyze this data to detect anomalies, identify emerging threats, and automate parts of the defensive workflow. Over time, this access to large datasets may give defenders a strategic advantage.<br><br></div><div><br>The conversation also explores how cybersecurity challenges differ between traditional IT environments and operational technology environments. Industrial systems often prioritize operational availability and safety above all else. Many devices run for decades and cannot easily be patched or modified. This creates a different security model where monitoring, segmentation, and deception technologies play a more important role than frequent system updates.<br><br></div><div><br>Haon’s work focuses on automated AI red teaming. Instead of relying only on human testers, AI driven attacker agents can simulate thousands of potential attacks against an AI model or service. This allows organizations to identify vulnerabilities earlier and test whether guardrails and policies are functioning correctly.<br><br></div><div><br>One of the most significant emerging risks involves physical AI systems. Autonomous vehicles, drones, and robotics rely on multimodal inputs such as images, audio, and sensor data to interpret their environment. If attackers manipulate these inputs, they may influence how the system behaves. As AI systems move from digital environments into the physical world, the consequences of security failures could extend beyond data breaches and into real world harm.<br><br></div><div><br>Across both conversations, a consistent theme emerges. The cybersecurity landscape is expanding in both scale and complexity. Attackers are accelerating their operations through automation and specialization, while defenders must also learn how to secure the new technologies they are building. Organizations that fail to address AI related risks early may discover vulnerabilities that traditional security frameworks were never designed to handle.<br><br></div><div><strong><br>What You’ll Learn:<br></strong><br></div><ul><li>How cybercrime evolved from individual hackers to a structured ecosystem</li><li>Why ransomware services and access brokers lowered the barrier to entry for attackers</li><li>How artificial intelligence accelerates cyber attacks and defensive analysis</li><li>Why defenders may gain long term advantages through data and telemetry</li><li>How operational technology environments create unique security challenges</li><li>Why enterprise AI systems introduce a new category of attack surface</li><li>How automated AI red teaming identifies vulnerabilities faster than manual testing</li><li>Why physical AI systems may create the next major cybersecurity risk<br><br></li></ul><div><strong><br>Your Roadmap to Understanding the Next Phase of Cybersecurity<br></strong><br></div><div><strong><br>[07:12] Step 1: Cybercrime Has Become a Supply Chain<br></strong><br></div><div><br>Cybercrime has evolved from isolated attackers into a structured ecosystem. Initial access brokers focus on gaining entry into networks and selling that access. Ransomware developers create tools and services. Other groups handle negotiations and payment collection. Individuals no longer need to build tools or conduct complex research themselves. They can purchase the components they need and focus only on one stage of the attack chain. As a result, cybercrime has become more scalable and more opportunistic.<br><br></div><div><br>Key Question: If cybercrime now operates like a supply chain, are organizations preparing for attacks that can be launched faster and at greater scale?<br><br></div><div><strong><br>[08:03] Step 2: AI Is Accelerating the Speed of Attacks<br></strong><br></div><div><br>Artificial intelligence allows attackers to automate tasks that previously required time and expertise. The result is not necessarily more sophisticated attacks, but faster ones. AI enables threat actors to iterate quickly and scale their operations. This speed advantage allows attackers to experiment and adapt before defenders have time to respond.<br><br></div><div><br>Key Question: If attackers can move faster with AI, how quickly can your security teams detect and respond?<br><br></div><div><strong><br>[10:34] Step 3: Data Gives Defenders a Long Term Advantage<br></strong><br></div><div><br>While AI gives attackers speed, defenders may hold the long term advantage because of data. Security operations centers collect vast volumes of telemetry from networks, endpoints, and infrastructure. This data provides the foundation for AI driven detection and analysis. When AI systems analyze behavioral patterns across these datasets, they can identify anomalies and emerging threats earlier than manual processes. Over time, this combination of large scale telemetry and AI driven analysis may strengthen defensive capabilities.<br><br></div><div><br>Key Question: Are organizations using the data they collect to strengthen detection, or simply storing it without extracting insight?<br><br></div><div><strong><br>[15:31] Step 4: Operational Technology Requires a Different Security Approach<br></strong><br></div><div><br>Industrial and operational technology environments operate under different priorities than traditional IT systems. Many devices run for decades and cannot be patched frequently. Because of this, security teams must rely on monitoring, segmentation, and deception techniques rather than constant updates. Security practices that work in IT environments often require significant adaptation in OT systems.<br><br></div><div><br>Key Question: Are security strategies designed specifically for operational technology environments, or are IT security practices being applied without adjustment?<br><br></div><div><strong><br>[39:55] Step 5: AI Systems Introduce a New Category of Risk<br></strong><br></div><div><br>As enterprises deploy AI systems across their operations, these systems introduce new attack surfaces. AI models may have access to internal company data, business processes, and automated workflows. If attackers manipulate inputs or exploit vulnerabilities, they may influence how these systems behave. AI systems can affect business decisions, automate internal processes, and interact with users. Without proper guardrails and testing, vulnerabilities in these systems may lead to operational or reputational damage.<br><br></div><div><br>Key Question: How are organizations validating the security of AI systems before deploying them at scale?<br><br></div><div><strong><br>[57:09] Step 6: Physical AI May Be the Next Major Security Incident<br></strong><br></div><div><br>The next phase of AI deployment will involve physical systems such as autonomous vehicles, drones, and robotics. These systems rely on multimodal inputs such as visual data, audio signals, and sensor information to interpret their environment. If attackers manipulate these inputs, they may influence how the system behaves. Unlike traditional cybersecurity incidents, failures in physical AI systems could result in real world harm. As AI becomes embedded in physical infrastructure, cybersecurity risks may extend beyond digital environments.<br><br></div><div><br>Key Question: Are organizations preparing for security risks that affect both digital systems and the physical world?<br><br></div><div><strong><br>Episode Resources:<br></strong><br></div><ul><li>Geri Revay on <a href="https://www.linkedin.com/in/gergelyrevay/">LinkedIn</a></li><li>Fortinet <a href="https://www.fortinet.com">Website</a></li><li>Haon Park on <a href="https://www.linkedin.com/in/haonpark/">LinkedIn</a></li><li>AIM Intelligence <a href="https://aim-intelligence.com/en">Website</a></li><li>Johannes Lintzen on <a href="https://www.linkedin.com/in/jolintzen/">LinkedIn</a>&nbsp;</li><li>PQShield <a href="http://www.pqshield.com">Website</a>&nbsp;<br><br></li></ul><div><br></div><div>Shielded: The Last Line of Cyber Defense is handcrafted by our friends over at: <a href="https://www.fame.so/?utm_medium=podcast&amp;utm_source=bcast&amp;utm_campaign=masters-of-community-with-david-spinks?utm_medium=podcast&amp;utm_source=bcast&amp;utm_campaign=fame-client">fame.so</a></div><div><br></div>]]></content:encoded>
      <pubDate>Thu, 12 Mar 2026 11:00:00 +0000</pubDate>
      <author>PQShield</author>
      <enclosure url="https://media.fame.so/wvykp4x8.mp3" length="146462301" type="audio/mpeg"/>
      <itunes:author>PQShield</itunes:author>
      <itunes:image href="https://content.fameapp.so/uploads/8l18kymq/6c315900-1d57-11f1-a009-d1d0f04f6840/6c315a00-1d57-11f1-815b-373ffe3d69d7.png"/>
      <itunes:duration>3661</itunes:duration>
      <itunes:summary>Artificial intelligence is reshaping cybersecurity on both sides of the battlefield. In this episode of Shielded: The Last Line of Cyber Defense, host Jo Lintzen speaks with two experts at Mobile World Conference in Barcelona. Amidst the buzz of the industry being in one place, they discuss the security landscape in the AI era. The guests are working at different layers; Geri Revay, Principal Security Researcher at Fortinet’s FortiGuard Labs, explains how cybercrime has evolved into a structured ecosystem where attackers specialize in different roles and services. Later in the episode, Haon Park, Co-Founder and CTO of AIM Intelligence, focuses on the emerging risks around AI systems themselves. As organizations rapidly deploy AI models, agents, and autonomous technologies, these systems introduce an entirely new category of attack surface.  Together, the conversation highlights a critical shift in the security landscape. Attackers are moving faster through automation and specialization, while defenders must adapt to new forms of risk created by the technologies they are deploying.</itunes:summary>
      <itunes:subtitle>Artificial intelligence is reshaping cybersecurity on both sides of the battlefield. In this episode of Shielded: The Last Line of Cyber Defense, host Jo Lintzen speaks with two experts at Mobile World Conference in Barcelona. Amidst the buzz of the industry being in one place, they discuss the security landscape in the AI era. The guests are working at different layers; Geri Revay, Principal Security Researcher at Fortinet’s FortiGuard Labs, explains how cybercrime has evolved into a structured ecosystem where attackers specialize in different roles and services. Later in the episode, Haon Park, Co-Founder and CTO of AIM Intelligence, focuses on the emerging risks around AI systems themselves. As organizations rapidly deploy AI models, agents, and autonomous technologies, these systems introduce an entirely new category of attack surface.  Together, the conversation highlights a critical shift in the security landscape. Attackers are moving faster through automation and specialization, while defenders must adapt to new forms of risk created by the technologies they are deploying.</itunes:subtitle>
      <itunes:keywords/>
      <itunes:explicit>No</itunes:explicit>
      <googleplay:explicit>No</googleplay:explicit>
    </item>
    <item>
      <title>Your Inventory Dashboard is Not a Migration Strategy</title>
      <link>https://podcasts.fame.so/e/rnkl1rq8-your-inventory-dashboard-is-not-a-migration-strategy</link>
      <itunes:title>Your Inventory Dashboard is Not a Migration Strategy</itunes:title>
      <itunes:episode>28</itunes:episode>
      <itunes:season>1</itunes:season>
      <itunes:block>No</itunes:block>
      <googleplay:block>No</googleplay:block>
      <guid isPermaLink="false">70wj5nq1</guid>
      <description>Post-quantum cryptography is often framed as an algorithm selection problem. Stefan Kölbl reframes it as something else entirely: a key management and lifecycle discipline challenge.

In this episode of Shielded: The Last Line of Cyber Defense, host Jo Lintzen speaks with Stefan, an information security engineer at Google, about what it actually takes to migrate cryptography across complex global systems at scale.

They explore why Store Now, Decrypt Later is treated as a real threat inside Google, why hybrid deployments were justified before final NIST standards, and why inventory dashboards alone won’t get organizations across the finish line. The real work, Stefan explains, lies in crypto agility, automated key rotation, lifecycle ownership, and safe-by-default developer frameworks.</description>
      <content:encoded><![CDATA[<div>Post-quantum cryptography migration is not primarily about choosing Kyber or ML-KEM. It is about whether your organization can rotate keys, abstract cryptography away from developers, and adapt under pressure. In this episode, Stefan Kölbl shares an operator-level perspective from inside Google’s PQC rollout, including early hybrid deployments that predated final NIST standards.<br><br></div><div><br>He explains why encryption in transit was prioritized, why signing remains harder than key exchange, and how Store Now, Decrypt Later risk justified early action.<br><br></div><div><br>The discussion moves beyond theory into operational friction: cache misses triggered by heap allocation behavior, lifecycle blind spots revealed by inventory tools, and the difficulty of prioritizing thousands of signing keys without ownership context.<br><br></div><div><br>Stefan’s core message is simple but powerful: PQC is not a one-time upgrade. It is an opportunity to fix key management. Organizations that treat migration as an agility exercise rather than an algorithm swap, will be the ones able to adapt when standards evolve again.<br><br></div><div>What You’ll Learn<br><br></div><ul><li>What it really takes to operationalize post-quantum cryptography at hyperscale</li></ul><div><br></div><ul><li>Why PQC is fundamentally a key management and lifecycle problem</li></ul><div><br></div><ul><li>How crypto agility reduces friction during algorithm transitions</li></ul><div><br></div><ul><li>Why Store Now, Decrypt Later justified early hybrid deployment</li></ul><div><br></div><ul><li>How Google approached PQC before final NIST standards were published</li></ul><div><br></div><ul><li>Why encryption in transit is easier to migrate than signing</li></ul><div><br></div><ul><li>Where firmware signatures and hardware-bound keys create long-term risk</li></ul><div><br></div><ul><li>Why inventory dashboards alone cannot drive prioritization</li></ul><div><br></div><ul><li>How lifecycle context determines what to fix first</li></ul><div><br></div><ul><li>What performance surprises can emerge during large-scale PQC rollout<br><br></li></ul><div><br></div><div>About Stefan Kölbl<br><br></div><div><br>Stefan Kölbl is an Information Security Engineer at Google, where he has been deeply involved in the company’s internal post-quantum cryptography rollout. His work spans early hybrid deployments, encryption-in-transit migration, key lifecycle management, and performance validation at hyperscale.<br><br></div><div><br>Stefan brings an operator-level perspective to quantum-safe migration, focusing on crypto agility, secure-by-default developer frameworks, and scalable key management architecture. His experience includes navigating PQC implementation prior to final NIST standardization and addressing real-world constraints such as signing lifecycles, hardware-bound keys, and system-level performance interactions.<br><br></div><div><strong><br>Your Roadmap to Post-Quantum Agility</strong></div><div><strong><br>[00:02:28] Step 1: Shift the Focus From Algorithms to Key Rotation</strong></div><div><br>Stefan reframes the PQC conversation. Updating code can be abstracted. Libraries and APIs can shield most developers from algorithm changes. The real operational challenge lies in key material. If you cannot rotate keys cleanly, you cannot switch algorithms cleanly.<br><br></div><div><br>Poor key management surfaces quickly under PQC pressure. Migration becomes difficult not because the math is hard, but because lifecycle ownership was unclear. Crypto agility, in practice, means being able to rotate without disruption.<br><br></div><div><br>Key Question: If you needed to rotate every key today, how much friction would you encounter?<br><br></div><div><strong><br>[00:04:41] Step 2: Treat PQC as a Security Hygiene Upgrade</strong></div><div><br>Stefan emphasizes that PQC should not be framed as a one-off cryptographic event. It is a forcing function. Organizations already thinking about PQC have an opportunity to improve rotation practices, lifecycle tracking, and resilience more broadly. If you use this moment to institutionalize automated, reliable key rotation, you strengthen your posture against future threats beyond quantum.<br><br></div><div><br>Key Question: Are you treating PQC as a compliance task or a resilience upgrade?<br><br></div><div><strong><br>[00:07:51] Step 3: Accept Store Now, Decrypt Later as a Real Risk</strong></div><div><br>For Google, “Store Now, Decrypt Later” is not a theoretical concern. The possibility that encrypted traffic captured today could be decrypted in the future helped justify early hybrid deployments, even before final NIST standards were published. Prior Chrome experiments provided the confidence to move forward, while hybrid designs ensured that introducing post-quantum mechanisms would not weaken existing security protections.<br><br></div><div><br>Key Question: If encrypted traffic were harvested today, how confident are you in its long-term confidentiality?<br><br></div><div><strong><br>[00:12:49] Step 4: Recognize That Signing Is the Harder Problem<br></strong><br></div><div><br>Encryption in transit is comparatively easier to migrate because protocols like TLS 1.3 already support cryptographic agility, allowing new key exchange mechanisms to be introduced without major system redesign. Signing infrastructure, however, is far more rigid. Firmware signatures, hardware roots of trust, and long-lived devices often rely on keys that are embedded in hardware or tied to decade-long lifecycles. In many cases, these keys cannot be rotated easily and the devices cannot be upgraded after deployment, which makes signing systems the long-tail risk in post-quantum migration.<br><br></div><div><br>Key Question: Which of your signatures are tied to hardware or decade-long lifecycles?<br><br></div><div><strong><br>[00:18:18] Step 5: Inventory Is the Beginning, Not the End</strong></div><div><br>Dashboards provide visibility, but visibility alone does not create prioritization. A list of RSA or ECC signing keys tells you nothing about ownership, business criticality, rotation feasibility, or lifecycle exposure. Without context, inventory becomes paralysis. True progress requires integrating lifecycle intelligence, ownership mapping, and automation.<br><br></div><div><br>Key Question: Does your crypto inventory tell you what to fix first - or just how much you have?<br><br></div><div><br></div><div><strong>[00:28:09] Step 6: Expect Performance Surprises at Scale</strong></div><div><br>Benchmarking does not always capture how systems behave in real-world environments. In one rollout, a PQC implementation caused unexpected cache misses because of how it allocated heap memory. The algorithm itself was fast, but its memory patterns disrupted system performance. This was not a cryptographic failure; it was a systems interaction issue. At scale, migrations often surface these kinds of edge cases that are difficult to anticipate during initial testing.<br><br><br></div><div>Key Question: Do you have regression testing capable of catching subtle systemic performance impacts?<br><br></div><div><br>Episode Resources<br><br></div><ul><li>Stefan Kölbl on <a href="https://www.linkedin.com/in/koelblstefan">LinkedIn</a></li></ul><div><br></div><ul><li>ProteQC <a href="https://proteqc.com/">Website</a></li></ul><div><br></div><ul><li>Johannes Lintzen on <a href="https://www.linkedin.com/in/jolintzen/">LinkedIn</a>&nbsp;</li></ul><div><br></div><ul><li>PQShield <a href="http://www.pqshield.com">Website</a>&nbsp;</li></ul><div><br></div><div>Want exclusive insights on quantum migration?&nbsp; Stay ahead of the curve. Subscribe to Shielded: The Last Line of Cyber Defense on Apple Podcasts, Spotify, or YouTube Podcasts.</div><div><br><br>✔ Get insider knowledge from leading cybersecurity experts.<br><br></div><div><br>✔ Learn practical steps to future-proof your organization.<br><br></div><div><br>✔ Stay updated on regulatory changes and industry trends.<br><br><br>Need help subscribing? Click <a href="https://www.fame.so/follow-rate-review">here</a> for step-by-step instructions.<br><br></div><div><br><br></div><div>Shielded: The Last Line of Cyber Defense is handcrafted by our friends over at: <a href="https://www.fame.so/?utm_medium=podcast&amp;utm_source=bcast&amp;utm_campaign=masters-of-community-with-david-spinks?utm_medium=podcast&amp;utm_source=bcast&amp;utm_campaign=fame-client">fame.so</a></div><div><br></div>]]></content:encoded>
      <pubDate>Thu, 05 Mar 2026 12:00:00 +0000</pubDate>
      <author>PQShield</author>
      <enclosure url="https://media.fame.so/81671rpw.mp3" length="88952162" type="audio/mpeg"/>
      <itunes:author>PQShield</itunes:author>
      <itunes:image href="https://content.fameapp.so/uploads/8l18kymq/dbca6ea0-1871-11f1-88f4-15c45784e98d/dbca6fb0-1871-11f1-816b-6dd570e8f5f9.png"/>
      <itunes:duration>2223</itunes:duration>
      <itunes:summary>Post-quantum cryptography is often framed as an algorithm selection problem. Stefan Kölbl reframes it as something else entirely: a key management and lifecycle discipline challenge.

In this episode of Shielded: The Last Line of Cyber Defense, host Jo Lintzen speaks with Stefan, an information security engineer at Google, about what it actually takes to migrate cryptography across complex global systems at scale.

They explore why Store Now, Decrypt Later is treated as a real threat inside Google, why hybrid deployments were justified before final NIST standards, and why inventory dashboards alone won’t get organizations across the finish line. The real work, Stefan explains, lies in crypto agility, automated key rotation, lifecycle ownership, and safe-by-default developer frameworks.</itunes:summary>
      <itunes:subtitle>Post-quantum cryptography is often framed as an algorithm selection problem. Stefan Kölbl reframes it as something else entirely: a key management and lifecycle discipline challenge.

In this episode of Shielded: The Last Line of Cyber Defense, host Jo Lintzen speaks with Stefan, an information security engineer at Google, about what it actually takes to migrate cryptography across complex global systems at scale.

They explore why Store Now, Decrypt Later is treated as a real threat inside Google, why hybrid deployments were justified before final NIST standards, and why inventory dashboards alone won’t get organizations across the finish line. The real work, Stefan explains, lies in crypto agility, automated key rotation, lifecycle ownership, and safe-by-default developer frameworks.</itunes:subtitle>
      <itunes:keywords/>
      <itunes:explicit>No</itunes:explicit>
      <googleplay:explicit>No</googleplay:explicit>
    </item>
    <item>
      <title>Post-Quantum Negligence: When Inaction Becomes Legal Exposure</title>
      <link>https://podcasts.fame.so/e/rn747128-post-quantum-negligence-when-inaction-becomes-legal-exposure</link>
      <itunes:title>Post-Quantum Negligence: When Inaction Becomes Legal Exposure</itunes:title>
      <itunes:episode>27</itunes:episode>
      <itunes:season>1</itunes:season>
      <itunes:block>No</itunes:block>
      <googleplay:block>No</googleplay:block>
      <guid isPermaLink="false">k18ylrp0</guid>
      <description>Post-quantum risk is no longer a distant technical concern. It is an emerging legal exposure. In this episode of Shielded: The Last Line of Cyber Defense, host Jo Lintzen speaks with Darren Bender, a US litigation attorney and Chief Litigation Officer in the post-quantum cryptography sector. Darren introduces the concept of post-quantum negligence and explains how quantum threats intersect with foreseeability, duty of care, and negligence law. He walks through how courts may evaluate Harvest Now, Decrypt Later risk using expert forecasts, Mosca’s theorem, and the Learned Hand test. He also explains why financial services may be first to face litigation and what governance evidence organizations must begin documenting now to defend decisions made today.</description>
      <content:encoded><![CDATA[<div>Post-quantum cryptography is often framed as a future technical upgrade. Darren Bender challenges that framing and treats it as a legal exposure that already exists. In this episode of Shielded: The Last Line of Cyber Defense, Darren introduces post-quantum negligence and explains how US courts may assess quantum risk using established legal doctrines. The discussion centers on a timing problem. Adversaries can harvest encrypted data today and decrypt it years later once quantum capability arrives. That gap breaks the traditional negligence model, where duty, breach, harm, and causation appear close together. With Harvest Now, Decrypt Later, harm may surface long after the decision to delay action. Darren explains why foreseeability becomes central, shaped by expert forecasts, Mosca’s theorem, and the Learned Hand reasonableness test. When migration cost drops below expected harm, inaction starts to look unreasonable. He outlines why financial services may be at that tipping point now, why healthcare may already be past it, and how delay compounds exposure. The episode also addresses performative quantum readiness. Public claims without real cryptographic work can raise legal risk by creating expectations. Darren closes with practical guidance for 2026, emphasizing documentation, governance, and review that hold up later.</div><div><br></div><div>What You’ll Learn<br><br><br></div><ul><li>What post-quantum negligence means and why it fills a US regulatory gap</li></ul><div><br></div><ul><li>Why Harvest Now, Decrypt Later disrupts traditional negligence timelines<br><br></li><li>How foreseeability is established through expert consensus, not speculation</li></ul><div><br></div><ul><li>How Mosca’s theorem frames exposure versus migration runway</li></ul><div><br></div><ul><li>How the Learned Hand test determines when inaction becomes unreasonable</li></ul><div><br></div><ul><li>Why financial services may face the first post-quantum negligence cases</li></ul><div><br></div><ul><li>What evidence courts may expect when reviewing 2024–2026 decisions</li></ul><div><br></div><ul><li>Why “quantum-ready” marketing without real work creates legal risk<br><br></li><li>How liability spreads across vendors, cloud providers, and supply chains</li></ul><div><br></div><ul><li>What leaders can do in 2026 to reduce future legal exposure<br><br></li></ul><div><br></div><div>Darren Bender is a US litigation attorney with a dual background in law and IT automation. He serves as Managing Attorney at Zwicker &amp; Associates and is Co-Founder and Chief Litigation Officer in the post-quantum cryptography sector for a newly formed UK advisory firm, ProtecQC. Before practicing litigation, Darren spent nearly a decade as a business systems analyst at First American, where he designed and automated complex, high-volume, data-sensitive workflows across national production systems. His work today sits at the intersection of law, governance, and cryptographic risk, with a focus on how emerging technical threats translate into real legal exposure.<br><br></div><div><br></div><div><strong>Your Roadmap to Quantum Resilience</strong></div><div><br><br></div><div><strong>[01:07] Step 1: Quantum Risk Already Creates Legal Duty<br></strong><br></div><div>Darren’s point is not that new laws suddenly create responsibility. It’s that responsibility shows up once a risk is widely known. In the US, courts do not wait for regulators to spell everything out. They look at whether a reasonable organization should have known about a risk and whether it had the ability to act. With public guidance, global coordination, and expert consensus now in the open, post-quantum risk is no longer obscure. Choosing to wait is still a choice, and courts will ask why that choice made sense at the time.<br><br></div><div>Key Question: If harm surfaces years from now, can you show why inaction was reasonable then?<br><br></div><div><br></div><div><strong>[06:28] Step 2: Harvest Now, Decrypt Later Breaks the Negligence Timeline<br></strong><br></div><div>Quantum risk does not look like a normal breach. There may be no alarm, no visible damage, and no clear moment of failure. Data can be copied quietly today and only become dangerous years later when it is decrypted. Darren explains that this stretches negligence across time. Courts may not focus on when harm finally appeared, but on earlier moments when data was taken and no action followed. Each year of delay becomes part of the story.<br><br></div><div>Key Question: If a court looks back year by year, what would your decisions show?<br><br></div><div><br></div><div><strong>[10:11] Step 3: Foreseeability Is Already Quantified<br></strong><br></div><div>Darren stresses that foreseeability does not mean knowing exactly when quantum breaks encryption. It means having credible signals that risk is coming. Courts already rely on expert forecasts and probability in many cases. Public quantum threat timelines and expert surveys fall squarely into that category. They are not fringe opinions. From a legal view, this turns quantum risk from speculation into something measurable. Ignoring that evidence does not create flexibility. It creates exposure.<br><br></div><div>Key Question: Are you treating expert forecasts as real input, or hoping uncertainty protects you?<br><br></div><div><br></div><div><strong>[12:32] Step 4: When the Reasonableness Test Stops Being Theoretical<br></strong><br></div><div>Darren uses the Learned Hand test to explain when delay stops being defensible. The idea is simple. If the cost of fixing a problem is lower than the damage likely to come from ignoring it, doing nothing no longer looks reasonable. For PQC, that comparison depends on what data you hold, how long it stays valuable, and how hard it is to migrate. Once expected harm outweighs migration cost, waiting stops looking like judgment and starts looking like neglect.<br><br></div><div>Key Question: If someone did the math today, would waiting still make sense?<br><br></div><div><br></div><div><strong>[13:04] Step 5: Why Financial Services Reaches the Line First<br></strong><br></div><div>Financial services sits right at the edge. Data sticks around long enough to be valuable to attackers, but not so long that action today is pointless. Losses are measurable. Regulators pay attention. Most importantly, starting now can still prevent real harm. Darren contrasts this with healthcare, where records last decades and prevention may already be too late. Where harm could still have been avoided, courts are far less forgiving of delay.<br><br></div><div>Key Question: If Q-day arrives on schedule, will delay be your weakest point?<br><br></div><div><br></div><div><strong>[20:08] Step 6: Performative Readiness, Shared Liability, and What Courts Will Expect<br></strong><br></div><div>Darren warns that claiming quantum readiness without doing the work is worse than staying quiet. Public claims create expectations, and expectations create liability. From there, risk spreads across vendors, cloud providers, and integrators. When something fails, plaintiffs follow the money under joint and several liability. Courts won’t expect perfection. They will expect proof you took the issue seriously. That means inventories, real risk analysis, board awareness, documented decisions, and regular follow-ups. This is legal hygiene, not panic.<br><br></div><div>Key Question: If everything was laid out in court, would your records help you or hurt you?</div><div><br><br></div><div><strong>Episode Resources<br><br></strong><br></div><ul><li>Darren Bender on <a href="https://www.linkedin.com/in/darren-bender-tx/">LinkedIn</a></li></ul><div><br></div><ul><li>ProteQC <a href="https://proteqc.com/">Website</a><br><br></li><li>Johannes Lintzen on <a href="https://www.linkedin.com/in/jolintzen/">LinkedIn</a>&nbsp;<br><br></li><li>PQShield <a href="http://www.pqshield.com">Website</a>&nbsp;</li></ul><div><br><br></div><div>Want exclusive insights on quantum migration?&nbsp; Stay ahead of the curve. Subscribe to Shielded: The Last Line of Cyber Defense on Apple Podcasts, Spotify, or YouTube Podcasts.<br><br></div><div><br>✔ Get insider knowledge from leading cybersecurity experts.<br><br></div><div><br>✔ Learn practical steps to future-proof your organization.<br><br></div><div><br>✔ Stay updated on regulatory changes and industry trends.<br><br><br>Need help subscribing? Click <a href="https://www.fame.so/follow-rate-review">here</a> for step-by-step instructions.<br><br></div><div><br></div><div>Shielded: The Last Line of Cyber Defense is handcrafted by our friends over at: <a href="https://www.fame.so/?utm_medium=podcast&amp;utm_source=bcast&amp;utm_campaign=masters-of-community-with-david-spinks?utm_medium=podcast&amp;utm_source=bcast&amp;utm_campaign=fame-client">fame.so</a></div><div><br></div>]]></content:encoded>
      <pubDate>Thu, 19 Feb 2026 12:00:00 +0000</pubDate>
      <author>PQShield</author>
      <enclosure url="https://media.fame.so/wyqj26jw.mp3" length="90569664" type="audio/mpeg"/>
      <itunes:author>PQShield</itunes:author>
      <itunes:image href="https://content.fameapp.so/uploads/8l18kymq/ea074690-0cbe-11f1-9e24-1363da2f7742/ea0748b0-0cbe-11f1-94cc-294bb95cbb6a.png"/>
      <itunes:duration>2264</itunes:duration>
      <itunes:summary>Post-quantum risk is no longer a distant technical concern. It is an emerging legal exposure. In this episode of Shielded: The Last Line of Cyber Defense, host Jo Lintzen speaks with Darren Bender, a US litigation attorney and Chief Litigation Officer in the post-quantum cryptography sector. Darren introduces the concept of post-quantum negligence and explains how quantum threats intersect with foreseeability, duty of care, and negligence law. He walks through how courts may evaluate Harvest Now, Decrypt Later risk using expert forecasts, Mosca’s theorem, and the Learned Hand test. He also explains why financial services may be first to face litigation and what governance evidence organizations must begin documenting now to defend decisions made today.</itunes:summary>
      <itunes:subtitle>Post-quantum risk is no longer a distant technical concern. It is an emerging legal exposure. In this episode of Shielded: The Last Line of Cyber Defense, host Jo Lintzen speaks with Darren Bender, a US litigation attorney and Chief Litigation Officer in the post-quantum cryptography sector. Darren introduces the concept of post-quantum negligence and explains how quantum threats intersect with foreseeability, duty of care, and negligence law. He walks through how courts may evaluate Harvest Now, Decrypt Later risk using expert forecasts, Mosca’s theorem, and the Learned Hand test. He also explains why financial services may be first to face litigation and what governance evidence organizations must begin documenting now to defend decisions made today.</itunes:subtitle>
      <itunes:keywords/>
      <itunes:explicit>No</itunes:explicit>
      <googleplay:explicit>No</googleplay:explicit>
    </item>
    <item>
      <title>Compliance Deadlines, Customer Reality, and the Case for (embedded) TLS1.3</title>
      <link>https://podcasts.fame.so/e/xn129mv8-compliance-deadlines-customer-reality-and-the-case-for-embedded-tls1-3</link>
      <itunes:title>Compliance Deadlines, Customer Reality, and the Case for (embedded) TLS1.3</itunes:title>
      <itunes:episode>26</itunes:episode>
      <itunes:season>1</itunes:season>
      <itunes:block>No</itunes:block>
      <googleplay:block>No</googleplay:block>
      <guid isPermaLink="false">703r8k41</guid>
      <description>Post-quantum cryptography does not fail because the math is hard. It stalls because systems are old, upgrades feel risky, and organizations struggle to explain the work in business terms. In this episode of Shielded: The Last Line of Cyber Defense, host Jo Lintzen speaks with Jan Schaumann, Chief Information Security Architect at Akamai Technologies, about how PQC migration actually unfolds inside a global platform. Jan explains why TLS 1.3 is the real prerequisite, why Akamai chose a slower, opt-in rollout, and how PQC becomes a forcing function for long-term crypto agility.</description>
      <content:encoded><![CDATA[<div>Post-quantum cryptography often enters organizations as a headline problem, then quickly turns into an operational one. In this episode of Shielded: The Last Line of Cyber Defense, Jan Schaumann, Chief Information Security Architect at Akamai Technologies, approaches PQC from the perspective of someone who has spent decades operating real systems at internet scale. From his view, the challenge is not quantum theory, but sequencing change safely across infrastructure that cannot all move at once. Jan walks through how Akamai approached PQC over several years, starting before standards fully settled and aligning progress with customer demand, compliance timelines, and platform resilience. He explains why TLS 1.3 migration remains the most common blocker, especially on the origin side, where legacy stacks, embedded clients, and IoT devices stretch upgrade timelines far beyond expectations. Rather than pushing PQC everywhere at once, Akamai split the problem into distinct traffic paths: client-to-edge, edge-to-origin, and internal connections. Each path carries a different threat model and operational risk. This framing enabled opt-in deployment, staged rollouts, and safer change, while still delivering meaningful protection against harvest-now-decrypt-later threats. Throughout the conversation, Jan returns to a single idea: PQC is not the finish line. It is a forcing function that exposes how well an organization understands its cryptography, how quickly it can upgrade, and whether it can repeat the process when the next cryptographic shift arrives.</div><div><br><br></div><div>What You’ll Learn<br><br><br></div><ul><li>Why PQC migration is primarily an operations and change-management problem</li></ul><div><br></div><ul><li>How unfinished TLS 1.3 migrations block post-quantum progress<br><br></li><li>Why Akamai separated PQC rollout by traffic leg instead of one global switch</li></ul><div><br></div><ul><li>How customer risk tolerance and regulation shape real deployment timelines</li></ul><div><br></div><ul><li>Why hybrid key exchange works today without locking teams into permanent compromise</li></ul><div><br></div><ul><li>How PQC can be used to build crypto agility, not just meet compliance deadlines</li></ul><div><br><br></div><div>Jan Schaumann is Chief Information Security Architect at Akamai Technologies, where he guides cryptographic strategy, infrastructure security, and safe-change practices across one of the internet’s most critical platforms. He previously served as Principal Architect at Akamai and has held senior security roles at companies including Yahoo, Twitter, and Etsy. Jan is also an Adjunct Professor of Computer Science at Stevens Institute of Technology, where he has taught graduate-level systems and Unix programming since 2001. He is a long-time developer with the NetBSD Foundation and describes himself, accurately, as an actual human on the internet who refuses to grow up.</div><div><br><br></div><div><strong>Your Roadmap to Quantum Resilience</strong></div><div><br><br></div><div><strong>[05:57] Step 1: Stop Treating PQC as a Quantum Problem -<br></strong><br></div><div>Jan pushes back on the idea that post-quantum cryptography requires quantum expertise or radical architectural change. In practice, he explains, PQC shows up as new key exchange mechanisms and ciphers layered into systems teams already operate. He points out that migrations like TLS 1.2 to TLS 1.3 were far more disruptive than enabling post-quantum key exchange inside TLS 1.3. The “quantum” label can help unlock executive attention, but it also intimidates engineers and customers who assume the work is experimental or fragile. Jan’s advice is to strip away the mystique early, frame PQC as disciplined crypto upgrade work, and focus teams on execution rather than theory.<br><br></div><div>Key Question: Are teams slowing themselves down by treating PQC as exotic instead of operational?</div><div><br><br></div><div><strong>[15:09] Step 2: Finish the TLS 1.3 Migration First -<br></strong><br></div><div>Jan is clear that PQC adoption stalls long before post-quantum algorithms become the issue. TLS-based PQC requires TLS 1.3, and many organizations are still running TLS 1.2 deep in their environments. While Akamai’s edge has supported TLS 1.3 for years, origin systems often lag. Jan describes why. Customers rely on legacy stacks, external vendors, embedded clients, and IoT devices that were never designed for frequent updates. In regulated industries, upgrade fear compounds the delay. Teams assume PQC is a simple cipher switch, then discover they must modernize entire origin environments first.<br><br></div><div>Key Question: Do you have full visibility into where TLS 1.2 still runs and why it has not moved?</div><div><br><br></div><div><strong>[21:11] Step 3: Break PQC Into Traffic Paths -<br></strong><br></div><div>Rather than treating PQC as a single migration, Jan explains how Akamai split the work into three distinct paths: client-to-edge, edge-to-origin, and internal traffic. Each path carries a different threat model, upgrade cost, and urgency. Client-to-edge protects the largest volume of traffic and addresses harvest-now-decrypt-later risks. Edge-to-origin depends heavily on customer readiness. Internal traffic faces a different attacker model altogether. By separating these paths, Akamai avoided all-or-nothing decisions and made progress measurable. This framing also helped customers understand where PQC delivered immediate value versus where it required longer-term planning.<br><br></div><div>Key Question: Are you prioritizing PQC by actual risk paths or treating everything as equally urgent?</div><div><br><br></div><div><strong>[23:45] Step 4: Use Phased Rollouts to Protect Stability -<br></strong><br></div><div>Jan describes why Akamai chose opt-in deployment instead of flipping PQC on globally. Many customers operate in financial, healthcare, and government environments where untested change carries serious consequences. Akamai’s rollout relied on staged percentages, canary networks, and gradual expansion to validate behavior before wider exposure. While this pace can feel frustrating to engineers eager to ship, Jan notes it avoided outages and preserved customer trust. Moving slower also allowed Akamai to adapt as standards evolved, rather than locking in early assumptions. For Jan, resilience and safe change matter more than being first.<br><br></div><div>Key Question: Does your deployment model reward caution and validation or speed at any cost?</div><div><br><br></div><div><strong>[25:58] Step 5: Let Standards Maturity Save You Work -<br></strong><br></div><div>Jan explains how tracking standards activity closely prevented significant rework. Akamai began preparing for Kyber before NIST finalized selections, then watched the industry pivot quickly to standardized ML-KEM. Because the rollout was staged, Akamai avoided shipping Kyber only to replace it weeks later. Jan also discusses FIPS considerations and how early uncertainty around hybrid compliance nearly forced support for multiple key exchanges. When NIST clarified that hybrid ML-KEM with classical exchange met FIPS requirements, entire branches of planned work became unnecessary. Waiting just long enough reduced complexity without delaying progress.<br><br></div><div>Key Question: Are you building flexibility so standards changes remove work instead of creating it?<br><br></div><div><br></div><div><strong>[36:06] Step 6: Build Crypto Agility, Not One-Time Compliance -&nbsp;<br></strong><br></div><div>Jan closes with a broader lesson. PQC is not the last cryptographic transition organizations will face. Whether the trigger is quantum, regulation, or vulnerability discovery, change will come again. Teams that treat PQC as a one-off compliance task miss the opportunity. Jan urges organizations to invest in inventory, visibility, and repeatable upgrade processes so future transitions hurt less. Knowing where cryptography lives, how it is negotiated, and how to replace it safely becomes the real security win. PQC simply exposes whether those foundations already exist.<br><br></div><div>Key Question: Will this migration leave you better prepared for the next cryptographic shift?</div><div><br><br></div><div><strong>Episode Resources<br></strong><br></div><ul><li>Jan Schaumann on <a href="https://www.linkedin.com/in/jschauma/">LinkedIn</a></li></ul><div><br></div><ul><li>Akamai Technologies <a href="https://www.akamai.com/">Website</a></li></ul><div><br></div><ul><li>Johannes Lintzen on <a href="https://www.linkedin.com/in/jolintzen/">LinkedIn</a>&nbsp;</li></ul><div><br></div><ul><li>PQShield <a href="http://www.pqshield.com">Website</a>&nbsp;</li></ul><div><br><br></div><div>Want exclusive insights on quantum migration?&nbsp; Stay ahead of the curve. Subscribe to Shielded: The Last Line of Cyber Defense on Apple Podcasts, Spotify, or YouTube Podcasts.<br><br></div><div><br>✔ Get insider knowledge from leading cybersecurity experts.<br><br></div><div><br>✔ Learn practical steps to future-proof your organization.<br><br></div><div><br>✔ Stay updated on regulatory changes and industry trends.<br><br><br>Need help subscribing? Click <a href="https://www.fame.so/follow-rate-review">here</a> for step-by-step instructions.<br><br></div><div><br></div><div>Shielded: The Last Line of Cyber Defense is handcrafted by our friends over at: <a href="https://www.fame.so/?utm_medium=podcast&amp;utm_source=bcast&amp;utm_campaign=masters-of-community-with-david-spinks?utm_medium=podcast&amp;utm_source=bcast&amp;utm_campaign=fame-client">fame.so</a></div><div><br></div>]]></content:encoded>
      <pubDate>Thu, 05 Feb 2026 12:00:00 +0000</pubDate>
      <author>PQShield</author>
      <enclosure url="https://media.fame.so/8mkm6658.mp3" length="80043362" type="audio/mpeg"/>
      <itunes:author>PQShield</itunes:author>
      <itunes:image href="https://content.fameapp.so/uploads/8l18kymq/26df01f0-02bc-11f1-8e13-736ed73c36c6/26df02f0-02bc-11f1-b682-a1bb72ea23f7.png"/>
      <itunes:duration>2001</itunes:duration>
      <itunes:summary>Post-quantum cryptography does not fail because the math is hard. It stalls because systems are old, upgrades feel risky, and organizations struggle to explain the work in business terms. In this episode of Shielded: The Last Line of Cyber Defense, host Jo Lintzen speaks with Jan Schaumann, Chief Information Security Architect at Akamai Technologies, about how PQC migration actually unfolds inside a global platform. Jan explains why TLS 1.3 is the real prerequisite, why Akamai chose a slower, opt-in rollout, and how PQC becomes a forcing function for long-term crypto agility.</itunes:summary>
      <itunes:subtitle>Post-quantum cryptography does not fail because the math is hard. It stalls because systems are old, upgrades feel risky, and organizations struggle to explain the work in business terms. In this episode of Shielded: The Last Line of Cyber Defense, host Jo Lintzen speaks with Jan Schaumann, Chief Information Security Architect at Akamai Technologies, about how PQC migration actually unfolds inside a global platform. Jan explains why TLS 1.3 is the real prerequisite, why Akamai chose a slower, opt-in rollout, and how PQC becomes a forcing function for long-term crypto agility.</itunes:subtitle>
      <itunes:keywords/>
      <itunes:explicit>No</itunes:explicit>
      <googleplay:explicit>No</googleplay:explicit>
    </item>
    <item>
      <title>The End of Static Cryptography: What Leaders Must Understand Now</title>
      <link>https://podcasts.fame.so/e/lnqwrl1n-the-end-of-static-cryptography-what-leaders-must-understand-now</link>
      <itunes:title>The End of Static Cryptography: What Leaders Must Understand Now</itunes:title>
      <itunes:episode>25</itunes:episode>
      <itunes:season>1</itunes:season>
      <itunes:block>No</itunes:block>
      <googleplay:block>No</googleplay:block>
      <guid isPermaLink="false">81nvjwp1</guid>
      <description>Post-quantum cryptography changes the rules of cybersecurity. This special episode of Shielded: The Last Line of Cyber Defense brings together experts from cryptography, security architecture, and risk to explain what comes next. The conversation clarifies that security can no longer rely on fixed algorithms or one-time upgrades. Organizations must design for constant cryptographic change, stronger governance, and disciplined implementation or risk losing security without realizing it.</description>
      <content:encoded><![CDATA[<div>Post-quantum cryptography does not arrive as a clean replacement for today’s systems. It forces organizations to rethink how cryptography is designed, deployed, governed, and maintained over time. In this special episode of Shielded, host Jo Lintzen leads a discussion that moves past algorithm selection and into operational reality. The panel connects three pressures most organizations underestimate. Threats evolve quickly. Hardware and deployed systems last for years. Governance around cryptographic assets is often weak or incomplete.</div><div><br><br></div><div>Bill Buchanan explains how lattice-based cryptography enables new capabilities such as fully homomorphic encryption, where data remains encrypted even while being processed. This matters in modern environments shaped by cloud platforms, edge computing, and machine learning, where sensitive data is frequently exposed during computation.</div><div><br><br></div><div>Mamta Gupta highlights the growing mismatch between long hardware lifecycles and rapidly changing cryptographic requirements. Devices expected to remain in the field for a decade must soon meet post-quantum mandates, even as standards and certification frameworks continue to evolve. Locking in rigid choices today creates future risk.<br><br></div><div><br></div><div>Jeremy B focuses on the skills gap. Post-quantum migration requires experienced practitioners, structured discovery, and repeatable methods. Until those capabilities become widespread, organizations must treat PQC work as specialized and plan accordingly.</div><div><br><br></div><div>Adrian Neal delivers a warning about failure modes. New algorithms will not tolerate weak governance or poor implementation. The most dangerous outcome is silent failure, where systems appear secure but provide little real protection.</div><div><br><br></div><div>Yolanda Reid reframes the issue for leadership. This is not another Y2K-style event. Cryptography will continue changing for the lifetime of modern systems. Executives must understand the risk to their most valuable assets and support long-term operating models, not short-term fixes.</div><div><br><br></div><div>Bruno Couillard closes by challenging decades of assumptions. For thirty years, digital systems were built on the belief that cryptography should never change. That belief no longer holds. Security now depends on knowing what cryptography is used where, maintaining it continuously, and building teams capable of adapting as standards and threats evolve.</div><div><br><br></div><div>What You’ll Learn<br><br></div><ul><li>Why cybersecurity depends entirely on cryptography</li></ul><div><br></div><ul><li>How post-quantum change reshapes security architecture</li></ul><div><br></div><ul><li>Why encrypted processing matters in modern data systems<br><br></li><li>How slow hardware lifecycles increase urgency</li></ul><div><br></div><ul><li>Why crypto agility is now mandatory</li></ul><div><br></div><ul><li>How weak governance undermines strong algorithms</li></ul><div><br></div><ul><li>Why poor implementation can destroy security silently</li></ul><div><br></div><ul><li>How discovery exposes real cryptographic risk</li></ul><div><br></div><ul><li>Why post-quantum readiness is a leadership issue<br><br></li><li>How organizations must plan for continuous change<br><br></li></ul><div><br></div><div><strong>Your Roadmap to Quantum Resilience</strong></div><div><br><br></div><div><strong>[00:00] Step 1: Cryptography Is the Real Security Boundary</strong></div><div>Bruno Couillard opens with something that sounds obvious, but often gets ignored. There is no cybersecurity without cryptography. Everything else sits on top of it. When teams treat cryptography as background plumbing, they stop paying attention to where trust really comes from. Post-quantum work starts with knowing where cryptography shows up in your systems, why it was chosen, and what assumptions it depends on. If you don’t have that picture, every other security decision is built on guesswork.</div><div><br><br></div><div><strong>[01:10] Step 2: Data Is Most Vulnerable While Being Used</strong></div><div>Bill Buchanan points out a problem we’ve quietly accepted for years. We encrypt data when it’s stored and when it moves, but the moment we actually use it, we expose it. In cloud systems, analytics, and machine learning, that exposure happens all the time. Lattice-based cryptography changes what’s possible here. It allows data to stay encrypted even while being processed. That opens the door to systems that are private by design, not just protected at the edges.</div><div><br><br></div><div><strong>&nbsp;[03:12] Step 3: Long Hardware Lifecycles Create Urgency</strong></div><div>Mamta Gupta explains why timing is such a headache. Devices are built to last five, ten, sometimes fifteen years. Meanwhile, threats, regulations, and algorithms change every few months. If you wait too long, you end up with systems that can’t be upgraded in time. If you lock things down too early, you risk betting on choices that won’t age well. The hard part is planning for both at once.</div><div><br><br></div><div><strong>[06:47] Step 4: Migration Is an Execution Problem, Not a Theory</strong></div><div>Jeremy B brings the focus to execution. PQC migration starts with discovery, not replacement. Most organizations do not know where cryptography lives until they actively map certificates, keys, protocols, vendors, and dependencies. Assurance schemes and consultants help add structure and confidence, especially early on, but they do not remove ownership. Someone inside the organization still needs to understand what exists today and what can change safely.</div><div><br><br></div><div><strong>[08:52] Step 5: Poor Implementation Destroys Security Quietly</strong></div><div>Adrian Neal explains why post-quantum algorithms raise the stakes. Older schemes often failed loudly. New ones do not. Weak governance or poor implementation can result in encryption that appears to work but provides little real protection. Discovery often exposes unknown certificates, unmanaged keys, and policy drift. In a PQC world, those gaps matter more than ever. Algorithm strength means nothing without disciplined implementation.</div><div><br><br></div><div><strong>[11:10] Step 6: This Is a Leadership Conversation, Not a Project</strong></div><div>Yolanda Reid pulls the conversation out of IT and into the executive room. Post-quantum cryptography is not a one-time upgrade you fund, complete, and move past. Cryptography will keep changing for as long as digital systems exist. That puts core assets at stake, communications, financial systems, identity, and trust. Leaders need to understand that risk and back operating models built for continuous change, not short-term fixes.</div><div><br><br></div><div><strong>Episode Resources<br><br></strong><br></div><ul><li>Bruno Couillard on <a href="https://www.linkedin.com/in/brunocouillard/">LinkedIn</a></li></ul><div><br></div><ul><li>Bill Buchanan on <a href="https://www.linkedin.com/in/billatnapier/">LinkedIn</a></li></ul><div><br></div><ul><li>Mamta Gupta on <a href="https://www.linkedin.com/in/mamta-gupta-5038123/">LinkedIn</a><br><br></li><li>Adrian Neal on <a href="https://www.linkedin.com/in/adrianneal/">LinkedIn</a></li></ul><div><br></div><ul><li>Yolanda Reid on <a href="http://linkedin.com/in/yolanda-c-reid">LinkedIn</a></li></ul><div><br></div><ul><li>Johannes Lintzen on <a href="https://www.linkedin.com/in/jolintzen/">LinkedIn</a>&nbsp;</li></ul><div><br></div><ul><li>PQShield <a href="http://www.pqshield.com">Website</a>&nbsp;<br><br></li></ul><div><br></div><div>Want exclusive insights on quantum migration?&nbsp; Stay ahead of the curve. Subscribe to Shielded: The Last Line of Cyber Defense on Apple Podcasts, Spotify, or YouTube Podcasts.<br><br></div><div><br>✔ Get insider knowledge from leading cybersecurity experts.<br><br></div><div><br>✔ Learn practical steps to future-proof your organization.<br><br></div><div><br>✔ Stay updated on regulatory changes and industry trends.<br><br><br>Need help subscribing? Click <a href="https://www.fame.so/follow-rate-review">here</a> for step-by-step instructions.</div><div>Shielded: The Last Line of Cyber Defense is handcrafted by our friends over at: <a href="https://www.fame.so/?utm_medium=podcast&amp;utm_source=bcast&amp;utm_campaign=masters-of-community-with-david-spinks?utm_medium=podcast&amp;utm_source=bcast&amp;utm_campaign=fame-client">fame.so</a></div><div><br></div>]]></content:encoded>
      <pubDate>Thu, 08 Jan 2026 12:00:00 +0000</pubDate>
      <author>PQShield</author>
      <enclosure url="https://media.fame.so/w0v4kyrw.mp3" length="49899101" type="audio/mpeg"/>
      <itunes:author>PQShield</itunes:author>
      <itunes:image href="https://content.fameapp.so/uploads/8l18kymq/14e121c0-ec7c-11f0-a6e4-9deb9783cd8f/14e122b0-ec7c-11f0-b056-8d5efba4aa59.png"/>
      <itunes:duration>1247</itunes:duration>
      <itunes:summary>Post-quantum cryptography changes the rules of cybersecurity. This special episode of Shielded: The Last Line of Cyber Defense brings together experts from cryptography, security architecture, and risk to explain what comes next. The conversation clarifies that security can no longer rely on fixed algorithms or one-time upgrades. Organizations must design for constant cryptographic change, stronger governance, and disciplined implementation or risk losing security without realizing it.</itunes:summary>
      <itunes:subtitle>Post-quantum cryptography changes the rules of cybersecurity. This special episode of Shielded: The Last Line of Cyber Defense brings together experts from cryptography, security architecture, and risk to explain what comes next. The conversation clarifies that security can no longer rely on fixed algorithms or one-time upgrades. Organizations must design for constant cryptographic change, stronger governance, and disciplined implementation or risk losing security without realizing it.</itunes:subtitle>
      <itunes:keywords/>
      <itunes:explicit>No</itunes:explicit>
      <googleplay:explicit>No</googleplay:explicit>
    </item>
    <item>
      <title>Confidentiality vs Authentication: How Far the Web Has Actually Moved</title>
      <link>https://podcasts.fame.so/e/l8qwpx68-confidentiality-vs-authentication-how-far-the-web-has-actually-moved</link>
      <itunes:title>Confidentiality vs Authentication: How Far the Web Has Actually Moved</itunes:title>
      <itunes:episode>24</itunes:episode>
      <itunes:season>1</itunes:season>
      <itunes:block>No</itunes:block>
      <googleplay:block>No</googleplay:block>
      <guid isPermaLink="false">80nv89q0</guid>
      <description>Post-quantum cryptography is not a future ambition. It is already embedded into the web’s core confidentiality protocols. In this episode of Shielded: The Last Line of Cyber Defense, host Jo Lintzen speaks with Sofia Celi, Senior Cryptography and Security Researcher at Brave, co-author of the MAYO signature scheme, and co-chair of an IETF working group driving global PQC standards. Sofia explains the two-speed reality of PQ migration: confidentiality is already deployed at scale through TLS 1.3 and hybrid KEMs, while authentication, signatures, and zero-knowledge-based identity systems remain in deep research. She shares how standards bodies are recalibrating after TLS 1.3, why multivariate signatures such as MAYO could reshape authentication, why European eID timelines miss critical cryptographic maturity gaps, and the first two steps any security team must take within the next year.</description>
      <content:encoded><![CDATA[<div>As post-quantum cryptography moves from theory into deployment, organizations need a clearer view of what is real today and what still requires time. In this episode of Shielded: The Last Line of Cyber Defense, Sofia Celi, Senior Cryptography and Security Researcher at Brave, breaks down the two-speed reality shaping PQC adoption. She explains why confidentiality is already protected at scale through TLS 1.3 and hybrid post-quantum key encapsulation, now used across major browsers, CDNs, and cloud providers to defend against harvest-now-decrypt-later threats. This shift is live, scaled, and part of today’s internet. However, authentication like signatures, PKI, eID systems, and privacy-preserving proofs remains early. Lattice-based signatures are large and costly, prompting NIST’s second call for signature schemes with new mathematical foundations and smaller communication sizes. Sofia’s work on MAYO, a compact multivariate signature scheme, offers a promising path for authentication, distributed signing, and environments where signature size matters. She also examines European digital identity plans, noting the gap between policy ambition and cryptographic readiness. Current timelines overlook the immaturity of zero-knowledge systems and the privacy risks hidden in their design. Sofia closes with two practical actions any organization can take now: migrate fully to TLS 1.3 and enable hybrid post-quantum key exchange. These steps strengthen confidentiality today while the ecosystem advances authentication.</div><div><br><br></div><div>What You’ll Learn<br><br></div><ul><li>Why PQC deployment for confidentiality is real and already scaled in production<br><br></li><li>How TLS 1.3 and hybrid KEMs mitigate harvest-now-decrypt-later threats<br><br></li><li>Why authentication and signatures lag far behind despite rapid standardization work<br><br></li><li>How MAYO targets small keys, compact signatures, and natural threshold support<br><br></li><li>Why multivariate signatures matter for algorithm diversity and future resilience<br><br></li><li>How zero-knowledge proofs behave differently in practice and why they require caution<br><br></li><li>Why 2027 digital identity timelines overlook both cryptographic maturity and privacy risks<br><br></li><li>What makes threshold cryptography attractive for distributed signing and delegated trust<br><br></li><li>Why the first PQC steps every organization must take are simple, available, and high impact<br><br></li></ul><div><br></div><div>Sofia Celi is a Senior Cryptography and Security Researcher at Brave, where she focuses on practical deployment of privacy-preserving and post-quantum cryptography. Her work spans Private Information Retrieval (PIR), zero-knowledge proof integration, TLS attestation, and the real-world application of advanced cryptography beyond blockchain. She is a co-author of MAYO, a multivariate post-quantum signature scheme submitted to NIST’s second signature call, and has led efforts to bring privacy technologies such as PIR into production environments.<br><br></div><div><br></div><div>Sofia serves as WG/RG Chair and Ombudsperson at the IETF, where she co-chairs a working group shaping global post-quantum protocol standards. She is an IACR ePrint co-editor, a reviewer for BlackHat, a member of the Open Technology Fund Advisory Council, and previously worked as a Cryptography and Security Researcher at Cloudflare. Her career sits at the intersection of research, protocol design, and applied security, advancing cryptography from theory into widely deployed systems.<br><br></div><div><br></div><div><strong>Your Roadmap to Quantum Resilience<br></strong><br></div><div><br></div><div><strong>[02:19] Step 1: Separate Confidentiality From Authentication -<br></strong><br></div><div>Sofia starts by drawing a line that many teams still blur: the confidentiality layer is already post-quantum, but authentication is not. At this point in the ecosystem, TLS confidentiality is protected through deployed hybrid post-quantum KEMs across major browsers and cloud providers. The motivation is clear: harvest-now-decrypt-later is possible today, and traffic that leaks in the future cannot be recovered. Authentication is a different story. TLS signatures, PKI, and privacy-preserving protocols still rely on classical schemes because PQ signatures remain large, slow, or difficult to compose. Treating these two domains as if they mature simultaneously creates the wrong expectations and timelines. A realistic roadmap begins with clarity on what needs immediate protection and what will evolve over several years.<br><br></div><div>Key Question: Which systems depend on long-term signature trust, and which only require encrypted traffic today?<br><br></div><div><br></div><div><strong>[04:42] Step 2: Treat Hybrid as a Transition but Recognize It May Stick -<br></strong><br></div><div>Sofia discusses how the industry has already adopted hybrid KEMs, concatenating classical and PQ algorithms as a safety net. In theory, hybrid is temporary. In practice, she notes that once the industry migrates, many systems never fully transition again. We still see SHA-1 and TLS 1.2 in production for this exact reason. Hybrid provides resilience while researchers gain confidence in PQ schemes and watch for early attacks, but it also carries the risk of becoming the default state if teams do not set clear expectations. Proper planning requires acknowledging both realities: hybrid protects confidentiality today, but architecture leaders need a position on whether and when pure PQC becomes the long-term baseline.<br><br></div><div>Key Question: Is hybrid a waypoint in your roadmap, or is it quietly turning into your destination?<br><br><br><br></div><div><strong>[08:29] Step 3: Use TLS 1.3 Migration Lessons to Avoid Delays in PQC Adoption -<br></strong><br></div><div>Referencing the TLS 1.3 rollout, Sofia explains how long real migrations take. TLS 1.3 required years of review, formal verification, and protocol hardening before large-scale deployment. Even now, many systems still use TLS 1.2 or older, and the IETF cannot enforce upgrades. This matters because TLS 1.3 is the prerequisite for PQC handshakes. If organizations have not completed their TLS 1.3 migration, PQC adoption stalls before it begins. Sofia highlights that the industry can only move as fast as the slowest dependency, and outdated protocol infrastructure remains a major blocker.<br><br></div><div>Key Question: Do you know exactly where TLS 1.2 still runs in your environment, and is there a plan to eliminate it?<br><br></div><div><br></div><div><strong>[14:36] Step 4: Track NIST’s Second Signature Round and Algorithm Diversity -<br></strong><br></div><div>Sofia explains why NIST opened a second call for PQ signatures: current lattice-based options are not enough. They are large, sometimes costly, and place all trust in a single mathematical family. If lattices were broken, both PQ key exchange and signatures would fall together. NIST now seeks independent mathematical foundations and smaller signatures that fit real-world authentication workflows. This includes bandwidth-limited clients, certificate chains, and protocols where signature size directly affects performance.<br><br></div><div>Key Question: Are you planning for an authentication ecosystem built on diverse algorithms, or is your strategy unintentionally tied to a single class?<br><br></div><div><br></div><div><strong>[17:21] Step 5: Evaluate Multivariate and Threshold-Friendly Signatures Such as MAYO -<br></strong><br></div><div>Sofia introduces MAYO, a multivariate-quadratic signature scheme she co-authored. She details why the industry is watching multivariate candidates closely: they offer small public keys, compact signatures, and natural support for threshold cryptography. Threshold capability is particularly important as authentication workflows spread across distributed systems, cloud infrastructure, and delegated trust relationships. Rather than placing full control of a private key in one location, threshold schemes allow multiple parties to collaborate on a signature without exposing a complete key.<br><br></div><div>Key Question: Which of your authentication paths would benefit from compact signatures and built-in support for shared signing authority?<br><br></div><div><br></div><div><strong>[33:03] Step 6: Act Now on What Is Mature - TLS 1.3 and Hybrid PQC<br></strong><br></div><div>Sofia focuses on the two upgrades every organization can deploy immediately without waiting for the authentication ecosystem to mature. First, migrate fully to TLS 1.3, which is already supported across all major libraries. Second, enable hybrid KEMs to protect confidentiality against stored-traffic attacks. Authentication, signatures, and zero-knowledge tools need more time, more validation, and more stable standards. But confidentiality can be defended today with minimal cost and operational friction. Sofia frames this not as future-proofing, but as reducing an active risk window that grows every day organizations delay action.<br><br></div><div>Key Question: Do you have a scheduled project to deploy TLS 1.3 and hybrid PQC across your primary communication paths in the next 12 months?</div><div><br><br></div><div><strong>Episode Resources<br></strong><br></div><ul><li>Sofia Celi on <a href="https://www.linkedin.com/in/sofia-celi-27704743/">LinkedIn</a><br><br></li><li>Brave <a href="https://www.brave.com/">Website</a><br><br></li><li>Johannes Lintzen on <a href="https://www.linkedin.com/in/jolintzen/">LinkedIn</a><br><br></li><li>PQShield <a href="http://www.pqshield.com">Website</a>&nbsp;</li></ul><div><br><br></div><div>Want exclusive insights on quantum migration?&nbsp; Stay ahead of the curve. Subscribe to Shielded: The Last Line of Cyber Defense on Apple Podcasts, Spotify, or YouTube Podcasts.</div><div><br><br>✔ Get insider knowledge from leading cybersecurity experts.<br><br><br></div><div>✔ Learn practical steps to future-proof your organization.<br><br></div><div><br>✔ Stay updated on regulatory changes and industry trends.<br><br><br>Need help subscribing? Click <a href="https://www.fame.so/follow-rate-review">here</a> for step-by-step instructions.</div><div><br></div><div>Shielded: The Last Line of Cyber Defense is handcrafted by our friends over at: <a href="https://www.fame.so/?utm_medium=podcast&amp;utm_source=bcast&amp;utm_campaign=masters-of-community-with-david-spinks?utm_medium=podcast&amp;utm_source=bcast&amp;utm_campaign=fame-client">fame.so</a></div><div><br></div>]]></content:encoded>
      <pubDate>Thu, 18 Dec 2025 12:00:00 +0000</pubDate>
      <author>PQShield</author>
      <enclosure url="https://media.fame.so/w16q3jy8.mp3" length="78363166" type="audio/mpeg"/>
      <itunes:author>PQShield</itunes:author>
      <itunes:image href="https://content.fameapp.so/uploads/8l18kymq/4bad3490-db62-11f0-812b-d79823b26d88/4bad3620-db62-11f0-9db3-bd06bda13c78.png"/>
      <itunes:duration>1959</itunes:duration>
      <itunes:summary>Post-quantum cryptography is not a future ambition. It is already embedded into the web’s core confidentiality protocols. In this episode of Shielded: The Last Line of Cyber Defense, host Jo Lintzen speaks with Sofia Celi, Senior Cryptography and Security Researcher at Brave, co-author of the MAYO signature scheme, and co-chair of an IETF working group driving global PQC standards. Sofia explains the two-speed reality of PQ migration: confidentiality is already deployed at scale through TLS 1.3 and hybrid KEMs, while authentication, signatures, and zero-knowledge-based identity systems remain in deep research. She shares how standards bodies are recalibrating after TLS 1.3, why multivariate signatures such as MAYO could reshape authentication, why European eID timelines miss critical cryptographic maturity gaps, and the first two steps any security team must take within the next year.</itunes:summary>
      <itunes:subtitle>Post-quantum cryptography is not a future ambition. It is already embedded into the web’s core confidentiality protocols. In this episode of Shielded: The Last Line of Cyber Defense, host Jo Lintzen speaks with Sofia Celi, Senior Cryptography and Security Researcher at Brave, co-author of the MAYO signature scheme, and co-chair of an IETF working group driving global PQC standards. Sofia explains the two-speed reality of PQ migration: confidentiality is already deployed at scale through TLS 1.3 and hybrid KEMs, while authentication, signatures, and zero-knowledge-based identity systems remain in deep research. She shares how standards bodies are recalibrating after TLS 1.3, why multivariate signatures such as MAYO could reshape authentication, why European eID timelines miss critical cryptographic maturity gaps, and the first two steps any security team must take within the next year.</itunes:subtitle>
      <itunes:keywords/>
      <itunes:explicit>No</itunes:explicit>
      <googleplay:explicit>No</googleplay:explicit>
    </item>
    <item>
      <title>The Hidden Threat: Harvest-Now-Forge-Later and the Collapse of Digital Trust</title>
      <link>https://podcasts.fame.so/e/l8qwp028-the-hidden-threat-harvest-now-forge-later-and-the-collapse-of-digital-trust</link>
      <itunes:title>The Hidden Threat: Harvest-Now-Forge-Later and the Collapse of Digital Trust</itunes:title>
      <itunes:episode>23</itunes:episode>
      <itunes:season>1</itunes:season>
      <itunes:block>No</itunes:block>
      <googleplay:block>No</googleplay:block>
      <guid isPermaLink="false">80nv84k0</guid>
      <description>The timelines for post-quantum cryptography are tightening, and the real threat surface extends far beyond decrypting old data. In this episode of Shielded: The Last Line of Cyber Defense, host Jo Lintzen speaks with Konstantinos Karagiannis, Director of Quantum Computing Services at Protiviti and host of The Post-Quantum World podcast, about the attacker’s perspective on quantum risk and why the world must plan for more than harvest-now-decrypt-later. Konstantinos explains why harvest-now-forge-later attacks on code signing, software supply chains, and blockchain consensus represent the most powerful quantum-enabled vectors, and how the emerging five-day rule for breaking RSA-2048 reshapes threat modeling and urgency. Expect practical direction on identifying crown jewels, demanding vendor clarity, building crypto inventory, and framing post-quantum migration as a core cyber resilience priority rather than a future experiment.</description>
      <content:encoded><![CDATA[<div>As quantum computing advances, organizations can no longer view post-quantum cryptography as a future project. In this episode of Shielded: The Last Line of Cyber Defense, Konstantinos Karagiannis, Director of Quantum Computing Services at Protiviti, lays out a practical and attacker-focused perspective on preparing for the quantum era. Konstantinos explains why the industry’s fixation on harvest-now-decrypt-later misses the most serious exposure: harvest-now-forge-later, where quantum capability targets the foundation of digital trust through attacks on code signing, software update channels, and blockchain consensus mechanisms. He introduces the emerging Five-Day Rule, informed by recent research indicating that a cryptographically relevant quantum machine could break RSA-2048 in roughly five days, reshaping assumptions about risk and timelines. The discussion expands to the potential instability of blockchain networks, such as proof-of-stake systems reliant on BLS signatures, and the broader implications for market integrity and digital identity. Konstantinos outlines the steps security leaders must take now: identify crown-jewel assets, conduct a full cryptographic inventory, evaluate exposure windows, and demand clear post-quantum plans from vendors. The lesson here is post-quantum migration is a core cyber resilience program that must begin immediately, supported by real posture measurement and actionable timelines.</div><div><br><br></div><div>What You’ll Learn:<br><br><br></div><ul><li>The difference between harvest-now-decrypt-later and harvest-now-forge-later<br><br></li><li>Why code signing and supply-chain trust models are the most critical targets<br><br></li><li>How the five-day rule reframes attacker capability planning<br><br></li><li>Why blockchain &amp; BLS signatures represent high-impact quantum risk<br><br></li><li>Why cryptographically relevant machines will be operated by nation states and major crime rings<br><br></li><li>How PQC migration aligns with existing cyber resilience practices<br><br></li><li>Why crown jewel analysis and crypto inventory must start immediately</li></ul><div><br></div><ul><li>How to evaluate vendors and avoid vague timelines</li></ul><div><br></div><ul><li>Why PQC will become invisible infrastructure within the next few years<br><br></li></ul><div><br></div><div>Konstantinos Karagiannis is the Director of Quantum Computing Services at Protiviti, where he leads efforts helping organizations develop real quantum use cases in optimization, machine learning, and simulation, and build realistic paths toward post-quantum cryptography migration. He has been with Protiviti for more than six years, serving previously as Associate Director of Quantum Computing Services. Before Protiviti, Konstantinos spent 13 years at BT, where he served as CTO of the Security Consulting Practice for BT Americas, and earlier as Global Technical Lead for Ethical Hacking, leading red-team operations and advanced cryptographic security testing.</div><div><br><br></div><div>He is the host of Protiviti’s “Post Quantum World” podcast, recently featured at DEFCON with his talk Post-Quantum Panic: When will the cracking begin, and can we detect it? His work focuses on building real quantum computing solutions today while preparing enterprises for the accelerating risks of Q-Day.</div><div><br><br></div><div><strong>Your Roadmap to Quantum Resilience</strong></div><div><br><br></div><div><strong>[05:26] Step 1: Separate HNDL from HNFL -<br></strong><br></div><div>Konstantinos reframes quantum risk by challenging the narrow industry focus on harvest-now-decrypt-later (HNDL). Decrypting old emails years from now is far less damaging than the real threat: harvest-now-forge-later (HNFL), where attackers use quantum capability to forge identities, break code-signing foundations, and compromise the software supply chain. This shifts the threat from exposure of data to the collapse of trust. When an attacker becomes the authoritative sender such as Microsoft, Apple, a firewall vendor, or a banking platform, the attack scales instantly, bypasses controls, and moves invisibly. This is not about curiosity or espionage; it is about control and reach, where one forged update compromises millions of systems in minutes.</div><div><br>Key Question: Where does your organization implicitly trust signed updates or machine identities, and who validates the integrity of that trust boundary today?</div><div><br><br></div><div><strong>[07:34] Step 2: Apply the Five-Day Rule -<br></strong><br></div><div>Konstantinos introduces what he calls the Five-Day Rule, based on recent research suggesting that a cryptographically relevant quantum computer could break RSA-2048 using roughly 1,399 logical qubits in around five days. This turns timelines from theoretical decades into an operational window that security and architecture teams must model now. Five days changes the logic of risk, pushing leaders to assess which secrets, keys, and operational identities remain valuable within that timeframe. Financial transactions may expire quickly, but the keys protecting critical infrastructure, identity infrastructures, government systems, long-life intellectual property, or blockchain consensus remain valuable long after they are created.</div><div><br>Key Question: If a key protecting your most sensitive systems could be broken in five days, what response tempo, controls, and contingency paths would you rely on?</div><div><br><br></div><div><strong>[13:28] Step 3: Model Code-Signing Blast Radius -<br></strong><br></div><div>In his offensive-security perspective, Konstatinos explains that attackers will go after code-signing keys and update channels first, because those are the levers that unlock systemic access. Compromising a single vendor’s signing key turns a routine software update into a global breach. Unlike decrypting a single intercepted email, forging an update affects entire fleets of devices at once, laptops, networking gear, operational systems, and cloud workloads. Supply-chain attacks such as SolarWinds and ShadowHammer demonstrated the scale of trust-based compromise without any quantum capability. Quantum only removes the barrier of needing privileged access. The blast radius is not linear; it grows exponentially.</div><div><br>Key Question: If a major vendor in your environment silently lost control of its signing key, which systems would accept the update without verification, and how quickly would you detect the first signal of compromise?</div><div><br><br></div><div><strong>[16:27] Step 4: Include Blockchain and Market Stability -<br></strong><br></div><div>Konstantinos expands the discussion beyond enterprise IT into blockchain and digital asset ecosystems. Vulnerable Bitcoin wallets using reused or exposed addresses could be drained by reversing private keys. More significantly, proof-of-stake networks such as Ethereum rely on BLS signatures to establish validator identity and consensus. Breaking those signatures enables attackers to hijack consensus, manipulate network governance, or destabilize price confidence. The consequences go far beyond theft. The damage includes global market volatility, reputational collapse, and loss of institutional trust. Even the credible announcement that such capability exists could move markets, without a full attack ever executing.</div><div><br>Key Question: Where is your organization exposed, directly or indirectly, to digital assets, transaction flows, or reputational dependence on market stability?</div><div><br><br></div><div><strong>[30:53] Step 5: Turn Quantum Risk Into Cyber Resilience -<br></strong><br></div><div>Konstantinos emphasises that preparing for post-quantum migration begins with security fundamentals: catalogue your cryptography, identify crown-jewel systems, evaluate exposure lifespans, and map relationships between systems, third parties, and identity flows. This reframes PQC from a cryptographic experiment into a disciplined cyber resilience program grounded in visibility and sequencing. Teams must understand what they protect, how long those assets remain valuable, and where control layers converge. This requires more than technical transition; it demands ownership, governance, and prioritisation. A successful roadmap depends on clarity of dependencies before cryptography is swapped.</div><div><br>Key Question: Can you produce a precise and current map of every key, certificate, algorithm, and dependency protecting your core services, and prioritise change based on exposure rather than convenience?</div><div><br><br></div><div><strong>[33:27] Step 6: Demand Specifics from Vendors -<br></strong><br></div><div>Third-party vendors are central to PQC readiness, but vague statements such as “investigating PQC” provide no protection. Konstatinos urges organizations to demand version-level commitments, timelines, supported PQC algorithms, and attestation paths. Roadmaps must include implementation dates, hybrid-mode support windows, and performance characteristics. Accountability now sits across the entire supply chain, and cryptographic dependencies extend far beyond internal engineering. This is a procurement, legal, and architectural negotiation that requires clarity and documentation, not aspiration. Silence is risk; specificity is control.</div><div><br>Key Question: Do your vendor agreements require measurable and dated PQC milestones, or do you rely on trust without validated evidence?</div><div><br><br></div><div><strong>Episode Resources<br><br></strong><br></div><ul><li>Konstantinos Karagiannis on <a href="https://www.linkedin.com/in/konstantinos-karagiannis-0a09503/">LinkedIn</a><br><br></li><li>Protiviti <a href="https://www.protiviti.com/">Website</a></li></ul><div><br></div><ul><li>Johannes Lintzen on <a href="https://www.linkedin.com/in/jolintzen/">LinkedIn</a>&nbsp;<br><br></li><li>PQShield <a href="http://www.pqshield.com">Website</a>&nbsp;<br><br></li></ul><div><br></div><div>Want exclusive insights on quantum migration?&nbsp; Stay ahead of the curve. Subscribe to Shielded: The Last Line of Cyber Defense on Apple Podcasts, Spotify, or YouTube Podcasts.</div><div><br>✔ Get insider knowledge from leading cybersecurity experts.<br><br></div><div>✔ Learn practical steps to future-proof your organization.<br><br></div><div>✔ Stay updated on regulatory changes and industry trends.<br><br><br>Need help subscribing? Click <a href="https://www.fame.so/follow-rate-review">here</a> for step-by-step instructions.</div><div>Shielded: The Last Line of Cyber Defense is handcrafted by our friends over at: <a href="https://www.fame.so/?utm_medium=podcast&amp;utm_source=bcast&amp;utm_campaign=masters-of-community-with-david-spinks?utm_medium=podcast&amp;utm_source=bcast&amp;utm_campaign=fame-client">fame.so</a></div><div><br></div>]]></content:encoded>
      <pubDate>Thu, 04 Dec 2025 12:00:00 +0000</pubDate>
      <author>PQShield</author>
      <enclosure url="https://media.fame.so/8z79z5mw.mp3" length="87289729" type="audio/mpeg"/>
      <itunes:author>PQShield</itunes:author>
      <itunes:image href="https://content.fameapp.so/uploads/8l18kymq/01b181e0-d0f0-11f0-b557-094ef36996a4/01b18390-d0f0-11f0-8a99-cd9a5bfea588.png"/>
      <itunes:duration>2182</itunes:duration>
      <itunes:summary>The timelines for post-quantum cryptography are tightening, and the real threat surface extends far beyond decrypting old data. In this episode of Shielded: The Last Line of Cyber Defense, host Jo Lintzen speaks with Konstantinos Karagiannis, Director of Quantum Computing Services at Protiviti and host of The Post-Quantum World podcast, about the attacker’s perspective on quantum risk and why the world must plan for more than harvest-now-decrypt-later. Konstantinos explains why harvest-now-forge-later attacks on code signing, software supply chains, and blockchain consensus represent the most powerful quantum-enabled vectors, and how the emerging five-day rule for breaking RSA-2048 reshapes threat modeling and urgency. Expect practical direction on identifying crown jewels, demanding vendor clarity, building crypto inventory, and framing post-quantum migration as a core cyber resilience priority rather than a future experiment.</itunes:summary>
      <itunes:subtitle>The timelines for post-quantum cryptography are tightening, and the real threat surface extends far beyond decrypting old data. In this episode of Shielded: The Last Line of Cyber Defense, host Jo Lintzen speaks with Konstantinos Karagiannis, Director of Quantum Computing Services at Protiviti and host of The Post-Quantum World podcast, about the attacker’s perspective on quantum risk and why the world must plan for more than harvest-now-decrypt-later. Konstantinos explains why harvest-now-forge-later attacks on code signing, software supply chains, and blockchain consensus represent the most powerful quantum-enabled vectors, and how the emerging five-day rule for breaking RSA-2048 reshapes threat modeling and urgency. Expect practical direction on identifying crown jewels, demanding vendor clarity, building crypto inventory, and framing post-quantum migration as a core cyber resilience priority rather than a future experiment.</itunes:subtitle>
      <itunes:keywords/>
      <itunes:explicit>No</itunes:explicit>
      <googleplay:explicit>No</googleplay:explicit>
    </item>
    <item>
      <title>Inside Microsoft’s Quantum Safe Program: Turning Policy into Practice</title>
      <link>https://podcasts.fame.so/e/mn4lkk6n-inside-microsoft-s-quantum-safe-program-turning-policy-into-practice</link>
      <itunes:title>Inside Microsoft’s Quantum Safe Program: Turning Policy into Practice</itunes:title>
      <itunes:episode>22</itunes:episode>
      <itunes:season>1</itunes:season>
      <itunes:block>No</itunes:block>
      <googleplay:block>No</googleplay:block>
      <guid isPermaLink="false">x06rwwk0</guid>
      <description>Post-quantum security will reshape every system that depends on cryptography. In this episode of Shielded: The Last Line of Cyber Defense, host Jo Lintzen speaks with Kevin Reifsteck, Director for Critical Infrastructure Protection at Microsoft, about how governments and global enterprises can turn quantum-safe readiness from policy into practice. Kevin shares how Microsoft’s Quantum Safe Program sets clear timelines, embeds accountability across engineering teams, and helps customers prepare long before 2035. He unpacks what regulators must do to accelerate migration, how to prioritize long-lived systems, and why leadership commitment, not code alone, defines true quantum resilience.</description>
      <content:encoded><![CDATA[<div>Quantum computing is coming faster than most organizations are ready for. In this episode of Shielded: The Last Line of Cyber Defense, Kevin Reifsteck, Director for Critical Infrastructure Protection at Microsoft, joins Jo Lintzen to unpack how Microsoft is building a coordinated roadmap toward quantum-safe security and why governments and enterprises must start acting now. Kevin explains how Microsoft’s Quantum Safe Program connects engineering, compliance, and policy under one strategy, with a clear commitment to deliver customer-ready capabilities by 2029 and complete the global transition by 2033. He shares how this plan balances scale with flexibility, empowering each product group to define its path while keeping the company aligned to a shared goal. He outlines why post-quantum migration must move beyond “code swaps” to address real-world complexities like data-center encryption, operational technology that runs for decades, and global interoperability. Kevin also highlights the role of government action, appointing accountable leaders, aligning regulations across borders, and prioritizing sectors such as healthcare and finance where long-term data protection is critical.</div><div><br><br></div><div><strong>What You’ll Learn</strong></div><div><br><br></div><div>How Microsoft’s Quantum Safe Program sets 2029 and 2033 milestones for migration readiness.</div><div><br></div><div>Why accountability and leadership drive progress more than technology alone.</div><div><br></div><div>How to identify and protect systems and data with long-term exposure risk.</div><div><br></div><div>Why global alignment through NIST, ISO, and IETF matters for interoperability.</div><div><br></div><div>How governments can accelerate national readiness through coordinated action.</div><div><br></div><div>Why post-quantum migration must include hardware, policy, and operations - not just software updates.</div><div><br></div><div>Practical first steps for organizations to begin their own quantum-safe transition today.</div><div><br><br></div><div>Kevin Reifsteck is the Director for Critical Infrastructure Protection at Microsoft, where he leads global strategy across cybersecurity policy, quantum-safe readiness, and public–private sector collaboration. His work bridges engineering and regulation, helping Microsoft’s product teams align with evolving post-quantum cryptography standards while advising governments on how to prioritize critical systems and national resilience. Before joining Microsoft, Kevin served as Director for Critical Infrastructure Cybersecurity at the National Security Council, The White House, where he shaped U.S. policy for securing essential services and modernizing cyber risk management. Today, Kevin plays a central role in driving Microsoft’s Quantum Safe Program, which sets clear timelines for transitioning products and services to post-quantum cryptography and helping customers worldwide prepare for the quantum era. Known for his strategic clarity and cross-sector insight, he continues to champion global alignment, government readiness, and responsible innovation in securing the foundations of the digital world.</div><div><br><br></div><div><strong>Your Roadmap to Quantum Resilience</strong></div><div><br><br></div><div><strong>[01:25] Step 1: Set Accountability and Direction –<br></strong>Every successful migration begins with ownership. Kevin explains how Microsoft anchored its transition by naming accountable leaders and setting measurable goals across its entire product ecosystem. The company’s Quantum Safe Program unites engineering, policy, and compliance within one vision, ensuring that strategy translates into coordinated action. Each product group defines its own plan within shared milestones, creating focus without friction. This balance of central direction and local execution allows a company as large as Microsoft to move with precision. Leadership commitment is the engine that turns post-quantum awareness into measurable progress.</div><div><br></div><div>Key Question: Who owns your quantum-safe migration, and what milestones define success?</div><div><br><br></div><div><strong>[04:29] Step 2: Establish a Timeline Customers Can Trust –</strong></div><div>Microsoft’s roadmap defines clear signposts: customer-facing capabilities by 2029 and full transition across products and services by 2033. These dates are not abstract; they give structure to engineering priorities, regulatory engagement, and customer planning cycles. Kevin shares that transparency in scheduling helps align suppliers, cloud partners, and governments around a shared sense of urgency. It signals that the migration window is already open, and that early action reduces future cost and complexity. By publishing its timelines, Microsoft creates both accountability and confidence within the broader ecosystem. Timelines build trust, and trust accelerates adoption.</div><div><br></div><div>Key Question: Have you defined a clear migration timeline that aligns your teams, vendors, and customers?</div><div><br><br></div><div><strong>[07:29] Step 3: Make Policy an Enabler, Not a Barrier –</strong></div><div>Governments set the tempo of readiness. Kevin emphasizes that effective policy should create alignment, not administrative drag. Microsoft advocates for each nation to name a responsible authority, establish a post-quantum plan within its national cybersecurity strategy, and allocate the resources to act on it. Awareness programs and sector-specific guidance can turn compliance from a burden into an accelerator, especially for industries like healthcare and energy where expertise is scarce. The key is partnership; policymakers and private industry moving in rhythm toward the same standards and timelines. Well-crafted regulation builds the runway for secure innovation.</div><div><br></div><div>Key Question: How can your policy environment encourage rather than slow down quantum-safe adoption?</div><div><br><br></div><div><strong>[09:26] Step 4: Move Beyond the “Algorithm Swap” Mindset –</strong></div><div>True migration reaches beyond code. Kevin outlines how large-scale infrastructures rely on encryption embedded deep within hardware, network layers, and operational systems that may run for decades. In cloud environments, encryption depends on specialized chips, data flow, and power efficiency, all of which must adapt to larger keys and new computational demands. In critical infrastructure, replacing or reconfiguring operational technology requires careful planning and years of lead time. Treating PQC as a systemic evolution ensures that migration strengthens, rather than disrupts, core services. Preparation today prevents technical and operational lock-in tomorrow.</div><div><br></div><div>Key Question: Which parts of your infrastructure demand more than a code update to achieve quantum resilience?<br><br><br></div><div><strong>[12:32] Step 5: Protect Long-Lived Data and Systems –</strong></div><div>Some data loses value in weeks; other data must stay confidential for decades. Kevin draws attention to sectors where this matters most: finance, healthcare, and government, where exposure to “harvest-now, decrypt-later” attacks could have generational consequences. The first step is to identify which assets would still cause harm if exposed ten or fifteen years from now. Protecting those systems early not only reduces risk but avoids future regulatory and operational strain. Microsoft’s guidance encourages leaders to focus first on the information and services that define their long-term trust relationship with customers. Longevity determines priority in the quantum transition.</div><div><br></div><div>Key Question: Which information or systems in your organization will still matter a decade from now?</div><div><br><br></div><div><strong>[14:50] Step 6: Align Through Global Standards –</strong></div><div>Quantum resilience depends on collaboration that crosses borders. Kevin explains how Microsoft works within NIST, ISO, and IETF to ensure that algorithms and protocols mature together, preventing regional fragmentation that could slow the entire ecosystem. When nations align on standards, organizations can innovate confidently, knowing their systems will interoperate securely worldwide. The goal is a consistent framework that supports both national security and commercial continuity. Alignment builds momentum, and momentum ensures no critical infrastructure is left behind. The post-quantum era will reward those who plan globally and execute locally.</div><div><br></div><div>Key Question: How well are your systems and partners aligned with emerging global post-quantum standards?</div><div><br><br></div><div><strong>Episode Resources<br></strong><br></div><ul><li>Kevin Reifsteck on <a href="https://www.linkedin.com/in/kevin-reifsteck-6b7119191/">LinkedIn</a></li></ul><div><br></div><ul><li>Microsoft <a href="http://news.microsoft.com/">Website</a></li></ul><div><br></div><ul><li>Johannes Lintzen on <a href="https://www.linkedin.com/in/jolintzen/">LinkedIn</a>&nbsp;</li></ul><div><br></div><ul><li>PQShield <a href="http://www.pqshield.com">Website</a>&nbsp;</li></ul><div><br><br>Want exclusive insights on quantum migration?<br><br><br></div><div>Stay ahead of the curve. Subscribe to Shielded: The Last Line of Cyber Defense on Apple Podcasts, Spotify, or YouTube Podcasts.<br><br></div><div><br>✔ Get insider knowledge from leading cybersecurity experts.<br><br></div><div><br>✔ Learn practical steps to future-proof your organization.<br><br></div><div><br>✔ Stay updated on regulatory changes and industry trends.<br><br></div><div><br>Need help subscribing? Click here for step-by-step instructions.</div><div><br></div><div>Shielded: The Last Line of Cyber Defense is handcrafted by our friends over at: <a href="https://www.fame.so/?utm_medium=podcast&amp;utm_source=bcast&amp;utm_campaign=masters-of-community-with-david-spinks?utm_medium=podcast&amp;utm_source=bcast&amp;utm_campaign=fame-client">fame.so</a></div><div><br></div>]]></content:encoded>
      <pubDate>Thu, 20 Nov 2025 12:00:00 +0000</pubDate>
      <author>PQShield</author>
      <enclosure url="https://media.fame.so/8j0m3pr8.mp3" length="82543803" type="audio/mpeg"/>
      <itunes:author>PQShield</itunes:author>
      <itunes:image href="https://content.fameapp.so/uploads/8l18kymq/912b56d0-c602-11f0-a672-a58fad8dac0d/912b57f0-c602-11f0-9b95-31b9866f3974.png"/>
      <itunes:duration>2063</itunes:duration>
      <itunes:summary>Post-quantum security will reshape every system that depends on cryptography. In this episode of Shielded: The Last Line of Cyber Defense, host Jo Lintzen speaks with Kevin Reifsteck, Director for Critical Infrastructure Protection at Microsoft, about how governments and global enterprises can turn quantum-safe readiness from policy into practice. Kevin shares how Microsoft’s Quantum Safe Program sets clear timelines, embeds accountability across engineering teams, and helps customers prepare long before 2035. He unpacks what regulators must do to accelerate migration, how to prioritize long-lived systems, and why leadership commitment, not code alone, defines true quantum resilience.</itunes:summary>
      <itunes:subtitle>Post-quantum security will reshape every system that depends on cryptography. In this episode of Shielded: The Last Line of Cyber Defense, host Jo Lintzen speaks with Kevin Reifsteck, Director for Critical Infrastructure Protection at Microsoft, about how governments and global enterprises can turn quantum-safe readiness from policy into practice. Kevin shares how Microsoft’s Quantum Safe Program sets clear timelines, embeds accountability across engineering teams, and helps customers prepare long before 2035. He unpacks what regulators must do to accelerate migration, how to prioritize long-lived systems, and why leadership commitment, not code alone, defines true quantum resilience.</itunes:subtitle>
      <itunes:keywords/>
      <itunes:explicit>No</itunes:explicit>
      <googleplay:explicit>No</googleplay:explicit>
    </item>
    <item>
      <title>Securing the Silicon: How HP Designed Quantum-Safe Hardware from the Ground Up</title>
      <link>https://podcasts.fame.so/e/mn4lkpqn-securing-the-silicon-how-hp-designed-quantum-safe-hardware-from-the-ground-up</link>
      <itunes:title>Securing the Silicon: How HP Designed Quantum-Safe Hardware from the Ground Up</itunes:title>
      <itunes:episode>21</itunes:episode>
      <itunes:season>1</itunes:season>
      <itunes:block>No</itunes:block>
      <googleplay:block>No</googleplay:block>
      <guid isPermaLink="false">x06rwy20</guid>
      <description>Hardware defines trust. If its cryptography fails, no amount of software protection can recover it. In this episode of Shielded: The Last Line of Cyber Defense, host Jo Lintzen speaks with Thalia Laing, Principal Cryptographer at HP, about how HP engineered quantum-safe protection directly into the hardware root of trust. Thalia explains how her team launched the world’s first quantum-safe Secure Boot for business PCs, why hybrid RSA + LMS was the right bridge between certification and quantum resilience, and what it takes to safeguard firmware that can’t be patched in the field. Expect a grounded discussion on hardware-level migration, LMS parameter design, and the practical steps every enterprise can take to secure devices that will outlive today’s algorithms.</description>
      <content:encoded><![CDATA[<div>As quantum computing advances, organisations can no longer treat hardware migration as a secondary task. Thalia Laing, Principal Cryptographer at HP Security Lab, explains how HP adopted a hardware-first approach to post-quantum security by launching the world’s first quantum-safe Secure Boot for business PCs ahead of NIST standards. She describes how HP integrated hybrid RSA + LMS signatures to preserve certification assurance and user performance while adding quantum-safe protection at power-on. Thalia outlines the operational design behind LMS state management, parameter selection, and cross-team testing to ensure verification speed and long-term reliability. She details why many enterprises overlook hardware-implemented cryptography in their inventories and how this blind spot undermines migration plans. She highlights how securing firmware integrity extends device lifespan and builds measurable confidence across product lines. The discussion reinforces that protecting the hardware root of trust is the first step toward true post-quantum resilience.</div><div><br><br></div><div><strong>What You’ll Learn:</strong><br><br><br></div><ul><li>How HP built quantum-safe Secure Boot into production PCs before PQC standards were finalised.</li></ul><div><br></div><ul><li>Why hybrid RSA + LMS signatures bridge certification and quantum resilience.<br><br></li><li>How LMS state and parameters are managed for predictable, verifiable signing.<br><br></li><li>Why hardware-level cryptography must be included in every crypto inventory.</li></ul><div><br></div><ul><li>How securing firmware integrity extends device lifetime and compliance value.<br><br></li><li>How to prioritise long-lived, hard-to-update products in PQC migration plans.<br><br></li><li>Why crypto agility begins in design, not deployment.<br><br></li><li>Why starting with the hardware root of trust reduces cost, risk, and time pressure later.</li></ul><div><br></div><div><br></div><div>Thalia Laing is the Principal Cryptographer and Security Researcher at HP Security Lab, where she leads research and implementation initiatives in post-quantum cryptography, hardware-based security, and trusted computing. She has played a key role in HP’s development of quantum-safe Secure Boot for business PCs and printers, integrating hybrid RSA + LMS architectures that strengthen firmware integrity and protect devices throughout their lifecycle. Over nearly eight years at HP, she has contributed to advancing cryptographic standards, security innovation, and enterprise readiness for the quantum era.</div><div><br><br></div><div>Thalia holds a PhD in Cyber Security from Royal Holloway, University of London, where her research on enhanced threshold schemes explored the balance between security and efficiency in distributed cryptographic systems. A member of the NIST NCCoE Migration to PQC Project, she continues to collaborate across industry and academia to accelerate the adoption of quantum-resistant security technologies. Known for her rigour and clarity in applying cryptography to real-world engineering, Thalia focuses on designing security foundations that endure across generations of hardware and emerging post-quantum standards.<br><br></div><div><br></div><div><strong>Your Roadmap to Quantum Resilience<br></strong><br></div><div><br></div><div><strong>[05:58] Step 1: Protect the Root of Trust First –</strong></div><div>Quantum resilience begins where trust begins, which is in hardware. Thalia explains why HP started its post-quantum journey by redesigning the Secure Boot process, the first code executed when a device powers on. This verification chain is baked into silicon and cannot be patched in the field, making it the single most critical layer to protect against future quantum attacks. By introducing quantum-safe verification at this immutable level, HP ensured that even if traditional cryptography were compromised, the foundation of every PC would remain secure. The result is a hardware-anchored assurance model that outlasts software cycles and supports long-term device integrity.<br><br></div><div>Key Question: Which hardware-anchored components in your systems would compromise everything if their signatures failed?</div><div><br><br></div><div><strong>[08:58] Step 2: Combine Proven and Post-Quantum Assurance –</strong></div><div>Migration to post-quantum cryptography doesn’t mean abandoning what already works. HP adopted a hybrid RSA + LMS model to secure its business PCs, combining the certification maturity of RSA with the forward security of LMS. Both signatures must verify before a device will boot, and a nested design ensures consistency: the firmware is first signed with LMS, then the firmware and LMS signature are signed again with RSA. This dual chain preserves compatibility for existing customers while introducing quantum-safe protection seamlessly. It also satisfies regional and industry assurance requirements, an essential bridge between today’s standards and tomorrow’s mandates.<br><br></div><div>Key Question: Where could a hybrid model strengthen your cryptographic assurance without disrupting certification or performance?<br><br></div><div><br></div><div><strong>[11:53] Step 3: Manage LMS with Precision and Predictability –</strong></div><div>LMS is powerful but operationally demanding. Thalia outlines how HP engineered its signing infrastructure to prevent state reuse, manage signature limits, and tune the Winternitz parameter, a key setting that trades verification speed for computational effort. Because firmware signing happens predictably and infrequently, HP could model the entire lifecycle of each key, ensuring that verification remains fast and the state never exhausts. Extensive cross-testing between the signing infrastructure and endpoint firmware teams helped find the optimal balance between performance and endurance. The result is a proven framework for implementing post-quantum signatures in live production environments.<br><br></div><div>Key Question: Have you built the operational discipline to manage state, limits, and parameters before scaling PQC deployments?<br><br></div><div><br></div><div><strong>[21:16] Step 4: Close the Hardware Inventory Gap –</strong></div><div>Visibility drives every successful migration, yet most crypto inventories overlook what’s embedded in hardware. Thalia emphasises that many scanning tools capture software libraries and network protocols but miss firmware-level cryptography entirely. Secure Boot keys, embedded verification logic, and hardware root certificates often sit outside conventional monitoring systems. HP encourages organisations to supplement automated scans with manual verification and vendor collaboration to document these hidden elements. Only by mapping cryptography end-to-end, from cloud to chip, can enterprises manage risk and sequence migration effectively.<br><br></div><div>Key Question: Does your cryptographic inventory capture the unseen hardware roots that define your trust boundary?<br><br></div><div><br></div><div><strong>[25:32] Step 5: Build for Physical Resilience –</strong></div><div>Quantum safety is only part of the equation, physical resilience completes it. Thalia explains how HP integrates side-channel and fault-injection protections into hardware designs, preventing attackers from bypassing verification steps or manipulating power and timing behaviour. Since such defences cannot be retrofitted after deployment, they must be planned at the design phase alongside cryptographic migration. The goal is not just mathematical security but operational assurance, devices that remain trustworthy even under physical access or lab-level attack.<br><br></div><div>Key Question: How aligned are your hardware-level countermeasures with the cryptographic strength you rely on?<br><br></div><div><br></div><div><strong>[18:21] Step 6: Prioritise Long-Lived, Hard-to-Update Devices –</strong></div><div>Every device has a lifespan; cryptography often does not. HP’s migration strategy focuses on hardware that will remain in service for years, business PCs, printers, and embedded peripherals. By upgrading these devices first, HP reduces exposure to the “harvest now, decrypt later” threat and avoids expensive retrofits when new standards become mandatory. Thalia calls this “future-proofing at the factory”: designing security that endures as algorithms evolve and threats mature. Prioritising longevity over convenience transforms security investment into measurable business value.</div><div>Key Question: Which products in your portfolio will still be operational when quantum attacks become real, and are they ready today?</div><div><br><br></div><div><strong>Episode Resources<br><br></strong><br></div><ul><li>Thalia Laing on <a href="https://www.linkedin.com/in/thalialaing/">LinkedIn</a><br><br></li><li>HP <a href="http://www.hp.com/">Website</a><br><br></li><li>Johannes Lintzen on <a href="https://www.linkedin.com/in/jolintzen/">LinkedIn</a>&nbsp;</li></ul><div><br></div><ul><li>PQShield <a href="http://www.pqshield.com">Website</a>&nbsp;<br><br></li></ul><div><br></div><div>Want exclusive insights on quantum migration?&nbsp; Stay ahead of the curve. Subscribe to Shielded: The Last Line of Cyber Defense on Apple Podcasts, Spotify, or YouTube Podcasts.</div><div><br><br>✔ Get insider knowledge from leading cybersecurity experts.<br><br></div><div><br>✔ Learn practical steps to future-proof your organization.<br><br></div><div><br>✔ Stay updated on regulatory changes and industry trends.<br><br><br>Need help subscribing? Click <a href="https://www.fame.so/follow-rate-review">here</a> for step-by-step instructions.</div><div><br></div><div>Shielded: The Last Line of Cyber Defense is handcrafted by our friends over at: <a href="https://www.fame.so/?utm_medium=podcast&amp;utm_source=bcast&amp;utm_campaign=masters-of-community-with-david-spinks?utm_medium=podcast&amp;utm_source=bcast&amp;utm_campaign=fame-client">fame.so</a></div><div><br></div>]]></content:encoded>
      <pubDate>Thu, 06 Nov 2025 12:00:00 +0000</pubDate>
      <author>PQShield</author>
      <enclosure url="https://media.fame.so/wvyz1x38.mp3" length="87305403" type="audio/mpeg"/>
      <itunes:author>PQShield</itunes:author>
      <itunes:image href="https://content.fameapp.so/uploads/8l18kymq/a5cf2400-ba2e-11f0-94aa-2d8220306801/a5cf2500-ba2e-11f0-b7c7-4ff6fb455516.png"/>
      <itunes:duration>2182</itunes:duration>
      <itunes:summary>Hardware defines trust. If its cryptography fails, no amount of software protection can recover it. In this episode of Shielded: The Last Line of Cyber Defense, host Jo Lintzen speaks with Thalia Laing, Principal Cryptographer at HP, about how HP engineered quantum-safe protection directly into the hardware root of trust. Thalia explains how her team launched the world’s first quantum-safe Secure Boot for business PCs, why hybrid RSA + LMS was the right bridge between certification and quantum resilience, and what it takes to safeguard firmware that can’t be patched in the field. Expect a grounded discussion on hardware-level migration, LMS parameter design, and the practical steps every enterprise can take to secure devices that will outlive today’s algorithms.</itunes:summary>
      <itunes:subtitle>Hardware defines trust. If its cryptography fails, no amount of software protection can recover it. In this episode of Shielded: The Last Line of Cyber Defense, host Jo Lintzen speaks with Thalia Laing, Principal Cryptographer at HP, about how HP engineered quantum-safe protection directly into the hardware root of trust. Thalia explains how her team launched the world’s first quantum-safe Secure Boot for business PCs, why hybrid RSA + LMS was the right bridge between certification and quantum resilience, and what it takes to safeguard firmware that can’t be patched in the field. Expect a grounded discussion on hardware-level migration, LMS parameter design, and the practical steps every enterprise can take to secure devices that will outlive today’s algorithms.</itunes:subtitle>
      <itunes:keywords/>
      <itunes:explicit>No</itunes:explicit>
      <googleplay:explicit>No</googleplay:explicit>
    </item>
    <item>
      <title>Global Standards, Regional Variants: Designing for PQC Across Jurisdictions</title>
      <link>https://podcasts.fame.so/e/pnllrjpn-global-standards-regional-variants-designing-for-pqc-across-jurisdictions</link>
      <itunes:title>Global Standards, Regional Variants: Designing for PQC Across Jurisdictions</itunes:title>
      <itunes:episode>20</itunes:episode>
      <itunes:season>1</itunes:season>
      <itunes:block>No</itunes:block>
      <googleplay:block>No</googleplay:block>
      <guid isPermaLink="false">x0l6wlx0</guid>
      <description>As quantum computing accelerates, organizations can no longer treat cryptographic migration as a distant technical task. Dr Richard Searle of Fortanix explains how confidential computing and a software-first model enable enterprises to adopt post-quantum cryptography (PQC) rapidly while maintaining control, compliance, and agility. He describes how Fortanix integrates standardized PQC algorithms within trusted execution environments to protect data in use, at rest, and in motion, providing a verifiable layer of defense against quantum-era threats. Richard clarifies that crypto agility, not a one-off migration, is the real target, enabling algorithm rotation and policy enforcement as new standards evolve. He also outlines how global companies must account for regional algorithm preferences, such as those emerging in Europe and Asia, without fragmenting global operations. Through examples from finance and technology sectors, he highlights how auditability, attestation, and workload geolocation now define compliance readiness across DORA, GDPR, and CNSA 2.0 frameworks. The discussion reinforces that migration is as much about policy, inventory, and evidence as it is about cryptography itself. The lesson is direct: begin the transition now, build measurable posture, and design architectures that can adapt before regulators and attackers dictate the timeline.


What You’ll Learn:

How confidential computing underpins a secure execution base for PQC migration.
Why crypto agility, not one-off migration, defines long-term resilience.
How to manage regional algorithm differences while maintaining global compatibility.
How attestation, geolocation, and immutable logs turn compliance into proof of control.
The role of inventory management and performance assessment in sequencing PQC rollout.
How to balance human approval with machine-based cryptographic execution through APIs.
Why finance and technology are leading sectors in post-quantum adoption.
Why starting now lowers cost, builds capability, and prevents a rushed, regulator-driven scramble.

Dr Richard Searle is the Chief AI Officer at Fortanix, a global leader in confidential computing and data security. He leads Fortanix’s strategy at the intersection of cryptography, AI security, and post-quantum readiness, helping enterprises protect data across hybrid multi-cloud environments. With a background in systems engineering and safety-critical design, Richard brings more than two decades of experience in building secure, compliant, and resilient systems for both private and public sectors. Before becoming Chief AI Officer, Richard served as Fortanix’s Vice President of Confidential Computing and played a pivotal role in advancing the company’s confidential computing platform, which secures data in use through trusted execution environments. He has also served as the Chair of the End-User Advisory Council and General Members’ Representative to the Governing Board of the Confidential Computing Consortium under the Linux Foundation.


A Doctor of Business Administration from Henley Business School, University of Reading, Richard continues to contribute to research in AI and defense security. He serves as Principal Investigator for Fortanix within the U.S. NIST AI Safety Institute Consortium (AISIC) and the UK Integrated Quantum Network (IQN) Hub. Known for his clarity and discipline in security architecture, Richard focuses on helping global enterprises design for crypto agility, regulatory assurance, and quantum-safe innovation.


Your Roadmap to Quantum Resilience


[03:14] Step 1: Establish a Confidential Computing Base -
Quantum resilience begins with protecting what matters most, which is “data in use.” Richard explains how trusted execution environments create an invisible shield around sensitive workloads, keeping information safe even while it is being processed. Fortanix’s software-first foundation allows this protection to extend across cloud and on-premises systems, without the delays of hardware dependencies. Establishing this base gives enterprises the confidence to deploy new algorithms, test PQC performance, and maintain control wherever their data flows.
Key Question: Which of your workloads process the most sensitive data and need in-use protection today?


[05:45] Step 2: Design for Crypto Agility from Day One -
Every organization entering the quantum era must prepare for change. Richard highlights the need to design systems that can adapt, rotating algorithms, refreshing keys, and updating parameters through policy rather than rebuilds. This mindset transforms cryptography from a fixed asset into a flexible service that evolves alongside emerging standards. By embedding agility from the start, enterprises can move with the pace of regulation and innovation instead of reacting to it.

Key Question: How easily can your teams change algorithms when new standards arrive?


[09:10] Step 3: Plan for Regional Algorithm Variants -
Global operations demand awareness of regional differences in cryptographic policy. While NIST drives the global baseline, Europe and Asia are advancing their own approaches, such as Classic McEliece and FrodoKEM, to strengthen local sovereignty. Fortanix addresses this diversity through a single control plane that can manage multiple algorithms while maintaining unified governance. Organizations that prepare for regional variance today will stay compliant and operationally aligned as new mandates emerge.

Key Question: Are your policies ready to accommodate regional algorithm choices without breaking global consistency?


[16:15] Step 4: Turn Compliance into Evidence -
Compliance becomes a source of trust when it can be proven. Richard shows how attestation and workload geolocation enable enterprises to demonstrate exactly where and how data was processed. Immutable logs and signed records create a transparent audit trail, satisfying frameworks like GDPR, DORA, and CNSA 2.0. This approach shifts compliance from a reporting exercise to a living proof of security discipline and accountability.

Key Question: Can you present verifiable proof of control, location, and authorization for sensitive workloads?


[19:22] Step 5: Inventory, Evaluate Performance, and Sequence by Exposure -
A strong migration plan begins with visibility. Richard outlines how teams can build an accurate inventory of keys, certificates, and machine identities, then analyze which are most exposed or critical to business continuity. Fortanix’s data security platform supports this assessment, enabling phased implementation that balances performance with risk. By starting with the systems that face customers and regulators, organizations gain both resilience and credibility in their transition to PQC.

Key Question: Which high-exposure services in your organization should move first toward PQC?


[21:01] Step 6: Govern with Humans, Execute with Machine Identities -
As automation expands, clarity of control becomes vital. Richard describes how Fortanix maintains human oversight through quorum approvals while allowing machine identities to perform cryptographic operations within defined boundaries. This structure preserves accountability and enables scale, empowering secure automation for code signing, data exchange, and AI workflows. True governance lies in this balance, human intent directing machine execution through policy and precision.

Key Question: Where can you introduce automation that enhances control rather than replacing it?


Episode Resources

Richard Searle on LinkedIn
Fortanix Website
Johannes Lintzen on LinkedIn 
PQShield Website 

Want exclusive insights on quantum migration?  Stay ahead of the curve. Subscribe to Shielded: The Last Line of Cyber Defense on Apple Podcasts, Spotify, or YouTube Podcasts.


✔ Get insider knowledge from leading cybersecurity experts.

✔ Learn practical steps to future-proof your organization.

✔ Stay updated on regulatory changes and industry trends.


Need help subscribing? Click here for step-by-step instructions.</description>
      <content:encoded><![CDATA[<div>As quantum computing accelerates, organizations can no longer treat cryptographic migration as a distant technical task. Dr Richard Searle of Fortanix explains how confidential computing and a software-first model enable enterprises to adopt post-quantum cryptography (PQC) rapidly while maintaining control, compliance, and agility. He describes how Fortanix integrates standardized PQC algorithms within trusted execution environments to protect data in use, at rest, and in motion, providing a verifiable layer of defense against quantum-era threats. Richard clarifies that crypto agility, not a one-off migration, is the real target, enabling algorithm rotation and policy enforcement as new standards evolve. He also outlines how global companies must account for regional algorithm preferences, such as those emerging in Europe and Asia, without fragmenting global operations. Through examples from finance and technology sectors, he highlights how auditability, attestation, and workload geolocation now define compliance readiness across DORA, GDPR, and CNSA 2.0 frameworks. The discussion reinforces that migration is as much about policy, inventory, and evidence as it is about cryptography itself. The lesson is direct: begin the transition now, build measurable posture, and design architectures that can adapt before regulators and attackers dictate the timeline.<br><br></div><div><br></div><div>What You’ll Learn:<br><br></div><ul><li>How confidential computing underpins a secure execution base for PQC migration.</li><li>Why crypto agility, not one-off migration, defines long-term resilience.</li><li>How to manage regional algorithm differences while maintaining global compatibility.</li><li>How attestation, geolocation, and immutable logs turn compliance into proof of control.</li><li>The role of inventory management and performance assessment in sequencing PQC rollout.</li><li>How to balance human approval with machine-based cryptographic execution through APIs.</li><li>Why finance and technology are leading sectors in post-quantum adoption.</li><li>Why starting now lowers cost, builds capability, and prevents a rushed, regulator-driven scramble.</li></ul><div><br></div><div>Dr Richard Searle is the Chief AI Officer at Fortanix, a global leader in confidential computing and data security. He leads Fortanix’s strategy at the intersection of cryptography, AI security, and post-quantum readiness, helping enterprises protect data across hybrid multi-cloud environments. With a background in systems engineering and safety-critical design, Richard brings more than two decades of experience in building secure, compliant, and resilient systems for both private and public sectors. Before becoming Chief AI Officer, Richard served as Fortanix’s Vice President of Confidential Computing and played a pivotal role in advancing the company’s confidential computing platform, which secures data in use through trusted execution environments. He has also served as the Chair of the End-User Advisory Council and General Members’ Representative to the Governing Board of the Confidential Computing Consortium under the Linux Foundation.<br><br></div><div><br></div><div>A Doctor of Business Administration from Henley Business School, University of Reading, Richard continues to contribute to research in AI and defense security. He serves as Principal Investigator for Fortanix within the U.S. NIST AI Safety Institute Consortium (AISIC) and the UK Integrated Quantum Network (IQN) Hub. Known for his clarity and discipline in security architecture, Richard focuses on helping global enterprises design for crypto agility, regulatory assurance, and quantum-safe innovation.<br><br></div><div><br></div><div><strong>Your Roadmap to Quantum Resilience</strong></div><div><br><br></div><div><strong>[03:14] Step 1: Establish a Confidential Computing Base -</strong></div><div>Quantum resilience begins with protecting what matters most, which is “data in use.” Richard explains how trusted execution environments create an invisible shield around sensitive workloads, keeping information safe even while it is being processed. Fortanix’s software-first foundation allows this protection to extend across cloud and on-premises systems, without the delays of hardware dependencies. Establishing this base gives enterprises the confidence to deploy new algorithms, test PQC performance, and maintain control wherever their data flows.</div><div>Key Question: Which of your workloads process the most sensitive data and need in-use protection today?<br><br></div><div><br></div><div><strong>[05:45] Step 2: Design for Crypto Agility from Day One -</strong></div><div>Every organization entering the quantum era must prepare for change. Richard highlights the need to design systems that can adapt, rotating algorithms, refreshing keys, and updating parameters through policy rather than rebuilds. This mindset transforms cryptography from a fixed asset into a flexible service that evolves alongside emerging standards. By embedding agility from the start, enterprises can move with the pace of regulation and innovation instead of reacting to it.<br><br></div><div>Key Question: How easily can your teams change algorithms when new standards arrive?<br><br></div><div><br></div><div><strong>[09:10] Step 3: Plan for Regional Algorithm Variants -</strong></div><div>Global operations demand awareness of regional differences in cryptographic policy. While NIST drives the global baseline, Europe and Asia are advancing their own approaches, such as Classic McEliece and FrodoKEM, to strengthen local sovereignty. Fortanix addresses this diversity through a single control plane that can manage multiple algorithms while maintaining unified governance. Organizations that prepare for regional variance today will stay compliant and operationally aligned as new mandates emerge.<br><br></div><div>Key Question: Are your policies ready to accommodate regional algorithm choices without breaking global consistency?<br><br></div><div><br></div><div><strong>[16:15] Step 4: Turn Compliance into Evidence -</strong></div><div>Compliance becomes a source of trust when it can be proven. Richard shows how attestation and workload geolocation enable enterprises to demonstrate exactly where and how data was processed. Immutable logs and signed records create a transparent audit trail, satisfying frameworks like GDPR, DORA, and CNSA 2.0. This approach shifts compliance from a reporting exercise to a living proof of security discipline and accountability.<br><br></div><div>Key Question: Can you present verifiable proof of control, location, and authorization for sensitive workloads?<br><br></div><div><br></div><div><strong>[19:22] Step 5: Inventory, Evaluate Performance, and Sequence by Exposure -</strong></div><div>A strong migration plan begins with visibility. Richard outlines how teams can build an accurate inventory of keys, certificates, and machine identities, then analyze which are most exposed or critical to business continuity. Fortanix’s data security platform supports this assessment, enabling phased implementation that balances performance with risk. By starting with the systems that face customers and regulators, organizations gain both resilience and credibility in their transition to PQC.<br><br></div><div>Key Question: Which high-exposure services in your organization should move first toward PQC?<br><br></div><div><br></div><div><strong>[21:01] Step 6: Govern with Humans, Execute with Machine Identities -</strong></div><div>As automation expands, clarity of control becomes vital. Richard describes how Fortanix maintains human oversight through quorum approvals while allowing machine identities to perform cryptographic operations within defined boundaries. This structure preserves accountability and enables scale, empowering secure automation for code signing, data exchange, and AI workflows. True governance lies in this balance, human intent directing machine execution through policy and precision.<br><br></div><div>Key Question: Where can you introduce automation that enhances control rather than replacing it?<br><br></div><div><br></div><div><strong>Episode Resources<br></strong><br></div><ul><li>Richard Searle on <a href="https://www.linkedin.com/in/richard-searle-cc/">LinkedIn</a></li><li>Fortanix <a href="https://www.linkedin.com/company/fortanix/">Website</a></li><li>Johannes Lintzen on <a href="https://www.linkedin.com/in/jolintzen/">LinkedIn</a>&nbsp;</li><li>PQShield <a href="http://www.pqshield.com">Website</a>&nbsp;</li></ul><div><br></div><div>Want exclusive insights on quantum migration?&nbsp; Stay ahead of the curve. Subscribe to Shielded: The Last Line of Cyber Defense on Apple Podcasts, Spotify, or YouTube Podcasts.<br><br></div><div><br>✔ Get insider knowledge from leading cybersecurity experts.</div><div><br>✔ Learn practical steps to future-proof your organization.<br><br></div><div>✔ Stay updated on regulatory changes and industry trends.<br><br><br>Need help subscribing? Click <a href="https://www.fame.so/follow-rate-review">here</a> for step-by-step instructions.</div><div>Shielded: The Last Line of Cyber Defense is handcrafted by our friends over at: <a href="https://www.fame.so/?utm_medium=podcast&amp;utm_source=bcast&amp;utm_campaign=masters-of-community-with-david-spinks?utm_medium=podcast&amp;utm_source=bcast&amp;utm_campaign=fame-client">fame.so</a></div><div><br></div>]]></content:encoded>
      <pubDate>Thu, 23 Oct 2025 11:00:00 +0000</pubDate>
      <author>PQShield</author>
      <enclosure url="https://media.fame.so/w4vlkrjw.mp3" length="67265305" type="audio/mpeg"/>
      <itunes:author>PQShield</itunes:author>
      <itunes:image href="https://content.fameapp.so/uploads/8l18kymq/a13f15e0-af38-11f0-9818-1388dfef9d65/a13f16e0-af38-11f0-818d-d1bd8e83136c.png"/>
      <itunes:duration>1681</itunes:duration>
      <itunes:summary>As quantum computing accelerates, organizations can no longer treat cryptographic migration as a distant technical task. Dr Richard Searle of Fortanix explains how confidential computing and a software-first model enable enterprises to adopt post-quantum cryptography (PQC) rapidly while maintaining control, compliance, and agility. He describes how Fortanix integrates standardized PQC algorithms within trusted execution environments to protect data in use, at rest, and in motion, providing a verifiable layer of defense against quantum-era threats. Richard clarifies that crypto agility, not a one-off migration, is the real target, enabling algorithm rotation and policy enforcement as new standards evolve. He also outlines how global companies must account for regional algorithm preferences, such as those emerging in Europe and Asia, without fragmenting global operations. Through examples from finance and technology sectors, he highlights how auditability, attestation, and workload geolocation now define compliance readiness across DORA, GDPR, and CNSA 2.0 frameworks. The discussion reinforces that migration is as much about policy, inventory, and evidence as it is about cryptography itself. The lesson is direct: begin the transition now, build measurable posture, and design architectures that can adapt before regulators and attackers dictate the timeline.


What You’ll Learn:

How confidential computing underpins a secure execution base for PQC migration.
Why crypto agility, not one-off migration, defines long-term resilience.
How to manage regional algorithm differences while maintaining global compatibility.
How attestation, geolocation, and immutable logs turn compliance into proof of control.
The role of inventory management and performance assessment in sequencing PQC rollout.
How to balance human approval with machine-based cryptographic execution through APIs.
Why finance and technology are leading sectors in post-quantum adoption.
Why starting now lowers cost, builds capability, and prevents a rushed, regulator-driven scramble.

Dr Richard Searle is the Chief AI Officer at Fortanix, a global leader in confidential computing and data security. He leads Fortanix’s strategy at the intersection of cryptography, AI security, and post-quantum readiness, helping enterprises protect data across hybrid multi-cloud environments. With a background in systems engineering and safety-critical design, Richard brings more than two decades of experience in building secure, compliant, and resilient systems for both private and public sectors. Before becoming Chief AI Officer, Richard served as Fortanix’s Vice President of Confidential Computing and played a pivotal role in advancing the company’s confidential computing platform, which secures data in use through trusted execution environments. He has also served as the Chair of the End-User Advisory Council and General Members’ Representative to the Governing Board of the Confidential Computing Consortium under the Linux Foundation.


A Doctor of Business Administration from Henley Business School, University of Reading, Richard continues to contribute to research in AI and defense security. He serves as Principal Investigator for Fortanix within the U.S. NIST AI Safety Institute Consortium (AISIC) and the UK Integrated Quantum Network (IQN) Hub. Known for his clarity and discipline in security architecture, Richard focuses on helping global enterprises design for crypto agility, regulatory assurance, and quantum-safe innovation.


Your Roadmap to Quantum Resilience


[03:14] Step 1: Establish a Confidential Computing Base -
Quantum resilience begins with protecting what matters most, which is “data in use.” Richard explains how trusted execution environments create an invisible shield around sensitive workloads, keeping information safe even while it is being processed. Fortanix’s software-first foundation allows this protection to extend across cloud and on-premises systems, without the delays of hardware dependencies. Establishing this base gives enterprises the confidence to deploy new algorithms, test PQC performance, and maintain control wherever their data flows.
Key Question: Which of your workloads process the most sensitive data and need in-use protection today?


[05:45] Step 2: Design for Crypto Agility from Day One -
Every organization entering the quantum era must prepare for change. Richard highlights the need to design systems that can adapt, rotating algorithms, refreshing keys, and updating parameters through policy rather than rebuilds. This mindset transforms cryptography from a fixed asset into a flexible service that evolves alongside emerging standards. By embedding agility from the start, enterprises can move with the pace of regulation and innovation instead of reacting to it.

Key Question: How easily can your teams change algorithms when new standards arrive?


[09:10] Step 3: Plan for Regional Algorithm Variants -
Global operations demand awareness of regional differences in cryptographic policy. While NIST drives the global baseline, Europe and Asia are advancing their own approaches, such as Classic McEliece and FrodoKEM, to strengthen local sovereignty. Fortanix addresses this diversity through a single control plane that can manage multiple algorithms while maintaining unified governance. Organizations that prepare for regional variance today will stay compliant and operationally aligned as new mandates emerge.

Key Question: Are your policies ready to accommodate regional algorithm choices without breaking global consistency?


[16:15] Step 4: Turn Compliance into Evidence -
Compliance becomes a source of trust when it can be proven. Richard shows how attestation and workload geolocation enable enterprises to demonstrate exactly where and how data was processed. Immutable logs and signed records create a transparent audit trail, satisfying frameworks like GDPR, DORA, and CNSA 2.0. This approach shifts compliance from a reporting exercise to a living proof of security discipline and accountability.

Key Question: Can you present verifiable proof of control, location, and authorization for sensitive workloads?


[19:22] Step 5: Inventory, Evaluate Performance, and Sequence by Exposure -
A strong migration plan begins with visibility. Richard outlines how teams can build an accurate inventory of keys, certificates, and machine identities, then analyze which are most exposed or critical to business continuity. Fortanix’s data security platform supports this assessment, enabling phased implementation that balances performance with risk. By starting with the systems that face customers and regulators, organizations gain both resilience and credibility in their transition to PQC.

Key Question: Which high-exposure services in your organization should move first toward PQC?


[21:01] Step 6: Govern with Humans, Execute with Machine Identities -
As automation expands, clarity of control becomes vital. Richard describes how Fortanix maintains human oversight through quorum approvals while allowing machine identities to perform cryptographic operations within defined boundaries. This structure preserves accountability and enables scale, empowering secure automation for code signing, data exchange, and AI workflows. True governance lies in this balance, human intent directing machine execution through policy and precision.

Key Question: Where can you introduce automation that enhances control rather than replacing it?


Episode Resources

Richard Searle on LinkedIn
Fortanix Website
Johannes Lintzen on LinkedIn 
PQShield Website 

Want exclusive insights on quantum migration?  Stay ahead of the curve. Subscribe to Shielded: The Last Line of Cyber Defense on Apple Podcasts, Spotify, or YouTube Podcasts.


✔ Get insider knowledge from leading cybersecurity experts.

✔ Learn practical steps to future-proof your organization.

✔ Stay updated on regulatory changes and industry trends.


Need help subscribing? Click here for step-by-step instructions.</itunes:summary>
      <itunes:subtitle>As quantum computing accelerates, organizations can no longer treat cryptographic migration as a distant technical task. Dr Richard Searle of Fortanix explains how confidential computing and a software-first model enable enterprises to adopt post-quantum cryptography (PQC) rapidly while maintaining control, compliance, and agility. He describes how Fortanix integrates standardized PQC algorithms within trusted execution environments to protect data in use, at rest, and in motion, providing a verifiable layer of defense against quantum-era threats. Richard clarifies that crypto agility, not a one-off migration, is the real target, enabling algorithm rotation and policy enforcement as new standards evolve. He also outlines how global companies must account for regional algorithm preferences, such as those emerging in Europe and Asia, without fragmenting global operations. Through examples from finance and technology sectors, he highlights how auditability, attestation, and workload geolocation now define compliance readiness across DORA, GDPR, and CNSA 2.0 frameworks. The discussion reinforces that migration is as much about policy, inventory, and evidence as it is about cryptography itself. The lesson is direct: begin the transition now, build measurable posture, and design architectures that can adapt before regulators and attackers dictate the timeline.


What You’ll Learn:

How confidential computing underpins a secure execution base for PQC migration.
Why crypto agility, not one-off migration, defines long-term resilience.
How to manage regional algorithm differences while maintaining global compatibility.
How attestation, geolocation, and immutable logs turn compliance into proof of control.
The role of inventory management and performance assessment in sequencing PQC rollout.
How to balance human approval with machine-based cryptographic execution through APIs.
Why finance and technology are leading sectors in post-quantum adoption.
Why starting now lowers cost, builds capability, and prevents a rushed, regulator-driven scramble.

Dr Richard Searle is the Chief AI Officer at Fortanix, a global leader in confidential computing and data security. He leads Fortanix’s strategy at the intersection of cryptography, AI security, and post-quantum readiness, helping enterprises protect data across hybrid multi-cloud environments. With a background in systems engineering and safety-critical design, Richard brings more than two decades of experience in building secure, compliant, and resilient systems for both private and public sectors. Before becoming Chief AI Officer, Richard served as Fortanix’s Vice President of Confidential Computing and played a pivotal role in advancing the company’s confidential computing platform, which secures data in use through trusted execution environments. He has also served as the Chair of the End-User Advisory Council and General Members’ Representative to the Governing Board of the Confidential Computing Consortium under the Linux Foundation.


A Doctor of Business Administration from Henley Business School, University of Reading, Richard continues to contribute to research in AI and defense security. He serves as Principal Investigator for Fortanix within the U.S. NIST AI Safety Institute Consortium (AISIC) and the UK Integrated Quantum Network (IQN) Hub. Known for his clarity and discipline in security architecture, Richard focuses on helping global enterprises design for crypto agility, regulatory assurance, and quantum-safe innovation.


Your Roadmap to Quantum Resilience


[03:14] Step 1: Establish a Confidential Computing Base -
Quantum resilience begins with protecting what matters most, which is “data in use.” Richard explains how trusted execution environments create an invisible shield around sensitive workloads, keeping information safe even while it is being processed. Fortanix’s software-first foundation allows this protection to extend across cloud and on-premises systems, without the delays of hardware dependencies. Establishing this base gives enterprises the confidence to deploy new algorithms, test PQC performance, and maintain control wherever their data flows.
Key Question: Which of your workloads process the most sensitive data and need in-use protection today?


[05:45] Step 2: Design for Crypto Agility from Day One -
Every organization entering the quantum era must prepare for change. Richard highlights the need to design systems that can adapt, rotating algorithms, refreshing keys, and updating parameters through policy rather than rebuilds. This mindset transforms cryptography from a fixed asset into a flexible service that evolves alongside emerging standards. By embedding agility from the start, enterprises can move with the pace of regulation and innovation instead of reacting to it.

Key Question: How easily can your teams change algorithms when new standards arrive?


[09:10] Step 3: Plan for Regional Algorithm Variants -
Global operations demand awareness of regional differences in cryptographic policy. While NIST drives the global baseline, Europe and Asia are advancing their own approaches, such as Classic McEliece and FrodoKEM, to strengthen local sovereignty. Fortanix addresses this diversity through a single control plane that can manage multiple algorithms while maintaining unified governance. Organizations that prepare for regional variance today will stay compliant and operationally aligned as new mandates emerge.

Key Question: Are your policies ready to accommodate regional algorithm choices without breaking global consistency?


[16:15] Step 4: Turn Compliance into Evidence -
Compliance becomes a source of trust when it can be proven. Richard shows how attestation and workload geolocation enable enterprises to demonstrate exactly where and how data was processed. Immutable logs and signed records create a transparent audit trail, satisfying frameworks like GDPR, DORA, and CNSA 2.0. This approach shifts compliance from a reporting exercise to a living proof of security discipline and accountability.

Key Question: Can you present verifiable proof of control, location, and authorization for sensitive workloads?


[19:22] Step 5: Inventory, Evaluate Performance, and Sequence by Exposure -
A strong migration plan begins with visibility. Richard outlines how teams can build an accurate inventory of keys, certificates, and machine identities, then analyze which are most exposed or critical to business continuity. Fortanix’s data security platform supports this assessment, enabling phased implementation that balances performance with risk. By starting with the systems that face customers and regulators, organizations gain both resilience and credibility in their transition to PQC.

Key Question: Which high-exposure services in your organization should move first toward PQC?


[21:01] Step 6: Govern with Humans, Execute with Machine Identities -
As automation expands, clarity of control becomes vital. Richard describes how Fortanix maintains human oversight through quorum approvals while allowing machine identities to perform cryptographic operations within defined boundaries. This structure preserves accountability and enables scale, empowering secure automation for code signing, data exchange, and AI workflows. True governance lies in this balance, human intent directing machine execution through policy and precision.

Key Question: Where can you introduce automation that enhances control rather than replacing it?


Episode Resources

Richard Searle on LinkedIn
Fortanix Website
Johannes Lintzen on LinkedIn 
PQShield Website 

Want exclusive insights on quantum migration?  Stay ahead of the curve. Subscribe to Shielded: The Last Line of Cyber Defense on Apple Podcasts, Spotify, or YouTube Podcasts.


✔ Get insider knowledge from leading cybersecurity experts.

✔ Learn practical steps to future-proof your organization.

✔ Stay updated on regulatory changes and industry trends.


Need help subscribing? Click here for step-by-step instructions.</itunes:subtitle>
      <itunes:keywords/>
      <itunes:explicit>No</itunes:explicit>
      <googleplay:explicit>No</googleplay:explicit>
    </item>
    <item>
      <title>No-Regrets Migration: Why PKI Should Be Your First Move</title>
      <link>https://podcasts.fame.so/e/0njyv6p8-no-regrets-migration-why-pki-should-be-your-first-move</link>
      <itunes:title>No-Regrets Migration: Why PKI Should Be Your First Move</itunes:title>
      <itunes:episode>19</itunes:episode>
      <itunes:season>1</itunes:season>
      <itunes:block>No</itunes:block>
      <googleplay:block>No</googleplay:block>
      <guid isPermaLink="false">40pqy561</guid>
      <description>Hardware security modules (HSMs) have quietly powered the digital economy for decades, but are they ready for the quantum era? In this episode of Shielded: The Last Line of Cyber Defense, host Johannes Lintzen speaks with Bruno Couillard, CEO and co-founder of Crypto4a, about his journey from designing the original Luna HSM to building the next generation of quantum-safe hardware. Bruno explains the crucial difference between being PQC-ready and PQC-providing, why classic HSMs can’t simply be patched into the future, and how cloudification and crypto-agility will redefine security infrastructure for decades to come.</description>
      <content:encoded><![CDATA[<div>Hardware security modules (HSMs) sit at the core of digital trust, protecting transactions, PKI systems, and authentication. As quantum computing approaches, traditional HSMs face limits that can’t be solved by patching old hardware. In this episode of Shielded: <em>The Last Line of Cyber Defense</em>, host Johannes Lintzen speaks with Bruno Couillard, CEO and co-founder of Crypto4a and co-creator of the Luna HSM, about building quantum-safe HSMs. Bruno explains the difference between PQC-ready and PQC-providing, warning that retrofitting classic devices is not enough. He highlights PKI as the no-regret first step and shows how hybrid models let organizations bridge classic and post-quantum algorithms. Cloud adoption and scalability challenges demand modular, cloud-aligned HSMs instead of isolated, priest-only boxes.</div><div>Bruno’s message is that HSMs are the foundation of digital security, and crypto-agility is now essential for surviving the quantum era.</div><div><br></div><div>What You’ll Learn<br><br></div><ul><li>The origin story of the Luna HSM and why it shaped modern key management</li><li>Why SSL in 1995 marked the “Big Bang” of the digital economy</li><li>PQC-ready vs. PQC-providing: the critical distinction vendors don’t always make</li><li>Why firmware updates can’t turn classic HSMs into true quantum-safe systems</li><li>How hybrid approaches allow gradual migration from RSA/ECC to PQC algorithms</li><li>Why PKI is the best “no-regret” first step in any migration plan</li><li>The cloud challenge: why HSMs must evolve from priest-only boxes to scalable, modular systems</li><li>The future of cryptography: crypto-agility as a permanent requirement, not a one-off project</li><li>Why cryptography is back at the forefront and ripe for young talent</li></ul><div><br></div><div>Bruno Couillard is the CEO and co-founder of Crypto4a Technologies, where he leads the development of quantum-safe, crypto-agile products like the QxHSM and QxEDGE. With nearly four decades of experience in cryptography, key management, and cybersecurity, Bruno has shaped the hardware security module (HSM) landscape from its origins to its next evolution. Earlier in his career, Bruno cofounded Chrysalis-ITS and co-designed the original Luna HSM, a product that remains foundational to global PKI systems and is now part of the Thales portfolio. He also contributed to the creation of the PKCS#11 standard and served as a cryptographic evaluator for the Canadian government, where he assessed and architected high-assurance military security products, including the Canadian Cryptographic Modernization Program.</div><div><br></div><div>Today, Bruno sits on the board of Quantum Industry Canada (QIC), co-chairs the Quantum Industry Developers and Users Working Group, and serves on Canada’s National Quantum Strategy committee, actively shaping the country’s quantum-safe cybersecurity ecosystem. Known for his clear perspective, he emphasizes the urgent need for crypto-agility, the distinction between PQC-ready and PQC-providing systems, and the modernization of HSMs to meet cloud and scalability demands.</div><div><br></div><div><strong>Your Roadmap to Quantum Resilience<br></strong><br></div><div><strong><br>[04:59]&nbsp; Step 1: Learn from the Past<br></strong>HSMs were originally designed in an era when cryptographic officers were treated as “priests,” entrusted with near-sacred responsibilities. The Luna HSM grew out of this mindset with hardware built for isolation, secrecy, and manual control. This legacy explains why many devices remain difficult to use and poorly adapted to modern environments. What worked in the 1990s no longer fits a world where security must be deployed at scale and managed across distributed teams. The first step is recognizing if your current systems are still locked in a pre-cloud, pre-scale paradigm.<br><br></div><div><strong><br>[09:58] Step 2: Understand the Big Bang of Digital Trust<br></strong>The arrival of SSL in 1995, combined with PKI and HSMs, triggered what Bruno calls the “Big Bang of the digital economy.” That triad enabled secure transactions and authentication, paving the way for today’s digital commerce, which is now one-third of global GDP. The takeaway is that cryptography is not a side issue but the fabric of the digital economy. If the integrity of this foundation collapses under quantum pressure, every layer of commerce, government, and communication is at risk. Leaders must weigh whether they are underestimating just how central cryptography is to their business model.<br><br></div><div><strong><br>[12:39] Step 3: Separate PQC-Ready from PQC-Providing<br></strong>Bruno stresses that an HSM must be <em>internally</em> quantum-safe, not just capable of handing PQC algorithms to external applications. Firmware updates, key exchanges, attestation signatures, and sibling-to-sibling communication inside the HSM all rely on its own cryptography. If that internal layer remains classical, the entire system is compromised even if it outwardly “provides” PQC algorithms. Many vendors blur this line, leaving buyers exposed. Organizations need to question their suppliers if they are only PQC-providing, or if they are truly PQC-ready inside and out?<br><br></div><div><strong><br>[17:38] Step 4: Don’t Believe in Magic Wands<br></strong>Classic HSMs cannot be turned into quantum-safe devices with a firmware patch. Bruno compares this to painting stripes on a horse and calling it a zebra. It may look different, but the foundation hasn’t changed. Once RSA and ECC are deprecated, patched boxes will collapse under the weight of new requirements. Leaders need to ask now whether their existing fleet can actually survive deprecation, or if they are investing in assets destined for the scrapheap. Betting on retrofits is a costly illusion that will leave organizations scrambling.<br><br></div><div><strong><br>[21:41] Step 5: Secure Your PKI First<br></strong>Among the many cryptographic systems to protect, PKI stands out as the crown jewel. Amazon has publicly called it a “no-regret” migration step, since nearly all systems depend on certificates and keys issued there. Crypto4a’s approach allows hybrid use, binding classical and PQC algorithms in the same machine, so organizations can transition without rebuilding from scratch. By starting with PKI, enterprises set a quantum-safe anchor that supports a gradual rollout elsewhere. It’s a step that prevents wasted effort and ensures early moves don’t need to be undone later.<br><br></div><div><strong><br>[26:23] Step 6: Modernize and Build for Agility<br></strong>While computing infrastructure has become modular, scalable, and cloud-aligned, most HSMs are still boxy appliances requiring physical keys and human rituals. This mismatch slows deployment and makes cryptography harder to manage at enterprise scale. Bruno argues HSMs must evolve to cloud-native, modular architectures that operators can provision and control without specialized ceremonies. Equally, systems must be designed for <strong>crypto-agility</strong>, the ability to swap algorithms through policy updates rather than rewriting code. Without agility and modernization, organizations will find themselves locked into brittle systems just as cryptography enters its most turbulent era.<br><br></div><div><br></div><div><strong>Episode Resources<br></strong><br></div><ul><li>Bruno Couillard on <a href="https://www.linkedin.com/in/brunocouillard/">LinkedIn</a></li><li>Crypto4A Technologies <a href="https://www.linkedin.com/company/crypto4a/">Website</a></li><li>Johannes Lintzen on <a href="https://www.linkedin.com/in/jolintzen/">LinkedIn</a>&nbsp;</li><li>PQShield <a href="http://www.pqshield.com">Website</a>&nbsp;</li></ul><div><br></div><div>Want exclusive insights on quantum migration?&nbsp; Stay ahead of the curve. Subscribe to Shielded: The Last Line of Cyber Defense on Apple Podcasts, Spotify, or YouTube Podcasts.</div><div><br>✔ Get insider knowledge from leading cybersecurity experts.</div><div><br>✔ Learn practical steps to future-proof your organization.</div><div><br>✔ Stay updated on regulatory changes and industry trends.<br><br><br>Need help subscribing? Click <a href="https://www.fame.so/follow-rate-review">here</a> for step-by-step instructions.</div><div>Shielded: The Last Line of Cyber Defense is handcrafted by our friends over at: <a href="https://www.fame.so/?utm_medium=podcast&amp;utm_source=bcast&amp;utm_campaign=masters-of-community-with-david-spinks?utm_medium=podcast&amp;utm_source=bcast&amp;utm_campaign=fame-client">fame.so</a></div><div><br></div>]]></content:encoded>
      <pubDate>Thu, 09 Oct 2025 11:00:00 +0000</pubDate>
      <author>PQShield</author>
      <enclosure url="https://media.fame.so/8qymk368.mp3" length="78157321" type="audio/mpeg"/>
      <itunes:author>PQShield</itunes:author>
      <itunes:image href="https://content.fameapp.so/uploads/8l18kymq/8ac52990-a42a-11f0-a517-770b4e5fdb6e/8ac52ac0-a42a-11f0-846e-fdf5bd7154d0.png"/>
      <itunes:duration>1953</itunes:duration>
      <itunes:summary>Hardware security modules (HSMs) have quietly powered the digital economy for decades, but are they ready for the quantum era? In this episode of Shielded: The Last Line of Cyber Defense, host Johannes Lintzen speaks with Bruno Couillard, CEO and co-founder of Crypto4a, about his journey from designing the original Luna HSM to building the next generation of quantum-safe hardware. Bruno explains the crucial difference between being PQC-ready and PQC-providing, why classic HSMs can’t simply be patched into the future, and how cloudification and crypto-agility will redefine security infrastructure for decades to come.</itunes:summary>
      <itunes:subtitle>Hardware security modules (HSMs) have quietly powered the digital economy for decades, but are they ready for the quantum era? In this episode of Shielded: The Last Line of Cyber Defense, host Johannes Lintzen speaks with Bruno Couillard, CEO and co-founder of Crypto4a, about his journey from designing the original Luna HSM to building the next generation of quantum-safe hardware. Bruno explains the crucial difference between being PQC-ready and PQC-providing, why classic HSMs can’t simply be patched into the future, and how cloudification and crypto-agility will redefine security infrastructure for decades to come.</itunes:subtitle>
      <itunes:keywords/>
      <itunes:explicit>No</itunes:explicit>
      <googleplay:explicit>No</googleplay:explicit>
    </item>
    <item>
      <title>Inventory, Agility, Reality: How FS-ISAC Sees the Path to PQC</title>
      <link>https://podcasts.fame.so/e/xny7zppn-inventory-agility-reality-how-fs-isac-sees-the-path-to-pqc</link>
      <itunes:title>Inventory, Agility, Reality: How FS-ISAC Sees the Path to PQC</itunes:title>
      <itunes:episode>18</itunes:episode>
      <itunes:season>1</itunes:season>
      <itunes:block>No</itunes:block>
      <googleplay:block>No</googleplay:block>
      <guid isPermaLink="false">l14rxjj1</guid>
      <description>What if quantum computing grabs the headlines, but the real risk is complacency about cryptography? In this episode of Shielded: The Last Line of Cyber Defense, host Johannes Lintzen welcomes Mike Silverman, Chief Strategy &amp; Innovation Officer at FS-ISAC. Mike shares why treating cryptographic migrations as one-off projects leaves organisations exposed, how building inventories and risk-based models creates real readiness, and why crypto-agility, not quantum anxiety, is the foundation for long-term security. Learn how to prioritise crown-jewel systems, what timelines like 2030 and 2035 really mean, and why vendor coordination and PKI standards could decide the success of your migration.</description>
      <content:encoded><![CDATA[<div>As industries continue to treat cryptography as invisible plumbing, the risk of systemic disruption is growing. In this episode of Shielded: The Last Line of Cyber Defense, host Johannes Lintzen speaks with Mike Silverman, Chief Strategy &amp; Innovation Officer at FS-ISAC, about why complacency is more dangerous than quantum itself. Mike explains how decades of one-off migrations have left organisations brittle, why inventories and risk models are the essential starting point, and how cryptographic agility must become both a design principle and an organisational mindset. They discuss why timelines like 2030 and 2035 demand phased action, how vendor and supply chain readiness can make or break success, and why PKI standards and certificate interoperability are the hidden dependencies no one can ignore. From embedding PQC into normal app modernisation cycles to reframing the conversation for the boardroom, Mike delivers a pragmatic warning: you don’t need to boil the ocean, but you must start now.<br><br></div><div><br></div><div>What You’ll Learn:</div><div><br></div><ul><li>Mindset Shift: Why the biggest risk isn’t “quantum” per se, it’s assuming cryptography can be ignored until the next crisis.</li><li>True Crypto-Agility: Minimal downtime, minimal (ideally zero) code changes, policy-driven selection, and ecosystem readiness.</li><li>Inventory First: How key discovery, asset metadata, and process mapping create a measurable, fundable scope of work.</li><li>Risk-Based Priorities: Protect crown-jewel data and long-lived assets first; accept there will be legacy tails.</li><li>Ecosystem Dependencies: Why vendors, PKI standards, certificate profiles, FIPS-validated libraries and supply chains dictate your timeline.</li><li>Board Framing: Position PQC as business continuity and trust preservation, embedded in regular tech refresh, not a one-off cost centre.</li><li>2030/2035 in Practice: Read timelines as phase gates (inventory + highest-risk migrations first; wider coverage later), not a big-bang cutover.</li></ul><div><br></div><div>Mike Silverman is Chief Strategy &amp; Innovation Officer at FS-ISAC, the global, member-driven consortium dedicated to collective defense in financial services. In this role, he leads forward-looking initiatives on post-quantum cryptography, AI risks, cloud security, and sector resilience, helping financial institutions anticipate and prepare for the threats shaping tomorrow’s trust landscape.<br><br></div><div>With a career shaped by crisis response and industry collaboration, Mike has been at the center of efforts to align governments, regulators, and enterprises on how to secure financial systems under pressure, from pandemic coordination to the emerging quantum challenge. His work focuses on reframing cryptography as a first-class citizen, embedding it into inventories, risk models, and long-term technology refresh cycles that extend beyond any single algorithm.<br><br></div><div>Known for his pragmatic perspective, Mike stresses that the real danger is complacency, not just quantum breakthroughs. He argues that cryptographic agility is the only sustainable defense, that timelines like 2030 and 2035 demand phased and realistic planning, and that collective readiness across vendors and supply chains is non-negotiable. His message is clear: organisations don’t need to panic, but they do need to start now.</div><div><br></div><div><strong>Your Roadmap to Crypto-Agility</strong></div><div><br><strong><br>[03:52] Step 1: Stop Treating Crypto as Plumbing<br></strong><br></div><div>For decades, cryptography has been invisible, assumed to “just work” in the background. Mike argues this is the biggest blind spot. Every major migration, from DES to AES or from RSA-1024 to RSA-2048, has been treated as a painful one-off. That approach leaves organisations brittle and unprepared for the next wave of change. The lesson is clear: cryptography must be treated as a first-class citizen in security planning, with visibility, budget, and executive attention. Key Question: Are you still assuming crypto will take care of itself, or are you elevating it to a first-class security discipline in your organisation?</div><div><br><br></div><div><strong>[09:58] Step 2: Define What Crypto-Agility Really Means<br></strong><br></div><div>Mike recalls sitting in industry meetings where “crypto-agility” meant wildly different things to different stakeholders. FS-ISAC responded by publishing a sector-wide definition: the ability to swap algorithms (A→B) with minimal downtime, minimal disruption, and ideally no code changes. Achieving this requires both architectural foresight (decoupling crypto from applications) and organisational alignment (governance, vendor contracts, policy-driven controls). Key Question: If you had to change cryptography tomorrow, would it take a simple policy update or a rewrite across every app and vendor system?<br><br></div><div><br></div><div><strong>[15:39] Step 3: Build Your Inventory and Risk Model<br></strong><br></div><div>Silverman stresses a basic truth: you can’t secure what you can’t see. Few CISOs could raise their hand if asked, “Do you know where 100% of your keys are?” An accurate inventory, where keys live, how they’re managed, which systems depend on them, creates the foundation for prioritisation. Layering risk on top ensures crown-jewel systems and long-lived data are addressed first. Without this visibility, organisations risk wasting resources on the wrong assets. Key Question: Do you know where all your cryptographic keys and algorithms are, and which assets pose the highest risk if migration lags?</div><div><br><br></div><div><strong>[20:15] Step 4: Plan for Legacy and External Dependencies<br></strong><br></div><div>Even with a ten-year runway, Mike believes there will be legacy systems left behind. Large institutions with acquisitions face inconsistent policies, while smaller firms rely heavily on vendor products. Dependencies extend beyond the enterprise, supply chains, PKI standards, certificate profiles, FIPS-validated libraries all dictate what’s feasible. Success depends on coordinated timelines with vendors and regulators, not just internal willpower.</div><div>Key Question: Are you aligning your migration plans with vendor readiness and global standards, or assuming you can solve it all in-house?</div><div><br><br></div><div><strong>[26:31] Step 5: Embed PQC into Normal Modernisation Cycles<br></strong><br></div><div>Boards balk at funding PQC as a standalone project. Mike reframes it: cryptographic upgrades should be part of ongoing app modernisation and lifecycle refresh. From mainframes and point-of-sale systems to operating systems and middleware, modernisation already happens in cycles. The right approach is to bake PQC into those existing refreshes, so cost and disruption are absorbed by processes organisations already budget for.</div><div>Key Question: Are you presenting PQC as an extra burden, or embedding it naturally into technology refresh cycles your board already funds?</div><div><br><br></div><div><strong>[36:46] Step 6: Act Now, Without Fearmongering<br></strong><br></div><div>Mike is clear: the sky isn’t falling. But the longer organisations delay, the harder and costlier the transition will be. Starting small, augmenting asset management, training staff, asking vendors the right questions, creates momentum without overwhelming the business. Crypto-agility is a journey measured in years, not months, and the best way to reduce fear is to begin.</div><div>Key Question: Are you waiting for the “perfect moment” to start, or taking small, practical steps today that build toward crypto-agility?</div><div><br><br></div><div><strong>Episode Resources<br></strong><br></div><ul><li>Mike Silverman on LinkedIn</li><li>FS-ISAC <a href="https://www.fsisac.com/">Website</a></li><li>FS-ISAC <a href="https://www.linkedin.com/company/fs-isac/">Linkedin</a></li><li>FS-ISAC <a href="https://x.com/FSISAC/status/1932860652508348690">X</a></li><li>FS-ISAC Cryptographic Agility White Paper <a href="https://www.fsisac.com/hubfs/Knowledge/PQC/BuildingCryptographicAgilityInTheFinancialSector.pdf">(TLP:WHITE)</a></li><li>Quantum Safe Financial Forum (QSFF) – <a href="https://www.europol.europa.eu/about-europol/european-cybercrime-centre-ec3/qsff">EU Initiative</a></li><li>Johannes Lintzen on <a href="https://www.linkedin.com/in/jolintzen/">LinkedIn</a>&nbsp;</li><li>PQShield <a href="http://www.pqshield.com">Website</a>&nbsp;</li></ul><div><br></div><div>Want exclusive insights on quantum migration?&nbsp; Stay ahead of the curve. Subscribe to Shielded: The Last Line of Cyber Defense on Apple Podcasts, Spotify, or YouTube Podcasts.</div><div><br>✔ Get insider knowledge from leading cybersecurity experts.<br><br></div><div>✔ Learn practical steps to future-proof your organization.<br><br></div><div>✔ Stay updated on regulatory changes and industry trends.<br><br><br>Need help subscribing? Click <a href="https://www.fame.so/follow-rate-review">here</a> for step-by-step instructions.</div><div>Shielded: The Last Line of Cyber Defense is handcrafted by our friends over at: <a href="https://www.fame.so/?utm_medium=podcast&amp;utm_source=bcast&amp;utm_campaign=masters-of-community-with-david-spinks?utm_medium=podcast&amp;utm_source=bcast&amp;utm_campaign=fame-client">fame.so</a></div><div><br></div>]]></content:encoded>
      <pubDate>Thu, 25 Sep 2025 11:00:00 +0000</pubDate>
      <author>PQShield</author>
      <enclosure url="https://media.fame.so/w7p25178.mp3" length="84137272" type="audio/mpeg"/>
      <itunes:author>PQShield</itunes:author>
      <itunes:image href="https://content.fameapp.so/uploads/8l18kymq/99ba9f60-99e6-11f0-bc7d-0b8458a52482/99baa060-99e6-11f0-b86e-2d0c2617d40a.png"/>
      <itunes:duration>2103</itunes:duration>
      <itunes:summary>What if quantum computing grabs the headlines, but the real risk is complacency about cryptography? In this episode of Shielded: The Last Line of Cyber Defense, host Johannes Lintzen welcomes Mike Silverman, Chief Strategy &amp; Innovation Officer at FS-ISAC. Mike shares why treating cryptographic migrations as one-off projects leaves organisations exposed, how building inventories and risk-based models creates real readiness, and why crypto-agility, not quantum anxiety, is the foundation for long-term security. Learn how to prioritise crown-jewel systems, what timelines like 2030 and 2035 really mean, and why vendor coordination and PKI standards could decide the success of your migration.</itunes:summary>
      <itunes:subtitle>What if quantum computing grabs the headlines, but the real risk is complacency about cryptography? In this episode of Shielded: The Last Line of Cyber Defense, host Johannes Lintzen welcomes Mike Silverman, Chief Strategy &amp; Innovation Officer at FS-ISAC. Mike shares why treating cryptographic migrations as one-off projects leaves organisations exposed, how building inventories and risk-based models creates real readiness, and why crypto-agility, not quantum anxiety, is the foundation for long-term security. Learn how to prioritise crown-jewel systems, what timelines like 2030 and 2035 really mean, and why vendor coordination and PKI standards could decide the success of your migration.</itunes:subtitle>
      <itunes:keywords/>
      <itunes:explicit>No</itunes:explicit>
      <googleplay:explicit>No</googleplay:explicit>
    </item>
    <item>
      <title>PQC vs. QKD: What Matters Now and What Can Wait</title>
      <link>https://podcasts.fame.so/e/1np7j7p8-pqc-vs-qkd-what-matters-now-and-what-can-wait</link>
      <itunes:title>PQC vs. QKD: What Matters Now and What Can Wait</itunes:title>
      <itunes:episode>17</itunes:episode>
      <itunes:season>1</itunes:season>
      <itunes:block>No</itunes:block>
      <googleplay:block>No</googleplay:block>
      <guid isPermaLink="false">z0r4n4v0</guid>
      <description>Quantum threats may feel distant, but your migration shouldn’t be. In this episode of Shielded: The Last Line of Cyber Defense, host Jo Lintzen talks with Will Collison, Interim Global Head of Cryptography at HSBC. Will explains why enterprises must start now and measure as they go, how to separate PQC, QKD, and quantum computing, and why cryptographic agility is the real objective. Expect practical guidance on executive buy-in, vendor dependencies, critical-system prioritization, and the cost logic that makes an early start the only rational choice.</description>
      <content:encoded><![CDATA[<div>As regulators publish guidance and timelines tighten, organizations can’t treat quantum readiness as a “future-us” problem. Will Collison details HSBC’s approach: begin the migration now, build crypto agility into architecture, and manage both internal upgrades and external dependencies across vendors, partners, and customers. He clarifies where PQC (for everyone) and QKD (for select high-assurance links) fit, and why identity (public-key) mechanisms not symmetric crypto like AES, are the primary risk from quantum computing. Will also reframes “legacy” systems as revenue-critical systems that demand careful, early planning, and he lays out a pragmatic cost model: if you wait, you’ll lose the ability to go slow, forcing a fast (and expensive) scramble. The mandate is simple: start now, measure progress, and design for change so you can swap algorithms when needed.</div><div><br></div><div>What You’ll Learn<br><br></div><ul><li>How early action lowers cost and risk while keeping quality high.</li><li>PQC vs. QKD vs. Quantum Computing: Clear roles, overlaps, and where to invest first</li><li>Why quantum threatens public-key identity mechanisms more than symmetric encryption.</li><li>Crypto Agility as the Goal: Build systems that can swap algorithms when standards evolve.</li><li>Prioritization Framework: Tackle internet-facing and revenue-critical services early, even if they’re “legacy.”</li><li>Vendor &amp; Partner Readiness: How to pressure-test your supply chain and avoid being the weak link.</li><li>Executive Buy-In: Talk tracks that move the conversation from “someday” to funded roadmap.</li><li>Regulatory Reality: Don’t wait for “R-Day” (regulator day); show posture now to customers and supervisors.</li></ul><div><br></div><div>Will Collison is the Interim Global Head of Cryptography at HSBC, where he leads the bank’s global cryptography strategy across 60 markets. A CISSP-qualified consultant with two decades of experience, he specializes in public key infrastructure (PKI), cryptography standards, and the automation of trust. Over his seven-plus years at HSBC, Will has served as Technical Director of Cryptography, Global Head of Cryptography Standards and Enforcement, and PKI Specialist, building frameworks for machine and digital identity and driving large-scale remediation programs.</div><div><br></div><div>Prior to HSBC, he founded Secmundi Limited, advising international banks on cryptography strategy and operating models, and worked as a Trust Consultant at Barclays, guiding PKI implementations and automation of certificate issuance. Known for combining deep technical expertise with pragmatic execution, Will has long been a voice for crypto agility, helping organizations modernize securely while preparing for future shifts. Today, his focus is clear: ensuring enterprises can meet the challenges of post-quantum cryptography (PQC) and build a quantum-safe future.</div><div><br></div><div><strong>Your Roadmap to Quantum Resilience</strong></div><div><br></div><div><strong>[06:20] Step 1: Build Awareness and Executive Buy-In -</strong></div><div>The first barrier isn’t technology, it’s leadership alignment. Will emphasizes that cryptographers alone cannot drive PQC migration; it requires CIOs, CEOs, and developer communities to take ownership. At HSBC, demonstrating early trials with quantum key distribution (QKD) helped leadership see quantum as real and urgent, not distant theory. By pairing opportunity narratives (business applications) with security risks (broken RSA), Will built credibility and won support across the C-suite. Without this awareness step, migrations stall, as PQC remains “just a cryptography issue” instead of a business priority.</div><div>Key Question: Do your executives see PQC as an organizational shift, or just another crypto upgrade?</div><div><br></div><div><strong>[10:44] Step 2: Separate the Quantum Trio (PQC, QKD, Quantum Computing) -</strong></div><div>Confusion often slows action: leaders lump quantum computing, post-quantum cryptography (PQC), and QKD into one bucket. Will makes the distinction clear, PQC is mandatory for everyone, QKD is optional for select high-assurance links, and quantum computing is the attacker capability on the horizon. PQC secures identity mechanisms that quantum computers can break; symmetric algorithms like AES remain largely safe. For organizations, this clarity avoids wasted investment and helps focus resources on the universal priority: PQC. QKD may add value in specific backbone use cases, but it’s not a substitute for PQC adoption.</div><div>Key Question: Does your roadmap clearly differentiate between PQC (a must-do) and QKD (a niche add-on)?</div><div><br></div><div><strong>[15:15] Step 3: Prioritize Critical and Revenue-Generating Systems -</strong></div><div>Migration is not just about legacy; it’s about revenue-critical systems that are hardest to touch. Will highlights that the most important services, core banking, internet-facing platforms, high-value transaction systems, are also the most delicate. These cannot be treated as “old and optional”; they need careful, phased planning. Starting with these systems ensures resilience where risk and business impact are highest. At HSBC, prioritizing internet-facing services and those with zero downtime tolerance became the backbone of the PQC roadmap. Organizations should resist the temptation to defer these systems, as they represent both the highest stakes and the longest lead times.</div><div>Key Question: Have you identified which systems are both critical and hardest to migrate and started with them?</div><div><br></div><div><strong>[18:10] Step 4: Engineer for Cryptographic Agility -</strong></div><div>Will posits that PQC migration isn’t a one-and-done fix. Because cryptography is open to attack and algorithms are deliberately stress-tested by academics, today’s standards may not be tomorrow’s. The real goal is crypto agility, building systems that can switch algorithms without costly rewrites. This means designing pluggable crypto frameworks, modular architecture, and future-ready PKI. Organizations that treat PQC as a single migration will find themselves repeating the pain in a few years; those that embed agility now will be able to adapt at the push of a button. Agility turns a crisis response into a strategic advantage.</div><div>Key Question: If the next PQC algorithm is broken tomorrow, could your systems swap it out without disruption?</div><div><br></div><div><strong>[27:15] Step 5: Start Now to Control Cost and Compliance -</strong></div><div>Waiting only makes migration harder and more expensive. Will lays out the math: if you start today, you can go slow and control costs; if you wait for Q-Day or R-Day (when regulators mandate action), you lose the option of “slow” and are forced into expensive, rushed remediation. Early investment also lets you train in-house talent instead of competing in a skills-short market later. Regulators and peers are already moving, meaning inaction risks reputational damage as much as security exposure. The smartest play is to begin now, measure progress, and use the lead time to stay ahead of both attackers and regulators.</div><div>Key Question: Are you starting early enough to spread cost and build skills, or setting yourself up for a rushed, expensive scramble later?</div><div><br></div><div><strong>Episode Resources<br></strong><br></div><ul><li>Will Collison on <a href="https://www.linkedin.com/in/willcollison/">LinkedIn</a></li><li>HSBC <a href="https://www.hsbc.com/">Website</a></li><li>Johannes Lintzen on <a href="https://www.linkedin.com/in/jolintzen/">LinkedIn</a>&nbsp;</li><li>PQShield <a href="http://www.pqshield.com">Website</a>&nbsp;</li></ul><div><br></div><div>Want exclusive insights on quantum migration?&nbsp; Stay ahead of the curve. Subscribe to Shielded: The Last Line of Cyber Defense on Apple Podcasts, Spotify, or YouTube Podcasts.</div><div><br>✔ Get insider knowledge from leading cybersecurity experts.</div><div>✔ Learn practical steps to future-proof your organization.</div><div>✔ Stay updated on regulatory changes and industry trends.<br><br>Need help subscribing? Click <a href="https://www.fame.so/follow-rate-review">here</a> for step-by-step instructions.</div><div><br></div><div>Shielded: The Last Line of Cyber Defense is handcrafted by our friends over at: <a href="https://www.fame.so/?utm_medium=podcast&amp;utm_source=bcast&amp;utm_campaign=masters-of-community-with-david-spinks?utm_medium=podcast&amp;utm_source=bcast&amp;utm_campaign=fame-client">fame.so</a></div><div><br></div>]]></content:encoded>
      <pubDate>Wed, 17 Sep 2025 11:00:00 +0000</pubDate>
      <author>PQShield</author>
      <enclosure url="https://media.fame.so/wj0mkz4w.mp3" length="87333615" type="audio/mpeg"/>
      <itunes:author>PQShield</itunes:author>
      <itunes:image href="https://content.fameapp.so/uploads/8l18kymq/e8f636f0-93a1-11f0-915e-b3f156932f14/e8f63800-93a1-11f0-9e17-3b570b5c065b.png"/>
      <itunes:duration>2183</itunes:duration>
      <itunes:summary>Quantum threats may feel distant, but your migration shouldn’t be. In this episode of Shielded: The Last Line of Cyber Defense, host Jo Lintzen talks with Will Collison, Interim Global Head of Cryptography at HSBC. Will explains why enterprises must start now and measure as they go, how to separate PQC, QKD, and quantum computing, and why cryptographic agility is the real objective. Expect practical guidance on executive buy-in, vendor dependencies, critical-system prioritization, and the cost logic that makes an early start the only rational choice.</itunes:summary>
      <itunes:subtitle>Quantum threats may feel distant, but your migration shouldn’t be. In this episode of Shielded: The Last Line of Cyber Defense, host Jo Lintzen talks with Will Collison, Interim Global Head of Cryptography at HSBC. Will explains why enterprises must start now and measure as they go, how to separate PQC, QKD, and quantum computing, and why cryptographic agility is the real objective. Expect practical guidance on executive buy-in, vendor dependencies, critical-system prioritization, and the cost logic that makes an early start the only rational choice.</itunes:subtitle>
      <itunes:keywords/>
      <itunes:explicit>No</itunes:explicit>
      <googleplay:explicit>No</googleplay:explicit>
    </item>
    <item>
      <title>3, 5 or 8 Years? The Realistic Timeline for Migration and the Task That Can’t Wait</title>
      <link>https://podcasts.fame.so/e/xny7zq9n-3-5-or-8-years-the-realistic-timeline-for-migration-and-the-task-that-can-t-wait</link>
      <itunes:title>3, 5 or 8 Years? The Realistic Timeline for Migration and the Task That Can’t Wait</itunes:title>
      <itunes:episode>16</itunes:episode>
      <itunes:season>1</itunes:season>
      <itunes:block>No</itunes:block>
      <googleplay:block>No</googleplay:block>
      <guid isPermaLink="false">l14rx8m1</guid>
      <description>What if quantum computing feels like a distant threat, but your timeline to prepare is already running out? In this episode of Shielded: The Last Line of Cyber Defense, host Johannes Lintzen welcomes Adrian Neal, Senior Director and Global Lead for Post-Quantum Cryptography at Capgemini. Adrian shares the urgent realities of PQC migration, from why a three-to-five-year plan is really an eight-year journey to the performance shocks of new algorithms and the critical need for crypto-agility. Learn why apathy is the greatest risk, how regulatory pressure could unlock boardroom action, and where CISOs must start to build quantum-ready systems today.</description>
      <content:encoded><![CDATA[<div>As executives continue to postpone action, the window for preparing secure systems in the quantum era is rapidly closing. In this episode of Shielded:<em> The Last Line of Cyber Defense</em>, host Johannes Lintzen speaks with Adrian Neal, Senior Director and Global Lead for Post-Quantum Cryptography at Capgemini, about the real timelines and challenges of PQC migration. Adrian explains why a “three-to-five-year” plan is unrealistic, why organizations should expect closer to eight years, and how unprepared boards risk panic and triage once the first quantum breakthrough hits. They discuss why crown-jewel systems must be prioritized, how banks and governments face different pressures, and why performance under PQC will shock existing infrastructure, illustrated by tests where an HSM fell from 10,000 transactions per second to just 200. From regulatory pressure that may be needed to drive boardroom buy-in to the hard truth that today’s algorithms may not last, Adrian delivers a candid warning: apathy will kill you. The time to act is now.</div><div><br></div><div>What You’ll Learn<br><br></div><ul><li>Y2K vs. Y2Q: Why “non-event” thinking is dangerous without upfront work</li><li>Timelines that hold: Why “3–5 years” is best-case and ~8 years is realistic at enterprise scale</li><li>Performance truth: How PQC can crush TPS and impact SLAs, capacity, and cost models</li><li>Crypto-agility: Abstract crypto from apps, enable policy-driven selection, and automate swap-outs</li><li>Governance first: Why poor implementations, not just algorithms, will break your security</li><li>Regulatory unlock: How mandates/bodies (BIS, NCSC, sector groups) drive C-suite action</li><li>Where to start: Crown-jewel systems, dependency mapping, and critical-path scheduling</li></ul><div><br></div><div>Adrian Neal is Senior Director and Global Lead for Post-Quantum Cryptography at Capgemini, where he advises governments, financial institutions, and global enterprises on preparing for the quantum era. With nearly four decades of experience spanning banking, defense, telecoms, and startups, Adrian has been at the center of major security transformations, from the early days of PKI to today’s post-quantum migration programs. His work focuses on helping organizations identify critical systems, manage dependencies, and design long-term strategies that combine technical execution with board-level buy-in.<br><br></div><div>Known for his candid perspective, Adrian warns that migration is closer to an eight-year journey than a three-year sprint, that crypto-agility is the only sustainable defense as algorithms evolve, and that apathy will kill you. His message is clear: the sooner organizations begin planning, the better chance they have to avoid panic, triage, and systemic disruption when the first quantum “black swan” arrives.</div><div><br></div><div><strong>Your Roadmap to Quantum Resilience<br></strong><br></div><div><strong>[04:17] Step 1: Accept the Real Timeline<br></strong><br></div><div>The biggest misconception Adrian encounters is the idea of a “three-to-five-year” migration. As he bluntly states, that only works if everything goes perfectly and in the real world, it never does. Organizations must plan for eight years at best, with the expectation of mid-course corrections and even emergency triage when hidden dependencies surface. Late action only makes the crunch sharper, as boards suddenly realize time has run out. Key Question: Are you planning for an idealized three-year sprint, or budgeting for the reality of an eight-year marathon?</div><div><br></div><div><strong>[07:18] Step 2: Watch for External Signals<br></strong><br></div><div>Quantum risk can feel abstract until regulators, supervisors, or global bodies spell out the consequences. Adrian points to the Bank of International Settlements, which recently warned of systemic financial collapse if banks fail to act. Similarly, the UK surveyed CISOs not to congratulate them, but to ask why nothing was happening. These signals are the early tremors&nbsp; and ignoring them risks being blindsided when regulation becomes mandatory. Key Question: Are you treating industry warnings as background noise, or as early instructions to act before mandates arrive?</div><div><br></div><div><strong>[12:23] Step 3: Stress-Test Your Infrastructure<br></strong><br></div><div>Benchmarks on paper rarely match performance under real load. Adrian recalls a test where a PQC algorithm dropped a hardware security module from 10,000 transactions per second to just 200. That kind of shock will ripple through SLAs, capacity planning, and cost models. Enterprises can’t wait for standards alone, they need to start testing now to understand what PQC will mean for their unique environments. Key Question: Have you run PQC under production-like loads, or are you still trusting theoretical benchmarks?</div><div><br></div><div><strong>[31:23] Step 4: Start With the Crown Jewels<br></strong><br></div><div>When mapping a migration, not all systems are equal. Adrian insists the first priority must be crown-jewel systems, the assets so critical that losing them could put you out of business. By identifying these early and mapping their dependencies, organizations can build a critical-path plan, sequencing work in the right order and avoiding surprises later. Everything not on the critical path can be parallelized, but the critical path itself must be guarded fiercely. Key Question: Do you know which systems are truly crown jewels, and how delays there will cascade across your migration?</div><div><br></div><div><strong>[34:17] Step 5: Design for Crypto-Agility<br></strong><br></div><div>Even if today’s algorithms are standardized, Adrian cautions they may not last. History has already shown finalists falling apart late in the NIST process, and cryptographers warn that vulnerabilities may be found within five years. That means crypto-agility is no longer optional: organizations must decouple applications from crypto libraries, move to policy-driven controls, and be ready to swap algorithms without rewriting code. Governance is equally critical, because poor implementation, not just weak algorithms, will be the Achilles’ heel. Key Question: Can you change cryptography across your systems with a policy update, or would it take a rewrite in every app?</div><div><br></div><div><strong>[21:38] Step 6: Leverage Regulation for Buy-In<br></strong><br></div><div>For many CISOs, the hardest part isn’t technical, it’s convincing the board. Adrian highlights how legislation may actually be a friend, giving executives the leverage to unlock budgets by framing PQC as a compliance necessity. Without that pressure, boards tend to see migration as a cost center with no immediate revenue benefit. By aligning to regulatory timelines, CISOs can turn PQC from a “someday project” into a non-negotiable investment. Key Question: Are you waiting for regulators to force your hand, or using regulation as a tool to unlock boardroom commitment today?</div><div><br></div><div><strong>Episode Resources<br></strong><br></div><ul><li>Adrian Neal on <a href="https://www.linkedin.com/in/adrianneal/?originalSubdomain=ch">LinkedIn</a></li><li>Capgemini Post-Quantum Cryptography <a href="https://www.capgemini.com/insights/research-library/post-quantum-crypto/">Resources</a></li><li>European Union Qprep <a href="https://civil-protection-humanitarian-aid.ec.europa.eu/news-stories/news/eu-stockpiling-and-medical-countermeasures-strategies-strengthen-crisis-readiness-and-health-2025-07-09_en">Initiative</a></li><li>Johannes Lintzen on <a href="https://www.linkedin.com/in/jolintzen/">LinkedIn</a>&nbsp;</li><li>PQShield <a href="http://www.pqshield.com">Website</a>&nbsp;</li></ul><div><br></div><div>Want exclusive insights on quantum migration?&nbsp; Stay ahead of the curve. Subscribe to Shielded: The Last Line of Cyber Defense on Apple Podcasts, Spotify, or YouTube Podcasts.</div><div><br>✔ Get insider knowledge from leading cybersecurity experts.<br><br></div><div>✔ Learn practical steps to future-proof your organization.<br><br></div><div>✔ Stay updated on regulatory changes and industry trends.<br><br>Need help subscribing? Click <a href="https://www.fame.so/follow-rate-review">here</a> for step-by-step instructions.</div><div><br></div><div>Shielded: The Last Line of Cyber Defense is handcrafted by our friends over at: <a href="https://www.fame.so/?utm_medium=podcast&amp;utm_source=bcast&amp;utm_campaign=masters-of-community-with-david-spinks?utm_medium=podcast&amp;utm_source=bcast&amp;utm_campaign=fame-client">fame.so</a></div><div><br></div>]]></content:encoded>
      <pubDate>Thu, 11 Sep 2025 14:27:00 +0000</pubDate>
      <author>PQShield</author>
      <enclosure url="https://media.fame.so/83l6pk4w.mp3" length="98370872" type="audio/mpeg"/>
      <itunes:author>PQShield</itunes:author>
      <itunes:image href="https://content.fameapp.so/uploads/8l18kymq/8eb4f500-8f1b-11f0-8555-bfdf714789b5/8eb4f600-8f1b-11f0-a888-47cfc64597ed.png"/>
      <itunes:duration>2459</itunes:duration>
      <itunes:summary>What if quantum computing feels like a distant threat, but your timeline to prepare is already running out? In this episode of Shielded: The Last Line of Cyber Defense, host Johannes Lintzen welcomes Adrian Neal, Senior Director and Global Lead for Post-Quantum Cryptography at Capgemini. Adrian shares the urgent realities of PQC migration, from why a three-to-five-year plan is really an eight-year journey to the performance shocks of new algorithms and the critical need for crypto-agility. Learn why apathy is the greatest risk, how regulatory pressure could unlock boardroom action, and where CISOs must start to build quantum-ready systems today.</itunes:summary>
      <itunes:subtitle>What if quantum computing feels like a distant threat, but your timeline to prepare is already running out? In this episode of Shielded: The Last Line of Cyber Defense, host Johannes Lintzen welcomes Adrian Neal, Senior Director and Global Lead for Post-Quantum Cryptography at Capgemini. Adrian shares the urgent realities of PQC migration, from why a three-to-five-year plan is really an eight-year journey to the performance shocks of new algorithms and the critical need for crypto-agility. Learn why apathy is the greatest risk, how regulatory pressure could unlock boardroom action, and where CISOs must start to build quantum-ready systems today.</itunes:subtitle>
      <itunes:keywords/>
      <itunes:explicit>No</itunes:explicit>
      <googleplay:explicit>No</googleplay:explicit>
    </item>
    <item>
      <title>The Next Chapter in Securing the World's Internet</title>
      <link>https://podcasts.fame.so/e/l8qw9p48-the-next-chapter-in-securing-the-internet</link>
      <itunes:title>The Next Chapter in Securing the World's Internet</itunes:title>
      <itunes:episode>15</itunes:episode>
      <itunes:season>1</itunes:season>
      <itunes:block>No</itunes:block>
      <googleplay:block>No</googleplay:block>
      <guid isPermaLink="false">80nvl8x0</guid>
      <description>What does it take to keep the world’s most widely used cryptographic library secure in the quantum era? In this episode of Shielded: The Last Line of Cyber Defense, host Johannes Lintzen welcomes Tomáš Mráz, Director of the OpenSSL Software Foundation, and Jon Ericson, Community Manager at the Foundation. Together, they explore OpenSSL’s evolution, from its 25-year legacy to its upcoming OpenSSL 3.6 release, hybrid cryptography, and the global effort to achieve FIPS certifications for post-quantum algorithms. Learn how community contributions, funding models, and industry partnerships are shaping OpenSSL’s role in securing the internet’s future.</description>
      <content:encoded><![CDATA[<div>OpenSSL has secured the internet for over 25 years, but how does a project with such deep legacy prepare for the quantum future? In this episode of Shielded: The Last Line of Cyber Defense, host Johannes Lintzen speaks with Tomáš Mráz, Director of the OpenSSL Foundation, and Jon Ericson, the Foundation’s Community Manager. Together they explore the shift from the old engine model to providers in OpenSSL 3.0, the rollout of NIST-approved post-quantum algorithms in 3.5, and what’s on the horizon with 3.6. They also dive into the realities of FIPS certification, the importance of diversified funding, and how community contributions sustain the world’s most widely used cryptographic library. From surprising “OpenSSL in the Wild” use cases to the first-ever OpenSSL Conference in Prague, this episode offers a rare inside look at how OpenSSL is evolving to keep global infrastructure secure in the quantum era. OpenSSL is evolving to keep the digital world safe.</div><div><br></div><div>What You’ll Learn<br><br></div><ul><li>How OpenSSL evolved from engines to providers, enabling faster adoption of new cryptographic standards</li><li>Why community contributions, from bug fixes to corporate sponsorships, remain critical to OpenSSL’s future</li><li>The significance of OpenSSL 3.5 and what to expect in the upcoming 3.6 release</li><li>How the Foundation approaches FIPS 140-3 certification and the challenges of validating post-quantum algorithms</li><li>Why hybrid cryptography and TLS-style agility are central to migration planning</li><li>The importance of funding diversification and how organizations can contribute</li><li>What to expect at the first OpenSSL Conference in Prague</li><li>OpenSSL’s three-to-five-year outlook on PQC adoption, performance, and global standards alignment</li></ul><div><br></div><div>Tomáš Mráz is the Director of the OpenSSL Software Foundation and a long-time contributor to the project. After years at Red Hat maintaining OpenSSL packages and serving on the OpenSSL Technical Committee, Tomáš now leads both governance and technical efforts for the Foundation. He has played a key role in transitioning OpenSSL to a provider-based model and integrating post-quantum cryptography support.&nbsp;<br><br></div><div>Jon Ericson is the Community Manager at the OpenSSL Software Foundation. With a background in programming and community building, Jon works to strengthen the connection between OpenSSL’s global user base and its core developers. From GitHub sponsorships to community use case surveys, he ensures that OpenSSL remains responsive to the evolving needs of its contributors and stakeholders.<br><br></div><div>With the shift to post-quantum cryptography accelerating, Tomáš Mráz and Jon Ericson’s message is clear: OpenSSL’s future will be defined by community, funding, and cryptographic agility, ensuring the internet’s most trusted library stays secure in the quantum era.</div><div><br></div><div><strong>Your Roadmap to Quantum Resilience</strong></div><div><br></div><div><strong>[02:30] Step 1: Build Through Community, Not Just Code<br></strong><br></div><div>From the very beginning, OpenSSL’s strength has been its community. As Jon Ericson explains, many contributions still come from volunteers fixing bugs or adding features because they personally rely on the library. This model means OpenSSL doesn’t evolve in isolation, it reflects the real-world needs of users across industries. Without this constant input, critical flaws might linger and adoption of new features would stall. Community-driven resilience is what has kept OpenSSL relevant for more than 25 years, and it’s also the key to surviving the quantum shift. Key Question: Is your organization contributing back to the open-source tools it depends on, or just consuming them?</div><div><br></div><div><strong>[15:40] Step 2: Embrace the Provider Model for Agility<br></strong><br></div><div>Tomáš Mráz highlights that OpenSSL 3.0’s provider architecture was a complete rewrite of the library’s internals. Unlike the old engine system, providers allow new algorithms, including post-quantum candidates, to be plugged in without altering the core code. This design foresight meant OpenSSL could quickly integrate PQC once NIST finalized its standards in 2024, instead of waiting years for structural changes. Agility in cryptography isn’t an abstract idea here, it’s a practical necessity, and the provider model gives OpenSSL the flexibility to adapt faster than ever. Key Question: Is your cryptographic infrastructure designed for future upgrades, or locked into a rigid model?</div><div><br></div><div><strong>[24:45] Step 3: Prepare for 3.6 With Discipline, Not Deadlines<br></strong><br></div><div>While many in the industry chase feature lists, OpenSSL takes a different approach. As Tomáš explains, new releases are time-based (April and October), but features are only merged when they are truly ready. Current work spans QUIC improvements, zero-RTT support, timing side-channel protections, and potential PQC enhancements, but nothing will be rushed to hit an arbitrary date. This discipline has allowed OpenSSL to remain the backbone of secure communications globally, trusted by billions of devices and applications. For organizations planning their upgrades, the message is clear: align to OpenSSL’s stable releases, don’t gamble on unfinished code. Key Question: Are your upgrade plans aligned with proven releases, or are you rushing ahead of the standards?</div><div><br></div><div><strong>[27:50] Step 4: Navigate the FIPS 140-3 Challenge<br></strong><br></div><div>Certification is one of the hardest parts of cryptography. OpenSSL 3.1 achieved FIPS 140-3 validation, a first in its history, and the 3.5 version is already in review to bring NIST’s post-quantum algorithms into scope. Tomáš admits the process is long, political, and outside of the Foundation’s control, with heavy negotiations between NIST, labs, and implementers. But without certification, many governments and enterprises simply cannot adopt PQC at scale. The lesson for security leaders: you can’t shortcut compliance, and you need realistic timelines to plan migrations. Key Question: Is your compliance roadmap realistic about how long certifications actually take?</div><div><br></div><div><strong>[30:30] Step 5: Stay Engaged With OpenSSL’s Future<br></strong><br></div><div>OpenSSL is everywhere, often in places you’d never expect. Jon recounts a developer securing serial devices with TLS, and even Mercedes vehicles using OpenSSL in their apps to lock and unlock doors. These surprising “in the wild” stories show why upgrading matters: outdated versions leave unseen risks in everyday systems. Looking ahead, the Foundation is also launching its first-ever OpenSSL Conference in Prague, bringing together experts, contributors, and industry voices to shape the next phase. Between new funding streams, hiring developers, and expanding global engagement, OpenSSL’s next 25 years will be as pivotal as its first.</div><div>Key Question: Do you know where OpenSSL runs in your stack — and are you keeping pace with its evolution?</div><div><br></div><div><strong>Episode Resources</strong></div><div><br></div><ul><li>Tomáš Mráz on <a href="https://www.linkedin.com/in/tomasmraz/">LinkedIn</a></li><li>Jon Ericson on <a href="https://www.linkedin.com/in/jonericson/">LinkedIn</a></li><li>OpenSSL Foundation <a href="https://openssl-foundation.org/">Website</a></li><li>OpenSSL GitHub <a href="https://github.com/sponsors/openssl">Sponsors</a></li><li>Johannes Lintzen on <a href="https://www.linkedin.com/in/jolintzen/">LinkedIn</a>&nbsp;</li><li>PQShield <a href="http://www.pqshield.com">Website</a>&nbsp;</li></ul><div><br></div><div>Want exclusive insights on quantum migration?&nbsp; Stay ahead of the curve. Subscribe to Shielded: The Last Line of Cyber Defense on Apple Podcasts, Spotify, or YouTube Podcasts.</div><div><br>✔ Get insider knowledge from leading cybersecurity experts.<br><br></div><div>✔ Learn practical steps to future-proof your organization.<br><br></div><div>✔ Stay updated on regulatory changes and industry trends.<br><br><br>Need help subscribing? Click <a href="https://www.fame.so/follow-rate-review">here</a> for step-by-step instructions.</div><div>Shielded: The Last Line of Cyber Defense is handcrafted by our friends over at: <a href="https://www.fame.so/?utm_medium=podcast&amp;utm_source=bcast&amp;utm_campaign=masters-of-community-with-david-spinks?utm_medium=podcast&amp;utm_source=bcast&amp;utm_campaign=fame-client">fame.so</a></div><div><br></div>]]></content:encoded>
      <pubDate>Thu, 04 Sep 2025 11:00:00 +0000</pubDate>
      <author>PQShield</author>
      <enclosure url="https://media.fame.so/853kp4z8.mp3" length="69846203" type="audio/mpeg"/>
      <itunes:author>PQShield</itunes:author>
      <itunes:image href="https://content.fameapp.so/uploads/8l18kymq/d0082c10-88df-11f0-b979-89518561da03/d0082e00-88df-11f0-a459-576f581991fa.png"/>
      <itunes:duration>1746</itunes:duration>
      <itunes:summary>What does it take to keep the world’s most widely used cryptographic library secure in the quantum era? In this episode of Shielded: The Last Line of Cyber Defense, host Johannes Lintzen welcomes Tomáš Mráz, Director of the OpenSSL Software Foundation, and Jon Ericson, Community Manager at the Foundation. Together, they explore OpenSSL’s evolution, from its 25-year legacy to its upcoming OpenSSL 3.6 release, hybrid cryptography, and the global effort to achieve FIPS certifications for post-quantum algorithms. Learn how community contributions, funding models, and industry partnerships are shaping OpenSSL’s role in securing the internet’s future.</itunes:summary>
      <itunes:subtitle>What does it take to keep the world’s most widely used cryptographic library secure in the quantum era? In this episode of Shielded: The Last Line of Cyber Defense, host Johannes Lintzen welcomes Tomáš Mráz, Director of the OpenSSL Software Foundation, and Jon Ericson, Community Manager at the Foundation. Together, they explore OpenSSL’s evolution, from its 25-year legacy to its upcoming OpenSSL 3.6 release, hybrid cryptography, and the global effort to achieve FIPS certifications for post-quantum algorithms. Learn how community contributions, funding models, and industry partnerships are shaping OpenSSL’s role in securing the internet’s future.</itunes:subtitle>
      <itunes:keywords/>
      <itunes:explicit>No</itunes:explicit>
      <googleplay:explicit>No</googleplay:explicit>
    </item>
    <item>
      <title>Post-Quantum Prep Without the Panic: Don’t Delay Your Upgrade to TLS 1.3</title>
      <link>https://podcasts.fame.so/e/4n9m7kpn-post-quantum-prep-without-the-panic-don-t-delay-your-upgrade-to-tls-1-3</link>
      <itunes:title>Post-Quantum Prep Without the Panic: Don’t Delay Your Upgrade to TLS 1.3</itunes:title>
      <itunes:episode>14</itunes:episode>
      <itunes:season>1</itunes:season>
      <itunes:block>No</itunes:block>
      <googleplay:block>No</googleplay:block>
      <guid isPermaLink="false">v07r6m31</guid>
      <description>What if quantum computing feels years away, but your migration to post-quantum cryptography needs to start today? In this episode of Shielded: The Last Line of Cyber Defense, host Jo Lintzen welcomes Kevin Hilscher, Senior Director of Product Management at DigiCert. Kevin shares the practical realities of PQC adoption, from TLS 1.3 prerequisites and hybrid cryptography to vendor readiness and global regulatory timelines. Learn where enterprises should begin and why early discovery is critical. Expect practical steps, clear insights, and a candid call for earlier discovery, smarter planning, and quantum-ready systems.</description>
      <content:encoded><![CDATA[<div>As governments and regulators accelerate PQC adoption timelines, the urgency for organizations to act has never been greater. In this episode of <em>Shielded: The Last Line of Cyber Defense</em>, host Jo Lintzen speaks with Kevin Hilscher, Senior Director of Product Management at DigiCert, to explore the practical first steps of post-quantum cryptography adoption. They discuss why upgrading to TLS 1.3 is a non-negotiable starting point, how discovery of crypto assets lays the groundwork for any migration, and what enterprises should know about hybrid cryptography and its competing standards. From fragmented global regulations to aggressive timelines and the looming challenges of vendor readiness, Kevin provides a candid, real-world perspective on how organizations can build a quantum-ready roadmap before regulatory deadlines and quantum breakthroughs arrive.</div><div><br></div><div>What You’ll Learn<br><br></div><ul><li>Why TLS 1.3 is the non-negotiable first step for PQC readiness</li><li>How to approach crypto asset discovery across software, hardware, and vendors</li><li>The difference between hybrid key exchange vs. hybrid certificates (and why it matters)</li><li>Why regulatory timelines (EU 2030, CNSA 2027) may be more ambitious than reality</li><li>The challenge of fragmented algorithms across geographies and what it means for interoperability</li><li>How Falcon (FNDSA) could benefit resource-constrained IoT devices</li><li>Where vendors are leading (crypto SDKs) vs. lagging (enterprise apps and infrastructure)</li><li>Kevin’s advice for CISOs: why awareness, discovery, and vendor engagement must start now</li></ul><div><br></div><div>Kevin Hilscher is Senior Director of Product Management at DigiCert, where he leads the device trust product team and oversees PQC readiness across the company’s portfolio. With a background at Microsoft and deep experience working with OEMs, banks, healthcare providers, and defense organizations, Kevin has been at the forefront of preparing enterprises for the quantum era. His focus spans securing connected devices, enabling regulatory compliance, and helping global customers prepare for the transition to PQC. Known for his pragmatic approach, Kevin bridges the gap between evolving cryptographic standards and real-world business needs, helping organizations take the first steps toward a secure, quantum-ready future.<br><br></div><div>With the shift to post-quantum cryptography accelerating, Kevin’s message is clear: early discovery and TLS 1.3 readiness, not just new algorithms, will define the path to a quantum-ready future.</div><div><br></div><div><strong>Your Roadmap to Quantum Resilience</strong></div><div><br></div><div><strong>[06:17] Step 1: Build Awareness and Secure Buy-In -&nbsp;<br></strong><br></div><div>For many industries, the first challenge isn’t technical; it’s awareness. Kevin explains that cybersecurity teams often have to “sell upwards,” using the right data, talk tracks, and materials to educate leadership about PQC and secure sponsorship. Without this “step zero,” projects stall before they begin. Education is critical, not just inside your own enterprise, but across vendors and partners who may not even know what PQC is yet. Key Question: Do your executives and stakeholders truly understand the urgency of PQC, or are they still in denial?</div><div><br></div><div><strong>[07:18] Step 2: Discover Your Crypto Assets -&nbsp;<br></strong><br></div><div>The foundation of every migration is discovery. Kevin stresses the importance of cataloging where and how cryptography is used, TLS versions, crypto libraries, SDKs, and source code. For banks, that means checking third-party apps and firewalls. For OEMs, it’s embedded devices still running RSA or ECC. Discovery reveals not just internal risks but also gaps in vendor readiness, enabling informed conversations about timelines and support. Key Question: Have you mapped your crypto landscape, from TLS versions to third-party dependencies, so you know what needs to change?</div><div><br></div><div><strong>[09:25] Step 3: Upgrade to TLS 1.3 Today -&nbsp;<br></strong><br></div><div>Before PQC algorithms even come into play, enterprises must meet the TLS prerequisite. As Kevin notes, the IETF has been blunt: quantum-safe algorithms will only be supported in TLS 1.3 and above. Yet many organizations are still stuck on TLS 1.2 in legacy apps and infrastructure. Migrating now means you can act independently of PQC timelines while also future-proofing your systems for what’s next. Key Question: Are you still relying on TLS 1.2, or have you taken the first real step toward a quantum-ready foundation?</div><div><br></div><div><strong>[12:30] Step 4: Navigate Hybrid Cryptography with Clarity -&nbsp;<br></strong><br></div><div>“Hybrid” is one of the most confusing terms in PQC. Kevin highlights the difference between hybrid key exchange (pairing a PQC algorithm with RSA or ECC for TLS handshakes) and hybrid certificates (dual-signed X.509s). While hybrid key exchange is standardized and deployable today, hybrid certificates remain stalled by competing standards like composite, Chimeria, and Chameleon. Without clarity, organizations risk paralysis. Key Question: Do you know which type of hybrid you’re preparing for, and are you moving ahead where standards are ready today?</div><div><br></div><div><strong>[22:14] Step 5: Plan Realistically for Timelines and Vendor Readiness -&nbsp;<br></strong><br></div><div>Global regulators are setting ambitious deadlines, 2030 in the EU, 2027 for U.S. federal procurement. Kevin warns that critical systems like SCADA, SAP, and ERP will struggle to meet those dates, especially with legacy TLS and outdated infrastructure. While crypto SDKs are ahead, enterprise apps and HSM certifications will lag. Organizations must pressure vendors for roadmaps while also preparing for phased upgrades.</div><div>Key Question: Are you planning your migration based on regulatory optimism, or on the real pace of vendor and infrastructure readiness?</div><div><br></div><div><strong>Episode Resources<br></strong><br></div><ul><li>Kevin Hilscher on <a href="https://www.linkedin.com/in/kevinhilscher/?originalSubdomain=ca">LinkedIn</a></li><li>DigiCert PQC <a href="https://www.digicert.com/tls-ssl/post-quantum-cryptography">Resources</a></li><li>DigiCert PQC <a href="https://labs.digicert.com/">Lab Site</a></li><li>Johannes Lintzen on <a href="https://www.linkedin.com/in/jolintzen/">LinkedIn</a>&nbsp;</li><li>PQShield <a href="http://www.pqshield.com">Website</a>&nbsp;</li></ul><div><br></div><div>Want exclusive insights on quantum migration?&nbsp; Stay ahead of the curve. Subscribe to Shielded: The Last Line of Cyber Defense on Apple Podcasts, Spotify, or YouTube Podcasts.</div><div><br>✔ Get insider knowledge from leading cybersecurity experts.</div><div><br>✔ Learn practical steps to future-proof your organization.<br><br></div><div>✔ Stay updated on regulatory changes and industry trends.<br><br>Need help subscribing? Click <a href="https://www.fame.so/follow-rate-review">here</a> for step-by-step instructions.</div><div>Shielded: The Last Line of Cyber Defense is handcrafted by our friends over at: <a href="https://www.fame.so/?utm_medium=podcast&amp;utm_source=bcast&amp;utm_campaign=masters-of-community-with-david-spinks?utm_medium=podcast&amp;utm_source=bcast&amp;utm_campaign=fame-client">fame.so</a></div><div><br></div>]]></content:encoded>
      <pubDate>Thu, 28 Aug 2025 11:00:00 +0000</pubDate>
      <author>PQShield</author>
      <enclosure url="https://media.fame.so/84vlq168.mp3" length="71438627" type="audio/mpeg"/>
      <itunes:author>PQShield</itunes:author>
      <itunes:image href="https://content.fameapp.so/uploads/8l18kymq/4a8eb050-83eb-11f0-8fec-efdcaf801cf9/4a8eb170-83eb-11f0-97a4-07020b217339.png"/>
      <itunes:duration>1785</itunes:duration>
      <itunes:summary>What if quantum computing feels years away, but your migration to post-quantum cryptography needs to start today? In this episode of Shielded: The Last Line of Cyber Defense, host Jo Lintzen welcomes Kevin Hilscher, Senior Director of Product Management at DigiCert. Kevin shares the practical realities of PQC adoption, from TLS 1.3 prerequisites and hybrid cryptography to vendor readiness and global regulatory timelines. Learn where enterprises should begin and why early discovery is critical. Expect practical steps, clear insights, and a candid call for earlier discovery, smarter planning, and quantum-ready systems.</itunes:summary>
      <itunes:subtitle>What if quantum computing feels years away, but your migration to post-quantum cryptography needs to start today? In this episode of Shielded: The Last Line of Cyber Defense, host Jo Lintzen welcomes Kevin Hilscher, Senior Director of Product Management at DigiCert. Kevin shares the practical realities of PQC adoption, from TLS 1.3 prerequisites and hybrid cryptography to vendor readiness and global regulatory timelines. Learn where enterprises should begin and why early discovery is critical. Expect practical steps, clear insights, and a candid call for earlier discovery, smarter planning, and quantum-ready systems.</itunes:subtitle>
      <itunes:keywords/>
      <itunes:explicit>No</itunes:explicit>
      <googleplay:explicit>No</googleplay:explicit>
    </item>
    <item>
      <title>Designing for Breakage: What Cybersecurity Leaders Must Plan For</title>
      <link>https://podcasts.fame.so/e/2nxz2l6n-designing-for-breakage-what-cybersecurity-leaders-must-plan-for</link>
      <itunes:title>Designing for Breakage: What Cybersecurity Leaders Must Plan For</itunes:title>
      <itunes:episode>13</itunes:episode>
      <itunes:season>1</itunes:season>
      <itunes:block>No</itunes:block>
      <googleplay:block>No</googleplay:block>
      <guid isPermaLink="false">61mkmyv1</guid>
      <description>What if treating post-quantum cryptography like Y2K is your first and most dangerous mistake? In this episode of Shielded: The Last Line of Cyber Defense, host Johannes Lintzen welcomes Yolanda Reid, former IBM Consulting leader and U.S. defense veteran, to explain why PQC is not a patch, but a permanent shift in how we secure systems, train teams, and think about risk. From executive blind spots to the realities of “designing for breakage,” Yolanda offers a clear-eyed view of what must change and why five years may already be too late. Expect sharp truths, practical direction, and a call for leaders to act now before quantum becomes the blindside nobody planned for.</description>
      <content:encoded><![CDATA[<div>As quantum computing accelerates toward real-world impact, organizations must stop viewing post-quantum cryptography as a one-time technical upgrade. In this episode of Shielded: The Last Line of Cyber Defense, host Johannes Lintzen sits down with Yolanda Reid, former Associate Partner at IBM Consulting and U.S. Department of Defense leader, to explain why the PQC transition is fundamentally different from past events like Y2K. They discuss why treating PQC as a “fix-it-and-forget-it” migration is a dangerous misconception, and why organizations must instead prepare for an ongoing process of algorithm updates, policy changes, system redesigns, and cultural shifts. Yolanda shares lessons from government, financial services, and telecom industries, offering insights on how to build resilient teams, automate enforcement, and educate executives who still think “quantum doesn’t apply to us.” From crypto inventory planning to hybrid approaches and the rising convergence of AI and quantum, Yolanda delivers a clear and urgent call for awareness, preparation, and leadership. This is not just a technology problem; it’s a mindset shift. And the clock is already ticking.</div><div><br></div><div>What You’ll Learn:<br><br></div><ul><li>Why PQC is a long-term transformation, not a one-time upgrade</li><li>The executive blind spot: why C-suites must care now</li><li>How to identify and protect your “crown jewels”</li><li>What crypto inventory is, and why you’ll need it forever</li><li>Lessons from the finance sector, and why no two PQC journeys are alike</li><li>Why “hybrid cryptography” is still debated and how to decide</li><li>How AI and quantum are converging and why regulation must catch up</li><li>Yolanda’s resilience framework: planning for risk, protecting what matters, and leading with clarity</li></ul><div><br></div><div>Yolanda Reid is a cybersecurity leader with over two decades of experience spanning national defense, intelligence, and enterprise technology. As a former Associate Partner at IBM Consulting, her career includes leadership roles at Raytheon, BBN Technologies, EverWatch, and the U.S. Department of Defense, where she specialized in quantum cryptography, zero trust, and strategic risk mitigation. Respected for her ability to translate complex technical issues into clear, actionable strategies, Yolanda is a trusted advisor to federal agencies, Fortune 500 companies, and emerging tech teams navigating quantum readiness. She combines deep technical expertise with a human-first approach shaped by her journey as a cancer survivor and single mother.<br><br></div><div>Today, Yolanda champions proactive planning, executive education, and long-term resilience, helping organizations prepare for a future where cybersecurity is not just about encryption, but evolution.</div><div><br></div><div><strong>Your Roadmap to Post-Quantum Readiness<br></strong><br></div><div><strong>[03:15] Step 1: PQC Is Not Y2K And That Changes Everything<br></strong><br></div><div>The Y2K scare came and went with a single deadline. But post-quantum cryptography? It’s not a singular event, it’s a complete shift in how we think about cryptography, risk, and infrastructure. Yolanda explains that with PQC, organizations will no longer rely on one fixed algorithm, they’ll need toolkits, policies, and a mindset of constant change. The entire cryptographic lifecycle will be in motion, from policy and procurement to development and testing. If you treat this as just another IT upgrade, you’ll miss the foundational shift required to secure your business in a quantum-enabled world. Key Question: Is your organization preparing for a recurring cryptographic upgrade cycle or hoping for a single fix?</div><div><br></div><div><strong>[06:47] Step 2: The Real Risk Is Executive Blindness<br></strong><br></div><div>Quantum threats aren’t just technical, they’re strategic. Yolanda recounts a conversation where a senior leader dismissed PQC because they “don’t do quantum.” That mindset is precisely the danger. She emphasizes that PQC readiness must reach the boardroom, not just engineering teams. Because what’s at risk isn’t theoretical, it’s your communications, finances, and trust.</div><div>Crown jewels like encrypted data, trade secrets, and customer information are all vulnerable without leadership engagement. This isn’t a technical curiosity. It’s an executive obligation and the time to engage is now. Key Question: Have your executives been briefed on the strategic impact of quantum disruption?</div><div><br></div><div>[<strong>09:27] Step 3: Design for Breakage, Because It’s Coming<br></strong><br></div><div>PQC migration isn’t clean. Yolanda emphasizes that upgrading algorithms will break systems, sometimes in unpredictable ways. Systems built 10, 20, or even 40 years ago weren’t designed for this shift, and performance may degrade or, in some cases, improve. Yolanda urges leaders to plan for this reality, build troubleshooting teams, and avoid panic rollbacks when things inevitably break. Breakage isn’t failure, it’s part of the process. Organizations that build for resilience, not perfection, will come out stronger. Key Question: Do you have a real-time recovery plan for the failures PQC migration will trigger?</div><div><br></div><div><strong>[25:35] Step 4: The 2030 Timeline Is a Mirage<br></strong><br></div><div>Think 2030 is far away? Think again. Yolanda compares the current moment to Y2K’s long runway, where preparation began over a decade in advance. She warns that migrations like TLS took 15 years, and we’re already late. Quantum adoption will likely happen faster and hit harder.</div><div>And if global investors succeed in reaching quantum advantage before 2030, it’s not just a matter of being slow, it’s a matter of being exposed. By the time official deadlines hit, it may already be too late for unprepared organizations to catch up. Key Question: Are you treating 2030 as your deadline or your last chance?</div><div><br></div><div><strong>[30:27] Step 5: AI + Quantum Changes Everything, Including Policy<br></strong><br></div><div>Quantum computing won’t arrive in isolation. Yolanda explains that it will collide with AI, creating exponential disruption that current policy frameworks are unprepared for. And while regulators are still trying to wrap their heads around AI, the convergence with quantum is already underway in labs, startups, and state-sponsored programs. Yolanda cautions that adversaries are already exploring malicious use cases, and we need to match that urgency with proactive safeguards. Those who wait for a clear policy may find themselves on the wrong side of quantum advantage. Key Question: Are you helping shape the future of secure AI + Quantum use or waiting for someone else to define it?</div><div><br></div><div><strong>Episode Resources:<br></strong><br></div><ul><li>Yolanda Reid on <a href="https://www.linkedin.com/in/yolanda-c-reid/">LinkedIn</a></li><li>Johannes Lintzen on <a href="https://www.linkedin.com/in/jolintzen/">LinkedIn</a>&nbsp;</li><li>PQShield <a href="http://www.pqshield.com">Website</a>&nbsp;</li></ul><div><br></div><div>Want exclusive insights on quantum migration?&nbsp; Stay ahead of the curve. Subscribe to Shielded: The Last Line of Cyber Defense on Apple Podcasts, Spotify, or YouTube Podcasts.</div><div><br>✔ Get insider knowledge from leading cybersecurity experts.</div><div>✔ Learn practical steps to future-proof your organization.</div><div>✔ Stay updated on regulatory changes and industry trends.<br><br>Need help subscribing? Click <a href="https://www.fame.so/follow-rate-review">here</a> for step-by-step instructions.</div><div>Shielded: The Last Line of Cyber Defense is handcrafted by our friends over at: <a href="https://www.fame.so/?utm_medium=podcast&amp;utm_source=bcast&amp;utm_campaign=masters-of-community-with-david-spinks?utm_medium=podcast&amp;utm_source=bcast&amp;utm_campaign=fame-client">fame.so</a></div><div><br></div>]]></content:encoded>
      <pubDate>Thu, 21 Aug 2025 11:00:00 +0000</pubDate>
      <author>PQShield</author>
      <enclosure url="https://media.fame.so/80v4nnj8.mp3" length="94965550" type="audio/mpeg"/>
      <itunes:author>PQShield</itunes:author>
      <itunes:image href="https://content.fameapp.so/uploads/8l18kymq/09e04d60-7dd8-11f0-bd63-b7ef9e126d97/09e04ef0-7dd8-11f0-b742-4f35a6bc1b62.png"/>
      <itunes:duration>2374</itunes:duration>
      <itunes:summary>What if treating post-quantum cryptography like Y2K is your first and most dangerous mistake? In this episode of Shielded: The Last Line of Cyber Defense, host Johannes Lintzen welcomes Yolanda Reid, former IBM Consulting leader and U.S. defense veteran, to explain why PQC is not a patch, but a permanent shift in how we secure systems, train teams, and think about risk. From executive blind spots to the realities of “designing for breakage,” Yolanda offers a clear-eyed view of what must change and why five years may already be too late. Expect sharp truths, practical direction, and a call for leaders to act now before quantum becomes the blindside nobody planned for.</itunes:summary>
      <itunes:subtitle>What if treating post-quantum cryptography like Y2K is your first and most dangerous mistake? In this episode of Shielded: The Last Line of Cyber Defense, host Johannes Lintzen welcomes Yolanda Reid, former IBM Consulting leader and U.S. defense veteran, to explain why PQC is not a patch, but a permanent shift in how we secure systems, train teams, and think about risk. From executive blind spots to the realities of “designing for breakage,” Yolanda offers a clear-eyed view of what must change and why five years may already be too late. Expect sharp truths, practical direction, and a call for leaders to act now before quantum becomes the blindside nobody planned for.</itunes:subtitle>
      <itunes:keywords/>
      <itunes:explicit>No</itunes:explicit>
      <googleplay:explicit>No</googleplay:explicit>
    </item>
    <item>
      <title>From NIST Standards to Action: A Year of PQC Migration</title>
      <link>https://podcasts.fame.so/e/18p7wk5n-from-nist-standards-to-action-a-year-of-pqc-migration</link>
      <itunes:title>From NIST Standards to Action: A Year of PQC Migration</itunes:title>
      <itunes:episode>12</itunes:episode>
      <itunes:season>1</itunes:season>
      <itunes:block>No</itunes:block>
      <googleplay:block>No</googleplay:block>
      <guid isPermaLink="false">z1r42yj1</guid>
      <description>It’s been one year since NIST finalized its post‑quantum cryptography (PQC) standards, a milestone that sparked urgency across government, industry, and security leaders. In this special episode of Shielded: The Last Line of Cyber Defense, we revisit those early conversations about PQC migration to see how far we’ve come (and how far we still have to go). Host Johannes Lintzen is joined by experts from NIST, DHS, Cloudflare, Signal and leading hardware security companies to reflect on what’s working, what’s stalled, and why this migration can’t wait any longer.</description>
      <content:encoded><![CDATA[<div>One year ago, NIST released its long‑awaited post‑quantum cryptography standards, marking the official start of the migration to quantum‑safe security. It was the moment everyone had been “waiting for” but did it really kickstart the shift?<br><br></div><div>In this anniversary episode of Shielded: The Last Line of Cyber Defense, host Johannes Lintzen brings back some of the most important voices in the PQC conversation to revisit where we were, where we are, and where we need to go next:<br><br></div><ul><li><strong>Dustin Moody</strong> (NIST) on what has surprised him about the first year of migration since the standards landed.</li><li><strong>Dr. Garfield Jones</strong> (DHS) on how mandates and compliance have accelerated (or complicated) the push to PQC.</li><li><strong>Bas Westerbaan</strong> (Cloudflare) on why the work is less about “just switching” and more about managing change.</li><li><strong>John Ray </strong>(Thales) on what crypto agility has looked like in practice since the standards dropped.</li><li><strong>Mamta Gupta (</strong>Lattice<strong>) &amp; Cassie Crossley</strong> (Schneider Electrics) on the reality of aligning hardware lifecycles, evolving algorithms, and compliance demands.</li><li><strong>Rolfe Schmidt</strong> (Signal) reveals how early adoption ahead of the standardization process paid off and the unexpected protocol design challenges that emerged in year one.</li></ul><div><br>Together, they deliver an unvarnished look at what’s changed in the 12 months since the standards were finalized and what still needs urgent attention.<br><br></div><div>What You'll Learn:</div><ul><li>How much progress has been made one year after the standards and where organizations are still stuck.</li><li>Why government mandates mean “waiting” could lock your business out of contracts.</li><li>The #1 first step before any PQC migration (and why it hasn’t changed in a year).</li><li>What crypto agility means now that the standards are a reality.</li><li>Why hardware lifecycles vs. quantum threats are still a ticking clock.</li><li>What this first year has taught us about what it will take to reach full migration.</li><li>The latest one-year-on insights from Cloudflare and Signal as they refine their PQC deployments.</li></ul><div><br></div><div>This is a rare, roundtable-style single-guest interview featuring voices from government, industry, and research in one conversation. If you need to understand not just why PQC migration matters but how to start, this is your playbook.</div><div><br></div><div><strong>Your Roadmap to Post-Quantum Readiness:</strong></div><div><strong><br>[00:45] Step 1: Busting the “Quick Switch” Myth –&nbsp; A Year Later<br></strong>When NIST released its PQC standards last year, a lot of organizations exhaled, assuming the hard part was over. “Great,” they thought, “we’ll just swap in the new algorithms and move on.” But as Dustin Moody warned then, and has proven true over the past 12 months, this migration isn’t that simple. It’s not just a patch or an update; it’s a deep, sometimes painful overhaul of systems, processes, and mindsets. One year on, companies are discovering that waiting doesn’t make the work easier, it makes it messier. Key Question: One year in, are you still treating PQC migration as “future work,” or are you finally planning for the hard parts?</div><div><strong><br>[03:31] Step 2: This Migration Isn’t Optional – And Year One Proved It<br></strong>When Dr. Garfield Jones said, “This migration shouldn’t be optional,” it sounded like a wake‑up call. A year later, it’s not just a warning, it’s policy. Government memos, executive orders, and procurement rules have already started pushing companies to act, with federal agencies asking for cryptographic inventories and refusing to work with vendors who can’t demonstrate progress. The message is blunt: if your systems aren’t on the migration path, you could be locked out of contracts or entire markets. Year one proved the pressure is real, and year two will only raise the stakes. Key Question: Are you keeping pace with mandates, or will you watch opportunities dry up as compliance deadlines kick in?<br><br></div><div><strong>[09:14] Step 3: Start With a Real Inventory – And Keep It Current<br></strong>A year ago, Bas Westerbaan of Cloudflare told us that the first step in PQC migration was a thorough cryptographic inventory. That advice hasn’t changed but the past year has shown just how hard that job is in reality. Most organizations don’t have a full picture of where cryptography lives across their systems, what protocols are in use, or even which data is most sensitive. Without that map, every other decision becomes reactive, and every fix becomes a scramble. One year later, companies that didn’t start this work are already struggling to answer the simplest question: “Where do we even begin?” Key Question: Is your cryptographic inventory still a “to‑do,” or have you turned it into a living, updated map of risk?<br><br></div><div><strong>[15:39] Step 4: Crypto Agility – From Concept to Year‑One Reality<br></strong>A year ago, John Ray warned that if we hard‑coded PQC algorithms the way we did with RSA and ECC, we’d just be setting ourselves up for another trap. That warning has aged well. In the past year, crypto agility has shifted from an abstract “future‑proofing” buzzword into an urgent architectural reality. Companies are already seeing that systems without flexibility turn every new standard or algorithm change into an expensive nightmare. The smartest teams are designing infrastructure so the back‑end decides what algorithm to use, instead of forcing every application to be rebuilt. Key Question: Are you building systems that can adapt, or are you locking yourself into brittle ones you’ll regret later?<br><br></div><div><strong>[18:17] Step 5: The Hardware Gap – Still a Ticking Clock<br></strong>Mamta Gupta flagged it last year, and it’s even sharper now: hardware lives on a different timeline. Devices being shipped today are designed to last 10–15 years but the cryptography inside them might not even last five. Standards are evolving, threats are evolving faster, and anything rigid will be obsolete long before it’s retired. In year one, we’ve already seen how this mismatch turns into a headache for companies that didn’t build in an upgrade path. The clock is still ticking, and the gap isn’t closing on its own. Key Question: Are you designing hardware for the future, or are you shipping next year’s legacy problems?<br><br></div><div><strong>[21:49] Step 6: Compliance – A Moving Target, Still Moving<br></strong>One year on, compliance hasn’t “settled down” the way some expected. Frameworks like FIPS 140‑3 and certification rules are still evolving, and Cassie Crossley warns that algorithms considered safe today might not pass tomorrow’s tests. For companies that locked in too early, that means costly rework; for companies that waited, it means they still can’t sit still. This is why crypto agility isn’t just a “nice idea,”&nbsp; it’s survival. PQC isn’t a single migration; it’s an ongoing process of adaptation. Key Question: One year after standards dropped, are you ready for the next round of compliance changes?<br><br></div><div><strong>Episode Resources:<br></strong><br></div><ul><li>Dustin Moody on <a href="https://www.linkedin.com/in/dustin-moody-88410550/">LinkedIn</a></li><li>Dr. Garfield Jones on <a href="https://www.linkedin.com/in/garfield-jones-d-eng-0aba558b">LinkedIn</a></li><li>Bas Westerbaan on <a href="https://nl.linkedin.com/in/baswesterbaan">LinkedIn</a></li><li>John Ray on <a href="https://www.linkedin.com/in/johnray11/">LinkedIn</a></li><li>Mamta Gupta on <a href="https://www.linkedin.com/in/mamta-gupta-5038123/">Linkedin</a></li><li>Cassie Crossley on <a href="https://www.linkedin.com/in/cassiecrossley">LinkedIn</a></li><li>NIST <a href="https://www.nist.gov/">Website</a></li><li>PQShield <a href="http://www.pqshield.com">Website</a>&nbsp;</li></ul><div><br></div><div>Want exclusive insights on post-quantum security? Stay ahead of the curve - subscribe to Shielded: The Last Line of Cyber Defense on Apple Podcasts, Spotify, and YouTube Podcasts.<br><br></div><div>✔ Get insider knowledge from leading cybersecurity experts.<br><br></div><div>✔ Learn practical steps to future-proof your organization.<br><br></div><div>✔ Stay updated on regulatory changes and industry trends.<br><br>Need help subscribing? Click <a href="https://www.fame.so/follow-rate-review">here</a> for step-by-step instructions.</div><div><br></div><div>Shielded: The Last Line of Cyber Defense is handcrafted by our friends over at: <a href="https://www.fame.so/?utm_medium=podcast&amp;utm_source=bcast&amp;utm_campaign=masters-of-community-with-david-spinks?utm_medium=podcast&amp;utm_source=bcast&amp;utm_campaign=fame-client">fame.so</a></div><div><br></div>]]></content:encoded>
      <pubDate>Thu, 14 Aug 2025 10:56:00 +0000</pubDate>
      <author>PQShield</author>
      <enclosure url="https://media.fame.so/w21nr298.mp3" length="74035199" type="audio/mpeg"/>
      <itunes:author>PQShield</itunes:author>
      <itunes:image href="https://content.fameapp.so/uploads/8l18kymq/f3ed4d70-783b-11f0-96a4-c1728ab47997/f3ed4e80-783b-11f0-8239-7736ada9c6c0.png"/>
      <itunes:duration>1850</itunes:duration>
      <itunes:summary>It’s been one year since NIST finalized its post‑quantum cryptography (PQC) standards, a milestone that sparked urgency across government, industry, and security leaders. In this special episode of Shielded: The Last Line of Cyber Defense, we revisit those early conversations about PQC migration to see how far we’ve come (and how far we still have to go). Host Johannes Lintzen is joined by experts from NIST, DHS, Cloudflare, Signal and leading hardware security companies to reflect on what’s working, what’s stalled, and why this migration can’t wait any longer.</itunes:summary>
      <itunes:subtitle>It’s been one year since NIST finalized its post‑quantum cryptography (PQC) standards, a milestone that sparked urgency across government, industry, and security leaders. In this special episode of Shielded: The Last Line of Cyber Defense, we revisit those early conversations about PQC migration to see how far we’ve come (and how far we still have to go). Host Johannes Lintzen is joined by experts from NIST, DHS, Cloudflare, Signal and leading hardware security companies to reflect on what’s working, what’s stalled, and why this migration can’t wait any longer.</itunes:subtitle>
      <itunes:keywords/>
      <itunes:explicit>No</itunes:explicit>
      <googleplay:explicit>No</googleplay:explicit>
    </item>
    <item>
      <title>Hardware Is the Hidden Risk: Ferhat Yaman on PQC, Side-Channel Attacks, and AI Privacy</title>
      <link>https://podcasts.fame.so/e/286qzlzn-hardware-is-the-hidden-risk-ferhat-yaman-on-pqc-side-channel-attacks-and-ai-privacy</link>
      <itunes:title>Hardware Is the Hidden Risk: Ferhat Yaman on PQC, Side-Channel Attacks, and AI Privacy</itunes:title>
      <itunes:episode>11</itunes:episode>
      <itunes:season>1</itunes:season>
      <itunes:block>No</itunes:block>
      <googleplay:block>No</googleplay:block>
      <guid isPermaLink="false">j12r8l81</guid>
      <description>What if your hardware is leaking secrets before your software even boots? In this episode of Shielded: The Last Line of Cyber Defense, Johannes Lintzen sits down with Ferhat Yaman, a security researcher at AMD’s Product Security Office, to explore the front lines of post-quantum cryptography, hardware vulnerabilities, and AI privacy. From electromagnetic side-channel attacks to homomorphic encryption, Ferhat shares practical insights from years of research and testing across AMD, academia, and open source projects. Learn what it takes to build and test hardware for a post-quantum world.</description>
      <content:encoded><![CDATA[<div>As post-quantum cryptography moves from theory to hardware, organizations can no longer afford to ignore the physical layer of security. In this episode of <em>Shielded: The Last Line of Cyber Defense</em>, host Johannes Lintzen speaks with Ferhat Yaman, security researcher at AMD’s Product Security Office, to explore how electromagnetic side-channel attacks, hybrid cryptography, and AI privacy are reshaping the future of secure system design. They discuss the risks of leakage in post-quantum implementations, the challenge of model theft in AI accelerators, and why mitigation needs to start before silicon is even taped out. From masking and shuffling to pre-silicon testing and homomorphic encryption, Ferhat offers a candid and deeply technical look at what it means to build quantum-resilient systems in hardware, not just in code.</div><div><br></div><div>What You’ll Learn:</div><ul><li>How side-channel attacks exploit physical leakage like EM emissions and power consumption</li><li>Why even tiny hardware optimizations can create new vulnerabilities</li><li>How AI model parameters can be extracted using electromagnetic analysis</li><li>What homomorphic encryption means and why it’s not yet practical</li><li>How hybrid cryptography supports post-quantum transition in real systems</li><li>Where to start with PQC hardware implementation (hint: think bootloaders)</li><li>How open source and commercial tools help validate hardware security pre-silicon</li><li>Ferhat’s top 3 priorities for building post-quantum-ready chips today</li></ul><div><br></div><div>Ferhat Yaman is a security researcher at AMD's product security office, where his work spans post-quantum cryptography, AI privacy, and side-channel resilience. With a background in both theoretical cryptography and practical hardware design, Ferhat has contributed to projects including the Crystals-Kyber and Dilithium PQC implementations, Caliptra Root of Trust, and electromagnetic model extraction from Google’s Edge TPU. His research explores how secure systems can be built from the silicon up, balancing performance, cost, and long-term quantum readiness. Ferhat’s recent work looks at accelerating homomorphic encryption for AI workloads and improving pre-silicon testing using commercial and open-source tools.<br><br></div><div>With the shift to post-quantum hardware security accelerating, Yaman’s message is clear: protecting systems requires more than new math; it demands early testing, layered defenses, and security built into the silicon itself.</div><div><br></div><div><strong>Your Roadmap to Hardware-Centric PQC:<br></strong><br></div><div><strong>[06:59] Step 1: Test for Physical Leakage, Not Just Algorithm Strength -&nbsp;<br></strong><br></div><div>Strong algorithms don’t guarantee strong protection if the hardware leaks secrets. Ferhat explains how side-channel attacks can extract private keys by analyzing power consumption or electromagnetic emissions, especially in hardware implementations of post-quantum cryptography like Kyber and Dilithium. Even minor hardware optimizations meant to improve speed can unintentionally introduce new leakages. Key Question: Have you tested your PQC hardware for side-channel leakage, or just verified the math?</div><div><br></div><div><strong>[11:19] Step 2: Prepare for Hybrid Attacks, Not Just Hybrid Crypto -&nbsp;<br></strong><br></div><div>Attackers are blending techniques, merging cryptanalytic insights with side-channel data to break even well-implemented systems. Ferhat emphasizes that defending against these multi-layered threats requires layered countermeasures across hardware and software. The combination of multiple attack vectors makes traditional assumptions about isolated vulnerabilities dangerously outdated. Key Question: Are you planning for real-world attack combinations or idealized test conditions?</div><div><br></div><div><strong>[13:52] Step 3: Use Hybrid Cryptography to Bridge the Transition -</strong></div><div><br></div><div>You don’t have to replace everything overnight. Ferhat describes how AMD’s Caliptra project integrates classical and post-quantum cryptography side-by-side, giving developers flexibility while building resilience. Hybrid cryptography is a practical way to support both legacy and quantum-safe systems, especially in constrained environments. It’s a crucial stepping stone for organizations that can’t afford a full cryptographic overhaul in one cycle. Key Question: Can your architecture support both today’s standards and tomorrow’s requirements?</div><div><br></div><div><strong>[17:38] Step 4: Defend AI Models from Electromagnetic Model Theft -&nbsp;</strong></div><div><br></div><div>AI workloads running on edge hardware can leak critical information. Ferhat’s research shows how electromagnetic side-channel attacks can reveal the structure of neural networks down to the number of layers and nodes, without touching the model file. For companies that treat models as IP, this presents a new category of risk. This form of model extraction reduces training time for attackers by shortcutting hyperparameter tuning. Key Question: Could your AI accelerators be quietly leaking trade secrets?</div><div><br></div><div><strong>[23:52] Step 5: Build Security In, With Countermeasures That Match the Threat -<br></strong><br></div><div>Mitigation strategies like masking, shuffling, and randomness injection aren’t optional; they’re essential. Ferhat walks through how these hardware-level techniques help minimize leakage, but warns that each comes with design and performance tradeoffs. Choosing the right countermeasure depends on your timing, area, and risk budget; there’s no one-size-fits-all solution. Key Question: Have you budgeted for countermeasures, or are you counting on hope?</div><div><br></div><div><strong>Episode Resources:</strong></div><ul><li>Ferhat Yaman on <a href="https://www.linkedin.com/in/ferhatyaman/">LinkedIn</a></li><li>Johannes Lintzen on <a href="https://www.linkedin.com/in/jolintzen/">LinkedIn</a>&nbsp;</li><li>PQShield <a href="http://www.pqshield.com">Website</a> &nbsp;</li><li>AMD’s <a href="https://github.com/chipsalliance/caliptra">Caliptra Project</a></li><li><a href="https://www.newae.com/hardware/chipwhisperer">ChipWhisperer by NewAE</a></li><li><a href="https://www.keysight.com/us/en/home.html">Keysight Side Channel Analysis Suite</a></li><li><a href="https://www.ansys.com/">ANSYS Security Tools</a></li><li>AMD <a href="https://www.linkedin.com/company/amd/">Linkedin</a></li></ul><div><br></div><div>Want exclusive insights on quantum migration?&nbsp; Stay ahead of the curve. Subscribe to Shielded: The Last Line of Cyber Defense on Apple Podcasts, Spotify, or YouTube Podcasts.</div><div><br>✔ Get insider knowledge from leading cybersecurity experts.<br><br></div><div><br>✔ Learn practical steps to future-proof your organization.<br><br></div><div><br>✔ Stay updated on regulatory changes and industry trends.<br><br>Need help subscribing? Click <a href="https://www.fame.so/follow-rate-review">here</a> for step-by-step instructions.</div><div>Shielded: The Last Line of Cyber Defense is handcrafted by our friends over at: <a href="https://www.fame.so/?utm_medium=podcast&amp;utm_source=bcast&amp;utm_campaign=masters-of-community-with-david-spinks?utm_medium=podcast&amp;utm_source=bcast&amp;utm_campaign=fame-client">fame.so</a></div><div><br></div>]]></content:encoded>
      <pubDate>Thu, 07 Aug 2025 11:00:00 +0000</pubDate>
      <author>PQShield</author>
      <enclosure url="https://media.fame.so/wyqj149w.mp3" length="89720162" type="audio/mpeg"/>
      <itunes:author>PQShield</itunes:author>
      <itunes:image href="https://content.fameapp.so/uploads/8l18kymq/7237e260-72d3-11f0-b36e-99159fc82720/7237e390-72d3-11f0-8110-8b0993174f08.png"/>
      <itunes:duration>2242</itunes:duration>
      <itunes:summary>What if your hardware is leaking secrets before your software even boots? In this episode of Shielded: The Last Line of Cyber Defense, Johannes Lintzen sits down with Ferhat Yaman, a security researcher at AMD’s Product Security Office, to explore the front lines of post-quantum cryptography, hardware vulnerabilities, and AI privacy. From electromagnetic side-channel attacks to homomorphic encryption, Ferhat shares practical insights from years of research and testing across AMD, academia, and open source projects. Learn what it takes to build and test hardware for a post-quantum world.</itunes:summary>
      <itunes:subtitle>What if your hardware is leaking secrets before your software even boots? In this episode of Shielded: The Last Line of Cyber Defense, Johannes Lintzen sits down with Ferhat Yaman, a security researcher at AMD’s Product Security Office, to explore the front lines of post-quantum cryptography, hardware vulnerabilities, and AI privacy. From electromagnetic side-channel attacks to homomorphic encryption, Ferhat shares practical insights from years of research and testing across AMD, academia, and open source projects. Learn what it takes to build and test hardware for a post-quantum world.</itunes:subtitle>
      <itunes:keywords/>
      <itunes:explicit>No</itunes:explicit>
      <googleplay:explicit>No</googleplay:explicit>
    </item>
    <item>
      <title>The biggest risk to PQC migration is you (and other humans)</title>
      <link>https://podcasts.fame.so/e/vn5jz2y8-the-biggest-risk-to-pqc-migration-is-you-and-other-humans</link>
      <itunes:title>The biggest risk to PQC migration is you (and other humans)</itunes:title>
      <itunes:episode>10</itunes:episode>
      <itunes:season>1</itunes:season>
      <itunes:block>No</itunes:block>
      <googleplay:block>No</googleplay:block>
      <guid isPermaLink="false">80q3k240</guid>
      <description>What if the biggest threat to your cybersecurity strategy isn’t quantum computing, but humans? In this episode of Shielded: The Last Line of Cyber Defense, host Johannes Lintzen welcomes Professor Bill Buchanan, OBE, FRSE, a global leader in applied cryptography, digital trust, and secure system design. Bill shares the origins of public key cryptography and the challenges of migrating beyond RSA and ECC. Learn why cryptographic agility is essential, where the biggest vulnerabilities lie, and how standards like FIPS 140 and TLS are laying the groundwork for a secure future. Expect blunt truths, clear insights, and an urgent call for better systems, smarter engineers, and more public understanding.</description>
      <content:encoded><![CDATA[<div>As quantum computing inches closer to real-world impact, organizations can no longer afford to treat post-quantum cryptography as a future concern. In this episode of Shielded: <em>The Last Line of Cyber Defense</em>, host Johannes Lintzen speaks with Professor Bill Buchanan, OBE, FRSE, to examine what it takes to transition into the post-quantum era. They explore the importance of cryptographic agility, the myths around PQC performance, and why human error remains the biggest vulnerability in cybersecurity. From hybrid adoption to hardware integration and upcoming regulatory mandates, Bill offers a candid and practical look at how organizations can prepare for the next generation of encryption before it’s too late.</div><div><br></div><div>What You’ll Learn:<br><br></div><ul><li>Why cryptographic methods are near-perfect and humans are the real weakness</li><li>How TLS exemplifies cryptographic agility (and why you should learn from it)</li><li>What Apple vs the UK Government reveals about trust and end-to-end encryption</li><li>Why hybrid approaches are more than a stepping stone—and how to do them right</li><li>The real performance and key size implications of PQC (Hint: it’s not scary)</li><li>How to think about certificates, signatures, and dual-key infrastructure</li><li>What’s coming next: homomorphic encryption, multi-party computation, and privacy-preserving design</li><li>Bill’s top 3 priorities for organizations starting their post-quantum journey</li></ul><div><br></div><div>Professor Bill Buchanan, OBE, FRSE, is a cybersecurity professor at Edinburgh Napier University and one of the most recognized voices in applied cryptography and digital trust. With over 30 books, 400+ research papers, and multiple spin-out companies to his name, Buchanan has dedicated his career to bridging the gap between theoretical cryptography and real-world implementation. His work spans homomorphic encryption, digital identity, secure system design, and blockchain-based trust frameworks. As a passionate advocate for privacy, fairness, and resilience in digital systems, Buchanan has contributed extensively to shaping both academic research and public policy in cybersecurity. He regularly advises governments and organizations on the future of secure infrastructure in a post-quantum world and is a driving force behind efforts to improve cryptographic literacy and engineering practices. Known for his clear thinking, technical depth, and human-first approach to security, Buchanan remains a trusted voice in the global conversation on quantum readiness and digital transformation.<br><br></div><div>With the shift to post-quantum cryptography accelerating, Buchanan’s message is clear: crypto agility and system design, not just new algorithms, will define the next era of trust.</div><div><br></div><div><strong>Your Roadmap to Quantum Resilience:<br></strong><br></div><div><strong>[04:55] Step 1: Address the Human Weak Link -<br></strong><br></div><div>The cryptography may be bulletproof, but your people aren’t. Bill Buchanan emphasizes that most large-scale breaches don’t happen because of broken algorithms; they happen because of human error, poor design, or social engineering. Whether it’s a $1.4 billion hack or a misconfigured certificate, humans remain the biggest vulnerability. A truly quantum-secure strategy starts with investing in security-conscious design, reducing friction in authentication, and eliminating avoidable weak points. Key Question: Are your systems secure by design, or are they just relying on perfect human behavior?</div><div><br></div><div><strong>[10:45] Step 2: Embrace Cryptographic Agility Through TLS -<br></strong><br></div><div>Crypto agility isn’t theoretical; it’s working today. Buchanan highlights TLS as a mature, proven model that allows for graceful cryptographic upgrades through suite negotiation. Rather than waiting for a full system overhaul, organizations can build agility now by supporting multiple cryptographic algorithms and migrating incrementally. Agility lets you test, evolve, and deprecate without downtime or disruption. Key Question: Have you adopted TLS-style agility to allow for future upgrades without breaking your systems?</div><div><br></div><div><strong>[16:45] Step 3: Stop Fearing PQC Performance -<br></strong><br></div><div>Worried about latency or massive key sizes? Don’t be. Buchanan debunks the myth that post-quantum cryptography is too resource-intensive. NIST-approved algorithms like ML-KEM and ML-DSA perform on par with elliptic curve cryptography and better than RSA in many cases. Even the increased key sizes are well within modern bandwidth and storage capabilities. With PQC performance now optimized, the only thing slowing you down is outdated assumptions. Key Question: Are your security decisions based on current facts, or outdated fears?</div><div><br></div><div><strong>[28:45] Step 4: Implement Hybrid Cryptography with Confidence -<br></strong><br></div><div>PQC doesn’t have to be all or nothing. Hybrid schemes, where classical and post-quantum algorithms are used together, offer a safe and flexible transition path. Buchanan explains how hybrid key exchanges and dual-signed certificates allow you to maintain interoperability while testing and rolling out quantum-safe components. Just like TLS evolved over time, your infrastructure can too. Key Question: Have you identified where hybrid cryptography could enable early wins without full replacement?</div><div><br></div><div><strong>[34:40] Step 5: Look Beyond PQC, Design for Privacy and Resilience -<br></strong><br></div><div>Post-quantum security isn’t just about new math, it’s about building smarter systems. Buchanan challenges organizations to think bigger: from fully homomorphic encryption to secure enclaves and multi-party computation, the goal isn’t just secrecy, but trust and resilience. Encryption at rest and in transit is not enough. Security in processing is the next frontier. Key Question: Is your roadmap just about compliance, or are you designing for privacy, performance, and future-proof trust?</div><div><br></div><div><strong>Episode Resources:<br></strong><br></div><ul><li>Professor Bill Buchanan on <a href="https://www.linkedin.com/in/billatnapier/">LinkedIn</a></li><li>Bill Buchanan’s Personal <a href="https://asecuritysite.com/">Website</a></li><li>Johannes Lintzen on <a href="https://www.linkedin.com/in/jolintzen/">LinkedIn</a>&nbsp;</li><li>PQShield <a href="http://www.pqshield.com">Website</a>&nbsp;</li></ul><div><br></div><div>Want exclusive insights on quantum migration?&nbsp; Stay ahead of the curve. Subscribe to Shielded: The Last Line of Cyber Defense on Apple Podcasts, Spotify, or YouTube Podcasts.</div><div><br>✔ Get insider knowledge from leading cybersecurity experts.<br><br></div><div><br>✔ Learn practical steps to future-proof your organization.<br><br></div><div><br>✔ Stay updated on regulatory changes and industry trends.<br><br>Need help subscribing? Click <a href="https://www.fame.so/follow-rate-review">here</a> for step-by-step instructions.<br><br></div><div><br></div><div>Shielded: The Last Line of Cyber Defense is handcrafted by our friends over at: <a href="https://www.fame.so/?utm_medium=podcast&amp;utm_source=bcast&amp;utm_campaign=masters-of-community-with-david-spinks?utm_medium=podcast&amp;utm_source=bcast&amp;utm_campaign=fame-client">fame.so</a></div><div><br></div>]]></content:encoded>
      <pubDate>Thu, 17 Jul 2025 11:00:00 +0000</pubDate>
      <author>PQShield</author>
      <enclosure url="https://media.fame.so/w0v46lrw.mp3" length="80031868" type="audio/mpeg"/>
      <itunes:author>PQShield</itunes:author>
      <itunes:image href="https://content.fameapp.so/uploads/8l18kymq/5be70c40-6225-11f0-8adb-9d942ae12baa/5be70d50-6225-11f0-bb71-01b1b9baf355.png"/>
      <itunes:duration>2000</itunes:duration>
      <itunes:summary>What if the biggest threat to your cybersecurity strategy isn’t quantum computing, but humans? In this episode of Shielded: The Last Line of Cyber Defense, host Johannes Lintzen welcomes Professor Bill Buchanan, OBE, FRSE, a global leader in applied cryptography, digital trust, and secure system design. Bill shares the origins of public key cryptography and the challenges of migrating beyond RSA and ECC. Learn why cryptographic agility is essential, where the biggest vulnerabilities lie, and how standards like FIPS 140 and TLS are laying the groundwork for a secure future. Expect blunt truths, clear insights, and an urgent call for better systems, smarter engineers, and more public understanding.</itunes:summary>
      <itunes:subtitle>What if the biggest threat to your cybersecurity strategy isn’t quantum computing, but humans? In this episode of Shielded: The Last Line of Cyber Defense, host Johannes Lintzen welcomes Professor Bill Buchanan, OBE, FRSE, a global leader in applied cryptography, digital trust, and secure system design. Bill shares the origins of public key cryptography and the challenges of migrating beyond RSA and ECC. Learn why cryptographic agility is essential, where the biggest vulnerabilities lie, and how standards like FIPS 140 and TLS are laying the groundwork for a secure future. Expect blunt truths, clear insights, and an urgent call for better systems, smarter engineers, and more public understanding.</itunes:subtitle>
      <itunes:keywords/>
      <itunes:explicit>No</itunes:explicit>
      <googleplay:explicit>No</googleplay:explicit>
    </item>
    <item>
      <title>The Crypto Agility Paradox: When Hardware Becomes Your Security Bottleneck</title>
      <link>https://podcasts.fame.so/e/xnvl4vkn-the-crypto-agility-paradox-when-hardware-becomes-your-security-bottleneck</link>
      <itunes:title>The Crypto Agility Paradox: When Hardware Becomes Your Security Bottleneck</itunes:title>
      <itunes:episode>9</itunes:episode>
      <itunes:season>1</itunes:season>
      <itunes:block>No</itunes:block>
      <googleplay:block>No</googleplay:block>
      <guid isPermaLink="false">71ypjry0</guid>
      <description>How do you prepare for post-quantum cryptography when your devices will still be in the field 20 years from now? In this episode of Shielded: The Last Line of Cyber Defense, host Johannes Lintzen is joined by Cassie Crossley, Vice President of Supply Chain Security in the Global Cybersecurity &amp; Product Security Office at Schneider Electric. Cassie shares the hard-earned lessons from a multi-year crypto agility program in one of the world’s largest OT environments. From supply chain transparency to legacy encryption risks, she breaks down what it takes to prepare critical infrastructure for the quantum era.</description>
      <content:encoded><![CDATA[<div>Most cybersecurity roadmaps don’t plan for 20-year-old firmware, but that’s the reality of operational technology (OT). In this episode, Cassie Crossley, Vice President of Supply Chain Security in the Global Cybersecurity &amp; Product Security Office at Schneider Electric, offers a behind-the-scenes look at what it takes to secure industrial systems, from chips to code.</div><div><br></div><div>Cassie explains why crypto agility isn’t just about algorithm swaps, it’s a long-haul architectural rethink. She unpacks how Schneider built a five-year roadmap with CTO support, how they tackled challenges like legacy devices, hardware constraints, and root-of-trust dependencies, and why threat modeling needs to evolve for future-ready product design.</div><div><br></div><div>From hardware bill of materials (HBOM) to the rising importance of crypto BoMs, Cassie outlines the real work behind securing infrastructure that can't just be patched or replaced. Whether you’re building new systems or protecting the old ones, this episode will change how you think about quantum readiness in the physical world.</div><div><br></div><div>What You'll Learn:<br><br></div><ul><li>Why crypto agility is more than swapping out encryption algorithms</li><li>How OT systems differ from IT in post-quantum readiness</li><li>Why Schneider created a five-year PQC roadmap (and what surprised them)</li><li>The role of supply chain transparency in future-ready security</li><li>How hardware constraints shape real-world security architecture</li><li>Why pacemakers and PLCs aren’t treated the same, but should both be secure</li><li>How to drive leadership buy-in without waiting for a breach</li><li>What quantum security means in environments that still run TLS 1.0</li></ul><div><br>Cassie Crossley is Vice President of Supply Chain Security in the Global Cybersecurity &amp; Product Security Office at Schneider Electric. An experienced cybersecurity executive with a background spanning IT, product development, and data privacy, Cassie brings deep technical and strategic leadership to the challenges of securing operational technology (OT) and global supply chains. She has led major initiatives in software and hardware supply chain security and secure development across complex industrial environments. Cassie is also the author of Software Supply Chain Security: Securing the End-to-End Supply Chain for Software, Firmware, and Hardware, and a frequent speaker on advancing cybersecurity resilience in critical infrastructure.<br><br></div><div><strong>Your Roadmap to Quantum-Resilient OT:<br></strong><br></div><div><strong>[03:10] Step 1: Recognize Hardware Supply Chains as a Blind Spot</strong></div><div>While the industry has made strides in software bill of materials (SBOMs), hardware remains largely uncharted territory. Cassie shares how Schneider faces increasing demands, especially from governments, to provide hardware bill of materials (HBOMs), including country-of-origin data. But there’s no common standard, no clear sharing mechanism, and limited awareness in cyber teams unfamiliar with hardware manufacturing. Without visibility, hardware becomes a hidden risk.</div><div><strong>Key Question</strong>: Do you know what’s in your hardware stack and where it came from?</div><div><br></div><div><strong>[07:25] Step 2: Treat Crypto Agility as a Long-Term Architecture Strategy</strong></div><div>Schneider’s crypto agility journey began with the goal of replacing a third-party crypto library, but quickly revealed broader architectural challenges. With thousands of legacy OT devices and products built across decades, encryption choices were deeply embedded. Agility meant revisiting old code, navigating hardware limits, and sometimes rethinking entire product lifecycles. This wasn’t a library swap, it was a multi-year evolution.</div><div><strong>Key Question:</strong> Are your encryption decisions future-proof, or just convenient?</div><div><br></div><div><strong>[11:11] Step 3: Balance Open Source Flexibility with Trusted Support</strong></div><div>Not all encryption solutions are created equal. Cassie explains how Schneider evaluated both open source and commercial crypto libraries, often preferring the latter for better long-term support and accountability. In environments where safety, compliance, and product longevity matter, vendor-backed solutions offered the reliability that open ecosystems couldn’t always guarantee. The cost-benefit equation goes beyond code.</div><div><strong>Key Question:</strong> What encryption models are you trusting and who’s supporting them?</div><div><br></div><div><strong>[12:41] Step 4: Secure Executive Buy-In with Technical Reality, Not Hype</strong></div><div>Crypto agility didn’t come from a marketing push, it had top-level backing from Schneider’s Chief Product Security Officer and CTOs across business units. What made it work was realistic goal setting, not rushed deadlines, or some artificial urgency. Instead, a five-year roadmap gave teams time to audit, evaluate, and align without disrupting product lifecycles. The lesson here is that buy-in starts with credible execution plans.</div><div><strong>Key Question:</strong> Does leadership understand the operational costs of crypto change?</div><div><br></div><div><strong>[14:50] Step 5: Plan for Quantum, Even If It’s Not Your Priority Today</strong></div><div>Quantum computing was already on Schneider’s radar years ago, not because it was urgent, but because it was inevitable. Cassie emphasizes that crypto agility isn't just about today’s algorithms; it’s about building the capacity to adapt when tomorrow's threats arrive. That mindset, designing for change, not permanence, helped Schneider bake quantum readiness into long-term product strategies.</div><div><strong>Key Question:</strong> If quantum hits in 2030, will your products be ready or still running 2010 firmware?</div><div><br></div><div><strong>[17:14] Step 6: Accept That OT Doesn’t Get Patched Like IT</strong></div><div>Many OT environments, including power grids and water treatment plants, run devices that aren’t connected to the internet and may not be patched for years. In some cases, integrators are gone, documentation is lost, and product changes risk disrupting safety systems. Cassie outlines how encryption updates in these systems often take a back seat to uptime, safety, and regulatory stability. Security strategy must be built around that reality.</div><div><strong>Key Question:</strong> If your OT systems won’t be patched, how will they stay secure?</div><div><br></div><div><strong>[22:19] Step 7: Align Compliance with Practical Security</strong></div><div>Standards like FIPS 140-3 and NERC CIP are important, but Cassie stresses that in OT, compliance is often a negotiation. Utilities may request future-ready encryption but continue running older product models through approved waivers and compensating controls. Instead of “rip and replace,” Schneider works to align compliance with risk, product timelines, and customer context. It’s about balance, not just checklists.</div><div><strong>Key Question:</strong> Are you applying standards, or just checking boxes?</div><div><br></div><div><strong>[26:41] Step 8: Build Encryption Into Hardware Decisions Early</strong></div><div>Encryption doesn’t live in isolation; it interacts with chips, memory constraints, and lifecycle decisions. Cassie explains how Schneider’s teams evaluate chip specs, trust vendor roadmaps, and plan for future requalification, all during product design. For long-lived OT devices, you don’t get a second chance to build in crypto resilience. You either plan ahead or pay later.</div><div><strong>Key Question:</strong> Are your hardware teams thinking about encryption as deeply as your software teams are?</div><div><br></div><div><strong>[31:53] Step 9: Design for Brownfield and Greenfield, Differently</strong></div><div>Cassie outlines how legacy (brownfield) and new (greenfield) systems require two distinct strategies. Brownfield systems demand risk-based prioritization and defensive depth. Greenfield systems offer the chance to integrate future-ready encryption, secure boot, and crypto agility from the start. Treating them the same is a recipe for friction and failure.</div><div><strong>Key Question:</strong> Is your PQC plan flexible enough for both legacy and next-gen systems?</div><div><br></div><div><strong>[40:54] Step 10: Start with Inventory, Then Prioritize by Risk</strong></div><div>Before any strategy can succeed, organizations must know what systems they have, what encryption they're using, and who owns what. Cassie warns that most companies, especially those outside regulated industries, lack that basic visibility. Without inventory, PQC becomes guesswork. But with it, you can prioritize upgrades, assess compliance gaps, and engage vendors with confidence.</div><div><strong>Key Question:</strong> Have you mapped your cryptography, and who owns it?</div><div><br><br></div><div><strong>Episode Resources:<br><br></strong><br></div><ul><li>Cassie Crossley on <a href="https://www.linkedin.com/in/cassiecrossley/">LinkedIn</a></li><li>Download: <a href="https://www.amazon.com/dp/1098133706/ref=tsm_1_fb_lk">“Software Supply Chain Security: Securing the End-to-End Supply Chain for Software, Firmware, and Hardware”</a></li><li>Johannes Lintzen on <a href="https://www.linkedin.com/in/jolintzen/">LinkedIn</a></li><li>PQShield <a href="http://www.pqshield.com">Website</a>&nbsp;</li></ul><div><br>Want exclusive insights on post-quantum security? Stay ahead of the curve—subscribe to Shielded: The Last Line of Cyber Defense on Apple Podcasts, Spotify, and YouTube Podcasts.<br><br></div><div><br>✔ Get insider knowledge from leading cybersecurity experts.<br><br></div><div>✔ Learn practical steps to future-proof your organization.<br><br></div><div>✔ Stay updated on regulatory changes and industry trends.<br><br>Need help subscribing? Click <a href="https://www.fame.so/follow-rate-review">here</a> for step-by-step instructions.</div><div>Shielded: The Last Line of Cyber Defense is handcrafted by our friends over at: <a href="https://www.fame.so/?utm_medium=podcast&amp;utm_source=bcast&amp;utm_campaign=masters-of-community-with-david-spinks?utm_medium=podcast&amp;utm_source=bcast&amp;utm_campaign=fame-client">fame.so</a></div><div><br></div>]]></content:encoded>
      <pubDate>Thu, 26 Jun 2025 11:00:00 +0000</pubDate>
      <author>PQShield</author>
      <enclosure url="https://media.fame.so/wz7971q8.mp3" length="108424880" type="audio/mpeg"/>
      <itunes:author>PQShield</itunes:author>
      <itunes:image href="https://content.fameapp.so/uploads/8l18kymq/92b888f0-526f-11f0-ae86-a18874c04ad7/92b88a10-526f-11f0-b071-f1c86accf97e.png"/>
      <itunes:duration>2710</itunes:duration>
      <itunes:summary>How do you prepare for post-quantum cryptography when your devices will still be in the field 20 years from now? In this episode of Shielded: The Last Line of Cyber Defense, host Johannes Lintzen is joined by Cassie Crossley, Vice President of Supply Chain Security in the Global Cybersecurity &amp; Product Security Office at Schneider Electric. Cassie shares the hard-earned lessons from a multi-year crypto agility program in one of the world’s largest OT environments. From supply chain transparency to legacy encryption risks, she breaks down what it takes to prepare critical infrastructure for the quantum era.</itunes:summary>
      <itunes:subtitle>How do you prepare for post-quantum cryptography when your devices will still be in the field 20 years from now? In this episode of Shielded: The Last Line of Cyber Defense, host Johannes Lintzen is joined by Cassie Crossley, Vice President of Supply Chain Security in the Global Cybersecurity &amp; Product Security Office at Schneider Electric. Cassie shares the hard-earned lessons from a multi-year crypto agility program in one of the world’s largest OT environments. From supply chain transparency to legacy encryption risks, she breaks down what it takes to prepare critical infrastructure for the quantum era.</itunes:subtitle>
      <itunes:keywords/>
      <itunes:explicit>No</itunes:explicit>
      <googleplay:explicit>No</googleplay:explicit>
    </item>
    <item>
      <title>NCSC proposes its PQC transition timeline to UK Policy makers: guiding the UK to a quantum-safe future</title>
      <link>https://podcasts.fame.so/e/pnm7r42n-no-policy-all-partnership-how-ncsc-is-guiding-the-uk-to-post-quantum-security</link>
      <itunes:title>NCSC proposes its PQC transition timeline to UK Policy makers: guiding the UK to a quantum-safe future</itunes:title>
      <itunes:episode>8</itunes:episode>
      <itunes:block>No</itunes:block>
      <googleplay:block>No</googleplay:block>
      <guid isPermaLink="false">71v5ymx0</guid>
      <description>Quantum readiness isn’t about “predicting when,” it’s about “preparing now.” In this episode of Shielded: The Last Line of Cyber Defense, host Johannes Lintzen sits down with Dr. Jeremy Bradley, Principal Technical Director at the UK’s National Cyber Security Centre (NCSC), to explore the UK’s newly released guidance on migrating to post-quantum cryptography. Jeremy shares why the NCSC chose a pragmatic, timeline-driven approach, how organisations can manage legacy infrastructure without fear, and why PQC migration is a cybersecurity challenge, not just a cryptographic one.</description>
      <content:encoded><![CDATA[<div>Post-quantum cryptography is no longer an abstract problem. It's a technology transformation that touches every layer of critical infrastructure, from policy to procurement, systems to supply chains. In this episode, Dr. Jeremy Bradley, Principal Technical Director at the UK’s NCSC and lead author of the government’s official PQC timeline guidance, breaks down how the UK is approaching this monumental shift.</div><div><br></div><div>Jeremy explains why the NCSC focused on organisational readiness and available technology rather than waiting for a cryptographically relevant quantum computer (CRQC). He unpacks how government and industry can work together without formal policy mandates, the importance of sector-wide movement, and what it takes to make your supply chain quantum-safe.&nbsp;</div><div><br></div><div><strong>What You'll Learn:</strong><br><br></div><ul><li>Why PQC migration is best treated as a technology change programme, not a cryptographic fix</li><li>The UK's phased migration roadmap and why 2035 is a realistic end-date</li><li>How advisory bodies like NCSC shape national direction without enforcing policy</li><li>What legacy infrastructure, vendor roadmaps, and sector alignment have in common</li><li>How to drive internal buy-in using the language of risk, not quantum timelines</li><li>Why collaboration, transparency, and shared learning are critical in high-stakes sectors</li></ul><div><br>Dr. Jeremy Bradley is Principal Technical Director for Cryptography and High Threat Technologies at the UK’s National Cyber Security Centre (NCSC). He leads the team behind the newly released Timelines for Migration to Post-Quantum Cryptography guidance. At NCSC, Jeremy oversees cryptographic assurance for the UK’s sensitive systems, advises across government and regulated sectors, and drives strategy for secure implementations. His work spans technical standards, inter-agency cooperation, and future-focused guidance to help the UK become quantum-safe.<br><br></div><div><strong>Your Roadmap to Post-Quantum Readiness:<br></strong><br></div><div><strong>[03:10] Step 1: Understand the NCSC’s Role in the Cybersecurity Ecosystem</strong></div><div>The NCSC isn’t a policymaker, it doesn’t mandate, legislate, or enforce. Instead, its strength lies in providing deeply technical, context-aware guidance to government departments, regulators, and sectors that run the UK’s critical infrastructure. Jeremy explains how this advisory role enables the NCSC to influence national cyber posture through trust, collaboration, and technical credibility. By staying connected to sector-specific realities like what’s feasible in telecoms vs. energy, they help shape decisions that matter without issuing formal rules.</div><div><br></div><div><strong>[05:00] Step 2: Why The Timing Behind the UK’s Guidance?</strong></div><div>The UK’s new PQC guidance wasn’t dropped in a vacuum, it’s the result of years of groundwork. Jeremy highlights how the foundational pieces have finally aligned: algorithm standards are in place, certified implementations are available, and protocols are maturing. Meanwhile, government departments and regulators are actively asking for support as they prepare sector-specific plans. It’s not about waiting for a quantum computer to arrive, it’s about moving because we finally can.</div><div><br></div><div><strong>[07:00] Step 3: Migration as a Technology Change, Not a Quantum Reaction</strong></div><div>Instead of reacting to an unknown future event, the arrival of a CRQC, the NCSC frames PQC migration like any other major tech transformation. Jeremy explains how organisations should approach it with a project management mindset: define end states, audit systems, plan upgrades, and refine over time. This engineering-first, risk-managed approach feels familiar to CISOs and CTOs and helps cut through the noise of hypothetical quantum fears. It’s not about guessing when; it’s about preparing how.</div><div><br></div><div><strong>[10:15] Step 4: Driving Adoption Without Policy Enforcement</strong></div><div>If the NCSC can’t enforce action, how does it drive real adoption? Through deep partnerships across government and industry. Jeremy describes how they work sector-by-sector, finance, telecoms, energy, etc., through advisory frameworks, guidance, and technical toolkits that regulators and agencies can lean on. They also influence key tools like the UK’s Cyber Assessment Framework, ensuring PQC is embedded in broader risk conversations. This has resulted in movement, even without mandates.</div><div><br></div><div><strong>[13:04] Step 5: The Real Migration Risk is in Its Legacy</strong></div><div>Boards may not lose sleep over quantum decryption, but they should over legacy systems. Jeremy shifts the narrative from quantum as an abstract threat to legacy as a very real, growing one. The risk isn't that a CRQC appears overnight, but that your infrastructure becomes unsupported, rigid, and expensive to maintain. Treating PQC migration as a chance to modernise legacy environments makes it easier to justify&nbsp; and more urgent to act on.</div><div><br></div><div><strong>[16:49] Step 6: Launching a PQC-Qualified Consultancy Scheme</strong></div><div>To scale migration across the UK, Jeremy reveals that the NCSC is launching a scheme to vet and recognise consultancies with true PQC expertise. It’s about ensuring organisations can find partners who understand cryptography, can assess systems, and offer repeatable, strategic guidance, not just sell buzzwords. The programme starts with a pilot cohort and aims to grow a national pool of trusted advisors. For both large enterprises and small firms, this initiative creates a clear path to credible help.</div><div><br></div><div><strong>[19:55] Step 7: How to Communicate Risk and Get Buy-In</strong></div><div>Talking about quantum doesn’t always land with leadership. Jeremy suggests a better angle: frame the conversation around business risk, legacy management, and operational complexity. Rather than “a quantum computer is coming,” try “your systems may be stuck with outdated security tech that vendors stop supporting.” When risk is tied to budget, compliance, and resilience, not just cryptographic theory, the board listens. And that unlocks funding, alignment, and momentum.</div><div><br></div><div><strong>[23:33] Step 8: What to Prioritise in the First 24 Months</strong></div><div>Jeremy lays out a practical near-term action plan: start with system discovery. Identify your most critical systems, map your data flows, and get clear on who manages your cryptographic tools: you or your vendors. These early steps shape your strategy and timelines. For most, PQC migration will rely heavily on understanding systems, not mastering algorithms. The more visibility you gain now, the fewer roadblocks you’ll face later.</div><div><br></div><div><strong>[25:50] Step 9: Use Supply Chain Pressure to Drive Change</strong></div><div>Even if you don’t directly control your cryptography, you still influence it. Jeremy points out that most sectors rely on a shared set of suppliers, so when industries move together, vendors listen. By using early discovery work to ask tough questions, “What’s your PQC roadmap?” organisations can pressure vendors to evolve faster. The goal isn’t just awareness; it’s collective influence that lifts the entire ecosystem.</div><div><br></div><div><strong>[27:26] Step 10: The UK’s Role in Global PQC Standards</strong></div><div>The UK isn’t just following global standards, it’s helping shape them. Jeremy highlights the NCSC’s role in bodies like IETF and ETSI, and how they’ve contributed clarity through work like hybrid cryptography definitions. These technical contributions matter because they reduce ambiguity and align industry efforts across borders. It’s a quiet but powerful form of leadership that is currently building the foundations for smoother global collaboration in the post-quantum world.</div><div><br></div><div><strong>Episode Resources:<br></strong><br></div><ul><li>NCSC <a href="https://www.ncsc.gov.uk/">website</a></li><li>Download: <a href="https://www.ncsc.gov.uk/blog-post/setting-direction-uk-migration-to-pqc">NCSC Timelines for PQC Migration</a></li><li>Johannes Lintzen on <a href="https://www.linkedin.com/in/jolintzen/">LinkedIn</a></li><li>PQShield <a href="http://www.pqshield.com">Website</a>&nbsp;</li></ul><div><br>Want exclusive insights on post-quantum security? Stay ahead of the curve—subscribe to Shielded: The Last Line of Cyber Defense on Apple Podcasts, Spotify, and YouTube Podcasts.</div><div><br>✔ Get insider knowledge from leading cybersecurity experts.</div><div>✔ Learn practical steps to future-proof your organization.</div><div>✔ Stay updated on regulatory changes and industry trends.<br><br>Need help subscribing? Click <a href="https://www.fame.so/follow-rate-review">here</a> for step-by-step instructions.<br><br></div><div>Shielded: The Last Line of Cyber Defense is handcrafted by our friends over at: <a href="https://www.fame.so/?utm_medium=podcast&amp;utm_source=bcast&amp;utm_campaign=masters-of-community-with-david-spinks?utm_medium=podcast&amp;utm_source=bcast&amp;utm_campaign=fame-client">fame.so</a></div><div><br></div>]]></content:encoded>
      <pubDate>Thu, 05 Jun 2025 10:30:00 +0000</pubDate>
      <author>PQShield</author>
      <enclosure url="https://media.fame.so/84vl0k78.mp3" length="76551313" type="audio/mpeg"/>
      <itunes:author>PQShield</itunes:author>
      <itunes:image href="https://content.fameapp.so/uploads/8l18kymq/5d0940a0-4206-11f0-8827-addc0e0eb4d6/5d0941a0-4206-11f0-8e80-d5bc58e8aed2.png"/>
      <itunes:duration>1913</itunes:duration>
      <itunes:summary>Quantum readiness isn’t about “predicting when,” it’s about “preparing now.” In this episode of Shielded: The Last Line of Cyber Defense, host Johannes Lintzen sits down with Dr. Jeremy Bradley, Principal Technical Director at the UK’s National Cyber Security Centre (NCSC), to explore the UK’s newly released guidance on migrating to post-quantum cryptography. Jeremy shares why the NCSC chose a pragmatic, timeline-driven approach, how organisations can manage legacy infrastructure without fear, and why PQC migration is a cybersecurity challenge, not just a cryptographic one.</itunes:summary>
      <itunes:subtitle>Quantum readiness isn’t about “predicting when,” it’s about “preparing now.” In this episode of Shielded: The Last Line of Cyber Defense, host Johannes Lintzen sits down with Dr. Jeremy Bradley, Principal Technical Director at the UK’s National Cyber Security Centre (NCSC), to explore the UK’s newly released guidance on migrating to post-quantum cryptography. Jeremy shares why the NCSC chose a pragmatic, timeline-driven approach, how organisations can manage legacy infrastructure without fear, and why PQC migration is a cybersecurity challenge, not just a cryptographic one.</itunes:subtitle>
      <itunes:keywords>post-quantum cryptography migration, NCSC guidance, cybersecurity planning, quantum-safe security, UK cryptography standards, PQC implementation timeline, cryptographic discovery, technology change management, legacy IT systems, supply chain security, hybrid cryptography, critical infrastructure protection, CISO planning guide, enterprise security roadmap, cybersecurity risk management, technical director insights, security architecture planning, regulatory compliance strategy, quantum readiness assessment, cryptographic transition strategy, PQC vendor evaluation, cryptographically relevant quantum computer, national cybersecurity framework, critical systems availability, NCSC PQC migration timeline 2035, UK government cryptography guidance, quantum-safe implementation strategy, critical infrastructure PQC adoption, enterprise cryptography modernization, PQC vendor assessment framework, cryptographic asset discovery, hybrid cryptography deployment, quantum-safe architecture, PQC standardization, security protocol migration, cryptographic risk assessment</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <googleplay:explicit>No</googleplay:explicit>
    </item>
    <item>
      <title>Your Hardware Refresh Is a Quantum Deadline with Mamta Gupta</title>
      <link>https://podcasts.fame.so/e/lnqwyprn-your-hardware-refresh-is-a-quantum-deadline-with-mamta-gupta</link>
      <itunes:title>Your Hardware Refresh Is a Quantum Deadline with Mamta Gupta</itunes:title>
      <itunes:episode>7</itunes:episode>
      <itunes:block>No</itunes:block>
      <googleplay:block>No</googleplay:block>
      <guid isPermaLink="false">81nv58j1</guid>
      <description>You can’t patch your way out of quantum exposure, especially when your hardware refresh cycle is a cryptographic deadline. In this episode of Shielded, Johannes Lintzen sits down with Mamta Gupta of Lattice Semiconductor to explore how hardware-rooted security must evolve to meet the post-quantum challenge. Mamta unpacks the real-world threat of “Harvest Now, Decrypt Later,” explains why crypto agility is essential for long-lifecycle devices, and shares clear, actionable steps to build quantum resilience from silicon to software. Learn how FPGAs provide a reprogrammable, future-ready foundation, what CNSA 2.0 mandates, and why your next hardware refresh cycle may be your last chance to stay ahead. If your business touches critical infrastructure, long-life devices, or digital supply chains, this episode is your wake-up call.</description>
      <content:encoded><![CDATA[<div>Quantum threats are no longer theoretical, and waiting could cost you. In this episode of <em>Shielded: The Last Line of Cyber Defense</em>, Johannes Lintzen is joined by Mamta Gupta, a quantum physicist turned cybersecurity strategist at Lattice Semiconductor. Together, they break down how crypto agility, hardware-based trust anchors, and PQC readiness are now essential for any organization managing long-lifecycle systems. You’ll come away with practical steps to assess, upgrade, and future-proof your cryptographic infrastructure.<br><br></div><div><strong>What You'll Learn:</strong><br><br></div><ul><li>Why crypto agility is no longer optional and how to implement it in hardware and software</li><li>How FPGAs provide a reprogrammable foundation for future-ready root-of-trust design</li><li>What the “Harvest Now, Decrypt Later” threat means for long-term data protection</li><li>How to assess PQC readiness in three strategic steps: visibility, trust anchor evaluation, and vendor analysis</li><li>How to navigate diverging regulatory mandates from CNSA 2.0 (U.S.) and ENISA (EU)</li><li>What it really takes to align internal stakeholders for a successful PQC transition</li></ul><div><br>Mamta Gupta is the Senior Director of Strategic Business Development for Security, Telecommunications, and Data Centers at Lattice Semiconductor. With a master’s degree in quantum physics, specializing in superfluidity, superconductivity, and critical phenomena, she brings a rare blend of theoretical insight and real-world engineering to the cybersecurity space. She has led key PQC strategy efforts at Lattice, helping develop quantum-resistant FPGA-based architectures and secure supply chain practices. A leading advocate for confronting the “Harvest Now, Decrypt Later” threat, Mamta is known for her pragmatic, cross-functional approach to building crypto-agile infrastructure.<br><br></div><div><strong>Your Roadmap to Post-Quantum Readiness:<br></strong><br></div><div><strong>[00:06:05] Step 1: Understand the Real Threat: “Harvest Now, Decrypt Later”</strong></div><div>The quantum threat is already operational, not hypothetical. Adversaries are actively collecting encrypted data today with the goal of decrypting it once quantum computers reach maturity. This tactic, known as "Harvest Now, Decrypt Later," means data with a long shelf life, such as health records, financial data, and national infrastructure, is already at risk. Waiting for quantum computing to become mainstream before acting is a critical miscalculation. Organizations must treat post-quantum cryptography as a present-day risk mitigation priority, not a future optimization. Key Question: Are you taking immediate steps to protect long-lived data from eventual quantum decryption?</div><div><strong><br>[10:43] Step 2: Design for Crypto Agility Across Hardware and Software<br></strong>The pace of cryptographic change is rapid; regulatory mandates, algorithm approvals, and threat intelligence evolve constantly. At the same time, the life cycle of deployed hardware can stretch over a decade. This disconnect demands systems that are flexible by design. Crypto agility ensures that organizations can upgrade algorithms, rotate keys, and adapt trust models without re-architecting infrastructure or replacing physical components. Without agility, today’s protections could become tomorrow’s liabilities. Key Question: Is your infrastructure architected to support cryptographic evolution across its full lifecycle?<br><br></div><div><strong>[14:38] Step 3: Run a Three-Part PQC Readiness Assessment<br></strong>Before launching a migration, organizations need full visibility into their current cryptographic environment. This begins with a cryptographic inventory, reviewing all firmware, certificates, keys, and the algorithms used to protect them. Next, evaluate your trust anchors, components like secure boot mechanisms, TPMs, or silicon-based keys to identify weak points or dependencies on outdated cryptographic methods like RSA or ECC. Finally, conduct a vendor readiness check across your digital supply chain. Determine whether suppliers of silicon, firmware, or software are equipped to support PQC or if they introduce downstream risk. This structured assessment turns uncertainty into a prioritized roadmap for upgrading your infrastructure with confidence. Key Question: Have you completed a full assessment of your cryptographic assets, trust anchors, and vendor readiness?</div><div><strong><br>[17:21] Step 4: Build a Crypto-Agile Root of Trust Using FPGAs<br></strong>The root of trust is the foundational layer of system security, and its resilience is essential in a post-quantum world. Field Programmable Gate Arrays (FPGAs) offer a key advantage over ASICs: reprogrammability. With FPGAs, cryptographic algorithms can be updated after deployment, providing the agility needed to respond to evolving standards and threats. They also enable secure firmware validation, hybrid cryptography, and alignment with upcoming compliance deadlines without requiring hardware swaps. Deploying FPGAs as the root of trust creates a flexible security architecture that supports long-term cryptographic adaptability. Key Question: Does your hardware architecture support post-deployment cryptographic updates without physical replacement?<br><br></div><div><strong>[25:33] Step 5: Architect Hybrid Cryptography with Strategic Intent<br></strong>Transitioning to post-quantum cryptography doesn’t mean abandoning classical algorithms immediately. Hybrid cryptography, running both classical and quantum-safe algorithms in parallel, offers a way to maintain current protections while building future resilience. However, this approach adds complexity in key management, execution order, and performance optimization. Systems must be designed to support multiple key types and enforce clearly defined policies on trust precedence and key retirement. A well-architected hybrid model ensures security and agility without introducing operational friction. Key Question: Have you developed a hybrid cryptography strategy that balances performance, policy, and long-term resilience?<br><br></div><div><strong>[31:13] Step 6: Launch a Cross-Functional PQC Pilot<br></strong>A pilot is the fastest way to move from theory to execution. By testing PQC readiness in a contained environment, organizations can surface critical constraints, such as firmware signing limitations, key size restrictions, or vendor gaps. Pilots also help unify teams across engineering, compliance, and leadership, creating a shared understanding of what the PQC transition entails. Running a pilot allows for experimentation, measurement, and iteration before committing to large-scale deployment. It’s a low-risk, high-leverage way to build momentum and organizational buy-in. Key Question: What would it take to launch a practical PQC pilot inside your organization in the next 90 days?<br><br></div><div><strong>[36:56] Step 7: Build a 12-Month Action Plan Aligned to Regulatory Timelines<br></strong>PQC migration is not a weekend upgrade; it’s a multi-year journey that requires strategic pacing. CNSA 2.0 mandates post-quantum protections in all new systems by 2030, and enforcement has already started impacting procurement. ENISA, the EU cybersecurity agency, has also issued guidance with specific requirements for hybrid cryptography. Organizations must build an actionable 12-month plan that includes cryptographic audits, vendor engagement, proof-of-concept evaluations, and measurable internal milestones. Aligning to regulatory timelines now ensures you don’t lose compliance or customers later. Key Question: How are you structuring your next 12 months to show measurable PQC progress aligned with global regulations?<br><br></div><div><strong>Episode Resources:<br></strong><br></div><ul><li>Mamta Gupta on <a href="https://www.linkedin.com/in/mamta-gupta-5038123/">LinkedIn</a></li><li>Lattice Semiconductor <a href="https://www.latticesemi.com/">Website</a></li><li>Johannes Lintzen on <a href="https://www.linkedin.com/in/jolintzen/">LinkedIn</a></li><li>PQShield <a href="http://www.pqshield.com">Website</a>&nbsp;</li></ul><div><br>Want exclusive insights on post-quantum security? Stay ahead of the curve—subscribe to Shielded: The Last Line of Cyber Defense on Apple Podcasts, Spotify, and YouTube Podcasts.</div><div><br>✔ Get insider knowledge from leading cybersecurity experts.</div><div>✔ Learn practical steps to future-proof your organization.</div><div>✔ Stay updated on regulatory changes and industry trends.<br><br>Need help subscribing? Click <a href="https://www.fame.so/follow-rate-review">here</a> for step-by-step instructions.<br><br></div><div>Shielded: The Last Line of Cyber Defense is handcrafted by our friends over at: <a href="https://www.fame.so/?utm_medium=podcast&amp;utm_source=bcast&amp;utm_campaign=masters-of-community-with-david-spinks?utm_medium=podcast&amp;utm_source=bcast&amp;utm_campaign=fame-client">fame.so</a></div><div><br></div>]]></content:encoded>
      <pubDate>Thu, 22 May 2025 10:30:00 +0000</pubDate>
      <author>PQShield</author>
      <enclosure url="https://media.fame.so/821vq20w.mp3" length="95151542" type="audio/mpeg"/>
      <itunes:author>PQShield</itunes:author>
      <itunes:image href="https://content.fameapp.so/uploads/8l18kymq/4e7c7420-36d9-11f0-8a42-ad736c452a7d/4e7c76a0-36d9-11f0-9c7d-03f16909f835.png"/>
      <itunes:duration>2378</itunes:duration>
      <itunes:summary>You can’t patch your way out of quantum exposure, especially when your hardware refresh cycle is a cryptographic deadline. In this episode of Shielded, Johannes Lintzen sits down with Mamta Gupta of Lattice Semiconductor to explore how hardware-rooted security must evolve to meet the post-quantum challenge. Mamta unpacks the real-world threat of “Harvest Now, Decrypt Later,” explains why crypto agility is essential for long-lifecycle devices, and shares clear, actionable steps to build quantum resilience from silicon to software. Learn how FPGAs provide a reprogrammable, future-ready foundation, what CNSA 2.0 mandates, and why your next hardware refresh cycle may be your last chance to stay ahead. If your business touches critical infrastructure, long-life devices, or digital supply chains, this episode is your wake-up call.</itunes:summary>
      <itunes:subtitle>You can’t patch your way out of quantum exposure, especially when your hardware refresh cycle is a cryptographic deadline. In this episode of Shielded, Johannes Lintzen sits down with Mamta Gupta of Lattice Semiconductor to explore how hardware-rooted security must evolve to meet the post-quantum challenge. Mamta unpacks the real-world threat of “Harvest Now, Decrypt Later,” explains why crypto agility is essential for long-lifecycle devices, and shares clear, actionable steps to build quantum resilience from silicon to software. Learn how FPGAs provide a reprogrammable, future-ready foundation, what CNSA 2.0 mandates, and why your next hardware refresh cycle may be your last chance to stay ahead. If your business touches critical infrastructure, long-life devices, or digital supply chains, this episode is your wake-up call.</itunes:subtitle>
      <itunes:keywords>Post-Quantum Cryptography, Hardware Security, Cybersecurity, Quantum Computing, FPGA Technology, Crypto Agility, Root of Trust, Hardware Refresh, CNSA 2.0, Quantum Threats, Supply Chain Security, Critical Infrastructure, Data Protection, Encryption, Semiconductor Security, Firmware Security, Trust Anchors, Hybrid Cryptography, Security Architecture, Quantum Resilience</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <googleplay:explicit>No</googleplay:explicit>
    </item>
    <item>
      <title>HSMs and PQC Migration: Are We There Yet?</title>
      <link>https://podcasts.fame.so/e/xn12xqr8-hsms-and-pqc-migration-are-we-there-yet</link>
      <itunes:title>HSMs and PQC Migration: Are We There Yet?</itunes:title>
      <itunes:episode>6</itunes:episode>
      <itunes:block>No</itunes:block>
      <googleplay:block>No</googleplay:block>
      <guid isPermaLink="false">703rj6z1</guid>
      <description>In this special RSA 2025 edition of Shielded: The Last Line of Cyber Defense, host Johannes Lintzen gathers four leading voices from the world of hardware security to discuss a cornerstone technology powering the post-quantum migration: the Hardware Security Module (HSM). Featuring insights from Entrust, Thales, Futurex, and Utimaco, this episode breaks down how HSMs are evolving to support cryptographic agility, comply with new standards like CNSA 2.0 and FIPS 203/204/205, and why waiting to upgrade your HSMs is no longer an option.</description>
      <content:encoded><![CDATA[<div>The time to modernize cryptographic infrastructure has arrived. In this episode, recorded live at RSA Conference 2025, host Johannes Lintzen moderates a conversation with four HSM industry leaders: Greg Wetmore (Entrust), John Ray (Thales), David Close (Futurex), and Kevin McKeogh (Utimaco). Together, they explore the evolution of Hardware Security Modules as the foundational building blocks for secure, post-quantum infrastructure.<br><br></div><div>Learn how HSMs are enabling cryptographic agility, supporting new NIST and CNSA 2.0 algorithms, and offering in-field firmware and FPGA updates, without requiring a full rip-and-replace. The panel dives into compliance frameworks, performance trade-offs, hybrid environments, and supply chain integrity, offering a rare behind-the-scenes view into how top HSM vendors are solving quantum migration at scale.<br><br></div><div><strong>What You’ll Learn:<br></strong><br></div><ul><li>Why HSMs are essential to post-quantum cryptographic trust</li><li>How cryptographic agility is enabled through firmware, FPGA, and SDK updates</li><li>Why CNSA 2.0 and FIPS 203/204/205 are now critical to compliance</li><li>How to deploy PQC without replacing your entire infrastructure</li><li>The real-world performance and interoperability implications of PQC</li><li>How leading organizations are already securing TLS with hybrid algorithms</li><li>Why PQC readiness requires standards-aligned APIs and driver updates</li><li>What’s next for HSMs and how vendors are building for an agile crypto future<br><br></li></ul><div>Greg Wetmore is VP, Software Development at Entrust. He leads Entrust's cryptographic engineering, focusing on post-quantum crypto implementation and HSM innovation.<br><br>David Close is Chief Solutions Architect at Futurex. He is an expert in hardware crypto infrastructure, compliance (FIPS, CNSA), and real-world PQC implementation.<br><br>John Ray is Director of HSM Product Management at Thales. He oversees quantum readiness and crypto-agility strategy for Thales HSM product lines.<br><br>Kevin McKeogh is Senior Director, Product Management at Ultimaco. He leads crypto innovation at Utimaco with a focus on hybrid deployments, SDK flexibility, and international standards alignment.<br><br></div><div><strong>Your Roadmap to Post-Quantum HSM Readiness:<br></strong><br></div><div><strong>[00:52] Step 1: Accept That Crypto Agility Is Now Essential<br></strong>The next 20 years of cryptography will be far more dynamic than the past 30. Entrust explains how layering cryptography across FPGA, firmware, and trusted code environments allows you to adopt new algorithms fast, without compromising security or waiting on long certification cycles.<br>Key Question: Is your organization building cryptographic agility into your hardware lifecycle?</div><div><strong><br>[04:42] Step 2: Plan for Firmware, Not Rip-and-Replace<br></strong>Post-quantum HSM adoption doesn’t mean starting from scratch. Vendors like Utimaco and Futurex reveal how firmware and SDK updates can retrofit existing infrastructure.<br>Key Question: Can your current HSM be upgraded for PQC, or are you locked into legacy limitations?<br><br></div><div><strong>[08:40] Step 3: Align with CNSA 2.0 and FIPS Standards<br></strong>PQC readiness is no longer optional. With new standards like CNSA 2.0 and FIPS 203–205, organizations must ensure their HSMs meet certification requirements and cryptographic benchmarks.<br>Key Question: Are your cryptographic modules validated for CNSA 2.0 and emerging FIPS requirements?<br><br></div><div><strong>[13:52] Step 4: Test Hybrid Environments Early<br></strong>TLS is already using PQC—many organizations just don’t realize it. Futurex reveals real-world deployments combining classical and quantum-safe algorithms in production environments.<br>Key Question: Are you piloting hybrid PQC deployments in real use cases like TLS or email security?<br><br></div><div><strong>[20:25] Step 5: Upgrade Your API Ecosystem<br></strong>PQC implementation isn’t just about HSMs—it’s about the ecosystem. CNG, PKCS#11, and OpenSSL must all support new algorithms. Vendors describe how they’re updating drivers and working with partners to enable seamless transitions.<br>Key Question: Have you validated that your entire crypto stack - APIs, libraries, and middleware - supports PQC?</div><div><strong><br>[28:48] Step 6: Build Interoperability into Your PQC Strategy<br></strong>&nbsp;HSM vendors emphasize cross-vendor cooperation and standards adherence. Migration success depends on interoperability and standards—not just product capabilities.<br>Key Question: Is your PQC deployment plan designed to interoperate across tools, vendors, and geographies?<br><br></div><div><strong>Episode Resources:<br></strong><br></div><ul><li>PQShield <a href="https://pqshield.com/">Website</a></li><li>Entrust PQC <a href="https://www.entrust.com/resources">Resources</a></li><li>Futurex <a href="https://www.futurex.com/solutions/by-industry">Solutions Hub</a></li><li>Thales <a href="https://engage-cybersec.thalesgroup.com/ppc-corp.html?_bt=743542477905&amp;_bk=thales%20security%20products&amp;_bm=p&amp;_bn=g&amp;creative=743542477905&amp;keyword=thales%20security%20products&amp;matchtype=p&amp;network=g&amp;device=c&amp;gad_source=1&amp;gad_campaignid=24351054&amp;gbraid=0AAAAAD_tGURAETTXftm5XO0kwUf7e6ML0&amp;gclid=Cj0KCQjwxJvBBhDuARIsAGUgNfgbbqoW385oQT3BdgQIMLRDywtJ-47pvhz5E_ptxRG0zXUerscCIc8aAsKmEALw_wcB">Post-Quantum Hub</a></li><li>Utimaco <a href="https://utimaco.com/service/knowledge-base">Knowledge Base</a></li><li>Johannes Lintzen on <a href="https://www.linkedin.com/in/jolintzen/">LinkedIn</a></li><li>Greg Wetmore on <a href="https://www.linkedin.com/in/gregwetmore/">LinkedIn</a></li><li>David Close on <a href="https://www.linkedin.com/in/davidclose/">LinkedIn</a></li><li>John Ray on <a href="https://www.linkedin.com/in/johnray11/">LinkedIn</a></li><li>Kevin McKeogh on <a href="https://www.linkedin.com/in/kevin-mckeogh-a5127618/">LinkedIn</a></li></ul><div><br></div><div>Want exclusive insights on post-quantum security? Stay ahead of the curve—subscribe to Shielded: The Last Line of Cyber Defense on Apple Podcasts, Spotify, and YouTube Podcasts.</div><div><br>✔ Get insider knowledge from leading cybersecurity experts.</div><div>✔ Learn practical steps to future-proof your organization.</div><div>✔ Stay updated on regulatory changes and industry trends.<br><br>Need help subscribing? Click <a href="https://www.fame.so/follow-rate-review">here</a> for step-by-step instructions.</div><div><br></div><div>Shielded: The Last Line of Cyber Defense is handcrafted by our friends over at: <a href="https://www.fame.so/?utm_medium=podcast&amp;utm_source=bcast&amp;utm_campaign=masters-of-community-with-david-spinks?utm_medium=podcast&amp;utm_source=bcast&amp;utm_campaign=fame-client">fame.so</a></div><div><br></div>]]></content:encoded>
      <pubDate>Fri, 16 May 2025 10:38:00 +0000</pubDate>
      <author>PQShield</author>
      <enclosure url="https://media.fame.so/8k47qr7w.mp3" length="104632946" type="audio/mpeg"/>
      <itunes:author>PQShield</itunes:author>
      <itunes:image href="https://content.fameapp.so/uploads/8l18kymq/55f3e5a0-323c-11f0-9421-1d9e70b67a21/55f3e6a0-323c-11f0-86ad-551c03d6eb43.png"/>
      <itunes:duration>2615</itunes:duration>
      <itunes:summary>In this special RSA 2025 edition of Shielded: The Last Line of Cyber Defense, host Johannes Lintzen gathers four leading voices from the world of hardware security to discuss a cornerstone technology powering the post-quantum migration: the Hardware Security Module (HSM). Featuring insights from Entrust, Thales, Futurex, and Utimaco, this episode breaks down how HSMs are evolving to support cryptographic agility, comply with new standards like CNSA 2.0 and FIPS 203/204/205, and why waiting to upgrade your HSMs is no longer an option.</itunes:summary>
      <itunes:subtitle>In this special RSA 2025 edition of Shielded: The Last Line of Cyber Defense, host Johannes Lintzen gathers four leading voices from the world of hardware security to discuss a cornerstone technology powering the post-quantum migration: the Hardware Security Module (HSM). Featuring insights from Entrust, Thales, Futurex, and Utimaco, this episode breaks down how HSMs are evolving to support cryptographic agility, comply with new standards like CNSA 2.0 and FIPS 203/204/205, and why waiting to upgrade your HSMs is no longer an option.</itunes:subtitle>
      <itunes:keywords>Post-Quantum Cryptography, Hardware Security Modules, Crypto Agility, CNSA 2.0, FIPS Compliance, Quantum-Safe Security, HSM Firmware, PQC Migration, Cryptographic Trust, Hybrid Algorithms, TLS Security, Quantum Readiness, Enterprise Cybersecurity, Key Management, Quantum Computing, RSA Conference, Algorithm Standards, Cryptographic Infrastructure, Data Protection, Digital Trust</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <googleplay:explicit>No</googleplay:explicit>
    </item>
    <item>
      <title>From Awareness to Action: The Blueprint for Quantum-Resilient Security | Garfield Jones</title>
      <link>https://podcasts.fame.so/e/rnkmk3yn-awareness-to-action-blueprint-for-quantum-resilient-security-garfield-jones</link>
      <itunes:title>From Awareness to Action: The Blueprint for Quantum-Resilient Security | Garfield Jones</itunes:title>
      <itunes:episode>5</itunes:episode>
      <itunes:block>No</itunes:block>
      <googleplay:block>No</googleplay:block>
      <guid isPermaLink="false">70w7z8v0</guid>
      <description>Quantum threats aren’t hypothetical, they’re operational risks hiding in your cryptographic stack. In this episode of Shielded: The Last Line of Cyber Defense, host Johannes Lintzen sits down with Dr. Garfield Jones from CISA to dive into the practical steps for post-quantum migration, making the case that waiting until 2035 is far too late. Dr. Jones breaks down his APA framework (Awareness, Preparedness, Action) and explains why organizations need to act now to secure their infrastructure against the quantum threat. Learn how to take inventory, align procurement, tackle legacy infrastructure, and embed PQC into your vendor strategy before the clock runs out.</description>
      <content:encoded><![CDATA[<div>Quantum migration isn’t a future concern, it’s a present-tense priority. In this episode of <em>Shielded: The Last Line of Cyber Defense</em>, Johannes Lintzen and Dr. Garfield Jones take a deep dive into the practical challenges of post-quantum migration, focusing on how organizations can apply the APA framework (Awareness, Preparedness, Action) to make their cybersecurity future-proof. From procurement and inventory to legacy system challenges and vendor alignment, Dr. Jones shares a tactical roadmap to help organizations start moving today.<br><br></div><div><strong>What You'll Learn:</strong><br><br></div><ul><li>How to apply the APA framework to drive post-quantum readiness</li><li>Why cryptographic inventory is the first and most urgent step</li><li>How to balance backward compatibility with secure innovation</li><li>Procurement strategies for embedding PQC into your supply chain</li><li>The dual challenge of securing encryption and authentication</li><li>When to trust automation, and where human oversight is essential</li><li>How compliance mandates can accelerate not hinder progress</li><li>Why global collaboration and algorithm flexibility matter</li><li>Where to access government resources and guidance</li></ul><div><br></div><div>Dr. Garfield Jones is the Associate Chief of Strategic Technology at CISA, part of the U.S. Department of Homeland Security. He is a leading figure in quantum security strategy and played a key role in shaping the APA framework (Awareness, Preparedness, Action). With expertise in AI, machine learning, and infrastructure protection, he is helping U.S. agencies and partners prepare for a cryptographic future shaped by quantum computing.</div><div><br></div><div><strong>Your Roadmap to Post-Quantum Readiness:<br></strong><br></div><div><strong>[00:52] Step 1: Launch Migration Using the APA Framework</strong></div><div>Quantum migration starts with the APA model: Awareness, Preparedness, and Action. Awareness means identifying your cryptographic footprint across software, hardware, vendors, and internal systems. Preparedness requires budgeting for upgrades, creating internal migration roadmaps, and prioritizing systems based on risk. Action brings these plans to life with procurement updates, patching schedules, contract renegotiations, and system deployments. Migration is not a future problem, it is an urgent operational priority. Organizations that delay will face steeper costs, rushed transitions, and possible security gaps. Key Question: Has your organization operationalized the APA framework into an actionable migration plan?</div><div><br></div><div><strong>[04:52] Step 2: Assign a PQC Champion and Conduct Full Inventory</strong></div><div>Quantum migration needs a clear owner, not a committee. Assign a PQC champion empowered to lead across security, IT, procurement, and leadership. Their first mission is a cryptographic inventory. Catalog every place encryption, digital signatures, and cryptographic key management are used, including internal systems, APIs, certificates, and vendor platforms. Inventorying is not optional. Without a full map, risk prioritization, budgeting, and timeline development are impossible. Key Question: Have you appointed a PQC champion and started building a verified cryptographic inventory?</div><div><br></div><div><strong>[06:54] Step 3: Plan for a Hybrid Cryptographic Environment</strong></div><div>Post-quantum migration will not happen overnight. Many environments must support both classical and quantum-safe algorithms during a multi-year transition. Prioritize forward-facing, high-risk systems first, such as customer portals, external interfaces, and remote authentication systems. Assess which assets require full replacement versus those that can use middleware, protocol proxies, or hybrid solutions. Planning for coexistence ensures operational continuity while securing the most critical assets first. Key Question: Has your team mapped systems into categories for full replacement or phased hybrid upgrades?</div><div><br></div><div><strong>[09:24] Step 4: Update Procurement to Enforce PQC Standards</strong></div><div>Every new system you buy should already be on the path to post-quantum compliance. Update RFP templates, procurement policies, and vendor contracts to include requirements for PQC readiness, adoption of NIST-approved algorithms, and cryptographic agility. Ensure vendors demonstrate their quantum migration roadmap during evaluations. Procurement is not just a finance issue, it is your frontline for securing future resilience. Key Question: Have you updated procurement processes to require quantum-resilient solutions and vendor roadmaps?</div><div><br></div><div><strong>[11:24] Step 5: Combine Automation and Human Oversight in Cryptographic Inventory</strong></div><div>Automation can rapidly identify cryptographic assets, but it is not enough on its own. Combine automated cryptographic discovery with manual verification. Experts catch context-specific errors, validate system relevance, and prioritize risks effectively. A blended approach ensures your inventory is accurate, comprehensive, and ready to drive informed migration planning.</div><div>Key Question: Are you combining automated discovery with expert manual validation in your cryptographic inventory?</div><div><br></div><div><strong>[13:52] Step 6: Use Compliance Mandates to Drive Urgency</strong></div><div>Compliance deadlines such as OMB 23-02 are more than bureaucratic hurdles. They are action triggers that can align leadership support, unlock budgets, and drive internal momentum. Treat compliance mandates as organizational deadlines for inventorying, planning, and upgrading systems. Organizations that start now will avoid costly last-minute scrambles.</div><div>Key Question: Are you treating compliance frameworks as strategic accelerators for quantum migration?</div><div><br></div><div><strong>[19:08] Step 7: Upgrade Authentication Alongside Encryption</strong></div><div>Quantum threats target encryption and authentication systems equally. Digital signatures, certificates, identity management platforms, and transactional validation must all be post-quantum ready. Organizations should assess their PKI infrastructure now and plan parallel upgrade tracks for data protection and system trust. Key Question: Are authentication systems fully included in your post-quantum migration roadmap?</div><div><br></div><div><strong>[20:30] Step 8: Use AI to Accelerate, Not Replace Expertise</strong></div><div>AI and machine learning can improve cryptographic discovery, pattern detection, and asset categorization. However, AI tools should augment, not replace, expert decision-making. Experts are essential for validating asset contexts, prioritizing risks, and building migration schedules. Maintain human oversight for all strategic migration decisions. Key Question: Is your AI deployment structured to enhance, not replace, expert-driven migration work?</div><div><br></div><div><strong>[24:35] Step 9: Build Systems for International Cryptographic Flexibility</strong></div><div>Different countries may adopt different post-quantum standards. Your systems must be flexible enough to negotiate between varying algorithms and maintain secure interoperability across borders. Build that flexibility into your communications protocols and infrastructure planning today. Key Question: Are your systems architected for algorithm negotiation and cross-border post-quantum compatibility?</div><div><br></div><div><strong>[26:36] Step 10: Extend Migration Planning Across the Supply Chain</strong></div><div>Quantum readiness does not stop at your organizational boundaries. Vendors, contractors, and suppliers must also align with post-quantum standards. Engage partners early to assess their migration plans, share best practices, and synchronize timelines where possible. A secure organization surrounded by vulnerable suppliers remains exposed. Key Question: Are your suppliers and partners actively aligning to post-quantum standards with you?</div><div><br></div><div><strong>Episode Resources:<br></strong><br></div><ul><li>Garfield Jones on <a href="https://www.linkedin.com/in/garfield-jones-d-eng-0aba558b">LinkedIn</a></li><li>CISA <a href="https://www.cisa.gov/">Website</a></li><li>Johannes Lintzen on <a href="https://www.linkedin.com/in/jolintzen/">LinkedIn</a></li><li>PQShield <a href="http://www.pqshield.com">Website</a>&nbsp;</li></ul><div><br></div><div>Want exclusive insights on post-quantum security? Stay ahead of the curve—subscribe to Shielded: The Last Line of Cyber Defense on Apple Podcasts, Spotify, and YouTube Podcasts.<br><br></div><div>✔ Get insider knowledge from leading cybersecurity experts.</div><div>✔ Learn practical steps to future-proof your organization.</div><div>✔ Stay updated on regulatory changes and industry trends.<br><br>Need help subscribing? Click <a href="https://www.fame.so/follow-rate-review">here</a> for step-by-step instructions.<br><br></div><div>Shielded: The Last Line of Cyber Defense is handcrafted by our friends over at: <a href="https://www.fame.so/?utm_medium=podcast&amp;utm_source=bcast&amp;utm_campaign=masters-of-community-with-david-spinks?utm_medium=podcast&amp;utm_source=bcast&amp;utm_campaign=fame-client">fame.so</a></div><div><br></div>]]></content:encoded>
      <pubDate>Tue, 29 Apr 2025 11:00:00 +0000</pubDate>
      <author>PQShield</author>
      <enclosure url="https://media.fame.so/w0vrk31w.mp3" length="72941191" type="audio/mpeg"/>
      <itunes:author>PQShield</itunes:author>
      <itunes:image href="https://content.fameapp.so/uploads/8l18kymq/35d3d290-250f-11f0-9032-f37a8060bc55/35d3d3a0-250f-11f0-b7e1-c7726e7fdefe.png"/>
      <itunes:duration>1823</itunes:duration>
      <itunes:summary>Quantum threats aren’t hypothetical, they’re operational risks hiding in your cryptographic stack. In this episode of Shielded: The Last Line of Cyber Defense, host Johannes Lintzen sits down with Dr. Garfield Jones from CISA to dive into the practical steps for post-quantum migration, making the case that waiting until 2035 is far too late. Dr. Jones breaks down his APA framework (Awareness, Preparedness, Action) and explains why organizations need to act now to secure their infrastructure against the quantum threat. Learn how to take inventory, align procurement, tackle legacy infrastructure, and embed PQC into your vendor strategy before the clock runs out.</itunes:summary>
      <itunes:subtitle>Quantum threats aren’t hypothetical, they’re operational risks hiding in your cryptographic stack. In this episode of Shielded: The Last Line of Cyber Defense, host Johannes Lintzen sits down with Dr. Garfield Jones from CISA to dive into the practical steps for post-quantum migration, making the case that waiting until 2035 is far too late. Dr. Jones breaks down his APA framework (Awareness, Preparedness, Action) and explains why organizations need to act now to secure their infrastructure against the quantum threat. Learn how to take inventory, align procurement, tackle legacy infrastructure, and embed PQC into your vendor strategy before the clock runs out.</itunes:subtitle>
      <itunes:keywords>post-quantum cryptography, quantum migration, APA framework, cryptographic inventory, cybersecurity strategy, PQC readiness, supply chain security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <googleplay:explicit>No</googleplay:explicit>
    </item>
    <item>
      <title>Your Cryptography is stuck in 2010 - How to Catch Up | Hart Montgomery</title>
      <link>https://podcasts.fame.so/e/28610v0n-your-cryptography-is-stuck-in-2010-how-to-catch-up-hart-montgomery</link>
      <itunes:title>Your Cryptography is stuck in 2010 - How to Catch Up | Hart Montgomery</itunes:title>
      <itunes:episode>4</itunes:episode>
      <itunes:block>No</itunes:block>
      <googleplay:block>No</googleplay:block>
      <guid isPermaLink="false">j122y3y1</guid>
      <description>Your cryptography may be stuck in 2010, and attackers are betting on it. In this episode of Shielded: The Last Line of Cyber Defense, host Johannes Lintzen speaks with Hart Montgomery, Technical Director at LF Decentralized Trust, about how outdated cryptographic dependencies, hidden vulnerabilities, and poor crypto agility are putting critical systems at risk. From alarming audit findings in financial infrastructure to lessons from tech giants like Google and AWS, Hart shares practical strategies to secure your stack today and keep it adaptable for a quantum future. Learn why 90% of closed-source software depends on potentially vulnerable open-source components and how to bring cryptographic chaos under control.</description>
      <content:encoded><![CDATA[<div>Navigating the shift to post-quantum cryptography takes more than awareness; it requires a forward-looking strategy, crypto-agile architecture, and long-term planning across software and hardware. In this episode of <em>Shielded: The Last Line of Cyber Defense</em>, host Johannes Lintzen speaks with Hart Montgomery, Technical Director at LF Decentralized Trust and a leading voice in cryptographic modernization. Together, they explore practical solutions and emerging standards that will define how organizations prepare for a quantum-secure future.<br><br></div><div><strong>What You'll Learn:</strong><br><br></div><ul><li>How to assess your quantum readiness through crypto-agility audits and dependency mapping</li><li>How to build a business case using the “Harvest Now, Decrypt Later” threat model</li><li>Why US, UK, and Australian regulations are accelerating timelines — and what that means for compliance</li><li>Why centralized crypto services are key to consistent implementation and quantum-safe upgrades</li><li>How to standardize cryptography across teams using policy-driven APIs</li><li>Where to start: Low-risk, high-reward use cases that build migration momentum</li><li>How the “Open Source Hamburger” explains your software supply chain risk</li><li>Why hardware timelines are the biggest bottleneck and how to start addressing them now</li><li>How SBOMs and CBOMs can help uncover legacy cryptography across your stack</li></ul><div><br></div><div>Hart Montgomery is the Technical Director at LF Decentralized Trust, specializing in post-quantum cryptography and secure blockchain architectures. With a PhD in lattice cryptography and a background as a blockchain researcher at Fujitsu, he brings deep expertise in both theoretical and applied security. Hart is involved with critical initiatives such as the Post-Quantum Cryptography Alliance and the Open Quantum Safe Project, helping secure the global open-source ecosystem through crypto agility and supply chain transparency. His unique blend of academic rigor and practical experience makes him a leading voice in post-quantum cryptography and secure software development.</div><div><br></div><div>Quantum security isn’t a project; it’s a phased transformation. Here’s a step-by-step roadmap to guide your organization through the post-quantum transition, from quick wins to long-term strategy.<br><br></div><div><strong>Your Roadmap to Post-Quantum Readiness:</strong></div><div><strong><br>[04:48] Step 1: Audit Your Crypto Footprint and Centralize Control</strong></div><div>The first step in quantum readiness is knowing what cryptographic assets you rely on and where they might be vulnerable. Hart highlights that over 90% of closed-source software contains open-source dependencies, many using outdated or insecure cryptographic algorithms like MD5 or single DES. To fix this, organizations must start by creating a Cryptographic Bill of Materials (CBOM) and Software Bill of Materials (SBOM) to expose hidden risks in the stack. From there, implement centralized cryptographic microservices to eliminate inconsistency and bring cryptographic controls under policy enforcement. Key Question: Can you confidently say where every cryptographic risk lives in your stack?</div><div><br></div><div><strong>[08:39] Step 2: Target Low-Cost, High-Impact Migrations First<br></strong>All cryptographic transitions are complex, but some are technically easier to implement with minimal performance impact. Start there. Hart points to TLS handshakes, ephemeral key exchanges, and messaging as ideal first steps, areas where larger PQ signatures and keys add little overhead. Organizations like Signal, Apple, and AWS have already migrated these areas, proving it's possible to build momentum while limiting operational risk. Start with what’s easy, then scale the lessons to more critical or complex systems. Key Question: What’s your TLS handshake worth in the quantum era?</div><div><br></div><div><strong>[14:48] Step 3: Use the “Open Source Hamburger” to Rethink Software Supply Chain Risk<br></strong>Modern software is built like a hamburger. You start with an open-source framework (the bottom bun), write a small layer of custom code (the meat), and stack on more open-source libraries (the top bun). According to Hart, that custom code might make up just 20% of your full application; the rest is open source that you didn’t write and might not fully understand. This model demands rigorous supply chain hygiene. Without a clear SBOM and CBOM, organizations risk inheriting vulnerabilities from long-abandoned GitHub repos or outdated crypto defaults buried in libraries. Treat every third-party dependency like a potential attack vector and standardize cryptographic practices across them. Key Question: Are you treating your software stack like your own or trusting a hamburger of unvetted, third-party code?</div><div><br></div><div><strong>[18:00] Step 4: Use the ‘Harvest Now, Decrypt Later’ Threat to Drive Business Buy-In</strong></div><div>Quantum attacks aren’t here yet, but the threat is real today. Encrypted data can be harvested now and decrypted later once quantum computers become viable. For any data that must remain secure for 5–10+ years—think health records, financial transactions, or national security—this is a clear and present risk. Hart emphasizes that while we can’t predict exactly when quantum computers will break RSA or ECC, we can estimate how long data needs to remain secure. That risk equation alone should drive immediate planning, especially when factoring in hardware timelines for things like secure elements and smart devices. Key Question: Will your encrypted data still be safe in 2035?</div><div><br></div><div><strong>[25:31] Step 5: Build Crypto Agility Into Your Architecture</strong></div><div>Quantum migration isn’t a one-time change; it’s an ongoing capability. Crypto agility means designing systems that can switch algorithms, protocols, or key sizes as threats evolve or standards change. Hart advocates a “black box” model: developers shouldn’t choose cryptographic algorithms themselves. Instead, they should call secure APIs governed by central teams. This kind of agility already exists in tech-forward companies like Google and AWS, where cryptographic updates happen at the service level, not deep in app logic. Adopting this model now prevents lock-in and future-proofs your infrastructure. Key Question: Are your systems flexible enough to rotate cryptography with minimal code rewrites and business disruption?</div><div><br></div><div><strong>[22:00] Step 6: Address Hardware Dependencies Before It’s Too Late</strong></div><div>IoT devices, embedded systems, smart meters—these components can't be updated overnight. They’re often deployed for a decade or more and may rely on cryptographic hardware that’s not post-quantum ready. For many organizations, this is the longest lead time in the entire migration process. As Hart warns, there’s often no choice but to replace or phase out outdated systems, and that requires years of planning, budgeting, and supply chain coordination. Secure hardware lifecycles must become part of your PQC strategy now, not later. Key Question: Have you identified cryptographic hardware in your infrastructure that must be upgraded and started planning its replacement?</div><div><br></div><div><strong>Episode Resources:<br></strong><br></div><ul><li>Hart Montgomery on <a href="https://www.linkedin.com/in/hartmontgomery/">LinkedIn</a></li><li>The Linux Foundation <a href="https://www.linuxfoundation.org/">Website</a></li><li>Johannes Lintzen on <a href="https://www.linkedin.com/in/jolintzen/">LinkedIn</a></li><li>PQShield <a href="http://www.pqshield.com">Website</a>&nbsp;</li></ul><div><br></div><div>Want exclusive insights on post-quantum security? Stay ahead of the curve—subscribe to Shielded: The Last Line of Cyber Defense on Apple Podcasts, Spotify, and YouTube Podcasts.<br><br></div><div>✔ Get insider knowledge from leading cybersecurity experts.</div><div>✔ Learn practical steps to future-proof your organization.</div><div>✔ Stay updated on regulatory changes and industry trends.<br><br>Need help subscribing? Click <a href="https://www.fame.so/follow-rate-review">here</a> for step-by-step instructions.</div><div><br></div><div>Shielded: The Last Line of Cyber Defense is handcrafted by our friends over at: <a href="https://www.fame.so/?utm_medium=podcast&amp;utm_source=bcast&amp;utm_campaign=masters-of-community-with-david-spinks?utm_medium=podcast&amp;utm_source=bcast&amp;utm_campaign=fame-client">fame.so</a></div><div><br></div>]]></content:encoded>
      <pubDate>Thu, 10 Apr 2025 11:00:00 +0000</pubDate>
      <author>PQShield</author>
      <enclosure url="https://media.fame.so/wvy2kzy8.mp3" length="68638301" type="audio/mpeg"/>
      <itunes:author>PQShield</itunes:author>
      <itunes:image href="https://content.fameapp.so/uploads/8l18kymq/9567d190-1b89-11f0-841b-359052ca4696/9567d320-1b89-11f0-83d7-4fe6d6cf8fca.png"/>
      <itunes:duration>1715</itunes:duration>
      <itunes:summary>Your cryptography may be stuck in 2010, and attackers are betting on it. In this episode of Shielded: The Last Line of Cyber Defense, host Johannes Lintzen speaks with Hart Montgomery, Technical Director at LF Decentralized Trust, about how outdated cryptographic dependencies, hidden vulnerabilities, and poor crypto agility are putting critical systems at risk. From alarming audit findings in financial infrastructure to lessons from tech giants like Google and AWS, Hart shares practical strategies to secure your stack today and keep it adaptable for a quantum future. Learn why 90% of closed-source software depends on potentially vulnerable open-source components and how to bring cryptographic chaos under control.</itunes:summary>
      <itunes:subtitle>Your cryptography may be stuck in 2010, and attackers are betting on it. In this episode of Shielded: The Last Line of Cyber Defense, host Johannes Lintzen speaks with Hart Montgomery, Technical Director at LF Decentralized Trust, about how outdated cryptographic dependencies, hidden vulnerabilities, and poor crypto agility are putting critical systems at risk. From alarming audit findings in financial infrastructure to lessons from tech giants like Google and AWS, Hart shares practical strategies to secure your stack today and keep it adaptable for a quantum future. Learn why 90% of closed-source software depends on potentially vulnerable open-source components and how to bring cryptographic chaos under control.</itunes:subtitle>
      <itunes:keywords/>
      <itunes:explicit>No</itunes:explicit>
      <googleplay:explicit>No</googleplay:explicit>
    </item>
    <item>
      <title>How to Build Your 12-Month Post-Quantum Strategy With NIST's Dustin Moody</title>
      <link>https://podcasts.fame.so/e/r8kmkwm8-build-your-12-month-post-quantum-strategy-nist-dustin-moody</link>
      <itunes:title>How to Build Your 12-Month Post-Quantum Strategy With NIST's Dustin Moody</itunes:title>
      <itunes:episode>3</itunes:episode>
      <itunes:block>No</itunes:block>
      <googleplay:block>No</googleplay:block>
      <guid isPermaLink="false">71w7z471</guid>
      <description>The countdown has begun: by 2035, all public-key cryptography must be quantum-safe. Are you ready? In this episode of Shielded: The Last Line of Cyber Defense, host Johannes Lintzen welcomes Dustin Moody, the mathematician leading NIST's post-quantum cryptography standardization project, for an in-depth discussion on why organizations must act now. Moody shares essential insights into the 2035 implementation deadline, debunks common misconceptions, and provides actionable advice for building crypto-agile systems. Learn why the "harvest now, decrypt later" threat is imminent, how to assess your organization's quantum risk, and the key steps to take in the next 12 months to secure your digital future. Essential listening for cybersecurity leaders, architects, and decision-makers navigating the quantum security landscape.</description>
      <content:encoded><![CDATA[<div>With the 2035 deadline for post-quantum cryptography rapidly approaching, organizations must act immediately to ensure a smooth transition. In this episode of <em>Shielded: The Last Line of Cyber Defense</em>, host Johannes Lintzen speaks with Dustin Moody, a mathematician at NIST, to discuss the practical steps organizations should take to prepare for this monumental shift in cryptography. They explore the critical timeline, common challenges, and how the post-quantum cryptography migration can be effectively managed.<br><br><strong>What You'll Learn:</strong><br><br></div><ul><li>How to build an effective PQC migration roadmap starting with a cryptographic inventory assessment.</li><li>Why the 2035 deadline is just the end of the journey, not the beginning, of quantum-safe implementation.</li><li>The essential role of crypto agility in maintaining long-term security resilience.</li><li>How to evaluate whether hybrid cryptography schemes are right for your organization.</li><li>Why "harvest now, decrypt later" attacks pose an immediate threat to sensitive data.</li><li>Practical steps organizations can take in the next 12 months to begin PQC migration.</li><li>How NIST’s standardization process is creating a toolbox of algorithms for different use cases.</li><li>Why collaboration between government agencies, industry, and vendors is crucial for a successful transition.</li></ul><div><br></div><div>Dustin Moody is a mathematician leading the post-quantum cryptography standardization project at the National Institute of Standards and Technology (NIST). Since 2016, he has led one of the most consequential cryptographic initiatives of our time, selecting and standardizing algorithms that will secure digital systems against quantum threats. As the principal architect of NIST’s post-quantum cryptography standards, Moody has played a pivotal role in establishing the 2035 migration timeline and crafting crucial guidance for organizations transitioning to quantum-safe cryptography. His work bridges the gap between theoretical cryptography and practical implementation, helping organizations understand and prepare for the post-quantum era through crypto agility, risk assessment, and strategic planning. Moody’s expertise, combined with his collaborative approach, makes him a leading authority on securing digital infrastructure against emerging quantum threats.</div><div><br></div><div>The year 2035 might sound far away, but if you're a large organization, your migration timeline starts now. As Dustin Moody warns, this isn’t going to be a quick plug-and-play switch. The good news? NIST has laid out a clear roadmap. Here’s how to get started step by step.<br><br></div><div><strong>Your Roadmap to Post-Quantum Readiness:</strong></div><div><strong><br>[03:55] Step 1: Appoint a PQC Taskforce and Map Your Migration - <br></strong>2035 marks the end of your post-quantum transition, not the beginning. Large organizations may need a decade or more to migrate fully, meaning the planning must start immediately. Moody recommends building a dedicated internal team to lead the charge, assigning ownership, and developing a migration roadmap tailored to your systems and dependencies. The first foundational task is a cryptographic inventory, a deep dive into all the ways cryptography is used in your infrastructure. This includes both internally developed systems and supply chain components. Engaging with vendors, suppliers, and customers early ensures alignment and reduces friction later in the transition. Key Question: Have you built a dedicated team and started your roadmap, including a cryptographic inventory?</div><div><strong><br>[13:22] Step 2: Design for Agility from Day One - <br></strong>Crypto agility isn’t a future nice-to-have; it’s a current necessity. Organizations need the ability to adapt cryptographic algorithms over time, responding to new threats and evolving standards without disrupting live systems. NIST’s formal definition of crypto agility includes the flexibility to update cryptographic components across software, hardware, protocols, and infrastructure—seamlessly. Implementing agility now ensures you’re not locked into today’s choices and gives you options to respond quickly if vulnerabilities are discovered down the road. Key Question: Are your systems built to evolve or will they need to be rebuilt the next time the landscape shifts?</div><div><strong><br>[18:24] Step 3: Protect Long-Lived Data from Quantum Exposure -<br></strong>Quantum threats aren’t theoretical; they’re already impacting data security. According to Dustin, adversaries are actively collecting encrypted data today with the intent of decrypting it later, once quantum computing reaches maturity. This makes post-quantum readiness especially urgent for industries that manage data with long shelf lives—such as healthcare, finance, critical infrastructure, and national security systems. Even if your data is secure now, if it’s still sensitive a decade from now, it’s already vulnerable. While symmetric encryption like AES offers partial protection, the public-key encryption methods used to exchange keys are often the weakest link. Organizations must begin assessing where these vulnerabilities exist and how to mitigate them. Key Question: Are you still treating quantum threats as a future problem or are you protecting your data from being decrypted tomorrow?</div><div><strong><br>[25:00] Step 4: Build Momentum with a 12-Month Action Plan -<br></strong>You don’t need to solve everything in a year, but you do need to start. The next 12 months should be focused on building momentum: resourcing your PQC strategy, launching your inventory, and plugging into real-world guidance from initiatives like NIST’s National Cybersecurity Center of Excellence. Use this time to learn from early adopters, experiment safely, and begin aligning teams around risk, infrastructure, and timelines. The transition may span a decade, but your first steps start today. Key Question: What progress will your organization be able to show by this time next year?<br><br></div><div><strong>Episode Resources:<br></strong><br></div><ul><li>Dustin Moody on <a href="https://www.linkedin.com/in/dustin-moody-88410550/">LinkedIn</a></li><li>NIST <a href="https://www.nist.gov/">Website</a></li><li>Johannes Lintzen on <a href="https://www.linkedin.com/in/jolintzen/">LinkedIn</a></li><li>PQShield <a href="http://www.pqshield.com">Website</a>&nbsp;</li></ul><div><br>Want exclusive insights on post-quantum security? Stay ahead of the curve—subscribe to Shielded: The Last Line of Cyber Defense on Apple Podcasts, Spotify, and YouTube Podcasts.<br><br></div><div>✔ Get insider knowledge from leading cybersecurity experts.</div><div>✔ Learn practical steps to future-proof your organization.</div><div>✔ Stay updated on regulatory changes and industry trends.<br><br>Need help subscribing? Click <a href="https://www.fame.so/follow-rate-review">here</a> for step-by-step instructions.</div><div><br></div><div>Shielded: The Last Line of Cyber Defense is handcrafted by our friends over at: <a href="https://www.fame.so/?utm_medium=podcast&amp;utm_source=bcast&amp;utm_campaign=masters-of-community-with-david-spinks?utm_medium=podcast&amp;utm_source=bcast&amp;utm_campaign=fame-client">fame.so</a></div><div><br></div>]]></content:encoded>
      <pubDate>Thu, 03 Apr 2025 11:00:00 +0000</pubDate>
      <author>PQShield</author>
      <enclosure url="https://media.fame.so/8z71xm5w.mp3" length="66488946" type="audio/mpeg"/>
      <itunes:author>PQShield</itunes:author>
      <itunes:image href="https://content.fameapp.so/uploads/8l18kymq/e2ae1af0-108e-11f0-a844-2711407061ac/e2ae1ca0-108e-11f0-b80f-61fc64d8a6d5.png"/>
      <itunes:duration>1662</itunes:duration>
      <itunes:summary>The countdown has begun: by 2035, all public-key cryptography must be quantum-safe. Are you ready? In this episode of Shielded: The Last Line of Cyber Defense, host Johannes Lintzen welcomes Dustin Moody, the mathematician leading NIST's post-quantum cryptography standardization project, for an in-depth discussion on why organizations must act now. Moody shares essential insights into the 2035 implementation deadline, debunks common misconceptions, and provides actionable advice for building crypto-agile systems. Learn why the "harvest now, decrypt later" threat is imminent, how to assess your organization's quantum risk, and the key steps to take in the next 12 months to secure your digital future. Essential listening for cybersecurity leaders, architects, and decision-makers navigating the quantum security landscape.</itunes:summary>
      <itunes:subtitle>The countdown has begun: by 2035, all public-key cryptography must be quantum-safe. Are you ready? In this episode of Shielded: The Last Line of Cyber Defense, host Johannes Lintzen welcomes Dustin Moody, the mathematician leading NIST's post-quantum cryptography standardization project, for an in-depth discussion on why organizations must act now. Moody shares essential insights into the 2035 implementation deadline, debunks common misconceptions, and provides actionable advice for building crypto-agile systems. Learn why the "harvest now, decrypt later" threat is imminent, how to assess your organization's quantum risk, and the key steps to take in the next 12 months to secure your digital future. Essential listening for cybersecurity leaders, architects, and decision-makers navigating the quantum security landscape.</itunes:subtitle>
      <itunes:keywords/>
      <itunes:explicit>No</itunes:explicit>
      <googleplay:explicit>No</googleplay:explicit>
    </item>
    <item>
      <title>The Quantum-Safe Playbook: How Signal Protected Billions with a Lean Team</title>
      <link>https://podcasts.fame.so/e/m84x16v8-the-quantum-safe-playbook-how-signal-protected-billions-with-a-team-of-one</link>
      <itunes:title>The Quantum-Safe Playbook: How Signal Protected Billions with a Lean Team</itunes:title>
      <itunes:episode>2</itunes:episode>
      <itunes:block>No</itunes:block>
      <googleplay:block>No</googleplay:block>
      <guid isPermaLink="false">x16lqk41</guid>
      <description>Quantum threats aren’t coming—they’re already here. In this episode of Shielded: The Last Line of Cyber Defense, host Johannes Lintzen talks with Rolfe Schmidt, the man behind Signal Messenger’s quantum-safe migration. Learn how Signal protected billions of messages by prioritizing Harvest Now, Decrypt Later risks and deploying hybrid encryption—before PQC standards were finalized. Whether you’re a cybersecurity leader or product strategist, this is your playbook for staying ahead of quantum threats.  Delays aren’t an option. Get Signal’s quantum-safe playbook and protect your data now.</description>
      <content:encoded><![CDATA[<div>Quantum risk is a business risk—and Signal Messenger isn’t waiting for quantum computers to arrive. In this episode of <em>Shielded: The Last Line of Cyber Defense</em>, Johannes Lintzen welcomes Rolfe Schmidt, Research Engineer at Signal Messenger, to explore how one of the world's most privacy-focused messaging platforms implemented post-quantum cryptography—even with a lean team.<br><br></div><div><strong>What You'll Learn:</strong><br><br></div><ul><li>How Signal’s lean team structure shaped their pragmatic, step-by-step approach to PQC migration</li><li>Why hybrid cryptography serves as both a transition strategy and long-term security measure</li><li>The strategic decision-making process behind prioritizing Harvest Now, Decrypt Later protection</li><li>How to integrate post-quantum updates into regular product development workflows</li><li>The challenges and potential solutions for implementing quantum-safe zero-knowledge proofs in metadata protection</li><li>How Signal’s bandwidth optimization enables post-quantum security without compromising user experience</li><li>Why inventorying cryptographic assets and understanding their purpose is crucial before starting PQC migration</li><li>The importance of collaboration with the research community when facing unsolved cryptographic challenges</li><li>How Signal’s evolving ratcheting protocol demonstrates the need for flexibility in early-stage PQC standardization</li></ul><div><br></div><div>Rolfe Schmidt is a Research Engineer at Signal Messenger, where he spearheads the organization's post-quantum cryptography initiatives. As the cryptography engineering lead, he has been instrumental in implementing Signal's groundbreaking post-quantum secure messaging protocols, including the successful deployment of ML-KEM (formerly Kyber) for harvest-now-decrypt-later protection in 2023. Schmidt's expertise spans cryptographic protocol design, zero-knowledge proofs, and secure messaging systems, making him a key figure in Signal's transition to quantum-safe security. His work has directly impacted billions of users across platforms that implement the Signal protocol, including WhatsApp and Google Messages.</div><div><br></div><div>Here’s your step-by-step guide to how Signal made post-quantum readiness real—no massive team or budget required.</div><div><br><strong>Your Roadmap to Post-Quantum Readiness:</strong></div><div><strong><br>[03:25] Integrating PQC into Regular Development Workflows –<br></strong>Rolfe explains how Signal treats post-quantum cryptography (PQC) migration as an ongoing part of their product development lifecycle rather than a standalone initiative. By embedding PQC into regular workflows, they avoid treating quantum security as a distant or isolated challenge. Instead of waiting for a "perfect time" to act, Signal continuously assesses threats, evaluates trade-offs, and prioritizes based on resource availability and user risk. This pragmatic approach allows their small team to make incremental, meaningful progress toward quantum resilience while keeping up with day-to-day product demands. Key Question: Are we integrating PQC into our current workflows or waiting for a separate initiative to start?<br><br></div><div><strong>[04:55] Prioritizing Harvest Now, Decrypt Later Protection –<br></strong>&nbsp;In early 2023, Signal prioritized protection against Harvest Now, Decrypt Later (HNDL) attacks—where adversaries capture encrypted data now with the intent to decrypt it when quantum computers become available. Rolfe highlights how they made this decision before PQ standards were finalized, confident that MLKEM (formerly Kyber) had reached sufficient maturity. By developing a hybrid encryption protocol, they added quantum resistance while maintaining their existing security guarantees. The lesson? Organizations can act today, even before the standards landscape is fully settled, by choosing well-supported, low-risk hybrid approaches. Key Question: Are we waiting for perfect standards, or are we mitigating immediate HNDL risks now?<br><br></div><div><strong>[09:36] Taking a Modular Approach to PQC Migration –</strong></div><div>Signal breaks down PQC migration into modular, manageable steps rather than attempting an all-at-once overhaul. Rolfe shares how they evaluate each system and service individually, applying post-quantum upgrades where it makes the most sense—such as updating hardware enclaves or secure channels—without waiting for a full platform redesign. This modular approach allows for gradual implementation, reduces operational risk, and helps teams build PQC familiarity over time. Key Question: Are we breaking PQC migration into smaller, actionable pieces or stuck planning a single massive shift?</div><div><br></div><div><strong>[17:24] Planning for Authentication Migration: A Three-Bucket Approach&nbsp; –</strong></div><div>Signal approaches authentication migration by categorizing it into three distinct areas: general signatures, user identity proofs, and metadata protection. Rolfe shares how they have clear plans to add quantum-safe digital signatures as hybrid solutions and integrate these changes into their standard product updates. Their method shows that organizations can prepare for authentication migration incrementally, building familiarity with PQ signature libraries now to ensure a smooth transition later. Key Question: Do we have a phased plan for migrating authentication and digital signatures, or are we postponing decisions until the threat is imminent?</div><div><br></div><div><strong>[29:23] Practical First Steps for PQC Migration&nbsp; –</strong></div><div>Rolfe emphasizes the importance of starting with a comprehensive cryptographic inventory—identifying where public key cryptography is used, why it’s used, and the consequences of quantum compromise. This analysis naturally prioritizes migration tasks and highlights areas where existing PQ solutions can be applied immediately. For challenges without clear answers, engaging the research community can uncover new pathways. Rolfe’s advice: Don’t wait for a mandate—take inventory, prioritize, and start small. Key Question: Have we completed a cryptographic inventory and risk assessment, or are we still mapping our exposure?</div><div><br></div><div><strong>Episode Resources:<br></strong><br></div><ul><li>Rolfe Schmidt on <a href="https://www.linkedin.com/in/rolfeschmidt/">LinkedIn</a></li><li>Signal Messenger <a href="https://signal.org">Website</a></li><li>Johannes Lintzen on <a href="https://www.linkedin.com/in/jolintzen/">LinkedIn</a></li><li>PQShield <a href="http://www.pqshield.com">Website</a>&nbsp;</li></ul><div><br></div><div>Want exclusive insights on post-quantum security? Stay ahead of the curve—subscribe to Shielded: The Last Line of Cyber Defense on Apple Podcasts, Spotify, and YouTube Podcasts.<br><br></div><div>✔ Get insider knowledge from leading cybersecurity experts.</div><div>✔ Learn practical steps to future-proof your organization.</div><div>✔ Stay updated on regulatory changes and industry trends.<br><br>Need help subscribing? Click <a href="https://www.fame.so/follow-rate-review">here</a> for step-by-step instructions.</div><div>Shielded: The Last Line of Cyber Defense is handcrafted by our friends over at: <a href="https://www.fame.so/?utm_medium=podcast&amp;utm_source=bcast&amp;utm_campaign=masters-of-community-with-david-spinks?utm_medium=podcast&amp;utm_source=bcast&amp;utm_campaign=fame-client">fame.so</a></div><div><br></div>]]></content:encoded>
      <pubDate>Thu, 27 Mar 2025 11:00:00 +0000</pubDate>
      <author>PQShield</author>
      <enclosure url="https://media.fame.so/8vy2z1vw.mp3" length="25458612" type="audio/mpeg"/>
      <itunes:author>PQShield</itunes:author>
      <itunes:image href="https://content.fameapp.so/uploads/8l18kymq/124c3210-0ae4-11f0-80c3-1fd9c62683c3/124c3320-0ae4-11f0-98dd-67c255be261c.png"/>
      <itunes:duration>2004</itunes:duration>
      <itunes:summary>Quantum threats aren’t coming—they’re already here. In this episode of Shielded: The Last Line of Cyber Defense, host Johannes Lintzen talks with Rolfe Schmidt, the man behind Signal Messenger’s quantum-safe migration. Learn how Signal protected billions of messages by prioritizing Harvest Now, Decrypt Later risks and deploying hybrid encryption—before PQC standards were finalized. Whether you’re a cybersecurity leader or product strategist, this is your playbook for staying ahead of quantum threats.  Delays aren’t an option. Get Signal’s quantum-safe playbook and protect your data now.</itunes:summary>
      <itunes:subtitle>Quantum threats aren’t coming—they’re already here. In this episode of Shielded: The Last Line of Cyber Defense, host Johannes Lintzen talks with Rolfe Schmidt, the man behind Signal Messenger’s quantum-safe migration. Learn how Signal protected billions of messages by prioritizing Harvest Now, Decrypt Later risks and deploying hybrid encryption—before PQC standards were finalized. Whether you’re a cybersecurity leader or product strategist, this is your playbook for staying ahead of quantum threats.  Delays aren’t an option. Get Signal’s quantum-safe playbook and protect your data now.</itunes:subtitle>
      <itunes:keywords/>
      <itunes:explicit>No</itunes:explicit>
      <googleplay:explicit>No</googleplay:explicit>
    </item>
    <item>
      <title>Inside Cloudflare's Post-Quantum Journey: Bas Westerbaan on Real-World Implementation</title>
      <link>https://podcasts.fame.so/e/58zxq9j8-inside-cloudflares-post-quantum-journey-bas-westerbaan-real-world-implementation</link>
      <itunes:title>Inside Cloudflare's Post-Quantum Journey: Bas Westerbaan on Real-World Implementation</itunes:title>
      <itunes:episode>1</itunes:episode>
      <itunes:block>No</itunes:block>
      <googleplay:block>No</googleplay:block>
      <guid isPermaLink="false">81z7jkv0</guid>
      <description>Is your organization truly prepared for the post-quantum era? In the premier episode of Shielded: The Last Line of Cyber Defense, host Johannes Lintzen is joined by Bas Westerbaan, Research Engineer at Cloudflare, to discuss why organizations must act now on post-quantum cryptography, how to navigate the two-phase migration process, and how to overcome key management, compliance, and performance challenges. Whether you're just starting or refining your post-quantum strategy, this conversation delivers the insights you need to future-proof your cryptographic security.</description>
      <content:encoded><![CDATA[<div>In the premier episode of <strong>Shielded: The Last Line of Cyber Defense</strong>, <strong>Johannes Lintzen</strong> welcomes <strong>Bas Westerbaan</strong>, Research Engineer at <strong>Cloudflare</strong>, to break down real-world post-quantum migration challenges and solutions:<br><br></div><ul><li>Cloudflare’s early PQC adoption - lessons from years of real-world implementation</li><li>Why you need two migrations (encryption today, authentication next)</li><li>How to secure executive buy-in &amp; conduct a cryptographic inventory</li><li>The hidden performance &amp; compatibility challenges of PQC deployment</li><li>Why vendor readiness &amp; regulatory compliance will shape adoption</li></ul><div><br></div><div>Bas Westerbaan is a Research Engineer at Cloudflare, specializing in post-quantum cryptography and its practical implementation at scale. With a PhD in theoretical quantum computing from Radboud University and experience across academia and industry, including roles at UCL and PQShield, Westerbaan brings a unique perspective to the intersection of mathematical theory and real-world cryptographic engineering. He has been instrumental in Cloudflare's post-quantum initiatives since 2017, leading efforts in implementing quantum-safe encryption and helping shape the company's phased approach to post-quantum migration</div><div><br>Want exclusive insights on post-quantum security? Stay ahead of the curve - subscribe to Shielded: The Last Line of Cyber Defense on Apple Podcasts, Spotify, and YouTube Podcasts.<br><br></div><div>✔ Get insider knowledge from leading cybersecurity experts.</div><div>✔ Learn practical steps to future-proof your organization.</div><div>✔ Stay updated on regulatory changes and industry trends.<br><br>Need help subscribing? Click <a href="https://www.fame.so/follow-rate-review">here</a> for step-by-step instructions.<br><br></div><div>Shielded: The Last Line of Cyber Defense is handcrafted by our friends over at: <a href="https://www.fame.so/?utm_medium=podcast&amp;utm_source=bcast&amp;utm_campaign=masters-of-community-with-david-spinks?utm_medium=podcast&amp;utm_source=bcast&amp;utm_campaign=fame-client">fame.so</a></div><div><br></div>]]></content:encoded>
      <pubDate>Tue, 18 Mar 2025 11:00:00 +0000</pubDate>
      <author>PQShield</author>
      <enclosure url="https://media.fame.so/w7p66638.mp3" length="60761860" type="audio/mpeg"/>
      <itunes:author>PQShield</itunes:author>
      <itunes:image href="https://content.fameapp.so/uploads/8l18kymq/1fb4f270-03cd-11f0-a352-7d6280b5fa63/1fb4f360-03cd-11f0-95ff-45ff3f9f45c9.png"/>
      <itunes:duration>1519</itunes:duration>
      <itunes:summary>Is your organization truly prepared for the post-quantum era? In the premier episode of Shielded: The Last Line of Cyber Defense, host Johannes Lintzen is joined by Bas Westerbaan, Research Engineer at Cloudflare, to discuss why organizations must act now on post-quantum cryptography, how to navigate the two-phase migration process, and how to overcome key management, compliance, and performance challenges. Whether you're just starting or refining your post-quantum strategy, this conversation delivers the insights you need to future-proof your cryptographic security.</itunes:summary>
      <itunes:subtitle>Is your organization truly prepared for the post-quantum era? In the premier episode of Shielded: The Last Line of Cyber Defense, host Johannes Lintzen is joined by Bas Westerbaan, Research Engineer at Cloudflare, to discuss why organizations must act now on post-quantum cryptography, how to navigate the two-phase migration process, and how to overcome key management, compliance, and performance challenges. Whether you're just starting or refining your post-quantum strategy, this conversation delivers the insights you need to future-proof your cryptographic security.</itunes:subtitle>
      <itunes:keywords>Post-quantum cryptography, Cloudflare, Migration strategy, Cryptographic inventory, Performance challenges, Authentication, Encryption, Executive buy-in, Regulatory compliance, Implementation lessons</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <googleplay:explicit>No</googleplay:explicit>
    </item>
    <item>
      <title>Trailer</title>
      <link>https://podcasts.fame.so/e/5nzxqlrn-trailer</link>
      <itunes:title>Trailer</itunes:title>
      <itunes:episode>0</itunes:episode>
      <itunes:block>No</itunes:block>
      <googleplay:block>No</googleplay:block>
      <guid isPermaLink="false">80z7jy41</guid>
      <description>Welcome to Shielded: The Last Line of Cyber Defense, the podcast that explores the urgent need for quantum-ready cybersecurity. Hosted by Jo Lintzen, we dive into the world of post-quantum cryptography, examining how businesses and industries can prepare for the upcoming quantum revolution. From practical steps to real-world case studies and expert interviews, Shielded is your essential guide to navigating the future of cybersecurity. Subscribe now and stay one step ahead in the quantum era.</description>
      <content:encoded><![CDATA[<div>Shielded: The Last Line of Cyber Defense is handcrafted by our friends over at: <a href="https://www.fame.so/?utm_medium=podcast&amp;utm_source=bcast&amp;utm_campaign=masters-of-community-with-david-spinks?utm_medium=podcast&amp;utm_source=bcast&amp;utm_campaign=fame-client">fame.so</a></div><div><br></div>]]></content:encoded>
      <pubDate>Thu, 06 Mar 2025 13:39:00 +0000</pubDate>
      <author>PQShield</author>
      <enclosure url="https://media.fame.so/86lnn578.mp3" length="4664423" type="audio/mpeg"/>
      <itunes:author>PQShield</itunes:author>
      <itunes:image href="https://content.fameapp.so/uploads/8l18kymq/ab4761f0-fa93-11ef-a7ee-0fb20636f1ea/ab476300-fa93-11ef-967e-d51a1f52da31.png"/>
      <itunes:duration>116</itunes:duration>
      <itunes:summary>Welcome to Shielded: The Last Line of Cyber Defense, the podcast that explores the urgent need for quantum-ready cybersecurity. Hosted by Jo Lintzen, we dive into the world of post-quantum cryptography, examining how businesses and industries can prepare for the upcoming quantum revolution. From practical steps to real-world case studies and expert interviews, Shielded is your essential guide to navigating the future of cybersecurity. Subscribe now and stay one step ahead in the quantum era.</itunes:summary>
      <itunes:subtitle>Welcome to Shielded: The Last Line of Cyber Defense, the podcast that explores the urgent need for quantum-ready cybersecurity. Hosted by Jo Lintzen, we dive into the world of post-quantum cryptography, examining how businesses and industries can prepare for the upcoming quantum revolution. From practical steps to real-world case studies and expert interviews, Shielded is your essential guide to navigating the future of cybersecurity. Subscribe now and stay one step ahead in the quantum era.</itunes:subtitle>
      <itunes:keywords/>
      <itunes:explicit>No</itunes:explicit>
      <googleplay:explicit>No</googleplay:explicit>
    </item>
  </channel>
</rss>
