top of page

Preparing for the Quantum Leap: Securing Against Quantum Threats

Quantum Tutorial.png

Speakers

John Buselli is an Offering Manager with IBM Quantum, leading IBM’s Quantum Safe Program to help governments, and global enterprises prepare for and execute migrations to post‑quantum cryptography. He frequently advises on crypto‑agility, quantum‑safe architectures, and cryptographic governance, and is a regular speaker on quantum‑safe security at industry conferences worldwide.

John Buselli

Global Offering Manager

IBM Quantum Safe Research

 

Screenshot 2026-03-18 at 8.37.11 PM.png
James McGugan.jpg

James McGugan is Chief Architect, Quantum Safe Tools at IBM, responsible for the end-to-end architecture of IBM’s quantum-safe portfolio, including capabilities for cryptographic inventory, CBOM generation, risk analytics, and automated remediation patterns. He has worked in quantum-safe security since 2020, leading multiple product development efforts and partnering with major financial institutions, critical infrastructure operators, and public-sector organizations to design and implement practical migration roadmaps to post-quantum cryptography.

James McGugan

Chief Architect – Quantum Safe

IBM Data & AI Group

Screenshot 2026-03-18 at 8.37.11 PM.png

Objective

  1. Explore the quantum threat to current encryption systems and why transitioning to quantum-safe cryptography is critical for future security.

  2. Examine the state of post-quantum algorithms and various regulatory advances promoting the adoption of these new technologies.

  3. Provide information to help explain the key challenges and migration strategies involved in implementing quantum-safe solutions.

Agenda/Topic

John Buselli

(5 mins)

Introduction

  • Welcome, objectives and context for SVCC

John Buselli

(45 mins)

Strategic Context - Quantum Computing & Regulatory Landscape

Covers the quantum threat landscape, regulatory requirements, critical timeline milestones, and business impact assessment:

  • Quantum threat and Cryptographic Relevant Quantum Computing (CRQC) reality 

  • Regulatory and standards pressure 

  • Global Post Quantum Cryptography (PQC) migration timelines 

  • Business and risk impact framing 

James McGugan

(80 min)

Technical Deep Dive

Focus on NIST PQC algorithms, hybrid cryptography strategies, cryptographic inventory methodology, and Cryptographic Bill of Material (CBOM) development:

  • Threat model and standards landscape.

  • NIST PQC status, algorithm families, and expected deployment patterns. 

  • Patterns for crypto inventory across applications, protocols, and data stores. 

  • CBOM concepts, scanner approaches, and lessons from large environments. (w/demonstration).

  • Designing quantum-safe architectures and controls/Reference architectures for crypto‑agility

  • Integration patterns with HSMs, KMS, and existing PKI. 

James McGugan

(30 min)

Strategic Context - Quantum Computing & Regulatory Landscape

Covers the quantum threat landscape, regulatory requirements, critical timeline milestones, and business impact assessment:

  • Quantum threat and Cryptographic Relevant Quantum Computing (CRQC) reality 

  • Regulatory and standards pressure 

  • Global Post Quantum Cryptography (PQC) migration timelines 

  • Business and risk impact framing 

All

(10 min)

Questions & Answers

  • Closing remarks

CONTACT US

event.manager AT svcsi.org

SUBSCRIBE FOR ALL SVCC-2026 UPDATES

QUESTIONS? 

LEAVE US A MESSAGE:

Thanks for submitting!

© All Copyrights @ SVCSI

SVCSI is a 501(c)(3) non-profit organization (Public Charity).

bottom of page