

Preparing for the Quantum Leap: Securing Against Quantum Threats

Speakers

John Buselli is an Offering Manager with IBM Quantum, leading IBM’s Quantum Safe Program to help governments, and global enterprises prepare for and execute migrations to post‑quantum cryptography. He frequently advises on crypto‑agility, quantum‑safe architectures, and cryptographic governance, and is a regular speaker on quantum‑safe security at industry conferences worldwide.
John Buselli
Global Offering Manager
IBM Quantum Safe Research

James McGugan is Chief Architect, Quantum Safe Tools at IBM, responsible for the end-to-end architecture of IBM’s quantum-safe portfolio, including capabilities for cryptographic inventory, CBOM generation, risk analytics, and automated remediation patterns. He has worked in quantum-safe security since 2020, leading multiple product development efforts and partnering with major financial institutions, critical infrastructure operators, and public-sector organizations to design and implement practical migration roadmaps to post-quantum cryptography.
James McGugan
Chief Architect – Quantum Safe
IBM Data & AI Group
Objective
-
Explore the quantum threat to current encryption systems and why transitioning to quantum-safe cryptography is critical for future security.
-
Examine the state of post-quantum algorithms and various regulatory advances promoting the adoption of these new technologies.
-
Provide information to help explain the key challenges and migration strategies involved in implementing quantum-safe solutions.
Agenda/Topic
John Buselli
(5 mins)
Introduction
-
Welcome, objectives and context for SVCC
John Buselli
(45 mins)
Strategic Context - Quantum Computing & Regulatory Landscape
Covers the quantum threat landscape, regulatory requirements, critical timeline milestones, and business impact assessment:
-
Quantum threat and Cryptographic Relevant Quantum Computing (CRQC) reality
-
Regulatory and standards pressure
-
Global Post Quantum Cryptography (PQC) migration timelines
-
Business and risk impact framing
James McGugan
(80 min)
Technical Deep Dive
Focus on NIST PQC algorithms, hybrid cryptography strategies, cryptographic inventory methodology, and Cryptographic Bill of Material (CBOM) development:
-
Threat model and standards landscape.
-
NIST PQC status, algorithm families, and expected deployment patterns.
-
Patterns for crypto inventory across applications, protocols, and data stores.
-
CBOM concepts, scanner approaches, and lessons from large environments. (w/demonstration).
-
Designing quantum-safe architectures and controls/Reference architectures for crypto‑agility
-
Integration patterns with HSMs, KMS, and existing PKI.
James McGugan
(30 min)
Strategic Context - Quantum Computing & Regulatory Landscape
Covers the quantum threat landscape, regulatory requirements, critical timeline milestones, and business impact assessment:
-
Quantum threat and Cryptographic Relevant Quantum Computing (CRQC) reality
-
Regulatory and standards pressure
-
Global Post Quantum Cryptography (PQC) migration timelines
-
Business and risk impact framing
All
(10 min)
Questions & Answers
-
Closing remarks