Join this online group to communicate across IBM product users and experts by sharing advice and best practices with peers and staying up to date regarding product enhancements.
Quantum computing is no longer science fiction—it's a looming reality that threatens to break the cryptographic foundations of today's digital world. Organizations can't afford to wait. "Harvest now, decrypt later" attacks are especially dangerous in sectors where data sensitivity and long-term confidentiality intersect—like telecom, finance, defense, and energy. This session explores the top challenges: lack of cryptographic visibility, outdated encryption, and compliance complexity. Learn how to build a cryptographic inventory, assess vulnerabilities, and deploy tools to protect your data and infrastructure before it's too late.
Speaker:
Jeff Crume is an IBM Distinguished Engineer and Master Inventor. He has a PhD in cybersecurity and serves as an adjunct professor at NC State University where he is also a member of the Computer Science Alumni Hall of Fame. He is the author of “Inside Internet Security: What Hackers Don’t Want You to Know” and his YouTube videos have been viewed more than 15 million times.