advertisement

Once a niche concern for IT professionals, crypto agility has evolved into a critical issue that impacts all organizations and employees, from executives to interns.

Crypto agility is everyone’s problem

[Adobe Stock / Syda Productions]

Fast Company Executive Board

The Fast Company Executive Board is a private, fee-based network of influential leaders, experts, executives, and entrepreneurs who share their insights with our audience.

BY Kevin Weiss4 minute read

The era of quantum computing is rapidly approaching, with the number of physical qubits on quantum circuits doubling every one to two years since 2018. Although still in its early stages, quantum computing is gaining momentum.

This doubling trend is expected to continue for at least the next three to five years. During this time, government spending for quantum computing is expected to exceed $10 billion. This inevitable shift to quantum computing is ushering in a new paradigm for cybersecurity.

Once a niche concern for IT professionals, cryptographic agility has evolved into a critical issue that impacts all organizations and employees, from executives to interns.

WHAT IS CRYPTOGRAPHIC AGILITY?

Compass Newsletter logo
Subscribe to the Compass newsletter.Fast Company's trending stories delivered to you daily

Cryptographic agility—or crypto agility—is a design principle in information security that allows systems to quickly adapt to changes in encryption methods without major disruptions. Think of it as a “futureproofing” strategy for data protection.

As cyber threats evolve, particularly with quantum computing, crypto agility helps keep your systems secure. It also makes compliance with changing security regulations and standards easier, and it reduces long-term costs by avoiding major system overhauls.

So, you may be asking yourself, “What does this have to do with me?” The reality is that crypto agility impacts nearly every part of your organization. From emails to encrypted secrets, you’re relying on encryption to keep your organization’s data safe. As quantum computing advances, your current encryption methods are likely to be compromised.

This means the security of your organization’s most important assets could be at risk without proper crypto agility measures in place. Think about the massive outages, data breaches, and financial losses that could materialize once current encryption methods are compromised.

While it may seem like this is years away or something for the experts to figure out, the reality is that this threat has already arrived.

QUANTUM THREATS ARE ALREADY UNDERWAY

Harvest now, decrypt later (HNDL) attacks occur when cybercriminals intercept and store encrypted data today, with the expectation that future quantum computers will have the power to break modern encryption standards. This means emails you send, stored customer data, your intellectual property, and company secrets could all be captured today and decrypted in the future.

To mitigate this threat, it’s critical for organizations to stay vigilant about the encryption methods they use. Adopting quantum-safe encryption technologies and staying informed about advancements in cryptography will be essential to protect data against this evolving risk.

Here are four ways to prepare your organization to safeguard data and operations in the face of quantum computing threats:

1. TAKE A TOP-DOWN APPROACH

The responsibility to invest in risk mitigation rests with those who own the enterprise’s risk: the C-suite and board members. The push for change is unlikely to come from technical teams, as their risk management decisions are often influenced by competing priorities, constrained budgets, and limited resources.

2. TAKE INVENTORY OF YOUR CRYPTOGRAPHIC ASSETS

advertisement

Start by identifying your most sensitive data—your company’s “crown jewels”—that are encrypted in transit using current cryptographic algorithms that are most vulnerable to quantum threats. This will help you identify which digital certificates—the foundation of secure data exchanges—need immediate upgrading to quantum-resistant technologies. This will help ensure no asset is left vulnerable.

Let these insights guide your next steps. This will need to be a cross-functional effort. Many leading enterprises are creating a cryptographic center of excellence to lead the charge. By completing this assessment now, you can not only strengthen your security posture but also reduce the overall costs of transitioning to a post-quantum future.

3. INVEST, UPDATE, DIVERSIFY, AND ALIGN

Implementing crypto agility strategies involves regularly updating and diversifying encryption methods, similar to rotating passwords but on a much larger scale. This can be achieved by adopting flexible security frameworks that enable quick transitions between different encryption algorithms, as well as ensuring a smooth and secure transition and alignment with the latest NIST standards on post-quantum encryption.

A certificate lifecycle management platform, for example, can streamline the detailed inventory and replacement of your digital certificates, making it an indispensable asset in your quantum readiness journey.

4. ESTABLISH A CULTURE OF SECURITY AWARENESS

Make your entire workforce part of the solution. Regular training sessions and clear communication about the risks and implications of quantum computing are essential. These sessions should translate complex concepts into simple terms, using real-world analogies to drive home the importance of preparedness.

Integrating security considerations into all aspects of operations—from product development to customer service—can help encourage employees to report potential vulnerabilities without fear of reprisal.

LOOKING AHEAD

By embracing crypto agility, organizations can both mitigate the potential threats posed by quantum computing and position themselves for long-term success.

In an era where data is the new currency and cybersecurity is a critical concern for businesses of all sizes, the ability to adapt quickly to evolving encryption needs can mean the difference between staying ahead of the curve or falling victim to catastrophic data breaches. Futureproofing your cybersecurity strategy with crypto agility can help safeguard your most valuable assets while maintaining operational efficiency and customer trust.

Don’t wait for the future to arrive—C-level executives and boards should start their crypto agility journey today. Begin by evaluating your current encryption practices, collaborating with your leadership team, and developing a roadmap for quantum-resistant security.

By acting now, you’re not just protecting your organization’s data; you’re also positioning yourself as a leader in the next wave of technological innovation. Make crypto agility a strategic priority and confidently lead your industry into the quantum age.


ABOUT THE AUTHOR

Kevin Weiss has nearly three decades of experience serving in various senior executive positions and is currently the CEO of Sectigo. Read Kevin's Executive Profile here. More


Explore Topics