Featured
Value in motion Industry edge Engine by Starling: From launching a bank to launching a software business Menu Services Services See all services Alliances Artificial intelligence Audit and assurance services Reinvention Business transformation Consulting Crisis management Deals Economics Family business Forensics Legal business solutions Managed services Private Risk services Strategy Sustainability and climate change Tax Trust Workforce Menu Services See all services Menu Services Alliances Menu Services Artificial intelligence Menu Services Audit and assurance services Accounting advisory Capital markets Corporate reporting Financial audit IFRS Internal audit Next generation audit Risk assurance Sustainability assurance Menu Services Reinvention Menu Services Business transformation Menu Services Consulting Cloud transformation Deals Finance transformation Forensics Front office transformation HR transformation Risk and regulation Strategy Technology Workforce Menu Services Crisis management Menu Services Deals Acquisitions Capital markets Corporate finance Deals strategy Joint ventures and alliances Legal business solutions M&A tax Managed services Performance and restructuring Menu Services Economics Menu Services Family business Menu Services Forensics Menu Services Legal business solutions Employment Entity governance and compliance International business reorganisations Mergers and acquisitions NewLaw Menu Services Managed services Menu Services Private Menu Services Risk services Menu Services Strategy Menu Services Sustainability and climate change Climate risk, resilience and adaptation Energy solutions Impact management Legal and sustainability Net zero transformation Sustainability assurance Sustainable capital Sustainability reporting Tax and sustainability Menu Services Tax Indirect taxes International tax services Mergers and acquisitions Sightline Tax code of conduct Tax controversy and dispute resolution Tax policy and administration Tax transformation Transfer pricing Menu Services Trust Menu Services Workforce Culture, leadership and change Employment law Employment tax and payroll HR transformation and technology Inclusion Organisational design People analytics and insights People in deals Retirement and pensions Reward and benefits Workforce risk Workforce strategyFeatured
Climate risk, resilience and adaptation Business transformation Artificial intelligence Menu Issues Issues See all issues AI, data, and tech Business transformation C-suite insights Climate and sustainability Cybersecurity Megatrends Reinvention Risk and regulation Trust Upskilling Workforce Menu Issues See all issues Menu Issues AI, data, and tech Menu Issues Business transformation Menu Issues C-suite insights Accelerating performance Global CEO Survey PwC at Davos strategy+business digital issue Take on Tomorrow: a strategy+business podcast The Leadership Agenda Menu Issues Climate and sustainability Menu Issues Cybersecurity Menu Issues Megatrends Menu Issues Reinvention Menu Issues Risk and regulation Menu Issues Trust Menu Issues Upskilling Menu Issues WorkforceFeatured
PwC’s 29th Global CEO Survey Value in motion Next Tech Agenda Menu About us About us See more About Us Alumni Analyst relations Asia Pac Client case studies Code of Conduct Corporate sustainability Ethics and compliance Global Annual Review Human rights policy Inclusion Network leadership, governance, and structure Newsroom Office locations Policy and regulation Purpose, values, and behaviours Strategy& Menu About us See more About Us Menu About us Alumni Menu About us Analyst relations Menu About us Asia Pac Menu About us Client case studies Menu About us Code of Conduct Menu About us Corporate sustainability Menu About us Ethics and compliance Menu About us Global Annual Review Menu About us Human rights policy Menu About us Inclusion Menu About us Network leadership, governance, and structure Menu About us Newsroom Menu About us Office locations Menu About us Policy and regulation Menu About us Purpose, values, and behaviours Menu About us Strategy&Featured
Value in motion Global Annual Review 2025 Menu Careers Careers Find out more about careers Search for a job Menu Careers Find out more about careers Menu Careers Search for a jobFeatured
Global Annual Review Purpose, values, and behaviours Loading ResultsNo Match Found
View All ResultsThe Quantum Conundrum:
How to prepare now for Quantum’s challenges and opportunities Insight 4 minute read March 15, 2025 Share Copy Link Link Copied Close The line between science fiction and reality is wearing thin, thanks in large part to how AI has quickly and irrevocably changed the ways in which we work and live. Now with recent advancements in quantum computing, that line may soon become a double-edge sword for business leaders concerned about safeguarding their data. Rob Joyce, PwC US Cyber, Risk & Regulatory Senior Fellow, former Cybersecurity Director, National Security Agency, shares his thoughts on quantum computing. Quantum computers – machines capable of exponential leaps in computational power beyond the “bits” of classical computing – could theoretically break today’s standard encryption methods, putting sensitive business, government, and other private personal data at risk. Yet quantum also promises greater security, using the same principles to confirm that no one can tamper with or intercept cryptographic keys without detection. This is the Quantum Conundrum – a paradox that forces us to balance both quantum’s benefits and risks with a thoughtful and measured approach. The challenge is deciding how to pivot from existing classical computing systems to ones that can stand up to these next-generation capabilities and safeguard sensitive data. With technology innovation moving faster than ever, there’s little time to waste. Businesses should prepare now for data security in a post-quantum world. What is quantum technology? Quantum computers work very differently from the classical computers we use today. Instead of processing information one step at a time, quantum computers can consider many possibilities at once, making them incredibly powerful for certain tasks. Imagine doing a jigsaw puzzle when every piece can be tried in every possible position and orientation simultaneously. This means a quantum computer could potentially solve more complex problems much faster than traditional computers. Although specialists already know how quantum computers could break current encryption, the technology isn't powerful enough – yet. But it’s coming – last December, Google’s 105-qubit (quantum bit) Willow processor performed a computation that the world’s most advanced supercomputer would have needed 10 septillion (10,000,000,000,000,000,000,000,000) years to achieve.Google’s 105-qubit (quantum bit) Willow processor performed a computation that the world’s most advanced supercomputer would have needed 10,000,000,000,000,000,000,000,000 years to achieve.
SourceGoogle Is quantum computing an immediate threat to data security? Quantum opens up exciting possibilities, including faster data analysis, breakthrough research, and more efficient supply chains. But it also sparks legitimate concerns. Many standard cryptographic techniques that protect financial transactions, personal records, and trade secrets could be rendered obsolete by a sufficiently advanced quantum machine. In October 2024, articles emerged claiming “Chinese scientists hack military-grade encryption on a quantum computer.” Spoiler alert: this wasn't quite the quantum computing apocalypse the first articles made it out to be. The researchers worked on a trivial problem with a relative of a quantum computer that isn't capable of running the necessary algorithms to break the encryption we rely upon. While the actual threat was far from substantial and did not represent any immediate danger to current encryption standards, it nevertheless serves as a valuable reminder that quantum’s timeline is unpredictable. Many specialists predict that quantum computers capable of threatening existing encryption could be less than a decade away – however, because data today can be stored and then decrypted in the future, all that cybercriminals need to do is wait until quantum technology catches up. The potential for this kind of “store now, decrypt later” attack is driving a worldwide race to develop and standardize post-quantum algorithms complex enough to withstand quantum decryption attempts. What does the government say about quantum? In May 2022, the White House issued a Presidential Executive Order directing the acceleration of the release of quantum-resistant encryption standards. It also required government departments and agencies to transition to quantum-resistant algorithms by 2035. The US Government ran a public competition to develop new encryption algorithms and set standards that can safeguard against future quantum threats. The next phase is to plan the upgrade path for software and systems to use this new protection. What key steps should I take to prepare? Assess your risk profile The first step on the road to quantum-resistant security is discovery and inventory. Where is public key cryptography used in your enterprise? Who maintains the software that has encryption and authentication routines? This is not just about the encryption that secures communication but also the authentication protocols that secure access to your systems. Quantum computers could also break protections (e.g., digital signatures) that confirm software is trusted and that documents haven't been altered. Talk to your vendors and partners Are they tracking these concerns? Do they have a plan for a transition to quantum resistance? Ask your security vendors, consultants, and industry partners about their specific steps towards quantum resistance. And keep in mind that this is an industry-wide issue. The external ecosystem such as cloud and network providers have skin in the game and should also be dealing with this risk. Budget for the quantum transition You will need to update your software, systems, and services to use quantum-resistant algorithms. Budgeting now can prevent future risks and enable a smoother transition, similar to the successful Y2K preparations. Stay informed and educate your team Encourage your IT and security teams to monitor developments in quantum computing. Share updates across leadership so decisions can be made with the right context. Address your crypto agility This is the ability to update your cryptography as standards emerge and evolve. By embracing crypto agility, systems can remain secure and compliant in the face of advancements in both classical and quantum cryptography. Collaborate and communicate Collaboration between business leaders, policymakers, and cybersecurity specialists is key. Regularly communicate the roadmap to stakeholders so there’s clarity and buy-in when it’s time to transition. Turn the Quantum Conundrum to your advantage The interest in developing quantum computers is real. Corporate private data, such as financial information, personal communications, sensitive business records, defence information, and intellectual property may be threatened by a capable quantum computer. More importantly, the keys to critical infrastructure access are also at risk. Recent nation state intrusions into energy grids, water treatment facilities, and large-scale communications systems demonstrated that the threat will be broad. As with any monumental technology shift, quantum computing demands foresight, adaptability, and collaboration. When we stop thinking of quantum as purely a threat or purely a solution, we can better prioritize investments, start testing post-quantum encryption, and stay close to research developments so we’re better prepared for the post-quantum future. Sources Chinese Scientists Hack Military-Grade Encryption on a Quantum Computer Executive Order on Enhancing the National Quantum Initiative Advisory Committee White House to require post-quantum encryption plans from agencies How we can help Learn more Contact Sean Joyce Email View More Follow us PwC office locations Site map Contact us © 2017 - 2026 PwC. All rights reserved. PwC refers to the PwC network and/or one or more of its member firms, each of which is a separate legal entity. Please see http://pwc.zhutiblog.com/com/structure for further details. This content is for general information purposes only, and should not be used as a substitute for consultation with professional advisors. Legal notices Privacy Cookie policy Legal disclaimer Terms and conditions智能索引记录
-
2026-03-02 13:56:10
综合导航
成功
标题:WTB 92 turbo parts: non cruise throttle cable, cold start switch, black door cups, [Archive] - Toyota MR2 Message Board
简介:Hey guys as stated! please message me with a price shipped t
-
2026-03-02 10:16:18
综合导航
成功
标题:Hotels in the Berlin - Grünau (Berlin) district - book cheaply with HRS
简介:Book hotels with HRS and save up to 50%: Enjoy exclusive ben
-
2026-03-02 14:52:01
综合导航
成功
标题:Authentication service for counterfeit measures Digital Traceability Service PwC Japanグループ
简介:We provide the Digital Traceability Service as a countermeas
-
2026-03-02 15:22:10
图片素材
成功
标题:肚皮的作文 描写肚皮的作文 关于肚皮的作文 素材-作文网
简介:作文网精选关于肚皮的作文,包含肚皮的作文素材,关于肚皮的作文题目,以肚皮为话题的作文大全,作文网原创名师点评,欢迎投稿!
-
2026-03-02 18:57:10
视频影音
成功
标题:林肯郡-全收集满_刺客信条英灵殿视频解说攻略_四主线全支线全收集视频攻略_斗句收集_3DM单机
简介:《刺客信条:英灵殿》视频解说攻略,四主线全支线全收集视频攻略。《刺客信条:英灵殿》神话篇、教团篇、殖民篇、家园建设篇全流
-
2026-03-02 15:47:11
教育培训
成功
标题:Docin.com豆丁网-分享文档 发现价值
简介:豆丁网是面向全球的中文社会化阅读分享平台,拥有商业,教育,研究报告,行业资料,学术论文,认证考试,星座,心理学等数亿实用
-
2026-03-02 18:44:00
综合导航
成功
标题:Marina Bulgarien im Eroscenter Stetten [Archiv] - BW7 Forum
简介:Marina Bulgarien Zimmer 08 http://stuttgart-laufhaus.de//up
-
2026-03-02 10:28:52
图片素材
成功
标题:初二作文200字 初二200字美文 200字优秀作文大全-作文网
简介:作文网优秀初二200字作文大全,包含初二200字作文素材,初二200字作文题目、美文范文,作文网原创名师点评,欢迎投稿!
-
2026-03-02 19:12:57
电商商城
成功
标题:栢丽香郁价钱价格图片精选 - 京东
简介:京东是国内专业的栢丽香郁价钱网上购物商城,本频道提供栢丽香郁价钱商品价格信息,栢丽香郁价钱价格,栢丽香郁价钱图片精选,为
-
2026-03-02 16:10:40
综合导航
成功
标题:146x.com is for sale HugeDomains
简介:Find a domain name today. We make it easy.
-
2026-03-02 12:15:11
综合导航
成功
标题:凉森玲梦的个人资料 - xb1
简介:凉森玲梦的个人资料 - xb1
-
2026-03-02 19:02:02
数码科技
成功
标题:不服来战破解版免广告方法最新章节_不服来战破解版免广告方法全文免费阅读_恋上你看书网
简介:曲熙然被主角炮灰后,因极度不甘而释放出的强大精神力激活了手机中的隐藏晶片终端选中,从此便走上了逆转剧情赚取生存积分的道路
-
2026-03-02 16:09:14
综合导航
成功
标题:Must-watch items next week: US CPI data may be absent for the first time; Binance Alpha lists JCT and ALLO (November 10- Bee Network
简介:Key Highlights for Next Week November 10 CBOE plans to lau
-
2026-03-02 10:05:58
综合导航
成功
标题:Honor Pad 10
简介:Default Description
-
2026-03-02 11:55:50
综合导航
成功
标题:曝《刺客信条:女巫》内部口碑爆表 员工抢着参与开发_3DM单机
简介:最近《刺客信条:女巫》(Assassin’s Creed Codename Hexe)创意总监克林特·霍金(ClintH
-
2026-03-02 11:58:04
教育培训
成功
标题:小学作文300字
简介:在日常的学习、工作、生活中,大家一定都接触过作文吧,根据写作命题的特点,作文可以分为命题作文和非命题作文。怎么写作文才能
-
2026-03-02 14:03:28
游戏娱乐
成功
标题:神殿祖玛,神殿祖玛小游戏,4399小游戏 www.4399.com
简介:神殿祖玛在线玩,神殿祖玛下载, 神殿祖玛攻略秘籍.更多神殿祖玛游戏尽在4399小游戏,好玩记得告诉你的朋友哦!
-
2026-03-02 12:10:32
综合导航
成功
标题:法律图书馆:法律法规数据库 法律论文 法律图书,法律门户网站
简介:法律图书馆_法律门户网站,提供法律法规数据库、法学论文、裁判文书、律师黄页、法治动态、司法考试资料、法律图书、法律书刊、
-
2026-03-02 10:06:45
综合导航
成功
标题:鬼校亡友第一季免费观看最新章节_第四十四章 孽缘下第1页_鬼校亡友第一季免费观看免费阅读_恋上你看书网
简介:第四十四章 孽缘下第1页_鬼校亡友第一季免费观看_罗马假日_恋上你看书网
-
2026-03-02 15:47:34
教育培训
成功
标题:【推荐】《年》的作文500字锦集五篇
简介:在日常学习、工作抑或是生活中,大家都写过作文,肯定对各类作文都很熟悉吧,借助作文人们可以实现文化交流的目的。那么问题来了
-
2026-03-02 19:19:46
综合导航
成功
标题:Schaeffler Germany
简介:Schaeffler has been driving forward groundbreaking invention
-
2026-03-02 18:55:35
综合导航
成功
标题:Click Beheaded - Play The Free Mobile Game Online
简介:Click Beheaded - click to play online. As a ninja, now you h
-
2026-03-02 10:29:46
综合导航
成功
标题:Lantum. World English Historical Dictionary
简介:Lantum. World English Historical Dictionary
-
2026-03-02 18:53:51
图片素材
成功
标题:公主被杀死的图片最新章节_第286章 冰语碾压九易之战第1页_公主被杀死的图片免费阅读_恋上你看书网
简介:第286章 冰语碾压九易之战第1页_公主被杀死的图片_大贼_恋上你看书网
-
2026-03-02 12:59:27
综合导航
成功
标题:Professional Print Shop Sign Company Marketing Services PIP Ocala, FL. - PIP
简介:PIP Ocala, 11 SW. 1st Avenue One stop resource for custom
-
2026-03-02 12:03:21
教育培训
成功
标题:(推荐)《最美》作文400字4篇
简介:在学习、工作、生活中,大家一定都接触过作文吧,借助作文可以提高我们的语言组织能力。你写作文时总是无从下笔?以下是小编整理
-
2026-03-02 10:32:06
综合导航
成功
标题:ç°¿å°çæ¼é³_ç°¿å°çææ_ç°¿å°çç¹ä½_è¯ç»ç½
简介:è¯ç»ç½ç°¿å°é¢é,ä»ç»ç°¿å°,ç°¿å°çæ¼é³,ç°¿å°æ¯
-
2026-03-02 16:01:48
数码科技
成功
标题:5o8.com-正在西部数码(www.west.cn)进行交易
简介:5o8.com,
-
2026-03-02 10:23:54
新闻资讯
成功
标题:杀戮尖塔_杀戮尖塔中文版下载,MOD,修改器,攻略,汉化补丁_3DM游戏网
简介:3DM杀戮尖塔游戏专区提供了杀戮尖塔中文版下载以及国内外第一手游戏资讯,详细的流程攻略,专业的汉化补丁,完善的修改器和超
-
2026-03-02 10:26:07
综合导航
成功
标题:Fisher Investments Wealth Management
简介:Founded in 1979, Fisher Investments is an independent regist