Superposition, not Superstition

By Johnny Xmas

Elevator Pitch

Quantum computing won’t break encryption overnight. “Superposition Without Superstition” cuts through the hype, explaining why quantum threats are distant, limited in scope, and already being countered with robust solutions. Sleep better with quantum realism.

Description

SUPERPOSITION WITHOUT SUPERSTITION

## Why the foreseeable state of quantum computing is not a nightmare for security practitioners


In this illuminating talk, we’ll cut through the quantum hype to reveal why security professionals can approach quantum computing with informed confidence rather than panic.

While headlines scream about the imminent apocalypse of our cryptographic systems, reality paints a dramatically different picture. This presentation delivers a refreshingly sober analysis of quantum computing’s actual security implications, replacing fear with facts.

Key Insights:

Reality Check on Timelines

The horizon for practical cryptographically relevant quantum computers stretches far beyond sensationalist coverage, likely years or even decades before systems capable of breaking RSA or ECC at a meaningful scale materialize. Even then, these systems will initially be massive research facilities accessible primarily to nation-states, not everyday threat actors.

“Unless you’re a high-priority target for these select few actors with nation-state resources, should quantum computing really keep you up at night?”

Technical Hurdles That Won’t Disappear Overnight

We’ll dissect the substantial challenges quantum computing still faces, comparable to nuclear fusion energy, where “breakthrough announcements” often represent minimal progress in the greater journey. Error correction requirements, qubit coherence limitations, and scaling challenges aren’t merely engineering problems but fundamental physics puzzles requiring revolutionary solutions.

The Quantum Security Advantage

Discover how quantum technologies themselves offer robust security benefits through innovations like Quantum Key Distribution (QKD). Learn how the security community’s decades of preparation have yielded practical post-quantum cryptographic standards and hybrid approaches that organizations can implement today as part of sensible transition strategies.

Beyond the Hype: Practical Preparation

Walk away with actionable insights on how to approach quantum-resistant security planning without overinvesting or underestimating. Learn which threats are real, which are exaggerated, and how to communicate quantum risks accurately to stakeholders and executives.


Join us for a reality-based assessment that replaces quantum superstition with quantum understanding, providing security practitioners with a practical perspective on this fascinating technological frontier.

This session is ideal for CISOs, security architects, and security practitioners who need to separate quantum computing fact from fiction.