Get ahead of the threat posed by quantum with Q-SLICE and QUANTA
Cryptographic Agility
Establish policies for the lifecycle management of cryptographic assets, incorporating migration plans to PQC algorithms.
Information Security Governance
Establish, maintain, and enforce information security policies aligned with ISO 27001, CIS18, NIST CSF and post-quantum considerations.
Secure data encryption
Encrypt sensitive data using current best practices while planning for migration to quantum-safe encryption standards.
Incident Response Plan with Quantum Breach Scenarios
Update IRP to include response procedures for quantum-related cryptographic breaches and data exposure.
Jeremy Green developer of Q-SLICE and QUANTA as part of his PhD in computer science. Is also a skilled and experienced security professional with more than 20 certifications across platform, security and DevSecOps including CISSP, CISM, CEH, ECDE and CHFI. He is also an official instructor for ISACA and EC Council and the author of Information Security Management Principles, fourth edition and Security Architecture A practical guide to designing proactive and resilient cyber protection published by BCS.
Author
Jeremy is also the author of BCS Information Security Management Principles Fourth Edition and Security Architecture: A practical guide to designing proactive and resilient cyber protection.
Instructor
Jeremy is an instructor for CompTIA, ISC2, ISACA and EC Council with twenty certifications. He also teachers Ethical Hacking and Digital Forensics on a Foundation Degree and holds a Cert Ed and QTLS.
Security Architect
Jeremy is a security architect supporting the security design and implementation of a large project for Leidos. Undertaking threat modelling, design assessment and stakeholder engagement.
Many organisations will be slow to recognise or respond to the threat posed by quantum computing, particularly in relation to its potential to break classical cryptographic systems. Some of this is due to quantum computing still being widely perceived as an abstract, long-term concern rather than an immediate operational risk.