As quantum computing advances, traditional cryptographic systems face increasing vulnerabilities. How can we govern the transition to quantum safe digital infrastructures? This course provides a comprehensive introduction to the challenges and solutions for governance of the transition to quantum-safe digital infrastructures. Participants will be equipped with the knowledge and tools needed to navigate the transition toward secure digital infrastructures.
Participants will explore the fundamental principles of quantum computing and its implications for cryptographic security. The course addresses the key governance challenges posed by quantum threats, including the fragmentation of stakeholders, societal risks, and the lack of clear transition frameworks. Through a blend of theoretical insights and practical applications, learners will develop strategies to safeguard data in a post-quantum world.
A core focus of this course is the development of robust policies and institutional frameworks to manage the transition. Participants will engage with solution-driven approaches, including:
- A societal risk assessment model to evaluate quantum-related threats.
- A set of governance mechanisms to coordinate stakeholders effectively.
- A stages-of-growth model to guide organizations through the quantum-safe transformation.
Designed for cybersecurity professionals, policymakers, and technology leaders, this course offers critical insights into quantum resilience, ensuring learners are prepared to lead the shift to quantum-safe cryptographic standards.
Additionally, this course draws from cutting-edge research conducted in the Netherlands through HAPKIDO (Hybrid Approach for quantum-safe Public Key Infrastructure Development for Organizations). This five-year initiative is dedicated to developing a structured roadmap for transitioning to quantum-safe Public Key Infrastructures (PKIs). Inspired by the Korean martial art Hapkido, which blends long-range and close-range techniques for adaptability, the project mirrors this philosophy in developing secure cryptographic infrastructures.