• About Me Card

Max Hemingway

~ Musings as I work through life, career and everything.

Max Hemingway

Tag Archives: quantum-computing

Preparing for Post Quantum Security: Key EA Strategies

29 Thursday Jan 2026

Posted by Max Hemingway in Enterprise Architecture, Quantum, Security

≈ Leave a comment

Tags

Enterprise Architecture, Quantum, quantum-computing, Security

As we begin 2026, its only 2 years until the first key milestone highlighted in the NCSC (National Cyber Security Centre) “Timelines for migration to post-quantum cryptography(PQC)”. Quantum computers have the potential to crack widely used cryptographic algorithms, threatening the confidentiality and integrity of critical data. Enterprise Architecture (EA) can play a pivotal role in enabling organisations to prepare for and adopt post-quantum security measures.

Key Milestones

As highlighted in the report the key milestones are:

  • By 2028: Define migration goals, conduct a full discovery exercise, and build an initial migration plan.
  • By 2031: Carry out early, high-priority PQC migration activities and refine the migration plan.
  • By 2035: Complete the migration to PQC for all systems, services, and products.

The Role of Enterprise Architecture

Enterprise Architecture provides a holistic framework for aligning IT strategy with business objectives. By mapping out systems, processes and data flows, EA enables organisations to identify vulnerabilities and plan for robust security solutions. When it comes to post-quantum security, EA serves as the blueprint for integrating new cryptographic standards across the enterprise.

Key Ways EA Facilitates Post Quantum Security

The Open Group Architecture Framework (TOGAF) provides a comprehensive methodology for developing, managing, and governing enterprise architecture and I have used this below to show where it adds value.

  • Strategic Planning: EA helps assess the current cryptographic landscape and develop a roadmap for migrating to PQC resistant solutions. This includes prioritising systems and data that are most at risk. TOGAF’s Preliminary and Architecture Vision phases guide in establishing the architectural capability and defining high-level aspirations. EA enables a thorough assessment of existing cryptographic assets and sets the direction for a quantum-resistant roadmap. This phase can be used to prioritise critical systems and data, aligning security goals with business objectives and stakeholder needs.
  • Standardisation: By enforcing architectural standards, EA ensures consistency in the adoption of post quantum algorithms across different platforms and departments. TOGAF’s core architecture domains (Business, Application, Data and Technology) provide a structured approach for enforcing architectural standards. EA ensures that post quantum algorithms are consistently adopted across platforms and the business, promoting interoperability and compliance. Standardisation is achieved through reference models, common principles and governance structures defined in these domains.
  • Risk Management: EA supports comprehensive risk assessments, enabling an understanding of the potential impact of quantum threats and allows them to be addressed proactively. TOGAF incorporates continuous requirements management and robust governance processes. EA, in alignment with these practices, supports in conducting comprehensive risk assessments to understand quantum threats, evaluate their impact and proactively implement mitigating controls. Regular reviews and compliance checks ensure risks are managed throughout the architecture lifecycle.
  • Change Management: Transitioning to post-quantum security requires significant organisational change. EA facilitates this by coordinating stakeholders, processes, and technologies to ensure smooth implementation. TOGAF’s Implementation Governance and Migration Planning phases are vital for orchestrating organisational change. EA coordinates stakeholder engagement, process redesign and technology upgrades, facilitating a smooth transition to PQC. Formal change management ensures all parties are informed, prepared and equipped to adapt to new protocols and standards.
  • Future-Proofing: EA promotes adaptability, ensuring that the architecture can evolve as PQC standards mature and new threats emerge. TOGAF emphasises continuous improvement and adaptability through its Opportunities and Solutions and Architecture Change Management phases. EA leverages these to monitor the evolution of post quantum standards and emerging threats, updating architectures as needed. This ensures the enterprise remains resilient and can quickly respond to new challenges, maintaining a robust security posture over time.

Steps for Enterprises to Take Now

  1. Begin by inventorying all systems and data that rely on cryptography.
  2. Engage with industry standards bodies and stay informed on PQC developments.
  3. Update the Enterprise Architecture to reflect quantum security requirements and plan for phased adoption.
  4. Train technical teams and stakeholders on the implications of quantum threats and the need for new security protocols.

Further Reading

Key Steps for a Successful Migration to Post-Quantum Cryptography

Share this:

  • Share on Facebook (Opens in new window) Facebook
  • Share on LinkedIn (Opens in new window) LinkedIn
  • Email a link to a friend (Opens in new window) Email
  • Share on Pinterest (Opens in new window) Pinterest
  • Share on Reddit (Opens in new window) Reddit
  • Share on X (Opens in new window) X
  • Share on Tumblr (Opens in new window) Tumblr
  • Share on Pocket (Opens in new window) Pocket
  • Share on Telegram (Opens in new window) Telegram
  • Share on Threads (Opens in new window) Threads
  • Share on WhatsApp (Opens in new window) WhatsApp
  • Share on Mastodon (Opens in new window) Mastodon
  • Share on Bluesky (Opens in new window) Bluesky
  • Share on Nextdoor (Opens in new window) Nextdoor
Like Loading...

Key Steps for a Successful Migration to Post-Quantum Cryptography

20 Thursday Mar 2025

Posted by Max Hemingway in Quantum, Security

≈ 1 Comment

Tags

AI, cybersecurity, Innovation, Quantum, quantum-computing, Security, technology

With quantum computing progressing, transitioning to post-quantum cryptography (PQC) is crucial. Quantum computers threaten current cryptographic systems by efficiently solving complex mathematical problems used in asymmetric Public Key Cryptography (PKC).

Post-Quantum Cryptography (PQC), or quantum-resistant cryptography, develops algorithms secure against quantum computer attacks, which uses problems quantum computers can’t solve efficiently.

The NCSC (National Cyber Security Centre) has released the “Timelines for migration to post-quantum cryptography” today (20/03/25), detailing steps organisations need to take to protect against Post Quantum Cryptography (PQC).

The national migration to PQC is a major technological shift that will take years and it is important that organisations start now. The NCSC provides guidance on early-stage migration activities and sets timelines for UK industry, government, and regulators. These timelines apply to all organisations, especially large ones, critical infrastructure operators, and those with custom IT systems.

Key Milestones

As highlighted in the report the key milestones are:

  • By 2028: Define migration goals, conduct a full discovery exercise, and build an initial migration plan.
  • By 2031: Carry out early, high-priority PQC migration activities and refine the migration plan.
  • By 2035: Complete the migration to PQC for all systems, services, and products.

Migration Strategy Selection

Organisations have several options for migration detailed in the report.

  • In-place migration: Replacing vulnerable PKC components with PQC equivalents.
  • Re-platform: Switching to a new or upgraded platform that supports PQC.
  • Retire the service: Setting a future date for withdrawal.
  • Tolerate the risk: Continuing to operate without mitigation.

What to do next?

The report highlights a series of steps you should take next with an expectation of 2-3 years timeline to migrate to PQC.

Given the intricacies involved in PQC migration, looking at external help should be considered through a company/consultancy with expertise in cryptographic assessments and migration strategies. They can provide invaluable support in several key areas:

  1. Comprehensive Assessment: Conducting a detailed discovery and assessment of your current cryptographic infrastructure, identifying vulnerabilities and dependencies that need to be addressed.
  2. Tailored Migration Plan: Develop a customised migration plan that aligns with your organisation’s specific needs and regulatory requirements. This plan will include timelines, resource allocation, and risk management strategies.
  3. Expert Recommendations: Leveraging deep knowledge of cryptographic technologies, can recommend the most suitable PQC algorithms and protocols for your systems. Provide guidance on integrating these new technologies without disrupting your existing operations.
  4. Ongoing Support: Throughout the migration process, offering continuous support, ensuring that your transition to PQC is seamless and that any issues are promptly addressed.

Are you considering PQC migration yet?

Further Reading

NCSC Report: Timelines for migration to post-quantum cryptography

Share this:

  • Share on Facebook (Opens in new window) Facebook
  • Share on LinkedIn (Opens in new window) LinkedIn
  • Email a link to a friend (Opens in new window) Email
  • Share on Pinterest (Opens in new window) Pinterest
  • Share on Reddit (Opens in new window) Reddit
  • Share on X (Opens in new window) X
  • Share on Tumblr (Opens in new window) Tumblr
  • Share on Pocket (Opens in new window) Pocket
  • Share on Telegram (Opens in new window) Telegram
  • Share on Threads (Opens in new window) Threads
  • Share on WhatsApp (Opens in new window) WhatsApp
  • Share on Mastodon (Opens in new window) Mastodon
  • Share on Bluesky (Opens in new window) Bluesky
  • Share on Nextdoor (Opens in new window) Nextdoor
Like Loading...

Follow Me on LinkedIn

www.linkedin.com – Click to Follow 

RSS Feed

RSS Feed RSS - Posts

Other Publications I contribute to

https://sparrowhawkbushcraft.com/

Recent Posts

  • Preparing for Post Quantum Security: Key EA Strategies
  • Graceful Speech & Timeless Tales: The Complete Series Index
  • Graceful Speech & Timeless Tales: Unlocking the Power of Tone
  • Why Boards Overlook Enterprise Architecture
  • Graceful Speech & Timeless Tales: The Elements of Elocution

Categories

  • 21st Century Human
  • 3D Printing
  • AI
  • Applications
  • ArchiMate
  • Architecture
  • Arduino
  • Automation
  • BCS
  • Big Data
  • Certification
  • Climate Change
  • Cloud
  • Cobotics
  • Connected Home
  • Data
  • Data Fellowship
  • Data Science
  • Development
  • DevOps/OpsDev
  • Digital
  • DigitalFit
  • Drone
  • Enterprise Architecture
  • F-TAG
  • Governance
  • Health
  • Innovation
  • IoT
  • Machine Learning
  • Metaverse
  • Micro:Bit
  • Mindset
  • Mobiles
  • Networks
  • Open Source
  • Podcasts
  • Productivity
  • Programming
  • Quantum
  • Raspberry Pi
  • Robotics
  • Scouting
  • Scouts
  • Security
  • Smart Home
  • Social Media
  • Space
  • STEM
  • Story Telling
  • Technologists Toolkit
  • Tools
  • Uncategorized
  • Wearable Tech
  • Windows
  • xR

Archives

Reading Shelf

Archives

Recent Posts

  • Preparing for Post Quantum Security: Key EA Strategies
  • Graceful Speech & Timeless Tales: The Complete Series Index
  • Graceful Speech & Timeless Tales: Unlocking the Power of Tone
  • Why Boards Overlook Enterprise Architecture
  • Graceful Speech & Timeless Tales: The Elements of Elocution

Top Posts & Pages

  • Preparing for Post Quantum Security: Key EA Strategies
  • Why Boards Overlook Enterprise Architecture
  • Data Fellowship - BCS Level 4 Diploma in Data Analysis Concepts
  • 2026 PKMS Updates: Boost Productivity and Knowledge Retention
  • Manual tasks of today should be the Automated tasks of tomorrow
  • Graceful Speech & Timeless Tales: The Complete Series Index
  • Moving to a Smart Meter
  • About Me Card
  • 10 Books I'd send to my younger self
  • Logical and Creative Thinking

Category Cloud

21st Century Human Architecture Automation Big Data Cloud Data Data Science Development DevOps/OpsDev Digital DigitalFit Enterprise Architecture Innovation IoT Machine Learning Mindset Open Source Podcasts Productivity Programming Raspberry Pi Robotics Security Social Media STEM Story Telling Technologists Toolkit Tools Uncategorized Wearable Tech

Tags

3D Printing 21st Century Human AI Applications Architecture artificial-intelligence Automation BCS Big Data Blockchain business Certification Cloud Cobot Cobotics Coding Communication Connected Home CPD creativity cybersecurity Data Data Fellowship Data Science Delivery Development DevOps Digital DigitalFit Digital Human Drone Email Enterprise Architecture GTD Infographic Information Theory Innovation IoT Journal Knowledge learning Machine Learning Metaverse MicroLearning Mindset Mixed Reality Networks Open Source OpsDev PKMS Podcasts Productivity Programming Proving It Quantum quantum-computing R RaspberryPI Robot Robotics Scouts Security Smart Home Social Media STEM Story Telling Technologists Toolkit technology Technology Couch Podcast Thinking Tools Visualisation Voice Wearable Tech xR

License

Creative Commons Licence
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

Meta

  • Create account
  • Log in
  • Entries feed
  • Comments feed
  • WordPress.com

Blog at WordPress.com.

  • Subscribe Subscribed
    • Max Hemingway
    • Join 82 other subscribers
    • Already have a WordPress.com account? Log in now.
    • Max Hemingway
    • Subscribe Subscribed
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar
%d