- Así es el orquestador de agentes de Adobe: personalización a escala para impulsar la creatividad
- Cisco Welcomes Chuck Graham as Chief Supply Chain Officer
- Cisco’s Partner Innovation Challenge Returns Bigger Than Ever
- How AI changes your multicloud network architecture
- PCI SSC Launches New PIN Listing Program
Preparing for the Quantum Future: Insights from the NCSC’s PQC Migration Roadmap

A new era of inconceivably fast quantum machines is not far away, with computers almost ready to completely transform the way we solve problems, communicate, and compute. However, this transformation is not all positive, and the cybersecurity industry fears that functional quantum computers will be able to break even the strongest encryption we have today, rendering today’s security infrastructure obsolete.
Looking back, most public-key algorithms rely on mathematical problems that are easy to solve in one direction but extremely hard to solve in the other. Think of it like mixing two paint colors to create a new shade—it’s easy to combine blue and yellow to get green but nearly impossible to separate them back into their original shades.
This principle underpins the RSA public key algorithm, which has been in widespread use since 1977. To break these cryptographic systems, everyday computers would have to solve multiple, incredibly complex mathematical problems, but their current algorithms are too slow—the numbers used in encryption are so large that even the most powerful traditional computers would take millions of years to crack them.
Why Quantum Computing Requires Cryptographic Change
Unfortunately, bad actors are already thinking ahead and pilfering and storing encrypted data in the hope of decrypting it once quantum computing has reached that level. This strategy, called “harvest now, decrypt later,” means those who delay post-quantum cryptography (PQC) planning are already putting their corporate, financial, and government data in danger.
To prevent delay, entities need to think about quantum-safe encryption to address quantum risks. They need to become “crypto agile” or able to quickly switch cryptographic methods in response to new threats, which will allow them to pivot as quantum-resistant encryption standards are developed and adopted globally.
However, implementing PQC can be thought of as replacing the foundation of a skyscraper while people are still working inside. Every piece of support must be reinforced or rebuilt without compromising the building’s integrity. While the process is complex and onerous and requires careful planning, failing to make the transition could cause the entire building to topple.
Key Points from the NCSC’s PQC Migration Roadmap
With the urgency of the quantum issue top of mind, the UK’s National Cyber Security Centre (NCSC) introduced a Post-Quantum Cryptography (PQC) Migration Roadmap—or framework that lays out a structured approach for organizations to transition to quantum-safe encryption. It consists of five key phases:
Preparation: Know where your information is stored— if you don’t know where your sensitive data is, you won’t know where to start. Firms need to understand how and where cryptography is used within their systems, too. Pinpointing cryptographic dependencies and potential vulnerabilities is the only way to mitigate them.
Assessment: Next, they should conduct a thorough inventory of their cryptographic assets and put sensitive data first, particularly proprietary, sensitive, or long-lived data (data that need to be kept secure for many years).
Planning: A migration strategy that outlines when and how PQC will be implemented must be developed, is also key, and must bear in mind that these plans should align with emerging (and current) global standards.
Execution: As post-quantum cryptographic standards are released (for instance, the set of encryption principles recently introduced by NIST), they must be integrated into security frameworks. Also, legacy encryption methods should be gradually and carefully phased out.
Ongoing Management: Implementing PQC isn’t a one-off exercise; it must be continually evaluated to see that it keeps up with technological change, which is why regular audits and monitoring are essential.
Laying a solid foundation for PQC will help businesses protect their proprietary data, customer information, and operational integrity.
The Implications for Organizations
The transition to PQC will have operational and regulatory implications, particularly in sectors that handle highly sensitive information.
Critical Sectors Must Act Early
Businesses in critical services such as finance, healthcare, government, and defense must start migration planning now to avoid disruption later. This is particularly important, as regulatory watchdogs are eyeing quantum risks and could mandate PQC adoption, giving early adopters a strategic advantage.
PQC Readiness Supports Compliance and Business Continuity
Guaranteeing data security in a post-quantum world is not only about cybersecurity, but regulatory compliance and maintaining business continuity, too. Legal liabilities, which can run into seven or eight figures, are a key consideration, as is the potential loss of customer trust. Those who proactively implement PQC will limit their risk exposure and avoid the penalties and legal woes of non-compliance.
Leadership Should Assign Responsibility
Successful PQC migration cannot happen without executive buy-in. The board will inevitably ask whether these technologies reduce risk and what their return on investment will be. CISOs and IT security leaders need to communicate that the cost of implementing PQC will pale in comparison to the cost of a data breach. Leaders must also build teams charged with managing cryptographic transitions so that a structured approach is followed.
Consider Supply Chain and Third-Party Dependencies
Given how interconnected every business is today, the wider ecosystem of vendors, third-party partners, and cloud providers must be factored in. Many third-party systems rely on cryptographic protocols, and a coordinated approach will prevent vulnerabilities that could affect the entire supply chain from being exploited. If all stakeholders in the supply chain are aligned in their PQC migration efforts, maintaining security and operational integrity will be much easier.
How Fortra Can Help
The transition to PQC is not just a technical upgrade; it is a strategic investment in the future security of your business and its success and longevity.
As organizations deal with the complexities of PQC migration, Fortra provides the tools and expertise needed to streamline the transition.
Cryptographic Asset and Risk Management
Fortra has the tools to help businesses identify their cryptographic dependencies and assesses potential vulnerabilities and threats to their data. Through cryptographic risk management, firms gain visibility into their encryption landscape which helps them develop robust migration plans.
Supporting Crypto Agility with Scalable Solutions
Fortra offers solutions designed to enhance crypto agility so they can seamlessly transition to new encryption standards while maintaining security and operating efficiently.
Ensuring Compliance and Security in a Quantum World
With regulatory requirements evolving, Fortra’s compliance-driven approach helps organizations understand what it takes to operate compliantly within a range of different industries while preparing for the quantum future. Having a well-thought-out PQC migration roadmap helps businesses mitigate risks and ensure long-term data protection.
Take the Next Step Toward Quantum Security
The transition to post-quantum cryptography is not a matter of if but when, and businesses who start planning now will be in a better position to maintain compliance, stay ahead of evolving threats, and protect their data and their bottom line.
Contact Fortra today to assess your cryptographic readiness and explore solutions that will future-proof your security strategy.