Cybersecurity Snapshot: Experts Issue Best Practices for Migrating to Post-Quantum Cryptography and for Improving Orgs’ Cyber Culture

Check out a new roadmap for adopting quantum-resistant cryptography. Plus, find out how your company can create a better cybersecurity environment. In addition, MITRE warns about protecting critical infrastructure from cyber war. And get the latest on exposure response strategies and on CISO compensation and job satisfaction.

Dive into five things that are top of mind for the week ending June 6.

1 – Group releases roadmap for adopting post-quantum cryptography

Is your organization looking for guidance on how to carry out its migration to post-quantum cryptography (PQC)? A group that includes MITRE, Microsoft and IBM just released a roadmap designed to help organizations plan and execute their adoption of PQC.

Titled “Post-Quantum Cryptography (PQC) Migration Roadmap,” the 20-page document from the “Post Quantum Cryptography Coalition” breaks down PQC migrations into four major stages:

  • Preparation, which includes identifying the transition’s main goals, assigning a project leader and identifying key stakeholders
  • Baseline understanding, which includes a comprehensive inventory of the data and assets to be protected, as well as determining required resources and budgets
  • Planning and execution, which includes collaboration with internal and external partners to either acquire or develop the necessary tools for the migration
  • Monitoring and evaluation, which includes establishing metrics for tracking the project’s progress and for reassessing cryptographic security, based on the evolution of quantum capabilities
     

Diagram of a post-quantum cryptography adoption roadmap

“This roadmap empowers CIOs and CISOs to act decisively, taking proactive steps to protect sensitive data now and in the future,” Wen Masters, MITRE’s VP of cyber technologies, said in a statement. 

Transitioning to PQC, also known as quantum-resistant cryptography, is a complex process that’s expected to take the typical en

[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.

This article has been indexed from Security Boulevard

Read the original article: