Overcoming Challenges in Quantum Readiness: ISARA Webinar Recap

Feeling overwhelmed about where to start with quantum readiness? You’re not alone. According to ISACA, 55% of organizations have not taken any steps to prepare for the arrival of quantum computers — even though most organizations are worried that quantum will break today's encryption and create new business risks.

In our experience with numerous CISOs and security leaders, a core reason for this lack of quantum preparedness is that launching a Quantum Readiness Program can be a real challenge. The good news? You don’t need to boil the ocean to begin. You can start today with small, meaningful actions which solidly put you on the path to quantum readiness. The smartest starting point? Cryptographic posture management.

This is what we addressed in our recent webinar: "Overcoming Challenges in Quantum Readiness: Practical Strategies for CISOs".

Hosted by ISARA’s Vijay Viswanathan, VP, Product & GTM; Rob Williams, Director, Technical Strategy; and Philip Lafrance, Standards Manager, the conversation centered on one key strategy security leaders can enact today.

Why Start with Cryptographic Posture Management?

At the most basic level, there are two questions organizations need to answer before they can become quantum ready: When do we act? And how do we act?

To answer when, you need to understand things like how long it will take to perform your quantum-readiness actions and how long you have available to do so. To answer how, you need to know the steps required for each action and an estimate of the resources needed to perform them.

Cryptographic posture management is the key to answering these questions. 

Quantum threats may still feel a few years away — but the cryptographic risks they pose are already here. And they’re growing. That’s why prioritizing crypto posture is the foundation for quantum readiness. Think of crypto posture management as your compass. It’s a continuous process that includes:

  • Inventory – What cryptography are you using? Where does it live?
  • Assessment – What are the risks tied to it?
  • Prioritization – What needs to be addressed first?

This approach gives you a way to start small, act, and build momentum — often using tools and processes you already have in place. This approach also offers flexibility in how risks are remediated. For example, do we mitigate with a simple configuration change? Or migrate the asset to use quantum-safe cryptography?

The Challenges: Cryptography is Everywhere

Cryptographic risk isn’t confined to one system or owned by one team. It’s scattered across your networks, clouds, data centers, and applications — many of which are managed in silos. This fragmentation makes it hard to see the full picture.

Since no one person or department "owns" cryptography, cryptographic posture management helps connect the dots, breaking through organizational silos to create a unified, contextual view of crypto risk.

Context is Everything

Discovery is just the beginning. Context is what makes it meaningful. Ask yourself:

  • Is that legacy TLS configuration protecting PII?
  • Is that outdated crypto library part of a mission-critical application?
  • Are your backups encrypted with algorithms vulnerable to quantum attacks?

Prioritization hinges on understanding where crypto risk intersects with real business impact.

Make Progress Measurable

Show your team and leadership real progress by tracking:

  • Number of systems using quantum-vulnerable algorithms
  • Critical apps with crypto dependencies identified
  • Month-over-month reduction in high-risk crypto exposure

The key is treating quantum readiness like a real, ongoing program, not a one-time project. These KPIs help you show real progress — to your team, your leadership, and your board.

Start Where You Are and Leverage What You Have

Quantum readiness can and should evolve in step with the rest of your cybersecurity program.

Cryptographic risk isn't theoretical, it's measurable, actionable, and already mapped to regulatory and business outcomes. Starting your quantum readiness journey now, with a small inventory or visibility effort, can make a meaningful difference.

Remember: you're not alone in this challenge. Most security leaders are grappling with the same questions. We're here to help you navigate this critical transition.

Ready to Take the Next Step?

In case you missed the webinar, "Overcoming Challenges in Quantum Readiness: Practical Strategies for CISOs," watch the recording here.

Do you have questions? Reach out to jim.sortino@isara.com

Come see as at the Gartner Security & Risk Management Summit, June 9-11, 2025. Swing by our Booth 1239!