
CXOTalk Cybersecurity and Quantum Computing: A Readiness Guide (with Palo Alto Networks) | CXOTalk #904
Jan 6, 2026
Anand Oswal, Executive Vice President of Network Security at Palo Alto Networks, dives into the critical intersection of cybersecurity and quantum computing. He reveals how nations are harvesting encrypted data now, anticipating the rise of quantum computers. Key timelines for algorithm deprecation, the urgency of enterprise migration, and the potential business risks from delayed response are highlighted. Anand outlines a three-pillar strategy for quantum readiness—Discover, Protect, Accelerate—and emphasizes the essential role of AI and immediate action for business leaders.
AI Snips
Chapters
Transcript
Episode notes
Quantum Breaks Core Cryptography
- Public key cryptography underpins most digital trust systems and relies on hard math problems like factoring large primes.
- Quantum computers will make those problems easy and thus break today's RSA and ECC-based protections.
AI Speeds Quantum Timelines
- The convergence of AI and quantum research is accelerating the arrival of cryptographically relevant quantum computers.
- Analysts estimate such machines could be capable of breaking current encryption by the end of this decade.
Timelines And Harvest-Now Risk
- Migration timelines for enterprise cryptography typically span 5–10 years, making the quantum deadline urgent.
- Adversaries are already harvesting encrypted data now for future decryption when quantum arrives.
