Workshop Description
Most incident response playbooks assume that cryptographic primitives hold. A quantum-enabled adversary breaks that assumption. When RSA and ECDH key agreement can be broken, the failure mode is not a single compromised key but a potential cascade: every key hierarchy built on those algorithms is exposed simultaneously. CA signing keys, VPN tunnel authentication, database encryption key wrapping, and code signing certificates all become vulnerable in the same event window.
This session addresses the specific incident response challenges that quantum cryptanalysis creates. Participants work through two scenario types: pre-CRQC incidents (detecting harvest-now-decrypt-later collection activity and responding to it as a current threat) and post-CRQC incidents (responding to mass cryptographic compromise after a quantum computer breaks deployed key agreement algorithms). The session covers detection indicators for each scenario, triage decision trees that distinguish classical from quantum-enabled compromise, and playbook design for key revocation at scale, CA trust chain reconstruction, and hybrid PQC deployment failure handling. Participants leave with a tabletop exercise framework they can run within their own organisations to test quantum incident response readiness.
What participants cover
- Quantum-era breach scenarios: how cryptographic compromise creates cascading failures across key hierarchies, certificate authorities, and encrypted data stores
- Pre-CRQC detection: indicators of harvest-now-decrypt-later collection activity including anomalous data exfiltration patterns and targeting of key exchange metadata
- Post-CRQC triage: distinguishing classical cryptographic failures from quantum-enabled compromise and escalation criteria for CISO and board notification
- Key revocation at scale: emergency rotation procedures for HSMs, cloud KMS, and certificate authorities with time-to-revoke estimates per architecture type
- CA compromise response: OCSP/CRL scaling, trust chain reconstruction, and cross-signed certificate fallback procedures
- Business continuity updates: revised RTOs for re-encryption, regulatory notification requirements (GDPR, NIS2), and a tabletop exercise framework for quantum IR testing