Workshops Cyber Defence PQC Migration Planning and Cryptographic...
Cyber Defence Full Day Workshop

PQC Migration Planning and Cryptographic Inventory

A structured programme for security architects and CISOs who need to move from awareness to execution on post-quantum cryptography. Covers how to build a cryptographic inventory, select algorithms from the NIST FIPS 203/204/205 suite, plan hybrid deployment, and produce a migration roadmap that aligns with CNSA 2.0 timelines and European regulatory requirements.

Full day (6 hours + Q&A)
In person or online
Max 30 delegates

Proud to recommend our expert members

Qrypto Cyber
Eclypses
Arqit
QuantBond
Krown
Applied Quantum
Quantum Bitcoin
Venari Security
QuStream
BHO Legal
Census
QSP
IDQ
Patero
Entopya
Belden
Atlant3D
Zenith Studio
Qudef
Aries Partners
GQI
Upperside Conferences
Austrade
Arrise Innovations
CyberRST
Triarii Research
QSysteme
WizzWang
DeepTech DAO
Xyberteq
Viavi
Entrust
Qsentinel
Nokia
Gopher Security
Quside
Qrypto Cyber
Eclypses
Arqit
QuantBond
Krown
Applied Quantum
Quantum Bitcoin
Venari Security
QuStream
BHO Legal
Census
QSP
IDQ
Patero
Entopya
Belden
Atlant3D
Zenith Studio
Qudef
Aries Partners
GQI
Upperside Conferences
Austrade
Arrise Innovations
CyberRST
Triarii Research
QSysteme
WizzWang
DeepTech DAO
Xyberteq
Viavi
Entrust
Qsentinel
Nokia
Gopher Security
Quside

Workshop Description

Most cyber defence organisations know they need to migrate to post-quantum cryptography. Few have started. The blockers are practical: no complete picture of where classical cryptography sits in the estate, no clear criteria for choosing between ML-KEM, ML-DSA, and SLH-DSA, and no roadmap that accounts for hybrid deployment, regulatory deadlines, and operational constraints like classified network segmentation.

This workshop addresses each blocker directly. Participants build a cryptographic inventory using CBOM (Cryptographic Bill of Materials) methodology, work through algorithm selection for their specific protocol stack, and produce a phased migration roadmap calibrated to CNSA 2.0 milestones and applicable European/national regulatory timelines. The interactive demonstration uses a representative enterprise environment so delegates can see the full discovery-to-roadmap pipeline in action. Every participant leaves with a populated inventory template, a regulatory gap assessment for their jurisdiction, and a prioritised migration plan they can take back to their organisation.

What participants will be able to do

  • Build a cryptographic inventory using automated discovery tools and CBOM methodology, covering network protocols, code dependencies, certificate chains, and key management systems
  • Select appropriate NIST PQC algorithms (ML-KEM, ML-DSA, SLH-DSA) based on security level requirements, performance constraints, and protocol compatibility for their environment
  • Design a hybrid deployment architecture using composite certificates and hybrid TLS to maintain backward compatibility during migration
  • Produce a risk-prioritised migration roadmap aligned with CNSA 2.0 transition timelines and applicable national/European regulatory requirements
  • Assess harvest-now-decrypt-later exposure across their cryptographic estate and prioritise assets by data shelf life and regulatory sensitivity
  • Evaluate FIPS 140-3 validated PQC module availability and integrate procurement planning into the migration timeline

Preliminary Agenda

Full Day Workshop structure with scheduled breaks. Content is configurable to your organisation's technical level, cryptographic estate, and regulatory jurisdiction.

# Session Topics
1 The Quantum Threat to Current Cryptography Why migration is urgent and how to quantify exposure
2 NIST PQC Algorithm Standards FIPS 203, 204, 205, and draft 206: selection criteria for cyber defence
  • ML-KEM (FIPS 203): key encapsulation for classified and unclassified transport
  • ML-DSA (FIPS 204) and SLH-DSA (FIPS 205): digital signature schemes and their performance trade-offs
  • FN-DSA (draft FIPS 206): lattice-based signatures and status update
  • Algorithm selection matrix: security levels, performance overhead, and protocol compatibility
Break, after 50 min
3 Cryptographic Inventory and Discovery Building a complete picture of your cryptographic estate
  • Automated discovery: network protocol scanning, code static analysis, and certificate chain auditing
  • Cryptographic Bill of Materials (CBOM): generating and maintaining an inventory using OWASP methodology
  • Prioritisation: harvest-now-decrypt-later risk, data shelf life, and regulatory exposure scoring
4 Interactive Demonstration Facilitator-led cryptographic inventory and migration pipeline walkthrough
  • Live inventory scan of a representative enterprise environment
  • Risk scoring and migration priority sequencing using CBOM output
  • Mapping inventory results to CNSA 2.0 transition timeline milestones
Break, after 60 min
5 Hybrid Cryptographic Schemes and Transition Architecture Bridging classical and post-quantum cryptography during migration
  • Composite certificates (IETF draft-ounsworth-pq-composite-keys) and dual key agreement
  • Hybrid TLS deployment (IETF draft-ietf-tls-hybrid-design) and backward compatibility
  • FIPS 140-3 validated PQC modules: current availability and procurement considerations
6 Regulatory Landscape and Migration Roadmap Multi-jurisdiction compliance for cyber defence organisations
  • CNSA 2.0 transition timeline and NSM-10 requirements
  • ETSI QSC guidance, NCSC (UK) PQC recommendations, BSI TR-02102, ANSSI position papers
  • NIST CSF 2.0 governance context: integrating PQC migration into existing cybersecurity frameworks
7 Q&A and Action Planning

Designed and Delivered By

Workshops are designed and delivered by QSECDEF in collaboration with sector specialists. All facilitators have direct experience in both quantum technologies and cyber defence systems.

QD

Quantum Security Defence

Workshop design and delivery

QSECDEF brings world-leading expertise in post-quantum cryptography, quantum computing strategy, and defence-grade security assessment. Our advisory membership spans 600+ organisations and 1,200+ professionals working at the intersection of quantum technologies and critical infrastructure security.

CY

Cyber Security Partners

Domain expertise and operational validation

Cyber Defence workshops are co-delivered with sector specialists who bring direct operational experience in cyber defence organisations. This ensures workshop content is grounded in regulatory, operational, and technical realities specific to the sector.

Commission This Workshop

Sessions are configured around your organisation's cryptographic estate, regulatory jurisdiction, and operational constraints. Get in touch to discuss requirements and schedule a date.

Contact Us

Quantum technologies are evolving quickly and new developments emerge regularly. This page was last updated on 15/03/2026. For the most current information about course content and suitability for your organisation, we recommend contacting us directly.