Workshops Manufacturing Safe Supply Chain Security For...
Manufacturing Full Day Workshop

Quantum-Safe Supply Chain Security for Manufacturers

Manufacturing supply chains depend on TLS-protected ERP integrations, EDI/AS2 message exchanges, and digitally signed firmware provenance records that all use cryptography vulnerable to quantum attack. This workshop maps those dependencies across multi-tier supplier networks and builds PQC migration plans that account for contractual, regulatory, and technical readiness gaps.

Full day (6 hours + Q&A)
In person or online
Max 30 delegates

Proud to recommend our expert members

Qrypto Cyber
Eclypses
Arqit
QuantBond
Krown
Applied Quantum
Quantum Bitcoin
Venari Security
QuStream
BHO Legal
Census
QSP
IDQ
Patero
Entopya
Belden
Atlant3D
Zenith Studio
Qudef
Aries Partners
GQI
Upperside Conferences
Austrade
Arrise Innovations
CyberRST
Triarii Research
QSysteme
WizzWang
DeepTech DAO
Xyberteq
Viavi
Entrust
Qsentinel
Nokia
Gopher Security
Quside
Qrypto Cyber
Eclypses
Arqit
QuantBond
Krown
Applied Quantum
Quantum Bitcoin
Venari Security
QuStream
BHO Legal
Census
QSP
IDQ
Patero
Entopya
Belden
Atlant3D
Zenith Studio
Qudef
Aries Partners
GQI
Upperside Conferences
Austrade
Arrise Innovations
CyberRST
Triarii Research
QSysteme
WizzWang
DeepTech DAO
Xyberteq
Viavi
Entrust
Qsentinel
Nokia
Gopher Security
Quside

Workshop Description

Addresses the quantum threat to supply chain cryptography, including encrypted communications between suppliers, ERP-to-ERP data exchanges, and digital twin integrity. Covers post-quantum cryptography migration priorities specific to manufacturing and industrial OT environments.

Supply chain cryptographic failure is not a single-point risk. When an ERP gateway's TLS session uses RSA-2048 key exchange, every purchase order, invoice, and design file transiting that connection is exposed to harvest-now-decrypt-later capture. When a digital twin synchronises component state over OPC UA with ECDSA P-256 certificates, the integrity of that twin degrades the moment those certificates become quantum-vulnerable. NIS2 Article 21 now explicitly requires supply chain security measures, and the EU Cyber Resilience Act extends product security obligations across the chain. Participants map their own supplier integration cryptography, classify partners by PQC readiness tier, and leave with a phased migration plan covering ERP gateways, SBOM signing infrastructure, and contractual language for embedding cryptographic requirements into supplier agreements.

What participants cover

  • ERP-to-ERP cryptographic exposure mapping across SAP RFC, Oracle B2B Gateway, and EDI/AS2 integrations
  • Digital twin integrity assessment: OPC UA and MQTT broker certificate chains spanning supplier boundaries
  • SBOM and CBOM code-signing migration from RSA/ECDSA to ML-DSA-65 and SLH-DSA
  • NIS2 Article 21 and EU Cyber Resilience Act supply chain due diligence obligations
  • Hybrid TLS 1.3 deployment planning for B2B gateways using ML-KEM-768 + X25519
  • Supplier readiness tiering: classifying partners by cryptographic maturity and negotiating migration timelines

Preliminary Agenda

Full Day Workshop structure with scheduled breaks. Content is configurable to your organisation's technical level and operational environment.

# Session Topics
1 Quantum Threats to Manufacturing Supply Chains Where cryptographic failure breaks the chain of trust
2 Cryptographic Exposure in Supply Chain Integration Protocol-level analysis of B2B data exchange
  • ERP-to-ERP TLS sessions: SAP RFC, Oracle B2B Gateway, and EDI/AS2 key exchange exposure
  • Digital twin synchronisation: OPC UA pub-sub and MQTT broker certificate chains across supplier boundaries
  • SBOM and CBOM integrity: code-signing and hash-based verification for firmware and component provenance
Break, after 50 min
3 Regulatory and Contractual Obligations NIS2, CRA, and supply chain due diligence
  • NIS2 Article 21 supply chain security requirements for essential and important entities
  • EU Cyber Resilience Act: PQC implications for product security across the supply chain
  • Contractual cryptographic requirements: embedding PQC readiness into supplier agreements and SLAs
4 Interactive Demonstration Facilitator-led supply chain cryptographic audit
  • Facilitator-led walkthrough: mapping cryptographic dependencies across a multi-tier supplier network
  • Identifying harvest-now-decrypt-later exposure in EDI transaction archives and design file transfers
  • Assessing digital twin integrity risk when supplier certificate chains use RSA-2048 or ECDSA P-256
Break, after 45 min
5 PQC Migration Strategy for Supply Chain Systems Sequencing migration across internal and supplier-facing infrastructure
  • Hybrid TLS 1.3 deployment for ERP gateways: ML-KEM-768 + X25519 key exchange
  • SBOM signing migration: ML-DSA-65 for firmware provenance and SLH-DSA for long-lived component certificates
  • Supplier readiness tiers: classifying partners by cryptographic maturity and negotiating migration timelines
6 Q&A and Action Planning

Designed and Delivered By

Workshops are designed and delivered by QSECDEF in collaboration with sector specialists. All facilitators have direct experience in both quantum technologies and manufacturing systems.

QD

Quantum Security Defence

Workshop design and delivery

QSECDEF brings world-leading expertise in post-quantum cryptography, quantum computing strategy, and defence-grade security assessment. Our advisory membership spans 600+ organisations and 1,200+ professionals working at the intersection of quantum technologies and critical infrastructure security.

MA

Manufacturing Sector Partners

Domain expertise and operational validation

Manufacturing workshops are co-delivered with sector specialists who bring direct operational experience in manufacturing organisations. This ensures workshop content is grounded in regulatory, operational, and technical realities specific to the sector.

Commission This Workshop

Sessions are configured around your organisation's technical level, operational environment, and regulatory jurisdiction. Get in touch to discuss requirements and schedule a date.

Contact Us