Consulting / Cyber Defence

Quantum Education Workshops for Cyber Defence Teams

Post-quantum cryptography is not a future concern. Adversaries are collecting encrypted traffic now. Six practitioner-led sessions for CISOs, security architects, and cyber defence teams who need to act before the timeline closes.

Proud to recommend our expert members

Qrypto Cyber
Eclypses
Arqit
QuantBond
Krown
Applied Quantum
Quantum Bitcoin
Venari Security
QuStream
BHO Legal
Census
QSP
IDQ
Patero
Entopya
Belden
Atlant3D
Zenith Studio
Qudef
Aries Partners
GQI
Upperside Conferences
Austrade
Arrise Innovations
CyberRST
Triarii Research
QSysteme
WizzWang
DeepTech DAO
Xyberteq
Viavi
Entrust
Qsentinel
Nokia
Gopher Security
Quside
Qrypto Cyber
Eclypses
Arqit
QuantBond
Krown
Applied Quantum
Quantum Bitcoin
Venari Security
QuStream
BHO Legal
Census
QSP
IDQ
Patero
Entopya
Belden
Atlant3D
Zenith Studio
Qudef
Aries Partners
GQI
Upperside Conferences
Austrade
Arrise Innovations
CyberRST
Triarii Research
QSysteme
WizzWang
DeepTech DAO
Xyberteq
Viavi
Entrust
Qsentinel
Nokia
Gopher Security
Quside

Built for Security Practitioners

Cryptographic vulnerabilities introduced today will persist for years. Legacy systems, long-lived credentials, and data retained for regulatory purposes all face exposure windows that extend beyond the expected arrival of cryptographically relevant quantum computers.

All sessions are delivered by practitioners with direct experience in enterprise cryptography programmes and critical infrastructure protection. Content is configured to your team's technical level and current cryptographic exposure.

4 Use-case sessions
2 Deep-dive briefings
20% Member discount

Quantum Use-Case Workshops

Four structured sessions covering the highest-impact quantum security applications for cyber defence teams. Each session combines technical depth with practical implementation guidance.

01
PQC Migration Planning and Cryptographic Inventory workshop

PQC Migration Planning and Cryptographic Inventory

A structured programme for security architects and CISOs leading post-quantum cryptography migrations. Covers how to build a cryptographic inventory across enterprise systems, prioritise assets by risk exposure, and produce a roadmap that aligns with NIST PQC standards and regulatory timelines.

02
Quantum-Safe Network Architecture workshop

Quantum-Safe Network Architecture

Network security teams learn how to redesign perimeter and internal architectures for the quantum era. Covers TLS 1.3 hybrid modes, quantum-safe VPN configurations, certificate lifecycle management under PQC, and the practical engineering steps to retrofit existing infrastructure.

03
QRNG and QKD for Cyber Defence Applications workshop

QRNG and QKD for Cyber Defence Applications

Covers the operational and technical case for quantum random number generation and quantum key distribution in defence and critical infrastructure contexts. Examines vendor landscape, deployment models, and where these technologies add genuine security value versus where software-based PQC is sufficient.

04
Harvest-Now-Decrypt-Later Risk Assessment workshop

Harvest-Now-Decrypt-Later Risk Assessment

Addresses one of the most immediate quantum threats: adversaries collecting encrypted data today for decryption once cryptographically relevant quantum computers exist. Covers data classification, retention risk scoring, and practical mitigations including forward secrecy and early PQC adoption.

Deep-Dive Sessions

Advanced sessions for security architects and operations leads. These sessions go beyond foundational coverage to examine threat modelling methodology, incident response playbooks, and board communication in depth.

Quantum Threat Modelling for Enterprise Security workshop

Quantum Threat Modelling for Enterprise Security

Security architects and red team leads In person or online

Practical threat modelling methodology for security teams assessing quantum-era risk. Covers cryptanalytic timelines, attack surface analysis, and how to integrate quantum threat vectors into existing STRIDE and PASTA frameworks. Includes a board communication module for escalating quantum risk.

Learn More
Quantum Incident Response and Recovery Planning workshop

Quantum Incident Response and Recovery Planning

Security operations and incident response teams In person or online

Prepares security operations and incident response teams for quantum-era breach scenarios. Covers detection of cryptographic compromise, playbook design for PQC-related failures, key revocation at scale, and how to update business continuity plans for a post-quantum threat environment.

Learn More

Choose Your Membership

All tiers include access to the full lecture archive, weekly webinars, and the member directory.

Individual

$149 lifetime

For professionals working in quantum computing, post-quantum cryptography, or adjacent security fields.

  • Access to 100+ hours of expert lectures and recordings
  • Weekly Tuesday webinar attendance (live and replay)
  • Member directory listing with professional profile
  • Private security briefings and member-only events
  • Networking across 40+ countries and 600+ organisations
  • Professional certification pathways
  • Newsletter and research updates
Join as Individual
Most Popular

Company

$499 /year

For organisations building, deploying, or evaluating quantum-safe solutions across their supply chain.

  • Everything in Individual membership
  • Up to 10 named professional members
  • Organisation listing in the member directory
  • Priority access to project consortia and partnerships
  • Quarterly strategic briefings on quantum readiness
  • Discounted rates for in-house workshops
  • Logo placement on the QSECDEF member network
Join as Company

Expert

$4,950 /year

For recognised specialists contributing lectures, advisory work, or research to the QSECDEF community.

  • Everything in Company membership
  • Speaker slot at the annual Paris Symposium
  • Expert profile page with lecture archive
  • Advisory board nomination eligibility
  • Direct introductions to government and enterprise clients
  • Co-branded research publication opportunities
  • Priority listing in the expert directory
Apply as Expert

Book a Cyber Defence Workshop

Sessions are configured around your team's technical level and current cryptographic exposure. Get in touch to discuss requirements and schedule a date.