Workshops Minerals & Mining Quantum Threats To Ot Security...
Minerals & Mining Full Day Workshop

Quantum Threats to OT Security in Mining and Extraction Environments

Mining OT networks depend on Modbus TCP, OPC UA, and DNP3 protocols that were designed without cryptographic agility. This workshop maps quantum-era exposure across pit-to-plant control architectures and builds PQC migration plans that account for VSAT backhaul constraints, SIL-rated safety systems, and autonomous equipment fleets.

Full day (6 hours + Q&A)
In person or online
Max 30 delegates

Proud to recommend our expert members

Qrypto Cyber
Eclypses
Arqit
QuantBond
Krown
Applied Quantum
Quantum Bitcoin
Venari Security
QuStream
BHO Legal
Census
QSP
IDQ
Patero
Entopya
Belden
Atlant3D
Zenith Studio
Qudef
Aries Partners
GQI
Upperside Conferences
Austrade
Arrise Innovations
CyberRST
Triarii Research
QSysteme
WizzWang
DeepTech DAO
Xyberteq
Viavi
Entrust
Qsentinel
Nokia
Gopher Security
Quside
Qrypto Cyber
Eclypses
Arqit
QuantBond
Krown
Applied Quantum
Quantum Bitcoin
Venari Security
QuStream
BHO Legal
Census
QSP
IDQ
Patero
Entopya
Belden
Atlant3D
Zenith Studio
Qudef
Aries Partners
GQI
Upperside Conferences
Austrade
Arrise Innovations
CyberRST
Triarii Research
QSysteme
WizzWang
DeepTech DAO
Xyberteq
Viavi
Entrust
Qsentinel
Nokia
Gopher Security
Quside

Workshop Description

Technical workshop for OT security leads, plant managers, and IT/OT integration teams in mining, quarrying, and mineral processing. Covers the cryptographic exposure of SCADA, DCS, and PLCs in mining operations, the specific constraints of remote site OT environments (satellite connectivity, limited compute), and PQC migration approaches aligned with IEC 62443 and ISA/IEC security standards for industrial automation.

Mining OT environments present constraints that generic PQC workshops ignore. PLCs running on 256KB flash cannot accommodate the same algorithms as enterprise servers. VSAT backhaul links to remote sites impose bandwidth and latency constraints on key exchange that rule out certain hybrid approaches. Safety-instrumented systems rated to IEC 61511 require firmware signing workflows that cannot tolerate the verification latency of larger post-quantum signatures. This workshop addresses those realities directly: participants map their own control network cryptography against the IEC 62443 zone/conduit model, assess FIPS 203/204/205 algorithm fit for their specific hardware, and leave with a phased migration plan that sequences PQC rollout from historian connections through to autonomous haulage fleet communications.

What participants cover

  • Protocol-level cryptographic exposure mapping for Modbus TCP, OPC UA, and DNP3 in pit-to-plant architectures
  • FIPS 203/204/205 algorithm benchmarking on resource-constrained PLCs (256KB flash, 64KB RAM targets)
  • IEC 62443 zone and conduit PQC overlay for open-pit, underground, and processing plant networks
  • Harvest-now-decrypt-later risk assessment for historian and telemetry data streams
  • Hybrid key exchange design for OPC UA pub-sub and VSAT/LTE remote site backhaul
  • Vendor PQC roadmap assessment: Rockwell, Siemens, ABB, and Schneider controller firmware timelines

Preliminary Agenda

Full Day Workshop structure with scheduled breaks. Content is configurable to your organisation's technical level and operational environment.

# Session Topics
1 Quantum Threat Landscape for Mining OT Why SCADA, DCS, and PLC cryptography in mining is uniquely exposed
2 Cryptographic Exposure in Mining Control Systems Protocol-level analysis of OT attack surfaces
  • Modbus TCP, OPC UA, and DNP3 cryptographic dependencies in pit-to-plant architectures
  • VSAT and LTE failover links: key exchange exposure on remote site backhaul
  • IEC 62443 zone and conduit model applied to open-pit and underground operations
Break, after 50 min
3 PQC Algorithm Selection for Resource-Constrained OT Matching FIPS 203/204/205 algorithms to mining hardware realities
  • ML-KEM-512 versus ML-KEM-768 on PLCs with 256KB flash and 64KB RAM
  • ML-DSA-44 firmware signing for safety-instrumented systems (SIL-rated controllers)
  • SLH-DSA for long-lived sensor calibration certificates in autonomous haulage fleets
4 Interactive Demonstration Facilitator-led cryptographic audit of a mining OT reference architecture
  • Facilitator-led walkthrough: mapping cryptographic dependencies across a simulated open-pit control network
  • Identifying harvest-now-decrypt-later exposure in historian and telemetry data streams
  • IEC 62443 SL-T gap analysis for a sample zone/conduit model with PQC overlay
Break, after 45 min
5 Migration Planning for Mining OT Environments Sequencing PQC rollout across remote and distributed sites
  • Hybrid key exchange for OPC UA client-server and pub-sub deployments
  • Firmware update logistics for underground mesh networks and autonomous equipment
  • Vendor readiness assessment: Rockwell, Siemens, ABB, and Schneider PQC roadmaps
6 Q&A and Action Planning

Designed and Delivered By

Workshops are designed and delivered by QSECDEF in collaboration with sector specialists. All facilitators have direct experience in both quantum technologies and minerals & mining systems.

QD

Quantum Security Defence

Workshop design and delivery

QSECDEF brings world-leading expertise in post-quantum cryptography, quantum computing strategy, and defence-grade security assessment. Our advisory membership spans 600+ organisations and 1,200+ professionals working at the intersection of quantum technologies and critical infrastructure security.

MI

Mining Sector Partners

Domain expertise and operational validation

Minerals & Mining workshops are co-delivered with sector specialists who bring direct operational experience in minerals & mining organisations. This ensures workshop content is grounded in regulatory, operational, and technical realities specific to the sector.

Commission This Workshop

Sessions are configured around your organisation's technical level, operational environment, and regulatory jurisdiction. Get in touch to discuss requirements and schedule a date.

Contact Us