Quantum Computing's Impact on Cybersecurity with Bernie Leung

preview_player
Показать описание
Explore the intriguing intersection of quantum computing and cybersecurity... It’s closer than you think.

In this episode, special guest Bernie Leng from Autodesk shares his expert insights on how quantum computing is reshaping the cybersecurity landscape. Discover the challenges and breakthroughs in encryption practices as Bernie breaks down complex concepts like the Shor Algorithm and discusses practical steps for adapting to this new era of cybersecurity.

This discussion is not just theoretical; it's a guide to understanding and preparing for the quantum leap in data protection.

Timestamps
00:00 Intro
00:33 Bernie’s Disclaimer
00:57 Bernie’s background in cybersecurity
02:35 Why do we need encryption?
04:01 Encrypting data and transmission
05:27 The impact of Shor’s algorithm on encryption
06:26 Advancements in technology cracking encryptions
08:00 Schrodinger's cat visualization of quantum
08:53 Why is quantum computing a threat to encryption
09:16 How quantum computing is changing encryption
10:05 Shor’s algorithm breaking TLS encryption
11:31 How long until quantum computing can crack current encryption
13:25 Start taking inventory on post quantum encryption needs now
14:14 Quantum computing solves prime numbers faster than legacy computing
15:50 Shor’s algorithm vs. char 256
17:02 How Shor's algorithm cracking pseudo random numbers
18:21 Strategies for generating random numbers for encryption
19:09 Cloudflare using lava lamps to generate true random numbers
21:41 The intersection of AI and quantum computing
23:19 How long until quantum computing becomes a threat to encryption
25:40 What solutions are being implemented for a post quantum encryption world
25:48 Worldwide standards and solutions in development for post quantum encryption
28:02 Where are experts looking for solutions in the post quantum world?
28:35 Where to find more info on post quantum encryption
29:52 Are we prepared for quantum threats?
31:32 What can we do now to prepare for quantum threats
31:50 Two-factor authentication is important for feature security
32:30 How will quantum computing affect crypto currency?
33:50 Career advice for people interested in post quantum encryption
35:08 Chicago restaurant recommendations
36:01 Outro

// Full Audio Podcast //

// Learn More About IT Audit Labs //
🔗 IT Audit Labs on LinkedIn: /it-audit-labs



This conversation is essential for IT professionals looking to future-proof their cybersecurity strategies against the quantum threat. Join us to gain a deeper understanding of how quantum computing could transform cybersecurity.

#QuantumComputing #FutureOfCybersecurity #Cybersecurity #InfoSec #PostQuantumCryptography
Рекомендации по теме
Комментарии
Автор

Fantastic discussion on post-quantum encryption! The impact of quantum computing on traditional methods is a game-changer. Appreciate the insights on preparing for the future.

AdvantestInc