Quantum computing won’t just disrupt encryption. It will quietly invalidate today’s identity trust model. Attackers are already collecting encrypted identity data with the expectation that quantum systems will break it later.
This session challenges a dangerous assumption: that identity cryptography is “someone else’s problem.” We’ll explain why RSA and elliptic-curve algorithms underpinning SSO, certificates, tokens and machine identities will fail, what post-quantum alternatives actually exist, and why waiting for vendors is the riskiest option.
This talk isn’t about math. It’s about timing, responsibility, and trust. If identity teams don’t start inventorying cryptographic dependencies and planning transitions now, they’ll inherit tomorrow’s breach even years after the data was stolen.