Quantum computing is an emerging technology that can give data analysts — and hackers — unprecedented power.
Quantum computing uses special hardware and software to amplify computational power. Much of the progress around quantum computing is currently in the realm of research, but recent developments and breakthroughs indicate that quantum computers will soon help find solutions that were not accessible to classical computers.
“If a classical computer needs to find a solution like the path out of a maze, it will try every solution sequentially,” explained Grant Thornton Risk Advisory Managing Director Vikrant Rai. “Our current classical computers take one path at a time — but a quantum computer can try multiple solutions at the same time.” This can create an exponential advantage for analyzing data in fields like healthcare research and financial market modeling, but it can also help decrypt data and launch cyberattacks.
The power of quantum computing is on track to break the most common cybersecurity encryption in the next few years, and there’s reason to take action now.
“Over the next three to five years, quantum computing is going to compromise traditional cryptography,” said Grant Thornton Risk Advisory Manager Alex Hinkebein. Rai added, “Quantum technology has been incubating for years. It's not new. However, with recent breakthroughs, it is no longer a hypothesis that it will compromise cryptography within five years. It is a reality.”
“Quantum computing will compromise traditional cybersecurity. We can no longer assume that data is protected if it is encrypted,” Rai said. He noted that many predict the asymmetric encryption used for most software and internet communications will be unsafe by 2029 and fully breakable by 2034.
This threat drove the National Institute of Standards and Technology (NIST) to issue new encryption standards that are designed to withstand quantum computer attacks. NIST encourages system administrators to “begin transitioning to the new standards as soon as possible” because the threat to data security is actually already happening.
Harvest now decrypt later (HNDL)
Today, many business and government systems rely on encryption to ensure the privacy and security of the data they store or send, including passwords and personal data. However, some governmental and non-governmental organizations are already gathering all the encrypted data they can, with a “harvest now decrypt later” (HNDL) mindset. They plan to try to extract insights and value from the data in three to five years, when quantum computing enables its decryption.
Right now, they’re harvesting data for “Q-day.”
Q-day, PQC and quantum resilience
“Q-day is the day when quantum computers will break through encryption and render traditional security applications useless, unless they have adopted a strategy of post-quantum cryptography and newer encryption standards,” Rai said.
Post-quantum cryptography (PQC) is a set of algorithms designed to be secure against both classical and quantum computing attacks. Organizations need to replace existing asymmetric encryption with PQC, deprecating methodologies and processes that rely on classical encryption. This requires a shift in business processes as well as technology, and it is part of a larger quantum resilience strategy. A quantum resilience strategy needs to address quantum computing risks across the business and technology aspects of an organization’s governance model, compliance with potential laws and regulations, alignment with know-your-data requirements, and comprehensive data protection. It also needs to track the deadlines to get it all done.
NIST and other industry-leading standards provide guidelines for quantum resilience, with most built on a foundation of data hygiene. “In the existing standards, a lot of the strategies relate to identifying the metadata behind the crypto database,” Rai said. It is important to know your data and understand the answers to the question like, “What datasets need to be recognized? What kind of encryption algorithms are currently being used? How do you prioritize and perform lifeboat exercises for data? What PQC transition plans that need to be put in place?”
“A lot of these concepts were considered in 2022 to 2024,” Rai said. Many organizations have started to address quantum resilience but do not yet have a comprehensive strategy in place. Some have not begun. “If you're just hearing about the concept of Q-day readiness, and data becoming vulnerable to decryption in the next three to five years, you need to start your planning right now.”
What to do now
Right now, many organizations need to ensure that they’ve addressed the pressing priorities of data security and regulatory compliance:
- Data security: Organizations must identify whether they have data (including system access credentials) only protected by classical encryption methods like Rivest-Shamir-Adleman (RSA) and Elliptic Curve Cryptography (ECC). If so, that data is at risk of being harvested now for decryption later. These organizations should immediately employ additional security measures to ensure classical encryption is never the only means of data protection. Organizations with unique data dependencies also need to consider the potential risks associated with cyberattacks that may target third parties, governmental databases or others in their data infrastructure.
- Regulatory compliance: National and regional governments have begun reviewing their critical infrastructure and data protection for quantum readiness, so organizations need to review the standards that have been published and design solutions that align with likely enforcement.
“Governance and regulatory bodies are preparing post-quantum security standards, so work with legal and compliance to really understand where you need to be in the next three to 10 years, and update policies appropriately,” Hinkebein said. “The most significant step that companies can take is defining their data protection strategies. As we understand the laws and regulations, look to define your data strategy in terms of a roadmap to where you want to be.”
Rai and Hinkebein led a recent webinar about quantum resilience, where most respondents indicated that they had not formed a quantum resilience strategy.
Quantum resilience strategy
To achieve long-term quantum resilience, organizations need to research, develop and test quantum resilience strategies that dynamically identify and manage their operational risks. “A quantum resilience strategy will require you to think through governance models and look at laws and regulations,” Rai said. “Then, take steps to protect your data — know your data and apply the appropriate encryption mechanisms that are quantum safe. This can take some time.”
- Research
Governments and regulatory bodies like NIST, the International Organization for Standardization and the European Union are developing and publishing post-quantum security standards (like NIST FIPS 203, 204 and 205). “In 2015, NIST began selecting standards and standardizing quantum-resistant algorithms,” Rai said. “These were converted into standards. Three of them are aligned with Q-safe algorithms and, as part of the quantum resilience strategy, we need to consider where to apply Q-safe algorithms to datasets that need to be protected against the quantum computing risks of the future.” As organizations analyze post-quantum standards, they should consider how the standards apply to their unique data, business processes and third-party dependencies.
- Development
Evaluate and enhance encryption policies, purge obsolete data and adopt new encryption methods:- Establish any required deadlines for meeting quantum readiness standards and requirements, along with mechanisms to track progress.
- If needed, perform an updated assessment and index of your data architecture to identify data protection priorities and responsibilities.
- Identify third-party suppliers and vendors that can possibly handle sensitive data. Ensure that any current or future loss of sensitive data (even if encrypted) will be reported to address HNDL.
- Purge any unnecessary or expired data to reduce risk areas.
- Build an inventory of your data encryption methods to create a cryptographic metadata database.
- Assess the encryption policies and governance within your organization and its data supply chain, replacing classical cryptography with PQC.
- Enhance any other data protection strategies to make them quantum-safe (Q-safe) by employing security that goes beyond classical encryption.
- Ensure that any application development processes will use and apply Q-safe methods moving forward.
- Testing
Review revised encryption controls, policies and algorithms:- Apply technical testing for PQC and Q-safe algorithms.
- Enforce PQC encryption policies and regulatory compliance for sensitive data.
- Perform lifeboat testing exercises for data, including functional, dynamic, static and dynamic testing.
“Organizations need to develop a testing plan to really understand the true nature of the resilience in place,” Hinkebein said. “Look at conducting penetration testing exercises, for example, leveraging models that can bypass the current encryption mechanisms to highlight vulnerabilities,” Rai said.
“Then, make plans to develop or transition to PQC,” Hinkebein said. “There are algorithms available. A PQC transition plan is something that can help review current data architecture to prevent digital signature compromise and help mitigate vulnerabilities.”
Q-safe resiliency also comes from an organization’s broader cybersecurity strategy. “Think about improving ownership of risks and controls. If you haven't considered zero-trust strategies, start considering those,” Rai said. Zero trust strategies do not “trust” any users or devices, requiring verification for every access request by using multifactor authentication, single access codes or passwords and biometric confirmations. Many systems have already moved to these models.
“We need to think about building quantum resilience across systems,” Rai said. “Do a threat modeling exercise and apply the inventory of data, as well as the inventory of all your encryption and data protection mechanisms. A lot of these efforts can be time-consuming and may have dependencies. This work requires us to look at strategies more closely. Analyzing datasets, encryption mechanisms, layered defense and zero-trust architectures will play a critical role in addressing quantum risks. We can expect to have software, hardware and hybrid systems that might require a significant overhaul.”
As organizations work to ensure enterprise-wide quantum resilience, internal audit teams can play an essential role.
The role of internal audit
“Internal audit's role is going to be critical in this,” Rai said. “Internal audit has the ability to look at controls from an independent perspective — sometimes even a broader perspective — so it’s able to connect the dots in ways that other functions might not.”
Areas of focus
For internal audit, the areas of focus include the particular domains that could be impacted by quantum computing. Auditors can begin by checking factors across primary areas:
- Encryption governance
- Evaluate the policies and procedures for encryption methods.
- Review the current encryption metadata database and application of Q-Safe algorithms (like NIST FIPS 203, 204, 205).
- What data does the organization have, and what is encrypted?
- Is data encrypted in a way that would be protected against current and future threats?
- Is the organization tracking encrypted data that may be at risk in the future?
- Is the organization employing any necessary PQC transition plans?
- Data protection controls
- Ensure that management reviews and oversees data protection controls, including policies, procedures, risk-based planning for data inventory, data classification, security controls, backup, storage and encryption requirements.
- Ensure compliance with all relevant standards and regulations, along with legal, contractual and statutory requirements.
- Ensure risk-based corrective action planning and risk remediation.
- Establish fully defined and operationally tested controls with technical testing methods.
- Data security and management
- Evaluate the organization’s data inventory, classification, storage and flow documentation, including the data processed, stored or transmitted.
- Establish data ownership, stewardship and location for all relevant protected data.
- Identify data protection controls during storage and transmission, along with data access, reversal, rectification, deletion, disclosure, use limitation, retention and disclosure.
- Do current policies identify and protect long-life sensitive data, like personally identifiable information, intellectual property, financial records and trade secrets?
- Are retention policies aligned with emerging cryptographic risks?
- Application security
- Ensure secure application design and development, including assessment of code, logic and secure coding practices.
- Assess API security and key management, including key generation, revocation, restoration and destruction.
- Ensure application security testing with vulnerability management, vulnerability scanning, risk remediation, safe coding and encryption methods.
- Identity and access management
- Assess policies and procedures for identity and access management, including identity inventory and password policies.
- Evaluate how access levels are managed, stored and reviewed in line with segregation of duties, least privilege and access provisioning standards.
- Evaluate the organization’s access change reviews, management of privileged access reviews and entitlement reviews.
- Assess safeguards for access logs, authentication, password management and authorization mechanisms.
- Third-party and supply chain risks
- Review third-party contracts policies, procedures, roles and responsibilities.
- Are vendors assessed for quantum readiness and encryption resilience?
- Are contracts updated to require future-proof encryption measures?
- Evaluate network security issues, including threat identification, current vulnerabilities, operating system management and patch management.
- Evaluate data storage with third parties, load balancers and security for containers, virtualization and platforms.
- Review third-party contracts policies, procedures, roles and responsibilities.
Internal auditors need to work with multiple enterprise teams as they look across the spectrum of issues for data protection controls, encryption standards, access logs, application security, data inventory and data classification, including data that is hosted or managed by third parties.
“One priority is to talk with teams about PQC transition plans,” Hinkebein said. “As you understand more about your environment of data, have they thought through post-quantum cryptography? Are there plans to transition methodologies, as needed, to protect data?”
These assessments and discussions can lead to clear guidelines that help the organization take the necessary actions for quantum resilience.
Actions for quantum resilience
The internal audit team’s independence and objectivity can play a critical role in evaluating and sharing insights into the organization’s quantum resilience. The team can present a clear evaluation of the strategy’s operating effectiveness, identify improvement strategies driven by leading practices and provide transparency to executive management. This can be especially important if an organization needs to make large changes quickly to achieve quantum resilience.
“Internal Audit bears a level of responsibility to provide transparency to upper management and the board, understanding lessons learned and working with management to identify root causes, and provide guidance with leading practices to manage risks within the organization,” Rai said.
Internal audit is uniquely positioned to:
- Assess the operating effectiveness of technical controls for Q-day readiness with PQC and Q-safe controls.
- Assess the cryptographic inventory and plans to transition to PQC.
- Analyze root causes and behaviors behind any issues.
- Evaluate areas of improvement and communicate these to management and the board.
- Understand, collect and communicate lessons learned.
- Collaborate with business leaders and management to identify leading practices that fit the organization.
- Stay informed about the developments in quantum computing to help inform a proactive risk management strategy.
- Monitor the evolving regulatory landscape for quantum computing to help inform a proactive compliance strategy.
- Present prevention strategies that can be considered to address potential future events.
“An important area of responsibility is to understand the operating effectiveness of technical controls and whether the organization is ready for Q-day,” Rai said. To help improve preparedness and foster quantum resilience, internal audit teams can recommend risk-mitigating actions for business leaders. Some leading practices include:
- Governance and policy
- Establish governance frameworks and policies to manage the transition to Q-safe algorithms and QPC
- Define risk management strategies, set guidelines for cryptographic agility and ensure compliance with emerging standards.
- Cryptographic exposure and remediation
- Identify vulnerabilities within the cryptographic infrastructure.
- Prioritize migration to PQC encryption, changing how data is encrypted and decrypted.
- Comprehensive roadmap
- Build a comprehensive roadmap for internal updates and contractual mechanisms to ensure vendors meet the updated standards.
- Develop a transition strategy to mitigate future risks.
Future evolution
Quantum resilience must ultimately find a place in every organization’s strategy for managing risks — especially as technology risks continue to grow. “Cybersecurity risks are here to stay, and they're going to increase in terms of scope,” Hinkebein said. “As we pair innovation with AI models, more data is developed and stored in our environment. When we store more data in our environment, we need to make sure that we protect it, understand the data privacy implications around it and refine a strategy to address that.”
Rai agreed, noting that these issues will become more complex as companies move from quantum-resilient security to quantum-enabled solutions. “The volume and nature of data created is going to be exponential — and phenomenally challenging to manage. As quantum computers are developed, there will be robust integration with AI, robotics and other tool sets at organizations.”
The future of many organizations could be defined by their quantum computing resilience and capabilities. “The power of today’s compute resources, combined with the technology of quantum computing, is going to significantly shift the balance of power between those that are prepared and advanced in their technology adoption and those that are not,” Rai said. “If you're in the business of financial services, you need to start thinking about transaction information. If you're in manufacturing, you need to think about the intellectual property and critical processes that you need to protect. If you're in research and innovation, you need to think about your research data.”
“Most organizations should have either started planning or already be in the transition phase,” Rai said. “If you're not, now is the time to act.”
Content disclaimer
This Grant Thornton Advisors LLC content provides information and comments on current issues and developments. It is not a comprehensive analysis of the subject matter covered. It is not, and should not be construed as, accounting, legal, tax, or professional advice provided by Grant Thornton Advisors LLC. All relevant facts and circumstances, including the pertinent authoritative literature, need to be considered to arrive at conclusions that comply with matters addressed in this content.
Grant Thornton Advisors LLC and its subsidiary entities are not licensed CPA firms.
For additional information on topics covered in this content, contact a Grant Thornton Advisors LLC professional.
Trending topics

No Results Found. Please search again using different keywords and/or filters.
Share with your network
Share