Quantum Reckoning: Cyber Security At A Tipping Point

As quantum computing technology rapidly advances, its potential to disrupt cybersecurity is starting to pose a real danger in information technology. By utilizing Shor’s algorithm, quantum computers could compromise widely used public key cryptographic systems such as RSA, DSA, and ECC, while Grover’s algorithm threatens to undermine symmetric encryption. Although large-scale quantum computers are still years away, the security implications are already clear. Threat actors are increasingly employing “Harvest Now, Decrypt Later” (HNDL) techniques to exfiltrate encrypted data with the intention of decrypting it once quantum capabilities mature. This poses a substantial threat to long-term data security, trust in contracts, and regulatory stability, especially in critical industries like healthcare, defense, banking, finance, and vital infrastructure.

This presentation emphasizes the early indicators of quantum disruption for organizations and addresses the critical necessity for proactive strategies. It explores the initiatives of the National Institute of Standards and Technology (NIST) in standardizing post-quantum cryptography (PQC) and highlights the significance of cryptographic agility in assessing vendors. We will also divulge key strategies for quantum computing precautions such as developing cryptographic asset inventories, transitioning to hybrid cryptographic systems, and deploying post-quantum algorithms are becoming essential components of a robust enterprise security strategy.

As adversaries deploy quantum weapons, executive management and security professionals must shift from reactive defense to proactive cryptographic resilience. Companies that delay quantum readiness expose their most sensitive data to significant risks, both now and in the future. The advantage in cybersecurity will belong to those who adapt swiftly in this evolving frontier, transforming cryptography from a passive defense into a powerful tool for foresight and resilience.

Felissa Mariz Marasigan – EY GDS (CS) Philippines, Inc.

Felissa Mariz Marasigan is a Cybersecurity Consultant with 7 years of professional experience across multiple domains, including reverse engineering, malware analysis, and cybersecurity incident response. Beginning her career in technical malware analysis, she developed a strong foundation in understanding and dissecting malicious code, which later expanded into broader roles within incident response and digital forensics.

Having worked closely with Cyber Security Incident Response Teams (CSIRTs), Felissa has been actively involved in investigating advanced threats, mitigating enterprise-scale security incidents, and strengthening organizational defenses. Currently serving as a SOC Analyst, she focuses on proactive monitoring, threat hunting, and building resilient security operations to adapt to today’s fast-evolving cyber landscape.

Mark Gabriel Rizare – EY GDS (CS) Philippines, Inc.

Mark Gabriel Rizare is a cybersecurity professional with 2 years of experience as a SOC Analyst, specializing in monitoring security alerts, analyzing potential threats, and responding to incidents in real time. In this role, he has developed strong expertise in handling security events under pressure, investigating malicious activity, and improving incident response processes. With a solid technical foundation in Electronics and Communication Engineering, Mark brings an analytical and detail-oriented approach to cybersecurity operations. He is passionate about advancing his skills in threat detection and defense strategies.