It is predicted that quantum computers will be capable of breaking popular encryption protocols at speeds that make it feasible to make use of the decrypted data. Specifically, modern public-key encryption protocols will not be sufficient for protecting the data from threat actors operating a quantum computer. Some threat actors may already be harvesting and storing large quantities of encrypted data that can be decrypted and useful in the future. This session will help the audience to better understand the emerging threats and the opportunities for organizations to prepare their infrastructures for the future. As an interactive office-hours style discussion, this session will engage enterprise leaders to discuss the preparation processes and
As EY Americas Cloud Cybersecurity Leader, Alex focuses on engineering; architectural controls and processes; and security solutions for public cloud, and container platforms.
She holds a PhD, MSc and BSc in Computer Science from Tel Aviv University, has multiple patents and is cited in over 30 scientific publications.