BEGIN:VCALENDAR
VERSION:2.0
PRODID:IEEE vTools.Events//EN
CALSCALE:GREGORIAN
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
DTSTART:20240310T030000
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
RRULE:FREQ=YEARLY;BYDAY=2SU;BYMONTH=3
TZNAME:EDT
END:DAYLIGHT
BEGIN:STANDARD
DTSTART:20241103T010000
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=11
TZNAME:EST
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTAMP:20240620T201139Z
UID:9F14C47A-CFB8-4B0F-8631-3C50ACF4D83E
DTSTART;TZID=America/New_York:20240513T110000
DTEND;TZID=America/New_York:20240513T120200
DESCRIPTION:Quantum Computing is often presented as one of the most promisi
 ng technologies of the 21st century\, a\ntotal disruption\, a revolution. 
 Governments\, technologists\, marketers\, investors\, and analysts project
 \nthat Quantum Computing will solve today&#39;s impossible problems with class
 ical computers.\nHowever\, the wonders of this emerging technology of comp
 utation also give rise to a new threat vector\nnamed Q-Day or Quantum Atta
 cks\, which means a threat to the current Communication Security due\nto t
 he Quantum Computer’s future power to break asymmetric encryption and sp
 eed up brute force\nattacks for symmetric encryption. Therefore\, communic
 ation security needs revolutionary and\ninnovative solutions\, a complete 
 cryptographic system\, and new technologies supporting various\naspects of
  CIA triad and Privacy protection.\nThe Question arises: Can we develop su
 ch a scheme of secure communication that cannot be\nbroken?\nQuantum Commu
 nication technologies might provide that by harnessing the laws of nature 
 and Post\nQuantum Cryptographic solutions might provide that by finding mo
 re complex mathematical problems\,\nbut is that the answer we look for in 
 cybersecurity?\nIn this talk\, I will explain what a quantum computer is\,
  what a quantum advantage or quantum\nsupremacy is\, and why the world is 
 thrown into a quantum race. I also will tackle the application side of\nqu
 antum computation as a threat vector to our communication security and the
  state of the art of this\ntechnology in relation to cybersecurity. The te
 chnological solutions proposed to mitigate the quantum\nthreat will be exp
 lained\, and the talk will conclude with further steps required for achiev
 ing\ncommunication and information security.\n\nCo-sponsored by: jonathan 
 yam &lt;jonathankyam@gmail.com&gt;\n\nSpeaker(s): Angie\, \n\nVirtual: https://e
 vents.vtools.ieee.org/m/417762
LOCATION:Virtual: https://events.vtools.ieee.org/m/417762
ORGANIZER:bpage1@ieee.org
SEQUENCE:35
SUMMARY:IEEE -Quantum Technologies: Threat and Security.
URL;VALUE=URI:https://events.vtools.ieee.org/m/417762
X-ALT-DESC:Description: &lt;br /&gt;&lt;p&gt;Quantum Computing is often presented as on
 e of the most promising technologies of the 21st century\, a&amp;nbsp\;&lt;br&gt;tot
 al disruption\, a revolution. Governments\, technologists\, marketers\, in
 vestors\, and analysts project&amp;nbsp\;&lt;br&gt;that Quantum Computing will solve
  today&#39;s impossible problems with classical computers.&amp;nbsp\;&lt;br&gt;However\,
  the wonders of this emerging technology of computation also give rise to 
 a new threat vector&amp;nbsp\;&lt;br&gt;named Q-Day or Quantum Attacks\, which means
  a threat to the current Communication Security due&amp;nbsp\;&lt;br&gt;to the Quant
 um Computer&amp;rsquo\;s future power to break asymmetric encryption and speed
  up brute force&amp;nbsp\;&lt;br&gt;attacks for symmetric encryption. Therefore\, co
 mmunication security needs revolutionary and&amp;nbsp\;&lt;br&gt;innovative solution
 s\, a complete cryptographic system\, and new technologies supporting vari
 ous&amp;nbsp\;&lt;br&gt;aspects of CIA triad and Privacy protection.&amp;nbsp\;&lt;br&gt;The Q
 uestion arises: Can we develop such a scheme of secure communication that 
 cannot be&amp;nbsp\;&lt;br&gt;broken?&lt;br&gt;Quantum Communication technologies might pr
 ovide that by harnessing the laws of nature and Post&amp;nbsp\;&lt;br&gt;Quantum Cry
 ptographic solutions might provide that by finding more complex mathematic
 al problems\,&amp;nbsp\;&lt;br&gt;but is that the answer we look for in cybersecurit
 y?&amp;nbsp\;&lt;br&gt;In this talk\, I will explain what a quantum computer is\, wh
 at a quantum advantage or quantum&amp;nbsp\;&lt;br&gt;supremacy is\, and why the wor
 ld is thrown into a quantum race. I also will tackle the application side 
 of&amp;nbsp\;&lt;br&gt;quantum computation as a threat vector to our communication s
 ecurity and the state of the art of this&amp;nbsp\;&lt;br&gt;technology in relation 
 to cybersecurity. The technological solutions proposed to mitigate the qua
 ntum&amp;nbsp\;&lt;br&gt;threat will be explained\, and the talk will conclude with 
 further steps required for achieving&amp;nbsp\;&lt;br&gt;communication and informati
 on security.&lt;/p&gt;
END:VEVENT
END:VCALENDAR

