{"id":730252,"date":"2024-10-07T04:00:50","date_gmt":"2024-10-07T09:00:50","guid":{"rendered":"https:\/\/www.capgemini.com\/us-en\/?p=730252&#038;preview=true&#038;preview_id=730252"},"modified":"2025-03-05T06:40:42","modified_gmt":"2025-03-05T11:40:42","slug":"how-post-quantum-cryptography-is-reshaping-cybersecurity-in-2024","status":"publish","type":"post","link":"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/how-post-quantum-cryptography-is-reshaping-cybersecurity-in-2024\/","title":{"rendered":"How post-quantum cryptography is reshaping cybersecurity in 2024"},"content":{"rendered":"\n<header class=\"wp-block-cg-blocks-hero-blogs header-hero-blogs\"><div class=\"container\"><div class=\"hero-blogs\"><div class=\"hero-blogs-content-wrapper\"><div class=\"row\"><div class=\"col-12\"><div class=\"header-title\"><h1>How post-quantum cryptography is reshaping cybersecurity in 2024<\/h1><\/div><\/div><\/div><\/div><div class=\"hero-blogs-bottom\"><div class=\"header-author\"><div class=\"author-img\"><img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2021\/03\/PASCAL-BRIER-1.jpg?w=200&amp;quality=10\" alt=\"\" loading=\"lazy\"\/><\/div><div class=\"author-name-date\"><h5 class=\"author-name\">Pascal Brier<\/h5><h5 class=\"blog-date\">Oct 2, 2024<\/h5><\/div><\/div><div class=\"brand-image\"> <\/div><\/div><\/div><\/div><\/header>\n\n\n\n<section class=\"wp-block-cg-blocks-group undefined section section--article-content\"><div class=\"article-main-content\"><div class=\"container\"><div class=\"row\"><div class=\"col-12 col-md-1\"><nav class=\"article-social\"><ul class=\"social-nav\"><li class=\"ip-order-fb\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/www.capgemini.com\/?p=1062551\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"opens in a new window\"><i aria-hidden=\"true\" class=\"icon-fb\"><\/i><span class=\"sr-only\">Facebook<\/span><\/a><\/li><li class=\"ip-order-li\"><a href=\"https:\/\/www.linkedin.com\/shareArticle?url=https:\/\/www.capgemini.com\/?p=1062551\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"opens in a new window\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><span class=\"sr-only\">Linkedin<\/span><\/a><\/li><\/ul><\/nav><\/div><div class=\"col-12 col-md-11 col-lg-10\"><div class=\"article-text article-quote-text\">\n<h2 class=\"wp-block-heading\" id=\"h-last-year-we-predicted-that-post-quantum-cryptography-pqc-would-be-a-defining-technology-trend-in-2024-nbsp-with-far-reaching-implications-for-organizations\">Last year, we predicted that post-quantum cryptography (PQC) would be a defining technology trend in 2024&nbsp;with far-reaching implications for organizations.<\/h2>\n\n\n\n<p>Following the release of NIST&#8217;s post-quantum encryption standards a few weeks ago, the race to secure IT systems for the quantum era has accelerated. Nowhere is this urgency more pronounced than in the financial sector, where sensitive data, stringent regulations, and vast datasets demand a rapid shift to quantum-safe systems<br><br>As <a href=\"https:\/\/www.linkedin.com\/feed\/hashtag\/?keywords=quantum&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A7246525887213441024\" target=\"_blank\" rel=\"noreferrer noopener\">#quantum<\/a> computing advances, it presents both opportunities and risks for the financial sector. On one hand, quantum computing could revolutionize financial processes such as market trading, risk management, and secure communication through technologies like quantum key distribution. On the other hand, it could create significant exposure, particularly to public-key cryptography, which underpins the security of digital communications. Cyber actors may use quantum computers to break current encryption methods, creating a scenario where sensitive financial data becomes vulnerable. The concept of &#8220;harvest now, decrypt later&#8221; is particularly concerning, as threat actors might intercept encrypted data today, with the aim of decrypting it once quantum computers mature.<br><br>Recently, the <a href=\"https:\/\/lnkd.in\/eFRzwxDN\" target=\"_blank\" rel=\"noreferrer noopener\">G7 Cyber Expert Group published a very interesting statement<\/a> that highlights the dual nature of this technology. <br><br>The G7 is urging financial institutions to start planning for post-quantum cryptography (PQC) as soon as possible to safeguard future communications. Financial institutions are encouraged to assess their own quantum risks, build inventories of vulnerable systems, and implement governance processes to mitigate emerging threats.<br><br>Personally, I would go beyond the G7\u2019s recommendations and urge organizations across all sectors to start investigating and navigating the complex quantum landscape.<br><br><strong>There are many actions that CxOs can take today to start preparing for a quantum future<\/strong>: such as auditing current cryptographic systems, investing in quantum-resistant algorithms, and ensuring that quantum readiness is integrated into long-term IT roadmaps.<\/p>\n\n\n\n<p>Quantum computing is advancing faster than initially predicted, and when it reaches critical maturity, it will be too late to start preparing. Post-quantum cryptography implementation will not be easy, so a gradual migration with careful planning will be essential. Starting now will prevent unwelcome surprises and allow an orderly migration. The actions we take today will determine whether we are resilient or exposed when quantum supremacy becomes a reality.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/lnkd.in\/eBUgCWpZ\" target=\"_blank\" rel=\"noreferrer noopener\">Read our top five trends 2024<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-outline is-style-outline--2\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.linkedin.com\/posts\/pascalbrier_quantum-activity-7246525887213441024-kioV\/?utm_source=share&amp;utm_medium=member_desktop\" target=\"_blank\" rel=\"noreferrer noopener\">Add your voice on LinkedIn<\/a><\/div>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/section>\n\n\n\n<section class=\"wp-block-cg-blocks-wrapper-people-slider section section--expert-slider wrapper-people-slider undefined\"><div class=\"container\"><div class=\"content-title\"><h2 data-maxlength=\"34\" class=\"people-heading-title\">Meet the author<\/h2><\/div><\/div><div class=\"slider slider-boxed\"><div class=\"container\"><div class=\"slider-window\"><div class=\"slider-list\">\t\t<div class=\"slide\">\n\t\t\t<div class=\"box\">\n\t\t\t\t<div class=\"row\">\n\t\t\t\t\t<div class=\"col-md-6 col-lg-4 box-img-wrapper\">\n\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2022\/05\/Capture-decran-2025-06-06-133926.png\" alt=\"Pascal Brier\"\/>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"col-md-6 col-lg-8 box-inner\">\n\t\t\t\t\t\t<div class=\"row title-social-media-header\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 mbl-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Email\" href=\"mailto:pascal.brier@capgemini.com\"><i aria-hidden=\"true\" class=\"mail-ico\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Opens in a new window\" href=\"https:\/\/www.linkedin.com\/in\/pascal-brier-76666a28\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 box-container\">\n\t\t\t\t\t\t\t\t<div class=\"box-title\">\n\t\t\t\t\t\t\t\t\t<h3 class=\"people-profile-title\">Pascal Brier<\/h3>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>Group Chief Innovation Officer, Member of the Group Executive Committee<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 social-box-container dkt-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Email\" href=\"mailto:pascal.brier@capgemini.com\"><i aria-hidden=\"true\" class=\"mail-ico\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Opens in a new window\" href=\"https:\/\/www.linkedin.com\/in\/pascal-brier-76666a28\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"people-info\">Pascal Brier was appointed Group Chief Innovation Officer and member of the Group Executive Committee on January 1st, 2021. Pascal oversees Technology, Innovation and Ventures for the Group in this position. Pascal holds a Masters degree from EDHEC and was voted \u201cEDHEC of the Year\u201d in 2017.<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div><\/div><\/div><div class=\"slider-nav\"><button class=\"slider-prev inactive\" aria-label=\"Slider-previous\" tabindex=\"-1\"><\/button><ul class=\"slider-paginator\"><\/ul><button class=\"slider-next\" aria-label=\"Slider-next\"><\/button><\/div><\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":263,"featured_media":730254,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cg_dt_proposed_to":[],"cg_seo_hreflang_relations":"[]","cg_seo_canonical_relation":"{\"uuid\":\"85e3fb20-8e69-44a7-bda6-4750e3d0db71\",\"blogId\":\"\",\"domain\":\"\",\"sitePath\":\"\",\"postLink\":\"\",\"postId\":null,\"isSaved\":true,\"isCrossLink\":false,\"hasCrossLink\":false}","cg_seo_hreflang_x_default_relation":"{\"uuid\":\"90ccf2f6-1725-4d4e-9a7f-52a17cc89a5e\",\"blogId\":\"\",\"domain\":\"\",\"sitePath\":\"\",\"postLink\":\"\",\"postId\":null,\"isSaved\":true,\"isCrossLink\":false,\"hasCrossLink\":false}","cg_dt_approved_content":true,"cg_dt_mandatory_content":false,"cg_dt_notes":"","cg_dg_source_changed":true,"cg_dt_link_disabled":false,"_yoast_wpseo_primary_brand":"","_jetpack_memberships_contains_paid_content":false,"footnotes":"","featured_focal_points":""},"categories":[1],"tags":[],"brand":[],"service":[],"industry":[],"partners":[],"blog-topic":[285],"content-group":[480],"class_list":["post-730252","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","blog-topic-innovation","content-group-technovision"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.8 (Yoast SEO v22.8) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How post-quantum cryptography is reshaping cybersecurity in 2024 - Capgemini USA<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/how-post-quantum-cryptography-is-reshaping-cybersecurity-in-2024\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How post-quantum cryptography is reshaping cybersecurity in 2024\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/how-post-quantum-cryptography-is-reshaping-cybersecurity-in-2024\/\" \/>\n<meta property=\"og:site_name\" content=\"Capgemini USA\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-07T09:00:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-05T11:40:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2024\/10\/GettyImages-1485607813-1200x800-6a45073.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Pascal Brier\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"bedantadas\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/how-post-quantum-cryptography-is-reshaping-cybersecurity-in-2024\/\",\"url\":\"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/how-post-quantum-cryptography-is-reshaping-cybersecurity-in-2024\/\",\"name\":\"How post-quantum cryptography is reshaping cybersecurity in 2024 - Capgemini USA\",\"isPartOf\":{\"@id\":\"https:\/\/www.capgemini.com\/us-en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/how-post-quantum-cryptography-is-reshaping-cybersecurity-in-2024\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/how-post-quantum-cryptography-is-reshaping-cybersecurity-in-2024\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2024\/10\/GettyImages-1485607813-1200x800-6a45073.jpeg\",\"datePublished\":\"2024-10-07T09:00:50+00:00\",\"dateModified\":\"2025-03-05T11:40:42+00:00\",\"author\":{\"@id\":\"https:\/\/www.capgemini.com\/us-en\/#\/schema\/person\/92b703c24b5deab19d42ae983e58f9d0\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/how-post-quantum-cryptography-is-reshaping-cybersecurity-in-2024\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/how-post-quantum-cryptography-is-reshaping-cybersecurity-in-2024\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/how-post-quantum-cryptography-is-reshaping-cybersecurity-in-2024\/#primaryimage\",\"url\":\"https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2024\/10\/GettyImages-1485607813-1200x800-6a45073.jpeg\",\"contentUrl\":\"https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2024\/10\/GettyImages-1485607813-1200x800-6a45073.jpeg\",\"width\":1200,\"height\":800,\"caption\":\"CYBER SECURITY Business technology Antivirus Alert Protection Security and Cyber Security Firewall Cybersecurity and information technology\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/how-post-quantum-cryptography-is-reshaping-cybersecurity-in-2024\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.capgemini.com\/us-en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How post-quantum cryptography is reshaping cybersecurity in 2024\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.capgemini.com\/us-en\/#website\",\"url\":\"https:\/\/www.capgemini.com\/us-en\/\",\"name\":\"Capgemini USA\",\"description\":\"Just another www.capgemini.com site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.capgemini.com\/us-en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.capgemini.com\/us-en\/#\/schema\/person\/92b703c24b5deab19d42ae983e58f9d0\",\"name\":\"bedantadas\",\"url\":\"https:\/\/www.capgemini.com\/us-en\/author\/bedantadas\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How post-quantum cryptography is reshaping cybersecurity in 2024 - Capgemini USA","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/how-post-quantum-cryptography-is-reshaping-cybersecurity-in-2024\/","og_locale":"en_US","og_type":"article","og_title":"How post-quantum cryptography is reshaping cybersecurity in 2024","og_url":"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/how-post-quantum-cryptography-is-reshaping-cybersecurity-in-2024\/","og_site_name":"Capgemini USA","article_published_time":"2024-10-07T09:00:50+00:00","article_modified_time":"2025-03-05T11:40:42+00:00","og_image":[{"width":1200,"height":800,"url":"https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2024\/10\/GettyImages-1485607813-1200x800-6a45073.jpeg","type":"image\/jpeg"}],"author":"Pascal Brier","twitter_card":"summary_large_image","twitter_misc":{"Written by":"bedantadas","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/how-post-quantum-cryptography-is-reshaping-cybersecurity-in-2024\/","url":"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/how-post-quantum-cryptography-is-reshaping-cybersecurity-in-2024\/","name":"How post-quantum cryptography is reshaping cybersecurity in 2024 - Capgemini USA","isPartOf":{"@id":"https:\/\/www.capgemini.com\/us-en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/how-post-quantum-cryptography-is-reshaping-cybersecurity-in-2024\/#primaryimage"},"image":{"@id":"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/how-post-quantum-cryptography-is-reshaping-cybersecurity-in-2024\/#primaryimage"},"thumbnailUrl":"https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2024\/10\/GettyImages-1485607813-1200x800-6a45073.jpeg","datePublished":"2024-10-07T09:00:50+00:00","dateModified":"2025-03-05T11:40:42+00:00","author":{"@id":"https:\/\/www.capgemini.com\/us-en\/#\/schema\/person\/92b703c24b5deab19d42ae983e58f9d0"},"breadcrumb":{"@id":"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/how-post-quantum-cryptography-is-reshaping-cybersecurity-in-2024\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/how-post-quantum-cryptography-is-reshaping-cybersecurity-in-2024\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/how-post-quantum-cryptography-is-reshaping-cybersecurity-in-2024\/#primaryimage","url":"https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2024\/10\/GettyImages-1485607813-1200x800-6a45073.jpeg","contentUrl":"https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2024\/10\/GettyImages-1485607813-1200x800-6a45073.jpeg","width":1200,"height":800,"caption":"CYBER SECURITY Business technology Antivirus Alert Protection Security and Cyber Security Firewall Cybersecurity and information technology"},{"@type":"BreadcrumbList","@id":"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/how-post-quantum-cryptography-is-reshaping-cybersecurity-in-2024\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.capgemini.com\/us-en\/"},{"@type":"ListItem","position":2,"name":"How post-quantum cryptography is reshaping cybersecurity in 2024"}]},{"@type":"WebSite","@id":"https:\/\/www.capgemini.com\/us-en\/#website","url":"https:\/\/www.capgemini.com\/us-en\/","name":"Capgemini USA","description":"Just another www.capgemini.com site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.capgemini.com\/us-en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.capgemini.com\/us-en\/#\/schema\/person\/92b703c24b5deab19d42ae983e58f9d0","name":"bedantadas","url":"https:\/\/www.capgemini.com\/us-en\/author\/bedantadas\/"}]}},"blog_topic_info":[{"id":285,"name":"Innovation"}],"taxonomy_info":{"category":[{"id":1,"name":"Uncategorized","slug":"uncategorized"}],"blog-topic":[{"id":285,"name":"Innovation","slug":"innovation"}],"content-group":[{"id":480,"name":"Technovision","slug":"technovision"}]},"parsely":{"version":"1.1.0","canonical_url":"https:\/\/capgemini.com\/us-en\/insights\/expert-perspectives\/how-post-quantum-cryptography-is-reshaping-cybersecurity-in-2024\/","smart_links":{"inbound":0,"outbound":0},"traffic_boost_suggestions_count":0,"meta":{"@context":"https:\/\/schema.org","@type":"NewsArticle","headline":"How post-quantum cryptography is reshaping cybersecurity in 2024","url":"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/how-post-quantum-cryptography-is-reshaping-cybersecurity-in-2024\/","mainEntityOfPage":{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/how-post-quantum-cryptography-is-reshaping-cybersecurity-in-2024\/"},"thumbnailUrl":"https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2024\/10\/GettyImages-1485607813-1200x800-6a45073.jpeg?w=150&h=150&crop=1","image":{"@type":"ImageObject","url":"https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2024\/10\/GettyImages-1485607813-1200x800-6a45073.jpeg"},"articleSection":"Uncategorized","author":[],"creator":[],"publisher":{"@type":"Organization","name":"Capgemini USA","logo":""},"keywords":[],"dateCreated":"2024-10-07T09:00:50Z","datePublished":"2024-10-07T09:00:50Z","dateModified":"2025-03-05T11:40:42Z"},"rendered":"<meta name=\"parsely-title\" content=\"How post-quantum cryptography is reshaping cybersecurity in 2024\" \/>\n<meta name=\"parsely-link\" content=\"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/how-post-quantum-cryptography-is-reshaping-cybersecurity-in-2024\/\" \/>\n<meta name=\"parsely-type\" content=\"post\" \/>\n<meta name=\"parsely-image-url\" content=\"https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2024\/10\/GettyImages-1485607813-1200x800-6a45073.jpeg?w=150&amp;h=150&amp;crop=1\" \/>\n<meta name=\"parsely-pub-date\" content=\"2024-10-07T09:00:50Z\" \/>\n<meta name=\"parsely-section\" content=\"Uncategorized\" \/>","tracker_url":"https:\/\/cdn.parsely.com\/keys\/capgemini.com\/p.js"},"jetpack_featured_media_url":"https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2024\/10\/GettyImages-1485607813-1200x800-6a45073.jpeg","archive_status":false,"featured_image_src":"https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2024\/10\/GettyImages-1485607813-1200x800-6a45073.jpeg","featured_image_alt":"","jetpack-related-posts":[{"id":751427,"url":"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/facing-the-quantum-cyber-threat-moving-from-denial-to-action\/","url_meta":{"origin":730252,"position":0},"title":"Facing the quantum cyber threat: moving from denial to action","author":"bedantadas","date":"August 21, 2025","format":false,"excerpt":"As highlighted in our Top Tech Trends of 2025 report, cybersecurity remains a critical focus with new defenses and emerging threats reshaping the landscape.","rel":"","context":"In \"Innovation\"","block_context":{"text":"Innovation","link":"https:\/\/www.capgemini.com\/us-en\/tag\/innovation\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2025\/08\/Web-banner-blog-cyber-quantum-1880x1800-1.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2025\/08\/Web-banner-blog-cyber-quantum-1880x1800-1.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2025\/08\/Web-banner-blog-cyber-quantum-1880x1800-1.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2025\/08\/Web-banner-blog-cyber-quantum-1880x1800-1.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":709802,"url":"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/navigating-the-ever-evolving-frontier-of-cybersecurity\/","url_meta":{"origin":730252,"position":1},"title":"Navigating the ever-evolving frontier of cybersecurity","author":"bedantadas","date":"December 1, 2023","format":false,"excerpt":"Navigating the ever-evolving frontier of cybersecurityPascal BrierNov 6, 2023 FacebookTwitterLinkedin The pursuit of unbreakable encryption has been a part of our history for millennia. Did you know that Caesar himself is sometimes attributed with creating his own encryption code, which relied simply on shifting letters placed\u00a0three spots up in the\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2023\/12\/webbanner3-1.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2023\/12\/webbanner3-1.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2023\/12\/webbanner3-1.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2023\/12\/webbanner3-1.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":751243,"url":"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/crypto-agility-the-unsung-hero-in-the-quantum-security-race\/","url_meta":{"origin":730252,"position":2},"title":"Crypto-agility: The unsung hero in the quantum security race","author":"priyankahitarthtanna","date":"August 20, 2025","format":false,"excerpt":"Quantum computing has the potential to break the cryptographic systems that currently protect our data, communications, and national infrastructure.","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2025\/08\/DotCom_Banner_2880X1800_4631b2.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2025\/08\/DotCom_Banner_2880X1800_4631b2.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2025\/08\/DotCom_Banner_2880X1800_4631b2.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2025\/08\/DotCom_Banner_2880X1800_4631b2.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":751250,"url":"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/cybersecurity-2025-embracing-resilience-in-an-era-of-disruption\/","url_meta":{"origin":730252,"position":3},"title":"Cybersecurity 2025: Embracing resilience in an era of disruption","author":"priyankahitarthtanna","date":"August 20, 2025","format":false,"excerpt":"From quantum threats to AI-driven attacks, discover the key trends shaping the future of security and how organizations can stay ahead.","rel":"","context":"In \"Cybersecurity\"","block_context":{"text":"Cybersecurity","link":"https:\/\/www.capgemini.com\/us-en\/tag\/cybersecurity\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2025\/08\/Cybersecurity-Trends-web-banners-2025.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2025\/08\/Cybersecurity-Trends-web-banners-2025.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2025\/08\/Cybersecurity-Trends-web-banners-2025.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2025\/08\/Cybersecurity-Trends-web-banners-2025.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":762877,"url":"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/the-five-strategic-cybersecurity-imperatives-for-2026\/","url_meta":{"origin":730252,"position":4},"title":"The five strategic cybersecurity imperatives for 2026","author":"priyankahitarthtanna","date":"February 16, 2026","format":false,"excerpt":"The digital environment is changing faster than traditional security models can keep up. Resilience, speed of response, and trust matter more today than any single tool or point solution. As we move toward 2026, organizations are rethinking cybersecurity not only to reduce risk, but to protect performance and continuity in\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2026\/04\/Cybersecurity-web-banners-2026b.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2026\/04\/Cybersecurity-web-banners-2026b.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2026\/04\/Cybersecurity-web-banners-2026b.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2026\/04\/Cybersecurity-web-banners-2026b.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":751500,"url":"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/leading-with-purpose-capgemini-named-a-leader-in-avasants-cybersecurity-services-2025-radarview\/","url_meta":{"origin":730252,"position":5},"title":"Leading with purpose: Capgemini named a Leader in\u00a0Avasant\u2019s Cybersecurity Services 2025 RadarView\u2122\u00a0","author":"priyankahitarthtanna","date":"August 22, 2025","format":false,"excerpt":"This recognition is more than a milestone \u2013 it\u2019s a powerful validation of our ability to deliver\u202fcontinuous cyber resilience","rel":"","context":"In \"Cybersecurity\"","block_context":{"text":"Cybersecurity","link":"https:\/\/www.capgemini.com\/us-en\/tag\/cybersecurity\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2025\/08\/Avasant-CIS-web-banner-2025.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2025\/08\/Avasant-CIS-web-banner-2025.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2025\/08\/Avasant-CIS-web-banner-2025.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2025\/08\/Avasant-CIS-web-banner-2025.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]}],"jetpack_sharing_enabled":true,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Capgemini USA","distributor_original_site_url":"https:\/\/www.capgemini.com\/us-en","push-errors":false,"featured_image_url":"https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2024\/10\/GettyImages-1485607813-1200x800-6a45073.jpeg","_links":{"self":[{"href":"https:\/\/www.capgemini.com\/us-en\/wp-json\/wp\/v2\/posts\/730252","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.capgemini.com\/us-en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.capgemini.com\/us-en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/us-en\/wp-json\/wp\/v2\/users\/263"}],"replies":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/us-en\/wp-json\/wp\/v2\/comments?post=730252"}],"version-history":[{"count":2,"href":"https:\/\/www.capgemini.com\/us-en\/wp-json\/wp\/v2\/posts\/730252\/revisions"}],"predecessor-version":[{"id":740123,"href":"https:\/\/www.capgemini.com\/us-en\/wp-json\/wp\/v2\/posts\/730252\/revisions\/740123"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/us-en\/wp-json\/wp\/v2\/media\/730254"}],"wp:attachment":[{"href":"https:\/\/www.capgemini.com\/us-en\/wp-json\/wp\/v2\/media?parent=730252"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.capgemini.com\/us-en\/wp-json\/wp\/v2\/categories?post=730252"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.capgemini.com\/us-en\/wp-json\/wp\/v2\/tags?post=730252"},{"taxonomy":"brand","embeddable":true,"href":"https:\/\/www.capgemini.com\/us-en\/wp-json\/wp\/v2\/brand?post=730252"},{"taxonomy":"service","embeddable":true,"href":"https:\/\/www.capgemini.com\/us-en\/wp-json\/wp\/v2\/service?post=730252"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.capgemini.com\/us-en\/wp-json\/wp\/v2\/industry?post=730252"},{"taxonomy":"partners","embeddable":true,"href":"https:\/\/www.capgemini.com\/us-en\/wp-json\/wp\/v2\/partners?post=730252"},{"taxonomy":"blog-topic","embeddable":true,"href":"https:\/\/www.capgemini.com\/us-en\/wp-json\/wp\/v2\/blog-topic?post=730252"},{"taxonomy":"content-group","embeddable":true,"href":"https:\/\/www.capgemini.com\/us-en\/wp-json\/wp\/v2\/content-group?post=730252"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}