Podcast
Root Causes 521: How Prepared Are Enterprises for PQC? (Part 1)


Hosted by
Tim Callan
Chief Compliance Officer
Jason Soroko
Fellow
Original broadcast date
August 22, 2025
We're back discussing the results of Sectigo's 2025 State of Crypto Agility report. We explore the second half of the report on post quantum cryptography (PQC) including enterprise awareness of PQC, the most influential drivers for PQC migration, expected budgets and more. You can follow along by downloading the full report here: https://www.sectigo.com/2025-s...
Podcast Transcript
Actively implementing post-quantum cryptography solutions - 16%
Planning to implement within the next 12 months - 18%
Planning to implement within 12 to 24 months - 23%
Evaluating options but no immediate implementation plans - 33%
And not evaluating options at all - 10%
So the breakdowns - evaluating people who have no plans is 43%.
People who have plans but have done nothing is 41%. And then people who are actively doing something is 16%.
The fact that it’s a little bit bottom heavy, meaning less activity than versus more activity, is probably what I would expect at this point.
We should think of this as the baseline. I think what's going to be interesting is what happens moving forward.
Next question. What would help your organization feel more prepared to begin evaluating post-quantum cryptography? And this is a pick as many as you want, and this is in descending order.
So access to internal or expertise and resources - 59%
Better familiarity with PQC standards, processes and policies - 52%
More education on PQC concepts and practical applications - 44%
Stronger understanding of PQC relevance to our organization - 33%
Clearer guidance on how to begin - 26%
Established and widely accepted industry standards or frameworks - 22%
Support aligning PQC with other cyber security priorities - 11%
More clarity on the right timing for PQC adoption - 11%
And a well-defined business case, or ROI, to justify investment - 7%
So I think you see the real kind of starting stuff up at the top. Access to expertise 59%, better familiar with the standards 52%, more education, 44%. So, what I'm seeing and when you look down to the bottom, things like clarity on the right timing for adoption, well-defined business case, nobody is picking this. So what we're getting right now is, what we're hearing is, I don't even know. My head is swimming. I'm just hearing about this. I don't know what this is. I don't know anything yet. I need to learn.
So next question here. NIST has signaled the deprecation of RSA 2048 and ECC 2056 by 2030. That's in a guidance document, isn't it? Were you previously aware of this change? Meaning previous to this question? So it's a yes/no question. It's a yes/no question because remember, they were screened. If they had no awareness, they were screened out. So the question is, yes, they were fully aware, or they know of it, but they don't know the details.
Fully aware - 42%
Know of it but don't know the details - 58%
Remember, this is what they were screened for.
Next question.
That sort of sets aside the awareness and knowledge segment of these questions. So let's put a little parentheses around that. Now we're going to move into actions and implementations.
So next question, question 12, has your organization conducted an assessment of systems vulnerable to quantum computing attacks? And the answer is yes.
So again, yes, fully - 14%.
Partially - 46%
Planning to do so within the next 12 months - 40%
No known plans - 0%
I think this is over optimistic. I think this is some of what we talked about in the last episode, where people are probably overestimating how prepared they are. I'm skeptical that 40% of enterprises have a full assessment of the systems that are quantable for computing attacks. I'm skeptical that 4% have that.
And that may be what we're seeing there. Another way to think about it. This is forward looking. So for some of these other ones, I've said I'm going to be interested in seeing what this looks like in a year. This is people's intentions for what they'll be doing over the next year.
Next question - how do you expect your organization's PQC investment to change over the next two to three years?
So significantly increase is 5% or more. Increase between 1% and 5% and stay the same. Do you want to think in your mind about what they are and then I'll tell you?
So then the next, I think it's four questions, and then that's where we're going to stop this episode are clustered around prioritization.
So here's the first one. Question 15 - What are your organization's top quantum safe priorities? And again, this is a pick many. There's a list of about eight things here and I'm going to go top to bottom in terms of the most to least.
Inventory. So this is your organization's top quantum safe priorities.
Inventory and classification of cryptographic assets - 51% selected that.
Risk assessments or impact analysis related to quantum threats - A slightly smaller 51% also selected that.
Research and evaluation of post-quantum cryptography algorithms - 47%.
Migration planning and roadmap development - 41%.
Then there's a big drop off:
Upgrading or replacing cryptographic libraries and protocols - 27%.
Certificate management modernization - 24%.
Vendor engagement or third party assessments - 21%.
Training and upscaling internal teams on PQC - 19%.
Pilot projects or POC implementations - 16%
And then lastly, there was a nothing, which was, it rounds to 0%. It's not actually zero. There is a little bar there, but it rounds to zero, and there's a don't know that also rounds to zero. So tiny number of people said nothing, but 99 plus percent of them were doing at least one of things on this list.
Next one, Question 16. Which best describes your organization's current approach to PQC migration? This is a pick one. And I'm going to go over the list.
Gradual phase in - 27%.
Waiting for more mature solutions - 23%.
Hybrid approach, e.g., running traditional and PQ systems in parallel long term - 16%.
Complete system overhaul - 14%.
And, we don't have a strategy yet - 20%.
So thoughts?
After now hearing some of the numbers of all of these put together, I'm having a hard time kind of piecing together how these people kind of came up to these things. However, none of these things are shocking or surprising. I don't know. There's no gigantic insight that jumps out for me here.
Number one - preparing for NIST algorithm deprecation of RSA and ECC - 50%. Top of the list.
Second - proactively preparing to meet upcoming standards and new government mandates. So it's very similar. 48%. Second on the list.
Third one - we conducted a risk assessment that revealed long term exposure - 47%.
Fourth one - protecting our brand reputation for potential outages or business interruptions - 46%.
Then again, we drop off pretty fast. So here's the next one.
We handle highly sensitive or long lived data - 40%.
After that, our leadership made PQC a priority or raised concerns about quantum risk - 31%.
Next one - regulatory audit or compliance review highlighted cryptographic risks - 31%.
Ater that - we want to position ourselves as an industry innovator or early adopter - 30%.
Now it's going to drop again.
We are modernizing our infrastructure and want to future proof it - 25%.
Client or partner required us to explore quantum safe strategies - 24%.
A competitor announced its own PQC initiatives - 24%.
Harvest and decrypt mitigation. First mention of harvest and decrypt - 22%.
And a breach or near miss highlighted weaknesses in our current encryption - 21%.
So what I see when I look at this is the action really is being driven by guidance.
From regulatory guidance, government mandates, standards and NIST.
Last question on priorities, and last question for this episode, which is question 18, how are systems prioritized for PQC migration?
So here are your choices. I think that's our last one. That's our last one. So how are systems prioritized for PQC migration? Again, in descending order. This is a pick multiple. In descending order.
Data sensitivity - 66%.
Risk level - 57%.
Compliance requirements - 57%.
Business impact - 50%.
Durability of secrets - 49%.
And system age - 37%.
So not a lot of spread in here.
Though they were and they acknowledge that. Now they're saying now that I'm doing this, because I was told to, I'm sitting down and saying, okay, what's the data I most want to protect?
And then we’ll get into another set in another episode. But the thesis or the synthesized thing that that we saw, that you and I saw here when we look at this data, is that it's very early, people are still trying to figure out what to do about it. There is broad recognition that something has to be done about it, and this mostly came from various guidelines and government guidance and things along those lines. And now that that broad recognition is in place, there is definitely intent to do something, but specifically what we're doing maybe is a little less clear and actual activity, true action, is pretty scarce at this stage.
And they are doing the right things you would do under these circumstances, which is get information and formulate a plan and formulate a strategy, and that's what you would hope to see. So in that regard, I'm actually, I don't know if I want to say not surprised, but pleased with what we see when we look at the results of this.
But this still establishing this baseline now is interesting. So listeners, if you didn't - go back and listen to the previous episode where we're going to describe readiness for 47 day certs. A lot of fascinating stuff there. Very interesting one. And also stay tuned, because the next episode, which may or may not be available depending on how quickly you listen to this, the next episode, we're going to finish off the PQC survey results.

