Podcast
Root Causes 522: How Prepared Are Enterprises for PQC? (Part 2)


Hosted by
Tim Callan
Chief Compliance Officer
Jason Soroko
Fellow
Original broadcast date
August 28, 2025
In this episode, we break down more PQC insights from Sectigo’s 2025 State of Crypto Agility report. We discuss how enterprises are preparing for the shift to quantum-safe encryption and what challenges lie ahead.
Key topics we cover:
- Barriers to implementing PQC in legacy systems
- Enterprise challenges and lessons learned
- The PQC skills gap in today’s workforce
- Confidence levels in current systems’ ability to adopt PQC
- The most important features organizations want in PQC solutions
If you’re interested in post-quantum cryptography, or enterprise crypto agility, this episode is for you. Follow along and download the full report here: https://www.sectigo.com/2025-s...
Podcast Transcript
Question 19 reads, what level of involvement do the following stakeholders have in PQC decisions at your organization? And so here are the choices. It's final decision maker, contributor, actively involved in the decision, consulted, asked for input but not deciding, aware, not involved and don't know. So with that, let's do it in order of final decision maker, and then we can talk about where the contributors fit in, because it looks different when you look at that.
So final decision maker, CISO, remember, this is what level of involvement for the following stakeholders and PQC decisions at your organization.
CISO - 51%
Security, crypto architects - 39%
Infrastructure team – 19
Compliance or legal team – 17
CIO – 14
CTO – 11
And the Board of Directors - 10%
So what do you think of that?
CEO - 22%. And it goes down from there.
And I think that this is probably a good order. You want CISOs involved. I find that CISO awareness has actually been really low. This cohort - just to remind people who are listening to this episode three and might not have heard the others - this is a double click on people who have been screened to actually have awareness. And so it's funny how the awareness of CISOs is probably quite low overall but once an organization has awareness, the CISO is kind of put into the driver's seat of making the final call. This is what this is saying.
This is people saying, we have to do this to remain secure, as opposed to when we talked about, for instance, 47 day certs, where we saw that it was very much driven from an operations mindset. We have to do this to remain up.
Training programs to quantum risk and POC - 57%.
Budgets specific to PQC initiatives - 56%
CCOE, Cryptographic Center of Excellence - 50%
External consultants or professional services - 47%
Development and operations roadmap - 46%
Procurement of new tools or platforms - also 46%
A dedicated internal team - 45%
And external pen test partners - 33%
Have not allocated any resources to PQC is not truly zero respondents, but small enough that it rounds to 0%
So thoughts?
All right, the next one. Question 21 - which areas has your organization prioritized for PQC implementation? Again, I think this is a pick many or pick all. It’s probably just a pick everything that's relevant, okay? Because it's kind of a long list. So again, in descending order of how much they picked:
Digital signatures - 50%
Critical infrastructure or OT systems - also 50%. Slightly smaller.
Data storage - 49%
Authentication - 49%
Cryptographic libraries and protocols - 48%
Data in transit - 46%
So that batch is all very similar. Then it drops down a little.
VPN or remote access - 40%
Web applications and APIs - 39%
IoT devices - 37%
Secure email and messaging - 37%
WAN - 32%
And local area network - 28%
We have not prioritized any specific areas yet is down at 1%
Next one. Question 22 – how concerned are you about the following quantum computing threats? And it's a five point scale, from extremely concerned to not at all concerned. So it goes extremely concerned, very concerned, moderately, slightly, not at all. And let's do let's do the top two, because that's what makes this really interesting. So the number one in the top two comparison is compromise of secure communications, which is to say man in the middle attacks - 68%. Next on the list is harvest now decrypt later attacks - 60%. Again, this is a top two, and then after that, trust now forge later attacks - 59%. So do you have some thoughts on that?
All right. 23. What challenges have you experienced or expect to experience when implementing PQC? Again, this is a pick many with a bunch of things. So challenges you're experiencing. Top to bottom in terms of number of people who picked it, starting with:
Coordination across teams - 56%
System complexity - 50%
Lack of expertise/skills gap - 49%
Legacy/outdated infrastructure - 47%
Lack of budget - 43%
Now it drops off.
Technically complex to implement - 38%
Unclear ROI - 29%
Don't know where to begin - 28%
Unexpected downtime/operational failure - 26%
Performance concerns - 25%
Internal silos/institutional barriers - 25%
Performance trade-offs and impacts - 25%
Lack of available HSM - 20%
Absence of clear ownership - 20%
Production or systems failure - 19%
And 2% said, we have no challenges.
And so, like, everyone's a stakeholder, and it's built into our technical systems in such a way that everyone in any kind of technical role has to be involved in the solution. This isn't a job just for the CISO or just for the CIO or just for the CTO. It is something that all of those groups and more need to be involved in, and so coordination across teams I can see as a big challenge.
I mean, moving down the list, the next one system complexity. I mean, I think this directly connects to what we were just saying that again, there's we got, I mean, this sometimes gets compared to Y2K and I think there are some good comparisons to be made between Y2K and PQC, but one of the ways that it's very different is in the case of Y2k we had to implement a series of independent fixes, like, oh, there's a bunch of places where we use a date. Let's go look at them and get them all fixed. But what we had much less in the year 2000 than we do now is this complete tangled web of digital operations to the point where everything touches everything else, and this the net of digital operations today in 2025 is 25 years older than it was in 2000 and it's just so much more integrated and incredibly complex. And everything, everything, everything, has a digital component. And so, that's going to play a role in this for sure.
At the top: Implementation expertise - 54%
Cryptography expertise - 52%
Strategy development or roadmap planning - 47%
Risk assessment capabilities - 45%
Migration planning – 42%
Certificate management – 40%
Integration expertise – 38%
Incident Response related to PQC – 37% and
Legacy system modernization – 33%
We had 3% who reported we don't have any skills gaps.
So implementation expertise is at the top, followed by cryptography expertise.
All right. 25. What barriers do you expect to experience during PQC implementation with your legacy systems?
Integration complexity - 53%
Compatibility issues - 49%
Aversion to downtime risk - 49%. That's an interesting one.
High cost of upgrades - 43%
Technical limitations or no PQC support - 41%
Employee skills gap - 39%
Lack of vendor support for PQC - 38%
Compliance or audit implications - 32%
Performance constraints and degradation - 30%
Organizational resistance to change - 22%
And we don't expect any barriers - 8%
So again, the question was, what barriers do you expect to experience during PQC implementation with your legacy systems?
So with that?
Extremely confident - 15%
Again, this is how confident are you in your current system's ability to anchor to integrate PQC without major disruption?
Extremely confident - 15%
Very confident - 23%
Moderately confident – 34%
Somewhat confident – 28%
No confidence at all - Zero.
So what do you think of that?
Integration with existing platforms and technologies - 58%
Ease of implementation - 55%
Automation options - 49%
Budget - 48%
Cryptographic agility - 43%
Support for current NIST PQC standards - 43%. Kind of low.
Ability to discover cryptographic assets - 39%
Support for hybrid certificates - 36%
And availability timeline - 31%
So let me just take a second and say, if you're sitting and listening to this, and we were saying a lot of numbers, these things can be much easier to digest in chart form. So I'm going to point you at a couple resources, one of which is there is a publication, white paper, published by Sectigo with all the results from this survey, including a chart for every question we went over for both the 47-day and the PQC components of the research. So you can go and you can literally look at the raw numbers in a chart for every single question. And that's available from Sectigo. You can go download that from Sectigo’s website. So that's point number one that I recommend.
Point number two is that I believe that you and I, Jason, will be doing at least a couple webinars on this, where we'll have the charts in front of us. Our analysis is going to be a lot like this, but again, you'll be able to see the numbers while we talk about it. So if that's something that would help you, those are coming up in the future. Keep your eyes peeled on that. And I think there was a lot of fascinating stuff here, personally,

