Cutting Edge

3111 - Great Scott! Quantum Cryptography is Fully Operational!

Wednesday, October 10
8:30 AM - 9:30 AM
Location: Floor 3: Mardi Gras: Salon E

Quantum computing has a long a history of development and is posed to be a game-changer in cybersecurity within the next five years. We’ll discuss Shor’s discovery for factoring and Grover’s algorithm for unstructured search and the implications that each one will have to nation-state-sponsored cryptanalysis. We’ll discuss how to assess corporate applications and plan for the implementation of quantum-resistant algorithms. Busted will be the myth that quantum-computing is in its infancy. Several examples of working quantum computers will be referenced and distinguished from the class of quantum simulators that are available in the cloud. We will illustrate our research findings on the theoretical power in qubits necessary to break popular encryption algorithms such as RSA, AES and TLS.


Learning Objectives:


Technical Program Manager
Identity Dynamics Corp

Richard Tychansky, CISSP-ISSEP, CSSLP, CAP, CIPP/US, is a technical program manager with more than 15 years of experience in systems design and software security engineering. He has championed building automation into security and privacy programs at several Fortune 100 companies. His experience includes: biometric software development; defense systems engineering; cryptologic research; and working with Google’s security and privacy to protect the data of a billion-plus users.

He has a passion for educating security professionals through his frequent speaking engagements with (ISC)2, IAPP, OWASP and Hacker Halted on topics such as cloud security architecture, cryptography, mobile application security, supply chain security and regulatory compliance. He participates in standards-setting working groups with NIST and the Cloud Security Alliance (CSA). He is also a member of Project Management Institute (PMI) and the International Association for Cryptologic Research (IACR).

As a program manager, Richard has the exceptional ability to work with executives, product managers and developers to solve hard technical security and privacy problems. He is considered an expert on GDPR compliance in the EU and what it means to corporate America and its business applications. He is highly tuned to identifying threats to users and their data and protecting them. Richard strives to impart knowledge that transforms business processes, consumer applications and technical backend infrastructure to be secure and privacy-preserving be default.


Send Email for Richard Tychansky


3111 - Great Scott! Quantum Cryptography is Fully Operational!



Presentation Slides




Attendees who have favorited this

Please enter your access key

The asset you are trying to access is locked. Please enter your access key to unlock.

Send Email for Great Scott! Quantum Cryptography is Fully Operational!