Little thought has been given to the imminent emergence of Quantum Computing. Theorized by Einstein, the Quantum state is no longer hypothetical. We have enjoyed the exponential rise of the processing power and the declining cost of binary computing for decades. Gordon Moore predicted its saturation point in 1957. That time has arrived. Binary computer logice is an either/function. Decisions are made by the digital choice of a 1 or a 0. Quantum computing can be described as a 1 and a 0 and an infinite number of numbers in between To the extent that today's cybersecurity measures achieve binary computing protections, they are no match for Quantum computing. Quantum computing speed and power will destroy binary computing security in milliseconds. No critical data in its current state of security is safe from theft and misuse on the arrival of Quantum computing. Personally identifiable Information, medical records, trade secrets, and proprietary information of every sort are "sitting ducks" for Quantum computing. These and many other critical data are currently being harvested for the inevitable break throughs of Quantum computing. Quantum computers are already demonstrating their unequaled power and speed in a number of applications in various use cases like supply chain, medical devices, and pharmaceuticals. Google's Willow quantum processor runs 13,000 times faster than the world’s most powerful supercomputers. Technologists, information officers, and privacy professionals call for pre-Quantum security measures to protect today's data from tomorrow's attacks. Educators, lawyers, policy makers, and the many disciplines of technology engineering and applications must be as fully informed of these threats as soon as possible. This session will state the case, illustrate the issues, and propose solutions to this coming crisis.

Speaker