Quantum Threats to Critical Infrastructure
Why CRQC timelines, harvest-now-decrypt-later attacks, and SCADA migration constraints make 2030 a planning goal rather than a forecast. Concrete risk picture for utility CISOs and policymakers, with examples from US grid SCADA and oil-and-gas OT.
Audience CISO/CTO + policymaker · mixed
Formats 60-min keynote · 30-min summit · panel · workshop
NIST PQC Migration Strategies
ML-KEM (Kyber), ML-DSA (Dilithium), and SLH-DSA (SPHINCS+) on real constrained hardware — what works, what does not. Hybrid deployments, smartcard limits, and the HSM problem nobody talks about.
Audience CISO/CTO + academic
Formats 60-min keynote · 90-min workshop · technical deep-dive
Quantum Kernels on Real NISQ Hardware
Lessons from running 8-qubit ZZFeatureMap on IBM ibm_fez (156 qubits), with cross-testbed validation on SWaT and HAI ICS datasets. What the +10.8% AUC actually buys you, and what shot-noise scaling will probably do to it.
Audience academic + technical
Formats 45-min research talk · 90-min tutorial
Sustainable 6G Cognitive Radio
Deep RL under partial observability, energy-aware reward shaping, and the security implications of policy-level attacks on radio controllers. Why the security model has to change when the radio learns.
Audience academic + technical · standards bodies
Formats 45-min research talk · panel · 30-min summit