Ch 1. Why This Is a Security Book, Not a Quantum Book
Reframes quantum risk as a trust, identity, and migration problem rather than a physics prediction contest. Establishes the evidence hierarchy used throughout the book.
Inside the book
Each chapter stands on its own. The book is designed for two reading paths: one for boards and investors, one for CISOs and architects.
The Quantum Almanac 2026-2027 contains 20 chapters organized into five sections: The Threat Model (chapters 1-5), Composite Scenarios, Operational Chapters (chapters 6-13), Sector Playbooks for finance, healthcare, industrial, and government (chapters 14-17), and Governance and Action (chapters 18-20). The book covers harvest now decrypt later, what breaks first, timing uncertainty, PKI and machine trust, data at rest, third-party risk, zero trust during transition, and a 12-month action plan. Two reading paths are provided: one for boards and investors, one for CISOs and architects.
Chapter summaries
Reframes quantum risk as a trust, identity, and migration problem rather than a physics prediction contest. Establishes the evidence hierarchy used throughout the book.
Explains quantum computing concepts at the level security leaders need: what qubits, gates, and error correction mean for the threat timeline, without requiring physics background.
Builds the HNDL threat model from first principles. Shows why data with long confidentiality requirements is already at risk, regardless of when a CRQC arrives.
Maps which cryptographic primitives are vulnerable (RSA, ECC, DH) versus resistant (AES, SHA-3). Identifies the systems that break first: PKI, code signing, and key exchange.
Argues that timeline uncertainty about Q-Day is not a reason to delay. The migration timeline, not the threat timeline, is the binding constraint for most organizations.
Three realistic composite scenarios showing what happens to a financial services firm, a healthcare system, and a critical infrastructure operator that start migration too late.
Chronicles the inflection points that moved quantum risk from theoretical discussion to operational planning: NIST standards, G7 guidance, platform defaults, and procurement language.
Tracks how Apple, Google, Microsoft, and Cloudflare are already deploying post-quantum cryptography in production. Shows that the transition is not waiting for enterprise readiness.
Covers quantum risk implications for digital assets, securities disclosure obligations, and capital markets governance. Addresses regulatory expectations and fiduciary duties.
The operational chapter on cryptographic inventory. Covers discovery tools, scanning approaches, and how to map the cryptographic surface area across an enterprise.
Addresses the largest migration surface: machine identities, certificates, and PKI infrastructure. Covers certificate lifecycle, key management, and trust chain migration.
Focuses on long-lived data protection: archives, backups, key escrow, and data-at-rest encryption. These systems have the longest exposure window to HNDL attacks.
Practical guidance on managing quantum risk through the supply chain. Includes vendor questionnaires, contract language, and procurement evaluation criteria.
Addresses security operations during the migration period. Covers how zero trust architectures interact with cryptographic transitions and incident response implications.
Sector-specific playbook for financial services. Covers SWIFT, payment networks, trading infrastructure, regulatory expectations, and the G7 Cyber Expert Group roadmap.
Sector playbook for healthcare and life sciences. Addresses HIPAA implications, clinical trial data, medical device security, and long-lived patient data protection.
Covers operational technology, cloud infrastructure, and critical systems. Addresses the unique challenges of migrating embedded systems and long-lifecycle industrial controls.
Covers federal mandates (CNSA 2.0, OMB M-23-02), defense requirements, and national security implications. Maps the government migration timeline and procurement requirements.
Translates quantum risk into board-level language. Covers capital allocation frameworks, governance structures, and how to communicate migration progress to leadership.
Steelmans the strongest arguments against urgency: timeline uncertainty, cost, competing priorities, and immature standards. Then systematically addresses each objection with evidence.
A concrete, month-by-month action plan for starting post-quantum migration. Covers quick wins, governance setup, vendor engagement, inventory, and pilot deployments.
Sections
Reading paths
Preface, Executive Summary, Changes from 2025-2026 Edition, Chapters 1, 6, 8, 18, 19, and 20, then Appendix B.
A compact path for governance, disclosure, capital allocation, and oversight.
Executive Summary, Changes from 2025-2026 Edition, Chapters 2, 4, 7, 9 through 13, 15 through 17, Appendix C, and Appendix J.
Designed to move quickly from threat model to inventory, trust, supplier pressure, and implementation.
Get the full book