Person

Umang Modi

TIAG

Published content

Quantum Risk Is Coming: How to Start Building Crypto Agility Now

expert panel

Quantum computing is poised to quickly turn a mindset of “we’re in good shape right now” into “why didn’t we start preparing sooner?” This is especially true when “now” refers to the encryption protecting customer data, intellectual property and the secrets a company’s board assumes are safe. Today’s widely used public-key systems were built for classical computers. A cryptographically relevant quantum machine could change the math fast, potentially wiping out the protections built over years of security planning. That’s why the quantum conversation is shifting from tech experts’ speculations to plain business risk management. Data has a shelf life, and for a lot of organizations, it’s a long one. Contracts, health records, financial history, M&A documents and source code don’t become innocuous just because the quarter ended. Add in the “harvest now, decrypt later” reality—adversaries collecting encrypted traffic today and unlocking it later—and the timeline to address quantum risk shrinks. The urgency is also being reinforced by credible signals that the transition is already underway, including NIST’s finalized post-quantum encryption standards. The good news is that organizations don’t need a quantum lab to start getting ready. But they do need clarity on where cryptography lives, how quickly it can be upgraded without breaking business processes, and who owns the decision-making when trade-offs emerge. Here, members of the Senior Executive Cybersecurity Think Tank weigh in on what organizations should do now to assess cryptographic vulnerabilities and build real crypto agility. 

How to Build Stronger Cybersecurity Through Smarter MDR Partnerships

expert panel

From credential-stuffing campaigns to deepfake-enabled impersonation and cloud configuration leaks, the modern attack surface has moved beyond the network—identity itself has become the new perimeter. As organizations migrate to hybrid environments and adopt more SaaS applications, the challenge isn’t just keeping pace with attackers but doing so amid a global cybersecurity talent shortage.  The growing reliance on Managed Detection and Response (MDR) services reflects a practical response to talent gaps, with the MDR market estimated at $4.19 billion in 2025 and expected to reach $11.30 billion by 2030. Yet as dependence on external partners grows, so does the question of balance—how can business leaders maintain control and accountability while leveraging outside expertise to strengthen defenses? Members of the Senior Executive Cybersecurity Think Tank, experts in enterprise security, zero-trust architecture and risk management, are tackling the question of what it means to “future-proof” cybersecurity head-on. Below, two of them discuss this strategic inflection point where identity, governance and partnership models converge—reshaping how organizations secure data, manage vendors and build resilience for what comes next.

Future-Proofing Cyber Teams in an Era of Escalating Risk

article

Demands on cybersecurity teams are growing faster than ever before. Members of the Senior Executive Cybersecurity Think Tank share how they’re transforming team culture, training strategies and internal collaboration to address both escalating attacks and shifting regulatory demands.

Navigating Evolving Global Privacy Laws: Advice From Cyber Experts

article

From SEC incident disclosure rules to evolving data privacy laws, cybersecurity leaders facing increasing scrutiny must rethink how compliance fits into daily operations. Members of the Cybersecurity Think Tank share practical frameworks and mindset shifts for staying ahead.

Company details

TIAG