Jump to content

Two scenarios show how today’s decisions shape security, market position and long‑term viability.

Threats in the quantum age are more subtle than previous risks faced by business, and this is what makes them particularly dangerous. Cybercriminals and intelligence agencies are already quietly collecting data today that they will be able to decrypt tomorrow to cause maximum damage. This strategy is called “Store Now, Decrypt Later.” 

The question for executives is therefore no longer whether quantum computing is a threat. Gartner's forecast is clear: Traditional cryptography could become insecure starting in 2029, making new encryption methods necessary—we’ve already covered the technical details of this in this blog.

The real question today is, who got that message and who didn’t? 

This blog post maps the story of two types of companies that faced the same choice in 2026 but took two completely different paths. The focus is not the technical aspects of post-quantum cryptography. Instead, using fiction and game theory, it explores how decisions made today can have a massive impact on the business landscape in 5 to 10 years.

The Strategic Challenge: Decisions with an “invisible deadline”

Let’s imagine two fictional board meetings. They both face a common issue: the future security of the company’s assets. Design data must remain1 confidential for another 15 years​. However, digital encryption may only provide protection for another 5 years. New encryption methods such as post-quantum cryptography (PQC) are available, but they consume—in varying degrees—three resources: time, expertise, and money. The quickest way to migrate is using external experts, but this also comes at the highest cost and leaves the company without any in-house expertise. If a company trains the personnel it needs entirely in-house, there are fewer one-time costs, but this extends the project duration noticeably. 

The standard management decision in similar scenarios has typically been: wait and see. “The standards are still settling in; others are doing the same; we’ll respond if necessary.” That leads to the wrong decision. However, it will not become clear until after Q-Day that the decision was wrong.

Scenario 1: The Fictional Pioneering Company

Size: 800–1,200 employees, automotive/aerospace supplier 
Industry: manufacturing industry with long product cycles (15–20 years) 
CEO structure: a leader with a flair for technology, a CFO with a risk-aware mindset, a CTO with a passion for innovation

The numbers make this company’s decision sounds extremely bold: The supplier is seeking to invest 10% of its IT budget—an average of 7 to 10 million euros—in post-quantum security. 

In game-theory terms, this is a clear offensive strategy that is proactive and involves taking calculated risks. After all, there will certainly be objections to this plan. The standards have only been available since 2024 and will not be mandatory until 2026; the business case is “hypothetical,” whereas the costs are substantial and very real. But the company will look to two main arguments:

The CFO’s Risk Assessment: “A breakthrough in quantum computing would be a disaster for us. Our most important digital assets—CAM models, material specifications, and robot programs—are all vulnerable to hacking by quantum computers, which could result in potential damages of 25 to 40 million euros.”

The Strategic Argument: “Crypto-agility will be our core competency for the next phase of digital manufacturing. Those learning this today will be ahead of the competition tomorrow.”

Based on this strategic direction, the company has developed a clear roadmap:

  • CBOM (Cryptographic Bill of Materials) is the source of truth at the start of a project: A structured, automated, machine-readable inventory of all cryptographic assets provides clear guidance on what needs to be protected and in what order of priority
  • Introduction of a hybrid architecture: Classic and post-quantum encryption are implemented in parallel to ensure seamless digital security
  • Pilot projects using NIST standards: Don’t wait passively for commitments to take effect; instead, test, learn, and establish in advance
  • Supply chain integration: Suppliers and partners are integrated into the PQC strategy by the pioneering company
  • Embedding in governance: PQC is becoming a key topic in board-level reporting, not just an isolated IT task

“Life punishes those who come too late” —and that’s especially true in the tech industry. Given the disruptive potential of quantum computing, we should already be taking steps to protect sensitive information, for example through PQC. 
- Prof. Joachim Ankerhold, academic spokesperson for the MHP network partner QuantumBW and director of the Institute for Complex Quantum Systems at the University of Ulm.

Scenario 2: The Laggard Company

Size: 1,000–1,500 employees, a long-established company with (up to now) stable markets 
Industry: Manufacturing industry, similar product lifecycles (15–20 years) 
CEO structure comprises traditional manager, CFO focused on cost optimization, CTO with limited influence

This decision of this protagonist is: “Post-quantum cryptography is currently not a priority.” The company’s three counterarguments are reasonable, but short-sighted:

The Technological Argument: “The NIST standards have only been finalized since 2024. We’ll wait until the teething problems have been resolved and the technology matures.”

Budgetary Pressure: “Supply chain bottlenecks, inflation, pressure to digitalize. All that is already costing us over 50 million euros. We don’t have any spare money for hypothetical quantum risks in this cycle.”

The Governance Problem: Like many of her colleagues, the company’s IT director recognizes the risk, but does not have the appropriate level of influence over the decision. She reports to the CTO and does not have direct access to senior management. Consequently, her concerns are treated as an “IT problem” rather than as part of the business strategy.

In short, the tacit decision of the laggard company is: Carry on as before. Specifically, this means that it not only rejects PQC migration, but also fails to create and maintain a properly structured CBOM, and to develop a strategic PQC policy in the first place.

2030 and Beyond: The Theory Becomes a Business Case, and the Paths Diverge

Gartner’s forecast comes true, and our fictional pioneering company’s aggressive strategy pays off in multiple ways. 

  • Post-quantum becomes a competitive advantage. Major OEMs explicitly require PQC standards from new suppliers in their requests for proposals
  • Market leadership is a reality; many competitors are no longer able to supply products for safety-critical applications
  • The company is expanding; international markets, new business areas, and high customer satisfaction are driving record results
  • The employer brand appeal: The company is building a reputation among young professionals in the job market for being innovative and forward-thinking 

By the early 2030s, it will already be clear that substantial investments made in 2026 have more than paid for themselves thanks to higher margins, exclusive large-scale contracts, and competitive advantage.

The laggard company, on the other hand, faces the “worst-case scenario,” with the worst fears becoming a business reality: 

  • The reality of “Store Now, Decrypt Later” attacks is becoming a fact; data collected between 2025 and 2031 will be systematically released
  • Design drawings are appearing on Chinese forums; competitors are copying innovations that have been closely guarded for years
  • Customer data is being sold on dark web markets: GDPR violations are becoming evident and public
  • The use of internal strategy documents as a subject in investigative journalism will damage trust and reputation

And it’s not just the immediate damage that is weighing on the company. Its consequences and the negative perception in the market also pose significant problems. 

Costly Emergency Migration: What could have been implemented in 2026 for 7–10 million euros is now costing 20–30 million euros as an emergency measure—with less security and under extreme time pressure. 

Terminated Automotive Contracts: Major OEMs cannot work with suppliers that expose their vehicles to the risk of hacking via quantum computers. 

Vehicle Recalls Become Reality: “Quantum hacking incident in OTA update architecture” triggers massive recalls. 

Insurance Coverage Is Reduced: Cyber insurers are invoking quantum exclusions, or premiums are increased by 40–60% 

Regulatory Penalties—for example, for violating data protection requirements, the EU Cyber Resilience Act, or the NIS2 regulation—are taking a heavy toll on already strained finances 

In 2034, after suffering losses, fines, failed contracts, and damage to its reputation, the management of the laggard company must face up to a difficult reality: Their business model is no longer viable.

In hindsight, the decision made in 2026—which was seen as “premature” at the time—could have saved the company. What Can We Learn From History?

Lesson 1: Time as a Strategic Ally and Enemy

The threat posed by quantum computers is long-term, and that is exactly what makes it dangerous. But there is still time to act. Those making the most of this time—like this pioneering company—will come out on top. Those ignoring this impending development—such as our laggard company—will lose out. And the ideal time to act is now, while the threat has not yet materialized, teams do not yet have to operate in crisis mode,​​ and controlled changes can still be planned.

Lesson 2: Early Decisions Create Competitive Advantage Down The Line

The pioneering company’s mindset is less technical and more strategic. The 7–10 million euros investment in 2026 is not just about technical security. It builds market position, governance expertise, employer appeal, customer trust, and supply chain influence.

Lesson 3: The Technology Is Ready, but Not Always the Organization

The company’s shortcomings stemmed less from its IT capabilities and more from its​ processes and structures. The CTO said: “We’ll wait it out.” The IT director recognized the risk but had no say at the executive level. The CFO recognized the cost but not the business case. A classic governance pitfall: If strategic security decisions are not made by senior management and are not treated as strategic matters, the wrong course will be set. The pioneering company positioned itself differently. The threats posed by quantum computers were a key topic of discussion at the board meeting.

What Leaders Should Prioritize Now

Does the laggard company’s plight describe your situation? You’re not alone; this applies to many manufacturing companies. It’s not dramatic changes or knee-jerk reactions that are needed now. You just need to take three strategic steps over the next 12 months:

Step 1: The Post-Quantum Assessment

An honest assessment of Quantum’s vulnerabilities as a fact-based foundation for all follow-up measures:

  • Which cryptographic assets actually protect me right now (CBOM)?
  • Which of your assets will still need to remain confidential in 5+ years?
  • How vulnerable is your current cryptographic infrastructure?
  • What regulatory requirements will you face? (NIS2, Cyber Resilience Act, etc.)
  • How much will emergency migration cost as opposed to planned migration?

Step 2: The PQC Governance Model

Structural embedding at the executive level to ensure smart and, above all, consistent navigation in the PQC era:

  • Who decides on the post-quantum strategy? (Should be CFO/CRO or CEO’s office (not just the CTO)
  • How is PQC incorporated into board-level reporting?
  • What new policies and decision-making criteria are needed?
  • How do we communicate this decision to the outside world?

Step 3: The First-Mover Pilot (Q3 2026 — Q1 2027)

First practical PQC implementation aimed at establishing a robust pilot setup that provides insights for company-wide scaling:

  • Which critical asset or process will serve as the PQC test environment
  • What standards and tools will be used? (NIST ML-KEM, ML-DSA, etc.)
  • How will the pilot project be measured, documented, and prepared for scaling?
  • How will the organization learn from this pilot?

“The problem is clearly defined: It’s about strategy and the value added by quantum security, not the IT budget. Given our current quantum computing roadmap​​—as outlined by Gartner, for example—which is currently moving ahead of schedule, there is an urgent need for action. Crypto-agility, which also allows for new algorithms or quantum key distribution to be retrofitted, is a must. Quantum technology should be on the agenda of every executive board and supervisory board to avoid similar surprises that we saw with AI.”
- Axel Foery, Executive Vice President ID.Quantique

Conclusion: Two Paths and a Choice

Companies will have to make a decision by 2026. They will not explicitly decide on “post-quantum or not.” They will decide whether post-quantum security is a strategic issue or an IT issue—or whether it is not addressed at all.

This distinction is critical: ​If it remains an IT issue, it will be viewed as just that and evaluated by the same standards: Upskilling is expensive, as is replacing staff, and so on. Then the CFO demands: “Show me the ROI—that seems too hypothetical to me.” Then management decides to wait.

On the other hand, when post-quantum becomes a strategic issue, CEOs take an interest: “Which of our competitors have already understood this?” Then the CFO wants to know: “What new markets or premium positions will open up for us?” Then the CTO asks: “How do we implement this technically to maximize the benefit?” Then they play out the pioneer scenario.

FAQ

Is post-quantum security really necessary? Quantum computers don’t even exist yet.

Quantum computers of a size relevant to cryptography do not yet exist. But “Store Now, Decrypt Later” attacks are already taking place. Attackers are now collecting the data you encrypted today so they can decrypt it once quantum computers become available.

The threat is therefore real, just delayed. Furthermore​, Gartner predicts that traditional cryptography could become insecure from as early as 2029. If you haven’t migrated by then, it will be too late.

How much should companies budget for PQC​​?

There is currently no uniform mandatory percentage (e.g. established by law). However, several data points from research and industry surveys show a surprising degree of consistency across different institutions. Multiple surveys indicate 5–10% of the IT security budget to be allocated to PQC readiness

The thing to remember is that starting early is a strategic lever for reducing costs as it allows organizations to leverage IT lifecycle budgets (refresh cycles), whereas late, rushed procurement tends to drive up costs. 

How long does a Post-Quantum migration take?

This question depends heavily on how standardized or customized the software is within each company.  

The following guideline can be given as a general rule of thumb: 

  • Where companies rely heavily on off-the-shelf software (lots of SaaS/COTS, little legacy software), it often takes ~1–3 years for the most critical, security-relevant applications to become PQC-capable—often via updates; full implementation takes longer due to the long tail.
  • Companies that are dominated by custom or legacy systems (lots of custom code, OT/IoT, appliances) will find it often takes ~3–8+ years until everything is fully migrated; realistically, full “completion” is looking toward the 2035 timeframe.

The key point is, if you want to be secure against attacks by quantum computers by 2029, you need to start no later than 2026–2027, irrespective of the specific scenario. 

Which companies are particularly at risk?

Companies whose assets have long lifecycles are particularly at risk. This includes: 

  • Automotive: Vehicles have a lifespan of 15–20 years, and components such as OTA ecosystems must remain cryptographically secure throughout their entire lifecycle
  • Aerospace: Aircraft have a service life of 25–30 years, during which avionics, radio/satcom, and mission data require cryptography that remains secure over the long term, while updates can only be rolled out slowly due to certification requirements and operational realities.
  • Pharmaceuticals/Chemicals: Research data must remain confidential for at least 15 years
  • Infrastructure: Energy supply, transportation systems, and telecommunications have lifespans of decades
  • Finance: Transaction data, contracts, and customer information have long-standing protection requirements
  • Defense: Military platforms (jets, drones, satellites, ships) often remain in service for 30+ years—secure radio and satellite communications, mission data, and key materials must remain protected over very long periods, while updates and retrofits can only be rolled out slowly due to certification requirements, supply chain constraints, and operational realities
  • Industrial Goods / Mechanical & Plant Engineering: Machines, systems, and OT components (PLC/SCADA, sensors, remote service gateways) often remain in operation for 15–30+ years. Many use long-lived device identities, certificates, and proprietary protocols; they are difficult to patch and must remain securely maintainable remotely even after retrofitting 

Should we switch everything to post-quantum encryption right away?

No. A hybrid approach combines proven, traditional methods (such as RSA or Elliptic Curve Cryptography, ECC) with new quantum-resistant algorithms specified by NIST. If the new PQC algorithm fails due to unexpected vulnerabilities, the system is still protected by the traditional method. Conversely, the PQC algorithm protects against quantum attacks in the event that classical encryption is broken. 

The best-practice strategy: 

  • Critical assets first (those with a long confidentiality period or high potential for financial loss)
  • Hybrid implementation (not “out with the old, in with the new”)
  • Gradual scaling over 3–5 years
  • Continuous learning and adaptation 

Where can you get help?

There are several resources that can be helpful here, depending on where you are in the process: 

Internal resources: IT security, CTO’s office, strategic planning 

External consultants: Consulting services with proven expertise in cybersecurity and post-quantum specialization 

Technical partners: Providers of PQC solutions and hardware security modules 

Standards organizations: NIST, ETSI, BSI, and industry associations provide guidelines and best practices 

About our author

A “Better tomorrow” isn't possible without:

  1. Leveraging extensive experience to focus on relevant new developments
  2. Early adoption of new technologies in harmony with existing systems
  3. Cross-industry collaboration across organizational boundaries 

My heart beats faster for...

…uncharted territory that I have the privilege of exploring alongside others, so that we can make it work for us and our customers.

Dr. Jan van Lier

Senior Manager Software Defined Vehicle

About our author

A “Better tomorrow” isn't possible without:

  1. A deep understanding of digital security—and the ability to turn risks into solutions
  2. A curiosity about technology that goes beyond today’s standards
  3. Collaboration across disciplines to create more resilient systems

My heart beats faster for...

 ...for the interplay of diverse perspectives, from which true digital resilience emerges.

Paulus Korsakas

Manager

About our author

A “Better tomorrow” isn't possible without:

  1. an eye for technological trends—and the ability to turn them into tangible value
  2. an entrepreneurial mindset that boldly leads the way
  3. openness to new ideas and interdisciplinary collaboration 

My heart beats faster for...

 ...the moment when a complex topic suddenly becomes clear.

Julian Seyfarth

Associate