PQC is encryption designed to stay secure even when quantum computers can break today’s mainstream cryptography so organizations can protect sensitive data for the long term. Find out more about our cybersecurity services.
Post-quantum security: act before Q-Day
Why does Q-Day matter and how can Proximus NXT support you?
Published on 17/02/2026 in Webinars, keynotes and videos
At ThinkNXT 2025, Peter Spiegeleer explained why quantum computing is reshaping the cybersecurity timeline, and what enterprises should do now to reduce risk.How can Proximus NXT support your organisation’s data protection?
If you wait, you’ll be forced to migrate your encryption algorithms in a rush which is never a good idea.
Peter Spiegeleer, Enterprise Security Architect at Proximus
Quantum computers may still be years away from large-scale adoption, but the security risk is already real. Malicious adversaries can “harvest now, decrypt later” by stealing encrypted data today and decrypting it once quantum capabilities mature. In parallel, future breakthroughs could weaken digital signatures that organisations rely on to verify software, identities and transactions.
In this Think NXT 2025 interview, Peter Spiegeleer outlines what enterprises should prioritise:
- identify where quantum cryptography sits across your environment and supply chain.
- build crypto-agility.
- start a structured, multi-year migration before compliance deadlines force rushed decisions.
Is post-quantum cryptography the missing layer in your cyber strategy?
Watch the full interview to learn how to reduce post-quantum risk and build a practical, enterprise-ready roadmap.
Want to learn more about post-quantum security? Discover the interview with Kristof Spriet and Peter Spiegeleer.
-
-
Crypto-agility is the ability to replace cryptographic algorithms, keys and certificates quickly across systems and suppliers without redesigning applications. It matters because post-quantum migration is a multi-year change and standards will evolve. With crypto-agility, you can update at pace while reducing operational risk. Explore our IT security solutions.
-
Because attackers can already collect encrypted data now to decrypt later, and forged signatures could enable software tampering if organisations don’t migrate in time. See how evolving threats are shaping priorities in our expert talk on cybersecurity trends.
-
Start by inventorying where cryptography is used across your environment (algorithms, protocols, certificates, dependencies across hardware/software and the supply chain). Then build crypto-agility so future swaps are feasible without redesigning everything.
-
Businesses and organizations with data that remains valuable for many years (e.g., patient, financial, strategic or regulated data). Even delayed decryption can still cause major impact on a legal, operational and reputational level. For context on quantum-safe security and long-lived data protection, watch this related video interview on quantum-safe security.
-
Proximus NXT can support quantum readiness by combining advisory capabilities (security maturity, compliance alignment and risk analysis) with continuous protection (24/7 monitoring and incident response). The right mix depends on your security maturity and operating model.
-
If you want to validate your current exposure and define priorities, start with an expert conversation to scope an assessment and roadmap.