Speaker:

We've had engagements with several agencies

Speaker:

where we've gone through the process of scanning

Speaker:

and discovering a discovery period, discovering

Speaker:

their vulnerabilities and helping them to identify

Speaker:

the ones that they should attack first. That makes them the most

Speaker:

vulnerable. And yes,

Speaker:

I think that's a good. Way to put it right. Because now is not the

Speaker:

time to panic. I'll paraphrase the Batman movie, Now is not the time to panic.

Speaker:

That'll come later. Quantum risk isn't about panic. It's

Speaker:

about timing. And that's exactly what we talk about on this episode

Speaker:

of Impact Quantum.

Speaker:

Hello and welcome back to Impact Quantum the podcast. We explore the

Speaker:

emerging field of quantum computing. And not just the field, the entire industry

Speaker:

where you're going to need not just PhDs, you're going to need marketers, sales reps,

Speaker:

et cetera. Just need really to be curious. And the most quantum

Speaker:

curious person I know is Candice Cooley. How's it going, Katus?

Speaker:

It's great, Frank, thank you for asking. Today is really

Speaker:

exciting. Okay. We're going to be speaking with Benita

Speaker:

Sassueta. Okay. And she does

Speaker:

quantum safe at IBM.

Speaker:

Interesting. We have a lot to talk about.

Speaker:

So quantum safe. Quantum safe what?

Speaker:

Safe from a cryptographically

Speaker:

relevant or a fault

Speaker:

tolerant quantum computer being able to crack

Speaker:

the cryptography once in the hands of

Speaker:

an adversarial threat. So

Speaker:

there are algorithms that

Speaker:

once on a fault tolerant computer it has enough

Speaker:

qubits, error correction is good.

Speaker:

The harvest now and decrypt later aspect

Speaker:

comes in where if an adversary has our

Speaker:

encrypted data, they're able to

Speaker:

use a fault tolerant or cryptographically relevant quantum

Speaker:

computer to decrypt that data that they

Speaker:

harvested that they weren't unable to encrypt. And this is

Speaker:

the time to do that will be shortened so it would be more

Speaker:

of a reality. And not only

Speaker:

is this part of my day job, but it's also my

Speaker:

dissertation subject. So I'm getting

Speaker:

a. I'm pursuing a doctoral degree in

Speaker:

business. I was really, really curious

Speaker:

from my career starting out as an engineer in the lab rat and research,

Speaker:

I was curious on how business decisions are made, especially

Speaker:

with emerging technologies. After my

Speaker:

MBA dug deeper and now I'm pursuing

Speaker:

my doctoral degree in business and my dissertation

Speaker:

topic is the impact of

Speaker:

a fault tolerant quantum computer on the

Speaker:

supply chain ecosystem

Speaker:

that use abominable software parts.

Speaker:

So they're already susceptible to Many cyber

Speaker:

attacks. So we know it's only going to

Speaker:

multiply and be more of an issue once

Speaker:

the adversaries have the capability to use a

Speaker:

quantum computer to attack the supply chain.

Speaker:

So without giving away any information that you don't want to

Speaker:

give away as you're, as you're putting your dissertation

Speaker:

together and stuff, are there any key insights that

Speaker:

you've that have emerged so far in your, in your,

Speaker:

in your work that you could share.

Speaker:

So the. I can share a little bit

Speaker:

about my methodology. And after being in science and

Speaker:

engineering so many years, we have a certain way of

Speaker:

addressing a problem, but by

Speaker:

using theories that aren't normally used in

Speaker:

the science world, like theories in psychology,

Speaker:

theories in sociology and other theories, decision making

Speaker:

theories. I'm viewing the issue from a different

Speaker:

lens and I haven't actually

Speaker:

began my research yet. I'm putting together my

Speaker:

design, designing my theoretical framework.

Speaker:

But I'm excited about the

Speaker:

theories that I'm applying to this problem. Looking

Speaker:

at it from a different viewpoint. Not

Speaker:

necessarily. Okay, it's

Speaker:

obvious on the innovation point,

Speaker:

innovation is, you know, happening rapid. You know,

Speaker:

we have to be able to adapt to these changes. We have to be able

Speaker:

to adopt this technology. But looking at a viewpoint from, okay, where is

Speaker:

the CIO or the CISO is coming from?

Speaker:

Why aren't they making these decisions to

Speaker:

implement or transform

Speaker:

their cybersecurity protocols to be ready for, for

Speaker:

when we have this fault tolerant quantum computer?

Speaker:

So yeah, you, you know, there's a lot of I want to unpack because in

Speaker:

your intro, you, you did bring up a lot of things that not every listener

Speaker:

may know. Right. So harvest now, decrypt later, I think would be a good.

Speaker:

Well, let's go back even further because I was listening to,

Speaker:

actually it was Joe Rogan podcast and he had Jensen Wong on there,

Speaker:

right. And it was an interesting thing because they, you know, I

Speaker:

think Jensen Huang is a very smart guy. Joe Rogan's

Speaker:

kind of like the everyday layman, so to speak, right? So he's like freaking out

Speaker:

about, oh my God, quantum computers are going to develop this super

Speaker:

sophisticated AI and it's going to blow through everything. And

Speaker:

Jensen tried to talk him down from the ledge. So I think it's important,

Speaker:

I think it's important that we level set here. Right.

Speaker:

So why are

Speaker:

quantum computers dangerous to

Speaker:

conventional encryption and basically everything we do? I think that's a good place to start,

Speaker:

then we can ask because that'll lead into harvest now to grip later.

Speaker:

Okay. Okay, so

Speaker:

we're not there yet. But we are

Speaker:

fastly approaching. Like I

Speaker:

mentioned previously, we

Speaker:

do have cybersecurity protocols.

Speaker:

Everyone knows about nist, and they have

Speaker:

protocols that we're supposed to

Speaker:

adhere to to protect our data. Right. To

Speaker:

protect our information. Well,

Speaker:

there are algorithms that can be ran on a

Speaker:

quantum computer that can

Speaker:

decrypt our once encrypted data

Speaker:

and it can do it in a time frame that won't take

Speaker:

thousands, hundreds, hundreds of years. So when it comes to

Speaker:

cryptography and the complexity of math that's

Speaker:

used to protect our data, so the threat of the

Speaker:

quantum computer is being able to solve those

Speaker:

supposedly unsolvable math

Speaker:

problems that protect, Currently protect our data. And that's where the threat of

Speaker:

the quantum computer comes in, because that's the whole,

Speaker:

that's his whole purpose is to be able to solve complex

Speaker:

problems not really solvable by

Speaker:

classical computer

Speaker:

in a shorter time span. So, so if you

Speaker:

encrypt your credit card data with convention and everything's

Speaker:

conventional, there's no quantum magic just yet. Right.

Speaker:

The idea is that by the time bad guys or bad gals

Speaker:

could decrypt that and

Speaker:

go on an Amazon shopping spree for you, it would be hundreds of

Speaker:

years. And honestly, in 100 years, you're probably going to have different problems, if you

Speaker:

have any problems at all. Whereas a quantum computer

Speaker:

could theoretically do that in to, say, an hour.

Speaker:

That's being generous. That's. Yeah, yeah, it won't be an hour, but,

Speaker:

you know. Yeah, yeah, yeah. Long enough to ruin your, ruin

Speaker:

your next credit card state, short enough to ruin your next credit card statement. Would

Speaker:

that be a good way to put it? Yeah, yeah. So, and then,

Speaker:

so then why are like national security types and

Speaker:

other people really freaked out about harvest now, decrypt later?

Speaker:

Because. Our data is so important.

Speaker:

And I've been working more on the federal side and

Speaker:

yes, they are aware and they are

Speaker:

putting protocols in place to protect

Speaker:

all of the data. I started out at Raytheon

Speaker:

Missile Systems, so I started out. Okay. So you've been in defense tech a while?

Speaker:

Yeah, I've been in defense on the hardware side with

Speaker:

missiles. Now I'm sort of indirectly on,

Speaker:

I think the next digital war being behind

Speaker:

protecting, helping our government and its

Speaker:

integrators protect our data. We

Speaker:

don't want our secrets in the hands of the

Speaker:

wrong person to use against us. Definitely

Speaker:

no, 100%. And the irony of the time we live in is

Speaker:

that while this is

Speaker:

coming soon, we don't know when is it. Three years, three months,

Speaker:

not three decades. Right. It's coming in some reasonable amount of time frame

Speaker:

and storage is cheap, right? So you have a lot of folks that are just

Speaker:

fine, your conversation is encrypted. I'm just going to store it.

Speaker:

And then whenever this happens, I'll be able to go back and decrypt

Speaker:

everything and kind of like the whole keys of the kingdom will be. Even

Speaker:

if it's a few years old, it's still going to be relevant enough.

Speaker:

And it's really scary. When I first heard that, I was like,

Speaker:

oh my God. Because I live in the D.C. metro area,

Speaker:

so, like, I'm not directly like in defense tech, but like, you

Speaker:

know, close enough to it that like, you know, it's not hard for me to

Speaker:

imagine, like, oh, this is like serious, seriously dangerous

Speaker:

stuff. Like, and I'm remembering a point to

Speaker:

answer Candace previous question.

Speaker:

Another thing that I discovered in my dissertation research

Speaker:

was that China,

Speaker:

China's criminal landscape, over 30%

Speaker:

is, are cyber crimes. So, and

Speaker:

that was as of what, five to seven years ago, and it's only

Speaker:

increasing. So by the time we do have a,

Speaker:

a cryptographically relevant quantum computer, who knows what that

Speaker:

number will be, but it'll probably be well above 50%.

Speaker:

So it's not just domestic, you know,

Speaker:

it's definitely foreign as well that we want to make sure that we

Speaker:

are protected. I mean, as a business model, looking at, from like the

Speaker:

criminal's point of view, cybercrime is like the best bang for

Speaker:

your buck, right? Or, or because

Speaker:

you're, you can be based anywhere in the world outside of

Speaker:

people's jurisdiction, sometimes even with your host country's

Speaker:

government's protection added to it. And you

Speaker:

could, you could, you know, if you walk downtown, don't do this,

Speaker:

kids at home. But if you can walk into a bank and you could, theoretically,

Speaker:

yes, you could rob a bank, but the chances of you getting caught, shot at

Speaker:

or elsewhere are pretty high. But if you rob a bank on the other side

Speaker:

of the planet, you know, your chances of getting caught are

Speaker:

way lower. They're not zero. But, you know, especially if

Speaker:

you're backed by a particular state, you know,

Speaker:

it's actually, I mean, from the criminal's point of view, it's safer and it's more

Speaker:

effective. Do you think that the governments are moving fast enough to

Speaker:

address this threat, or do you think they're getting stuck on

Speaker:

the policy gap? Well,

Speaker:

I don't think it's an easy

Speaker:

thing to do

Speaker:

looking at the vast amount of data, the

Speaker:

vast amount of information that needs to be protected and all of the

Speaker:

systems that's already in place, the transformation

Speaker:

that it's going to take to become cyber resilient,

Speaker:

which is meaning that, hey, we're not just protecting against

Speaker:

a quantum computer, but we're protecting against any other future

Speaker:

as much as possible emerging technology that can be a

Speaker:

threat to our modern day cryptography. So

Speaker:

I think they've already began, you know, and I

Speaker:

the first step being assess what you have, right?

Speaker:

So knowing where you're

Speaker:

vulnerable, knowing your cryptographic

Speaker:

vulnerabilities and then prioritizing those

Speaker:

vulnerabilities on which one we have to

Speaker:

address these first and have an action

Speaker:

plan to be able to

Speaker:

mitigate this. And so I can't

Speaker:

speak directly on if I think they're going fast enough

Speaker:

because I'm not aware of each

Speaker:

individual agency's plan. But there

Speaker:

have been, you know, there has been movement and they are

Speaker:

taking it serious. We've had, we've

Speaker:

had engagements with several agencies where

Speaker:

we've gone through the process of scanning

Speaker:

and discovering a discovery period, discovering

Speaker:

their vulnerabilities and helping them to identify

Speaker:

the ones that they should attack first. That makes them the most

Speaker:

vulnerable. And yes,

Speaker:

I think that's a good. Way to put it. Right. Because now is not the

Speaker:

time to panic. I'll paraphrase the Batman movie. Now is not the time to panic.

Speaker:

That'll come later. But

Speaker:

now's the time to assess and kind of reasonably through it.

Speaker:

I first heard about this probably

Speaker:

before I had my quantum computing aha moment in 2019.

Speaker:

I first heard about this in 2015, 2016 ish, when

Speaker:

he said basically like look, we don't know when this will happen at this

Speaker:

time. They were still measuring in decades, right?

Speaker:

But he's like, well, we should start

Speaker:

upgrading our encryption today because one, we all know how

Speaker:

slow federal it tends to work, right?

Speaker:

The best way to be ready in 10 years is to start five years ago,

Speaker:

right. And the second best way to be ready in 10 years to start today,

Speaker:

right? So that's one angle that's a very kind of very stoic,

Speaker:

very calm way to approach it. And then there's all the way on the other

Speaker:

side, the complete freakout thing, which like I said, I don't think it's time to

Speaker:

panic yet. I think that we'll get there, but not now. But I

Speaker:

think the best thing to do now, like is exactly what you said, right? Triage

Speaker:

and just slowly implement because what you don't want is you don't.

Speaker:

And I know there was some drama about this and maybe you can shed some

Speaker:

light into this. My wife actually works at nist, but not

Speaker:

on the quantum stuff. Right. So I kind of, I kind of hear some of

Speaker:

it. But wasn't there like some

Speaker:

algorithms that were ranked as quantum safe or quantum resistant and then

Speaker:

somebody broke them within a couple of weeks?

Speaker:

That was like a few years back. Might have been before the

Speaker:

pandemic. I don't remember exactly. Okay.

Speaker:

Or am I misremembering that wrong? Because. Yeah, I don't

Speaker:

recall. But you know, you're not speaking of the ones. Definitely

Speaker:

not speaking about the ones that were recently. No, not the recent ones.

Speaker:

Okay. Yeah, because remember they had kind of like a Hunger Games type thing

Speaker:

where it was like they had. You know what? I think that guy is an

Speaker:

IBMer who cracked it. I think he was on. I think you're right.

Speaker:

Zurich research team. Team was really, really smart people. Some

Speaker:

cartographers, cryptographers that were actually involved in

Speaker:

creating the, the newer algorithms that were

Speaker:

rolled out by nist. So yes, I think that guy is an IBM or. He's

Speaker:

a legend. Yeah. So like it's interesting because like, and, and,

Speaker:

and you, you probably, if you've not read the book, you've definitely

Speaker:

encountered it. The big giant red or is it blue now?

Speaker:

Bruce Schneier book called Applied Cryptography.

Speaker:

Have you ever read that? Okay, all right.

Speaker:

So yeah, yeah, yeah. So anyway, like in, in that, in that there's

Speaker:

plenty of stories about how everyone thinks their, their algorithm is

Speaker:

secure until they release it into the world and then suddenly it's not.

Speaker:

Right. Because they make you make certain. I mean it's just like software, it's software

Speaker:

development. Right, Like. Right. It's your imprint.

Speaker:

Right, right. So how do

Speaker:

you explain quantum risk to a non technical

Speaker:

executive in a way that actually motivates action?

Speaker:

Okay.

Speaker:

And motivates action without panic. Motivates action

Speaker:

without panic. Okay. I think that's the million dollar

Speaker:

or billion dollar question now that we're in the age of Nvidia.

Speaker:

Trillion dollar question. Right.

Speaker:

So sorry. Yeah, yeah, so I'll do it

Speaker:

in the point of view of my, of

Speaker:

my research topic. And the reason is because I'm accustomed to

Speaker:

audiences not being having

Speaker:

quantum experience, so I'm more comfortable

Speaker:

saying it that way. So for your

Speaker:

supply chain, you want to make

Speaker:

sure that not only the information

Speaker:

and the data that's being going from

Speaker:

one node to the next is protected, but you

Speaker:

also want to make sure that the

Speaker:

adversaries don't

Speaker:

enter the databases and the

Speaker:

infrastructure of the people that are

Speaker:

Trusted in within your supply chain. So there

Speaker:

were different instances where

Speaker:

software that was corrupted

Speaker:

got implanted and into the supply chain into

Speaker:

one, no weak node of the supply chain. And it impacted

Speaker:

governments, it impacted other, it impacted

Speaker:

everyone within the supply chain. So in order

Speaker:

to avoid not only people stealing your data,

Speaker:

but that's within that ecosystem,

Speaker:

but also having access to.

Speaker:

You want to make sure if this is, if this is the

Speaker:

state of how things are now

Speaker:

without the threat of

Speaker:

cryptographically relevant quantum computer, then we're, we're

Speaker:

further doomed. Right? It's, it's only going to, to get

Speaker:

worse. But I know I'm not doing a good

Speaker:

job of not making the scare tack is. Right. No, no, no. But, but I

Speaker:

mean like this is, I mean I think you're doing a great job because you're,

Speaker:

because you're right. Like it's not going to get any better on its own left

Speaker:

to its own devices. It is, it is going to get worse right from

Speaker:

here on out. Right. Because you have four for every developer you have.

Speaker:

We had another podcast guest talk about the

Speaker:

builder mentality versus the

Speaker:

attacker mentality. Right. And for every

Speaker:

builder you're going to have,

Speaker:

I think just the economic incentives of it. Before you

Speaker:

go into the geopolitical kind of Game of Thrones stuff.

Speaker:

Right. There are more incentives to

Speaker:

be an attacker than a builder. Definitely.

Speaker:

Definitely. So I think that

Speaker:

conservatively saying, you're talking about a five to one forever your

Speaker:

builder, you have, you probably have at least five attackers. And I think that's,

Speaker:

that's being conservative. It's probably way worse than that. Right.

Speaker:

And then with the builders, they have the, they have

Speaker:

constraints, right. So companies aren't going to invest

Speaker:

millions of dollars to protect something that, you know,

Speaker:

it's not as tangible or

Speaker:

something that, you know, they take a chance. Right. So

Speaker:

it's the risk that they know versus the risk that they

Speaker:

don't know. So it's like they're going to take on a known risk as

Speaker:

opposed to an unknown risk. And it just so happened to

Speaker:

be that that unknown risk may be protecting

Speaker:

itself against threat of a quantum computer.

Speaker:

So in your view, what are the top misconceptions that

Speaker:

leaders have about quantum technologies?

Speaker:

I think we've talked about this a little bit. One of the

Speaker:

top misconceptions is that it's decades away.

Speaker:

That's one top misconception. Another top

Speaker:

misconception is that it's just some

Speaker:

piece of hardware that does magic or

Speaker:

whatever. Another

Speaker:

misconception is that

Speaker:

I think that leaders think that the workforce

Speaker:

won't be prepared for it. I

Speaker:

do think that

Speaker:

we can upskill and we can retrain the

Speaker:

workforce to be able to make that adjustment. I mean,

Speaker:

we're doing it for AI and everyone that

Speaker:

is in the technical field know that you always have to be

Speaker:

constantly learning the latest and greatest

Speaker:

and constantly refreshing your skills.

Speaker:

I'm keeping it high level. Another

Speaker:

misconception is that it's going to cost

Speaker:

a lot of money or that I have to have my own

Speaker:

quantum computer. You don't. It's very expensive.

Speaker:

But another misconception is

Speaker:

that it's only for

Speaker:

researchers. It's on the academic

Speaker:

level and only researchers and PhDs

Speaker:

can do problems on it. But, you know,

Speaker:

partnering with researchers and partnering with

Speaker:

schools and other research

Speaker:

labs and companies

Speaker:

and finding use cases that

Speaker:

you're able to work with

Speaker:

a group of experts on, because you can

Speaker:

have the business view and they can have the algorithm or the

Speaker:

scientific view on how we can approach this problem.

Speaker:

I do think that it's not a field where

Speaker:

only people who have PhDs in quantum physicists can thrive

Speaker:

in. I do think it is going to take a

Speaker:

diverse group of thinkers from various backgrounds

Speaker:

thinking different ways to be able to address a

Speaker:

problem. And I think it's going to really transform how

Speaker:

executives make decisions. So

Speaker:

I don't see it as something that's going to disrupt the

Speaker:

market and replace all of class. No, we're still

Speaker:

going to have a laptop. We're not going to have a quantum computer in our

Speaker:

homes or quantum iPads or

Speaker:

quantum, you know, tablets for our kids. But I

Speaker:

do think it is going to transform

Speaker:

how we make decisions, how we make business decisions. And,

Speaker:

and it's going to be for the better. That's a good way

Speaker:

to put it. Right? Because I think, I think you're right. Like, you don't need

Speaker:

to be a PhD, you don't need to be a quantum researcher or a cryptographer.

Speaker:

Right? Like, you know, you don't need to understand all

Speaker:

the math behind it. But if you understand what's at risk here, and

Speaker:

you know, the cliche is, you know, big company has

Speaker:

a breach, right? Their stock tanks and all that,

Speaker:

all that financial drama. But the next day or two days later on LinkedIn,

Speaker:

what do you see? Infosec job openings for same company.

Speaker:

Right. I'm trying not to call anyone out in particular, but there was one.

Speaker:

There was one. It's not good karma. And like

Speaker:

some of them may or may not be customers of any one of our companies.

Speaker:

Now I'll Just stop right there. Right. But like, there's a

Speaker:

screenshot on LinkedIn, I'm sure elsewhere too, of like, you know, the

Speaker:

headline, the job openings, right? Which begs the question,

Speaker:

did they not value this prior to the breach?

Speaker:

Exactly. It's looking that way. Right. Because no one wants to see. My

Speaker:

wife has worked in some form of IT security for, I

Speaker:

don't want to say a number of years because I'll get in trouble, but

Speaker:

no one's happy when security comes knocking on the door,

Speaker:

right? Because especially developers, right? Because they're like,

Speaker:

I don't want to have to do that, you know? Right. Like, you want to

Speaker:

think security last. Right. If at all. Right. And it's even

Speaker:

worse, I think, with hardware companies, right?

Speaker:

Particularly consumer hardware companies. Right? Like, you

Speaker:

know, you probably heard the joke, The S in IoT stands for security,

Speaker:

right? Because it's never thought of, right. Or even just

Speaker:

resilience testing, right. Some of this is just good business practices, right? Like

Speaker:

when US East 1 went down on AWS, right? Not

Speaker:

calling them out, but, you know, outages happen. There was

Speaker:

a company that sold a smart bed. Did you hear about

Speaker:

this? That the bed would not

Speaker:

respond to. Like it was like one of those Craftmatic beds or

Speaker:

whatever. Like, it would beat up, it would go down. Like it would raise your

Speaker:

legs or whatever, but needed an

Speaker:

Internet connection to just

Speaker:

move the stupid bed. So it was literally stuck in

Speaker:

like whatever position until US east one came back,

Speaker:

right? And it's just like as a. As an architect, as a, you

Speaker:

know, as a developer, I'm like, how would you. Like you would not. Maybe I'm

Speaker:

just old and I remember the pre Internet days, right? Like, or when Internet

Speaker:

was Internet connections were very unreliable. Like, really, you

Speaker:

could just cache the data locally, you know,

Speaker:

do what the user wants and then cache it locally. I don't know, like, of

Speaker:

course it's, you know, I heard the best phrase the other day. It was the

Speaker:

easiest position on the team is the. The armchair quarterback.

Speaker:

So. Sorry I cut you off, Candace. No,

Speaker:

no, that's okay. I was thinking about, you know, you're. You're at a

Speaker:

really great intersection, right? You're. You're in highly

Speaker:

technical content, but you're also involved in

Speaker:

business best practices and supply chain.

Speaker:

So what kind of leadership lessons have you learned from

Speaker:

working at that intersection? Okay,

Speaker:

that's a very good question. So

Speaker:

one thing I did with one of my major clients,

Speaker:

leading the delivery of a

Speaker:

quantum safe transformation, one thing I did

Speaker:

was I looked up their values of

Speaker:

that company. I looked up the core values of that company and also

Speaker:

looked up the data that they had about

Speaker:

what the employees, how the employees feel about

Speaker:

those values. And so I picked three

Speaker:

things, right? So two things that really stuck out to me for that

Speaker:

client was they value technology

Speaker:

and they value innovation, but their feelings about

Speaker:

it is that they're not sure if they're able

Speaker:

to execute on it. Right. And another

Speaker:

key value that was by this

Speaker:

company was that they didn't have a

Speaker:

good feeling about

Speaker:

contractors or other companies coming in, closing the

Speaker:

deal, finishing what they started. So

Speaker:

I picked those two and that was the source of

Speaker:

our objectives and our key results. Number one, we're

Speaker:

going to make sure that they feel like they are in the driving seat

Speaker:

when it comes to this technology and innovation. We're going to

Speaker:

educate them as much as possible, but we're going to follow

Speaker:

their lead, but guide them at the same time. So that way

Speaker:

since we know they value innovation, that they feel like they

Speaker:

have a seat at the table. And the second thing we're going to do is

Speaker:

we're going to make sure we execute. We're going to communicate

Speaker:

our plan and we're going to show up and we're going to do

Speaker:

executive reports, we're going to do final reports, we're going to meet,

Speaker:

we're going to make sure they see the progress

Speaker:

and that did a huge impact on that

Speaker:

client and have follow up business. So

Speaker:

being in a leadership position and seeing

Speaker:

how really taking a look at not just what the

Speaker:

company you're working with, their core values are, but also

Speaker:

how they feel about those core values and acting accordingly,

Speaker:

really had a major impact on that engagement

Speaker:

and a potential follow up engagement with them.

Speaker:

It's fascinating. Thank you.

Speaker:

Interesting, because everyone can make a shiny toy, but

Speaker:

if no one wants to play with it or no one knows how

Speaker:

to operate it, they're just gonna put it to the side and

Speaker:

collect dust. But it was

Speaker:

a true lesson. And in

Speaker:

delivery and client success,

Speaker:

you. Know, in the broader picture, how should

Speaker:

organizations prepare for the talent needs

Speaker:

that they're going to have as tech like quantum computing and

Speaker:

advanced cybersecurity evolve?

Speaker:

Okay,

Speaker:

Get on IBM's Quantum website and take the free courses. I'm

Speaker:

just going to say it. We've been providing free coursework

Speaker:

not just with Quantum, but also with Quantum. Safe

Speaker:

free coursework, free certifications, free badges,

Speaker:

so many opportunities, YouTube channels, you can

Speaker:

learn for free. So

Speaker:

I think if clients

Speaker:

are, I mean, if companies focus more on

Speaker:

growing the interests and the passions of their

Speaker:

individual employees and I know that's hard because the purpose of business

Speaker:

is making money, but

Speaker:

having, I'm sure most companies have quantum champions,

Speaker:

people that are passionate about it and that like you, you both are

Speaker:

and that are quantum enthusiasts and, and read about it,

Speaker:

you know, in your spare time. Lean on these folks

Speaker:

and supporting them in every

Speaker:

aspect of getting the learning and the training, training that

Speaker:

they need. And not just the learning and the training. There's

Speaker:

hackathons, there's actual, you know, there's developer

Speaker:

conferences, there's so many opportunities to, to test

Speaker:

out that knowledge by, by having hands on experience

Speaker:

and creating an algorithm. So I think there's,

Speaker:

there's lots and lots of

Speaker:

artifacts, there's lots of things out there for

Speaker:

them to learn. So as a company you don't

Speaker:

have to recreate the wheel. IBM has done a lot of the work

Speaker:

for you already and they're providing for you for free because

Speaker:

we want our clients to be successful. And it is

Speaker:

one of the main concerns of our

Speaker:

clients. Like we, if we

Speaker:

purchase access to this quantum computer, who's going to program

Speaker:

it or who's going to create the algorithm?

Speaker:

Our leadership was aware of that. We've put things

Speaker:

in place to continue

Speaker:

providing educational content for

Speaker:

free to educate our next

Speaker:

generation of quantum developers. And I think that's good too.

Speaker:

Right. You know, IBM is recognized early that there is going

Speaker:

to be a pipeline shortage in the future. And the best way to know

Speaker:

the whole thing, the planting a tree. Right. You know, and I

Speaker:

will say, like even though I work for Red Hat, right. And this is not,

Speaker:

the show is not sponsored by Red Hat or anyway, it's completely independent.

Speaker:

Right. You know, and IBM,

Speaker:

IBM is the parent company of Red Hat, right. I don't want to put that

Speaker:

out there. Right? No, no, no surprises. IBM is

Speaker:

really one of the companies at the forefront, not just of quantum computing,

Speaker:

but the quantum training too. Right. With the, the kiskit stuff and

Speaker:

things like that. I think they created kiskit, if memory serves

Speaker:

too. Right. So like they're really at the forefront of this because I think they've

Speaker:

kind of, this is not IBM's first rodeo. Right. Like, you know,

Speaker:

IBM was there when the transistor came. Completely changed

Speaker:

what we thought of as computers or what's possible. Right. They were there during the,

Speaker:

you know, to this day they're called IBM PC compatibles. Right.

Speaker:

You know, so, you know, I think they kind of know

Speaker:

the long, the long haul picture of it. And fun fact, I don't know if

Speaker:

this came up in any previous Conversation you had with Candace. But Candace's

Speaker:

dad worked at IBM Research

Speaker:

in what, the 90s, 80s, 90s, like. Working on theoretical the 70s

Speaker:

through the 90s. But yeah, I mean his like theoreticals. In like quantum

Speaker:

stuff. Yeah, exactly. Nice. Right. I was that kid that go into school and didn't

Speaker:

know what her dad did for a living, you know, so. He was

Speaker:

your dad. That's what he did for a living. There you go. That's a great

Speaker:

answer. I love it. Yeah, I'm sorry, Frank, I cut you off. Go

Speaker:

ahead. Oh, no worries. That was, that was all I had.

Speaker:

So let me ask you this. How do you evaluate

Speaker:

whether an organization truly understands its crypto?

Speaker:

Agility, preparedness, versus just thinking

Speaker:

that they do? Ah,

Speaker:

so that's a good question. So we

Speaker:

do have a, an entire,

Speaker:

we have a software portfolio and

Speaker:

we do have an engagement where

Speaker:

we identified how prepared they are. And I talked

Speaker:

about it previously through the

Speaker:

software scanning tool, identifying their

Speaker:

cryptographic vulnerabilities

Speaker:

and the number that they have. Right. And so

Speaker:

from there we also identify if they have any

Speaker:

policies. Right, so. Or do they have a policy

Speaker:

team that

Speaker:

helps govern their cryptography,

Speaker:

their cyber security. And we also assess the

Speaker:

teams, the different teams that we will interact with. Right.

Speaker:

We take a look at their, if they have

Speaker:

lots and lots of applications or whatever

Speaker:

software they have, or whatever databases they have, we talk to

Speaker:

those database or software or application leads and

Speaker:

we can sort of, we have a questionnaires where we can assess where they are.

Speaker:

So what we're doing is we're, we have a heat map

Speaker:

and we go through that process, right? So in the

Speaker:

heat map, we ask a series of questions, we have a series of

Speaker:

interviews, and before we do any

Speaker:

scanning, we look at, you know, their

Speaker:

entire landscape of what needs to be protected,

Speaker:

and we ask questions based on

Speaker:

those items. We have, you know, certain categories. And

Speaker:

then based on their responses, we're able to create a heat map.

Speaker:

And the heat map actually show, okay, these, these

Speaker:

applications or these, this software that's

Speaker:

in the red. This, you know, these are the most

Speaker:

vulnerable. These are most at stake. And these are, you

Speaker:

know, really business, business relevant, right? So like, if

Speaker:

something happens to this, it can pretty much affect the entire business.

Speaker:

So we start off with that, that heat map and then from that

Speaker:

heat map we, we dive deeper,

Speaker:

right? So he heat map is on a higher level. Then we dive

Speaker:

deeper with the, the software tools

Speaker:

that we utilize and then we can get more details. And then,

Speaker:

so having the heat map from the top down and then the the

Speaker:

results from our software tools from a bottom up

Speaker:

we're able to come up with an action plan. And that

Speaker:

action plan prioritizes our findings from both the heat

Speaker:

map and the software tool results. And then once we have those

Speaker:

prioritized, we can provide them with a preliminary

Speaker:

roadmap. Right. So this preliminary

Speaker:

roadmap would ideally

Speaker:

give them from. You mentioned about. It's not going to take long. You're

Speaker:

dead on Frank, five to 10 years. So the roadmap can

Speaker:

be from five to 10 years long. Like we, we understand you're not going to

Speaker:

be able to do this in one year, but here are the things you can

Speaker:

do now and we provide that. And so I think I went

Speaker:

beyond your question. But

Speaker:

yeah. There'S a lot to think about is

Speaker:

there? And like there's no, it's the old

Speaker:

thing like there's no silver bullets but like if you don't think, if you do

Speaker:

nothing it's really bad. Doing nothing

Speaker:

is still something. So I learned that I like that in

Speaker:

dissertation. Right. So there's going to be an impact if you do nothing.

Speaker:

So and you just have to be prepared for what that is

Speaker:

or you, you will not be prepared for what that is. So,

Speaker:

so like if you, if you could go and, and advise

Speaker:

a mid sized enterprise today on preparing for

Speaker:

quantum era supply chain risks, what,

Speaker:

what three actions would you tell them to start with

Speaker:

immediately? Okay so the first

Speaker:

thing I would

Speaker:

tell them to do is to

Speaker:

take inventory of the

Speaker:

third party software vendors that you

Speaker:

have within your supply

Speaker:

chain network and I can explain more why later.

Speaker:

And the second thing I would tell them to do

Speaker:

is to, to work with them,

Speaker:

work with them in making their software

Speaker:

more secure. And the third thing I would tell them

Speaker:

to do is to really

Speaker:

communicate with everyone within that supply chain

Speaker:

ecosystem. It really should be first on, on what the weakness is

Speaker:

because you're only as strong as you know,

Speaker:

right. And that is definitely is the case with security

Speaker:

when the supply chain system. But the reason I say

Speaker:

to access the third party vendor software

Speaker:

solution is because found through my research that

Speaker:

this is. These are the weak points. A lot of times

Speaker:

the software vendors are reused

Speaker:

open source software and that's out for everyone.

Speaker:

So you're reusing this and it's even more vulnerable and it's easier

Speaker:

to inject bad

Speaker:

things into it to be able to, to, to

Speaker:

hack into whatever the adversary want to hack into.

Speaker:

So yes, thank you for giving me the space to talk about

Speaker:

my, my dissertation. I'm early on in it but

Speaker:

it's really, really help I talk

Speaker:

about it and the more questions that you all ask. Oh no, no,

Speaker:

it's like one of those things where it hits the nerve.

Speaker:

It hits the nerve that needs to be hit, right? Like how do you,

Speaker:

I mean any self improvement guru could tell you this, right? How do you, how

Speaker:

do you inspire action without inspiring panic, right? I'm sure

Speaker:

that, sure. Like that's, that's a tough, that's

Speaker:

a tough needle to thread, right? Like and I think

Speaker:

this is going to impact all of us, right? Like I don't think people really

Speaker:

realize that quantum computing isn't just hey look, you know, we'll get, you

Speaker:

know there will be that, right? We'll get better medicines faster, blah blah, blah blah.

Speaker:

Better materials like that will happen. But the thing that I think is and

Speaker:

you know, playing kind of the historical realist

Speaker:

here, right. Like what's driving investment in this largely is defense

Speaker:

and national security stuff right around the world, right? It's not just us.

Speaker:

Anybody with enough coin to throw at the problem

Speaker:

is throwing this coin at this problem. And that should tell you something

Speaker:

right there, right? And

Speaker:

you know, whoever figures this out first

Speaker:

and I think this also too, right, Whoever figured this out first is going to

Speaker:

have a significant tactical advantage. And I think also too like whenever

Speaker:

a functional quantum computer is actually built, we may never

Speaker:

know the first one. We'll know the second one probably,

Speaker:

but the first one is probably going to kept so there's such wraps for as

Speaker:

long as they can that. Because that's just. This is how

Speaker:

it works, right? It's not how it should work. But you know,

Speaker:

here we are. But no, I mean I think, I think, I

Speaker:

think, I think your, your dissertation really hits on a nerve of like how do

Speaker:

you educate people who are not educated. The people who can, can write the

Speaker:

checks, you know, the hippo as we like to call them, the highest paid person's

Speaker:

opinion. Ah, that's a good one. I have to take. Yeah, that's an old

Speaker:

Microsoft term so feel free to use it. Like more people need to know the

Speaker:

hippo, right? Like whoever, right? And the hippo is

Speaker:

not, you know, when we talk to startups like and things like that,

Speaker:

the person cutting the check for how much this quantum computer solution or quantum solution

Speaker:

is going to cost is not going to be a. Chances are they're not going

Speaker:

to have a PhD in quantum physics, right? Best you can hope for is an

Speaker:

mba, right? So how do you put that term

Speaker:

and how do you talk about this tech in ways they can understand. Right.

Speaker:

So what role do you see automation and

Speaker:

AI playing in helping organizations manage

Speaker:

their quantum era cybersecurity challenges? How,

Speaker:

how I see them, how I see automation

Speaker:

and AI helping in general

Speaker:

the supply chain ecosystem

Speaker:

is the

Speaker:

automation aspect being, I mean

Speaker:

really lowering the cost. Okay. Lowering transaction

Speaker:

costs. I just, I just studied this. So lowering the

Speaker:

transaction costs within the supply

Speaker:

chain system so the saving money

Speaker:

that way and the way it can help lower transaction

Speaker:

costs is automating

Speaker:

identifying products or automating finding

Speaker:

the right partner or

Speaker:

those types of things that

Speaker:

were more or less a manual thing previously,

Speaker:

but able to

Speaker:

shorten that that time or that

Speaker:

the space in between those two

Speaker:

nodes, supply chain nodes, whether it's a

Speaker:

transportation space or whether it's a, it's a time space

Speaker:

in getting from one spot to

Speaker:

one location to the next. But yes, I do

Speaker:

see

Speaker:

that in general for supply chain now for

Speaker:

quantum. Yes, there are lots of

Speaker:

machine learning

Speaker:

examples that can be

Speaker:

accomplished with both AI and quantum. And

Speaker:

I think that the use cases will

Speaker:

continue to, to increase.

Speaker:

I am looking forward to

Speaker:

the intersection of all of those. Right. So where we get to the point

Speaker:

where we're using AI and automation in a

Speaker:

way to make things better, you

Speaker:

know, repetitive operational

Speaker:

things, administrative things can be

Speaker:

done and that way the focus can be more on the

Speaker:

technical side. That is another way

Speaker:

I see time and space being

Speaker:

dedicated to the innovation

Speaker:

and nurturing, developing that innovation and

Speaker:

spending less time on the more operational

Speaker:

administrative tasks that can really

Speaker:

bog down the time of someone managing not just a supply

Speaker:

chain, but an entire ecosystem.

Speaker:

Interesting. That was a long way to that

Speaker:

I had to think it was a. Short question

Speaker:

with a long answer. Right. We've been at this as

Speaker:

a society like it work for,

Speaker:

I mean 60 to 40 to 60 years. Right.

Speaker:

And the larger the organization,

Speaker:

the same problems they all encounter, you know what I mean?

Speaker:

The secure bill of materials and all of this is really I think influenced

Speaker:

by. You build something, somebody breaks it and then you go back and fix

Speaker:

it. I think it's only been in the last maybe five, 10 years

Speaker:

there's been this kind of proactive approach, probably longer, but at

Speaker:

least I've only been aware of it for 5 to 10 year time

Speaker:

frame of you know, the red teaming, the blue teaming. Right. Like that sort of

Speaker:

thing, those types of exercises. And even then only

Speaker:

companies like IBM, Microsoft, those are two companies I worked

Speaker:

for that I knew that they had this. Right. And I, I talked with

Speaker:

people who's not in that field, you know, obviously red hat too.

Speaker:

But I just can't imagine, like, how would you

Speaker:

explain that 30 years ago? Well, what we're going to do is we're going to

Speaker:

have people try to hack you, but they're on our payroll, so they're okay. But

Speaker:

they'll report on like an incident. I mean, you can easily imagine.

Speaker:

I think there's a lot of people who are in kind of Fortune 500 leadership

Speaker:

today that, you know, they, they earned their,

Speaker:

you know, they earned their stripes or whatever analogy you want to use, like 30

Speaker:

years ago. Right. And they're kind of like in that government too, is actually

Speaker:

also in that, also in that space, barring some notable

Speaker:

exceptions. Right. So, like, how do you sell, I mean, ultimately, I think at

Speaker:

the end of the day, how do you sell being

Speaker:

proactive about this? Right. You know,

Speaker:

maybe it's like airbags and cars, right. Or seat belts and cars. Right.

Speaker:

Like, I, I, obviously it can't, it can't stop

Speaker:

accidents, but it can mitigate the risk of it. Right. Again, this is very

Speaker:

much top of my mind because of recent

Speaker:

events, but I mean, is that a good, healthy way to look at, is that

Speaker:

a good way to sell it to the hippos, so to speak?

Speaker:

I like this scenario that I've

Speaker:

used in the past. Let them know that you are

Speaker:

in a huge ship and you have to make

Speaker:

a turn in a tight spot, in a tight corner.

Speaker:

It's doable, but we have to start

Speaker:

now, right? Right, Right, right. Okay. We have to start

Speaker:

now. So this, this transformation is going to take some

Speaker:

time. And I know we can't do everything at once,

Speaker:

but if we start now, we can

Speaker:

gradually turn and get us going

Speaker:

in the right direction to where we achieve

Speaker:

cyber resilience. So.

Speaker:

Yeah, and that seemed to go over well. Cyber resilience,

Speaker:

I like that. Yeah, that feels strong. Awesome.

Speaker:

Yeah. Resilience, I think, is because you can't protect 100 of the

Speaker:

time. Right? Right. But resilience, right. Crumple zones and cars,

Speaker:

right. Like that sort of thing. For the next week or so, I'm. Probably gonna,

Speaker:

it's gonna be about cars. Yeah, cars. Because one of the worst things

Speaker:

about car totaling your car, aside from, you know, getting

Speaker:

injured, is you have to go shopping for a new car. And

Speaker:

that's just, I find that an unpleasant experience. But,

Speaker:

but I mean, like, you know, you can't predict, but you can at least mitigate.

Speaker:

Right? You can have the crumple zones, the airbags, the seat belts,

Speaker:

the, you know, anti lock brakes. Right. Like all those sorts of things. Right.

Speaker:

The good tires. Right. But, you know,

Speaker:

I think if you put it. I think everyone can kind of relate to that

Speaker:

as opposed to, you know, why am I going to pay these kids to try

Speaker:

to hack my site? You know, why am I going to do that? Right. I

Speaker:

could picture some, you know, somebody saying that with a gravelly voice, you know,

Speaker:

and it becomes. But. But I think if you kind of

Speaker:

see it as preventative kind of maintenance,

Speaker:

I don't know. I know we're coming to the top of the hour. I have

Speaker:

a hard stop, and I want to be respectful of your time, but this has

Speaker:

been a fascinating look to kind of like the overall notion

Speaker:

of this. And that's cool. Quantum safe, is it called? Yes,

Speaker:

yes. Cool. That's cool. I'm sorry, Candace.

Speaker:

No, I. Thank you so much for coming on. And, you know, we didn't even

Speaker:

get to really talk about the whole aerospace and defense

Speaker:

interest that you have, but. We do have another podcast in development

Speaker:

called Autonomous Warfare AI so just put that out there into the universe. So

Speaker:

hopefully by the time folks are listening, it's officially launched. But

Speaker:

I did register the domain name, so I do want to put that domain name

Speaker:

folks go to autonomouswarfare AI. You'll either see a signup

Speaker:

sheet or the actual podcast itself, depending on what happens between

Speaker:

here and when we launch season four. I do have one funny

Speaker:

story. If we have time on the aerospace

Speaker:

side. When I was at Honeywell

Speaker:

Aerospace, our team was responsible for creating,

Speaker:

like, over 60% of the cabin pressure control systems in the

Speaker:

world. And it was a small team of us, right?

Speaker:

And so one time I was flying with my family,

Speaker:

and the pilot got on and was like, wait a

Speaker:

minute, nothing's turning on. We don't know what's going on. We

Speaker:

can't do anything. I don't see any lights. And

Speaker:

so I had spent years in the lab, you know, with

Speaker:

the equipment that eventually went on

Speaker:

the airplane, you know, testing the subsystems, making sure

Speaker:

software, hardware, all that in the loop integration.

Speaker:

And so I. I yell out, do a

Speaker:

reset. Put

Speaker:

the off and on switch. And I don't know if they heard

Speaker:

me, but the pilot was like. And everything came

Speaker:

back on. He's like, oh, okay. I just turned it off and turned it back

Speaker:

on again. And the people around me start clapping. I was like, I'm not a

Speaker:

hero. I just been doing this in the lab. Every time stuff

Speaker:

hangs up, you know, the equipment hangs up, I just do a power. A

Speaker:

power reset and that and that does it. But, yeah, it reminds me of The

Speaker:

IT crowd. If you're. If you've not seen that show, it's. I think it's on

Speaker:

Netflix. You never seen that show? No. Oh my God. I

Speaker:

don't watch TV much. This is a show that's where at least the first

Speaker:

episode. It's hilarious. It's basically about this.

Speaker:

It. It. It's dated now. Like it's from like the early 2010s, but it's

Speaker:

basically a comedy about this. IT support department in this

Speaker:

posh British. They never explained what the company did, but they're basically

Speaker:

locked away in the basement. And it's like the support desk and the guy answers

Speaker:

the phone. Hello? Did you turn it off and turn it back on? Like that's

Speaker:

kind of. Yeah, it's always the first thing they ask you. But it's funny like,

Speaker:

and, and you could probably catch like clips of it on,

Speaker:

on YouTube and stuff like that. And there's like, you know,

Speaker:

every IT stereotype exists is like in

Speaker:

there. Whether it's the, the complete disrespect you get from

Speaker:

the higher ups to. To. Kind of, you

Speaker:

know, the, the socially awkward nerdy types working the work in the

Speaker:

D. It's funny. You'll enjoy it. I have to check it out

Speaker:

during my break. There you go. All right, so with that

Speaker:

we'll. It's a great place to end the show. We'll make sure in the show

Speaker:

notes, we have links to the IBM quantum safe program, the qiskit,

Speaker:

all the tutorial stuff and anything else of interest that you

Speaker:

would like to send. Send our listeners to. Yeah, sure, sure.

Speaker:

Definitely send them to the free training. So that'll be good.

Speaker:

Awesome. Awesome. Build your skills today. Because it's just like that

Speaker:

ship you're talking about, right? Like you're not. No one's going to be a Quantum

Speaker:

expert in 20 minutes. Right? There's not going to be that like, you

Speaker:

know, quantum computing for dummies type thing that you'll be able to read in 24

Speaker:

hours and then be an expert. Right. The. The time

Speaker:

to market and the time to learn is, you know, based on the time to

Speaker:

market. The time to learn is today. Obviously you can't be

Speaker:

like Candace's dad and start in the 70s, right. But the next best thing

Speaker:

is to start today. Yeah, yeah, yeah, yeah. Already started with my

Speaker:

8 year old. So we started with building a little

Speaker:

adult Legos computing chandelier.

Speaker:

So we're having fun. That's cool. Awesome. And

Speaker:

we'll play the outro music.

Speaker:

Quantum podcasts. They're breaking the mold Science has got beats

Speaker:

in bold and it's gold.

Speaker:

The multiverse is skanking Skanking in time? Black holes

Speaker:

are wailing in a horn line so fine From Planck scales to planets they're

Speaker:

connecting the dots Candace and Frank, they're the cosmic

Speaker:

hot shots.

Speaker:

Quantum podcast, turn it up fast Candace and Frank

Speaker:

blowing my mind at last Quantum podcast they're breaking

Speaker:

the mold Science has got beats it's bold

Speaker:

and it's gold.