We've had engagements with several agencies
Speaker:where we've gone through the process of scanning
Speaker:and discovering a discovery period, discovering
Speaker:their vulnerabilities and helping them to identify
Speaker:the ones that they should attack first. That makes them the most
Speaker:vulnerable. And yes,
Speaker:I think that's a good. Way to put it right. Because now is not the
Speaker:time to panic. I'll paraphrase the Batman movie, Now is not the time to panic.
Speaker:That'll come later. Quantum risk isn't about panic. It's
Speaker:about timing. And that's exactly what we talk about on this episode
Speaker:of Impact Quantum.
Speaker:Hello and welcome back to Impact Quantum the podcast. We explore the
Speaker:emerging field of quantum computing. And not just the field, the entire industry
Speaker:where you're going to need not just PhDs, you're going to need marketers, sales reps,
Speaker:et cetera. Just need really to be curious. And the most quantum
Speaker:curious person I know is Candice Cooley. How's it going, Katus?
Speaker:It's great, Frank, thank you for asking. Today is really
Speaker:exciting. Okay. We're going to be speaking with Benita
Speaker:Sassueta. Okay. And she does
Speaker:quantum safe at IBM.
Speaker:Interesting. We have a lot to talk about.
Speaker:So quantum safe. Quantum safe what?
Speaker:Safe from a cryptographically
Speaker:relevant or a fault
Speaker:tolerant quantum computer being able to crack
Speaker:the cryptography once in the hands of
Speaker:an adversarial threat. So
Speaker:there are algorithms that
Speaker:once on a fault tolerant computer it has enough
Speaker:qubits, error correction is good.
Speaker:The harvest now and decrypt later aspect
Speaker:comes in where if an adversary has our
Speaker:encrypted data, they're able to
Speaker:use a fault tolerant or cryptographically relevant quantum
Speaker:computer to decrypt that data that they
Speaker:harvested that they weren't unable to encrypt. And this is
Speaker:the time to do that will be shortened so it would be more
Speaker:of a reality. And not only
Speaker:is this part of my day job, but it's also my
Speaker:dissertation subject. So I'm getting
Speaker:a. I'm pursuing a doctoral degree in
Speaker:business. I was really, really curious
Speaker:from my career starting out as an engineer in the lab rat and research,
Speaker:I was curious on how business decisions are made, especially
Speaker:with emerging technologies. After my
Speaker:MBA dug deeper and now I'm pursuing
Speaker:my doctoral degree in business and my dissertation
Speaker:topic is the impact of
Speaker:a fault tolerant quantum computer on the
Speaker:supply chain ecosystem
Speaker:that use abominable software parts.
Speaker:So they're already susceptible to Many cyber
Speaker:attacks. So we know it's only going to
Speaker:multiply and be more of an issue once
Speaker:the adversaries have the capability to use a
Speaker:quantum computer to attack the supply chain.
Speaker:So without giving away any information that you don't want to
Speaker:give away as you're, as you're putting your dissertation
Speaker:together and stuff, are there any key insights that
Speaker:you've that have emerged so far in your, in your,
Speaker:in your work that you could share.
Speaker:So the. I can share a little bit
Speaker:about my methodology. And after being in science and
Speaker:engineering so many years, we have a certain way of
Speaker:addressing a problem, but by
Speaker:using theories that aren't normally used in
Speaker:the science world, like theories in psychology,
Speaker:theories in sociology and other theories, decision making
Speaker:theories. I'm viewing the issue from a different
Speaker:lens and I haven't actually
Speaker:began my research yet. I'm putting together my
Speaker:design, designing my theoretical framework.
Speaker:But I'm excited about the
Speaker:theories that I'm applying to this problem. Looking
Speaker:at it from a different viewpoint. Not
Speaker:necessarily. Okay, it's
Speaker:obvious on the innovation point,
Speaker:innovation is, you know, happening rapid. You know,
Speaker:we have to be able to adapt to these changes. We have to be able
Speaker:to adopt this technology. But looking at a viewpoint from, okay, where is
Speaker:the CIO or the CISO is coming from?
Speaker:Why aren't they making these decisions to
Speaker:implement or transform
Speaker:their cybersecurity protocols to be ready for, for
Speaker:when we have this fault tolerant quantum computer?
Speaker:So yeah, you, you know, there's a lot of I want to unpack because in
Speaker:your intro, you, you did bring up a lot of things that not every listener
Speaker:may know. Right. So harvest now, decrypt later, I think would be a good.
Speaker:Well, let's go back even further because I was listening to,
Speaker:actually it was Joe Rogan podcast and he had Jensen Wong on there,
Speaker:right. And it was an interesting thing because they, you know, I
Speaker:think Jensen Huang is a very smart guy. Joe Rogan's
Speaker:kind of like the everyday layman, so to speak, right? So he's like freaking out
Speaker:about, oh my God, quantum computers are going to develop this super
Speaker:sophisticated AI and it's going to blow through everything. And
Speaker:Jensen tried to talk him down from the ledge. So I think it's important,
Speaker:I think it's important that we level set here. Right.
Speaker:So why are
Speaker:quantum computers dangerous to
Speaker:conventional encryption and basically everything we do? I think that's a good place to start,
Speaker:then we can ask because that'll lead into harvest now to grip later.
Speaker:Okay. Okay, so
Speaker:we're not there yet. But we are
Speaker:fastly approaching. Like I
Speaker:mentioned previously, we
Speaker:do have cybersecurity protocols.
Speaker:Everyone knows about nist, and they have
Speaker:protocols that we're supposed to
Speaker:adhere to to protect our data. Right. To
Speaker:protect our information. Well,
Speaker:there are algorithms that can be ran on a
Speaker:quantum computer that can
Speaker:decrypt our once encrypted data
Speaker:and it can do it in a time frame that won't take
Speaker:thousands, hundreds, hundreds of years. So when it comes to
Speaker:cryptography and the complexity of math that's
Speaker:used to protect our data, so the threat of the
Speaker:quantum computer is being able to solve those
Speaker:supposedly unsolvable math
Speaker:problems that protect, Currently protect our data. And that's where the threat of
Speaker:the quantum computer comes in, because that's the whole,
Speaker:that's his whole purpose is to be able to solve complex
Speaker:problems not really solvable by
Speaker:classical computer
Speaker:in a shorter time span. So, so if you
Speaker:encrypt your credit card data with convention and everything's
Speaker:conventional, there's no quantum magic just yet. Right.
Speaker:The idea is that by the time bad guys or bad gals
Speaker:could decrypt that and
Speaker:go on an Amazon shopping spree for you, it would be hundreds of
Speaker:years. And honestly, in 100 years, you're probably going to have different problems, if you
Speaker:have any problems at all. Whereas a quantum computer
Speaker:could theoretically do that in to, say, an hour.
Speaker:That's being generous. That's. Yeah, yeah, it won't be an hour, but,
Speaker:you know. Yeah, yeah, yeah. Long enough to ruin your, ruin
Speaker:your next credit card state, short enough to ruin your next credit card statement. Would
Speaker:that be a good way to put it? Yeah, yeah. So, and then,
Speaker:so then why are like national security types and
Speaker:other people really freaked out about harvest now, decrypt later?
Speaker:Because. Our data is so important.
Speaker:And I've been working more on the federal side and
Speaker:yes, they are aware and they are
Speaker:putting protocols in place to protect
Speaker:all of the data. I started out at Raytheon
Speaker:Missile Systems, so I started out. Okay. So you've been in defense tech a while?
Speaker:Yeah, I've been in defense on the hardware side with
Speaker:missiles. Now I'm sort of indirectly on,
Speaker:I think the next digital war being behind
Speaker:protecting, helping our government and its
Speaker:integrators protect our data. We
Speaker:don't want our secrets in the hands of the
Speaker:wrong person to use against us. Definitely
Speaker:no, 100%. And the irony of the time we live in is
Speaker:that while this is
Speaker:coming soon, we don't know when is it. Three years, three months,
Speaker:not three decades. Right. It's coming in some reasonable amount of time frame
Speaker:and storage is cheap, right? So you have a lot of folks that are just
Speaker:fine, your conversation is encrypted. I'm just going to store it.
Speaker:And then whenever this happens, I'll be able to go back and decrypt
Speaker:everything and kind of like the whole keys of the kingdom will be. Even
Speaker:if it's a few years old, it's still going to be relevant enough.
Speaker:And it's really scary. When I first heard that, I was like,
Speaker:oh my God. Because I live in the D.C. metro area,
Speaker:so, like, I'm not directly like in defense tech, but like, you
Speaker:know, close enough to it that like, you know, it's not hard for me to
Speaker:imagine, like, oh, this is like serious, seriously dangerous
Speaker:stuff. Like, and I'm remembering a point to
Speaker:answer Candace previous question.
Speaker:Another thing that I discovered in my dissertation research
Speaker:was that China,
Speaker:China's criminal landscape, over 30%
Speaker:is, are cyber crimes. So, and
Speaker:that was as of what, five to seven years ago, and it's only
Speaker:increasing. So by the time we do have a,
Speaker:a cryptographically relevant quantum computer, who knows what that
Speaker:number will be, but it'll probably be well above 50%.
Speaker:So it's not just domestic, you know,
Speaker:it's definitely foreign as well that we want to make sure that we
Speaker:are protected. I mean, as a business model, looking at, from like the
Speaker:criminal's point of view, cybercrime is like the best bang for
Speaker:your buck, right? Or, or because
Speaker:you're, you can be based anywhere in the world outside of
Speaker:people's jurisdiction, sometimes even with your host country's
Speaker:government's protection added to it. And you
Speaker:could, you could, you know, if you walk downtown, don't do this,
Speaker:kids at home. But if you can walk into a bank and you could, theoretically,
Speaker:yes, you could rob a bank, but the chances of you getting caught, shot at
Speaker:or elsewhere are pretty high. But if you rob a bank on the other side
Speaker:of the planet, you know, your chances of getting caught are
Speaker:way lower. They're not zero. But, you know, especially if
Speaker:you're backed by a particular state, you know,
Speaker:it's actually, I mean, from the criminal's point of view, it's safer and it's more
Speaker:effective. Do you think that the governments are moving fast enough to
Speaker:address this threat, or do you think they're getting stuck on
Speaker:the policy gap? Well,
Speaker:I don't think it's an easy
Speaker:thing to do
Speaker:looking at the vast amount of data, the
Speaker:vast amount of information that needs to be protected and all of the
Speaker:systems that's already in place, the transformation
Speaker:that it's going to take to become cyber resilient,
Speaker:which is meaning that, hey, we're not just protecting against
Speaker:a quantum computer, but we're protecting against any other future
Speaker:as much as possible emerging technology that can be a
Speaker:threat to our modern day cryptography. So
Speaker:I think they've already began, you know, and I
Speaker:the first step being assess what you have, right?
Speaker:So knowing where you're
Speaker:vulnerable, knowing your cryptographic
Speaker:vulnerabilities and then prioritizing those
Speaker:vulnerabilities on which one we have to
Speaker:address these first and have an action
Speaker:plan to be able to
Speaker:mitigate this. And so I can't
Speaker:speak directly on if I think they're going fast enough
Speaker:because I'm not aware of each
Speaker:individual agency's plan. But there
Speaker:have been, you know, there has been movement and they are
Speaker:taking it serious. We've had, we've
Speaker:had engagements with several agencies where
Speaker:we've gone through the process of scanning
Speaker:and discovering a discovery period, discovering
Speaker:their vulnerabilities and helping them to identify
Speaker:the ones that they should attack first. That makes them the most
Speaker:vulnerable. And yes,
Speaker:I think that's a good. Way to put it. Right. Because now is not the
Speaker:time to panic. I'll paraphrase the Batman movie. Now is not the time to panic.
Speaker:That'll come later. But
Speaker:now's the time to assess and kind of reasonably through it.
Speaker:I first heard about this probably
Speaker:before I had my quantum computing aha moment in 2019.
Speaker:I first heard about this in 2015, 2016 ish, when
Speaker:he said basically like look, we don't know when this will happen at this
Speaker:time. They were still measuring in decades, right?
Speaker:But he's like, well, we should start
Speaker:upgrading our encryption today because one, we all know how
Speaker:slow federal it tends to work, right?
Speaker:The best way to be ready in 10 years is to start five years ago,
Speaker:right. And the second best way to be ready in 10 years to start today,
Speaker:right? So that's one angle that's a very kind of very stoic,
Speaker:very calm way to approach it. And then there's all the way on the other
Speaker:side, the complete freakout thing, which like I said, I don't think it's time to
Speaker:panic yet. I think that we'll get there, but not now. But I
Speaker:think the best thing to do now, like is exactly what you said, right? Triage
Speaker:and just slowly implement because what you don't want is you don't.
Speaker:And I know there was some drama about this and maybe you can shed some
Speaker:light into this. My wife actually works at nist, but not
Speaker:on the quantum stuff. Right. So I kind of, I kind of hear some of
Speaker:it. But wasn't there like some
Speaker:algorithms that were ranked as quantum safe or quantum resistant and then
Speaker:somebody broke them within a couple of weeks?
Speaker:That was like a few years back. Might have been before the
Speaker:pandemic. I don't remember exactly. Okay.
Speaker:Or am I misremembering that wrong? Because. Yeah, I don't
Speaker:recall. But you know, you're not speaking of the ones. Definitely
Speaker:not speaking about the ones that were recently. No, not the recent ones.
Speaker:Okay. Yeah, because remember they had kind of like a Hunger Games type thing
Speaker:where it was like they had. You know what? I think that guy is an
Speaker:IBMer who cracked it. I think he was on. I think you're right.
Speaker:Zurich research team. Team was really, really smart people. Some
Speaker:cartographers, cryptographers that were actually involved in
Speaker:creating the, the newer algorithms that were
Speaker:rolled out by nist. So yes, I think that guy is an IBM or. He's
Speaker:a legend. Yeah. So like it's interesting because like, and, and,
Speaker:and you, you probably, if you've not read the book, you've definitely
Speaker:encountered it. The big giant red or is it blue now?
Speaker:Bruce Schneier book called Applied Cryptography.
Speaker:Have you ever read that? Okay, all right.
Speaker:So yeah, yeah, yeah. So anyway, like in, in that, in that there's
Speaker:plenty of stories about how everyone thinks their, their algorithm is
Speaker:secure until they release it into the world and then suddenly it's not.
Speaker:Right. Because they make you make certain. I mean it's just like software, it's software
Speaker:development. Right, Like. Right. It's your imprint.
Speaker:Right, right. So how do
Speaker:you explain quantum risk to a non technical
Speaker:executive in a way that actually motivates action?
Speaker:Okay.
Speaker:And motivates action without panic. Motivates action
Speaker:without panic. Okay. I think that's the million dollar
Speaker:or billion dollar question now that we're in the age of Nvidia.
Speaker:Trillion dollar question. Right.
Speaker:So sorry. Yeah, yeah, so I'll do it
Speaker:in the point of view of my, of
Speaker:my research topic. And the reason is because I'm accustomed to
Speaker:audiences not being having
Speaker:quantum experience, so I'm more comfortable
Speaker:saying it that way. So for your
Speaker:supply chain, you want to make
Speaker:sure that not only the information
Speaker:and the data that's being going from
Speaker:one node to the next is protected, but you
Speaker:also want to make sure that the
Speaker:adversaries don't
Speaker:enter the databases and the
Speaker:infrastructure of the people that are
Speaker:Trusted in within your supply chain. So there
Speaker:were different instances where
Speaker:software that was corrupted
Speaker:got implanted and into the supply chain into
Speaker:one, no weak node of the supply chain. And it impacted
Speaker:governments, it impacted other, it impacted
Speaker:everyone within the supply chain. So in order
Speaker:to avoid not only people stealing your data,
Speaker:but that's within that ecosystem,
Speaker:but also having access to.
Speaker:You want to make sure if this is, if this is the
Speaker:state of how things are now
Speaker:without the threat of
Speaker:cryptographically relevant quantum computer, then we're, we're
Speaker:further doomed. Right? It's, it's only going to, to get
Speaker:worse. But I know I'm not doing a good
Speaker:job of not making the scare tack is. Right. No, no, no. But, but I
Speaker:mean like this is, I mean I think you're doing a great job because you're,
Speaker:because you're right. Like it's not going to get any better on its own left
Speaker:to its own devices. It is, it is going to get worse right from
Speaker:here on out. Right. Because you have four for every developer you have.
Speaker:We had another podcast guest talk about the
Speaker:builder mentality versus the
Speaker:attacker mentality. Right. And for every
Speaker:builder you're going to have,
Speaker:I think just the economic incentives of it. Before you
Speaker:go into the geopolitical kind of Game of Thrones stuff.
Speaker:Right. There are more incentives to
Speaker:be an attacker than a builder. Definitely.
Speaker:Definitely. So I think that
Speaker:conservatively saying, you're talking about a five to one forever your
Speaker:builder, you have, you probably have at least five attackers. And I think that's,
Speaker:that's being conservative. It's probably way worse than that. Right.
Speaker:And then with the builders, they have the, they have
Speaker:constraints, right. So companies aren't going to invest
Speaker:millions of dollars to protect something that, you know,
Speaker:it's not as tangible or
Speaker:something that, you know, they take a chance. Right. So
Speaker:it's the risk that they know versus the risk that they
Speaker:don't know. So it's like they're going to take on a known risk as
Speaker:opposed to an unknown risk. And it just so happened to
Speaker:be that that unknown risk may be protecting
Speaker:itself against threat of a quantum computer.
Speaker:So in your view, what are the top misconceptions that
Speaker:leaders have about quantum technologies?
Speaker:I think we've talked about this a little bit. One of the
Speaker:top misconceptions is that it's decades away.
Speaker:That's one top misconception. Another top
Speaker:misconception is that it's just some
Speaker:piece of hardware that does magic or
Speaker:whatever. Another
Speaker:misconception is that
Speaker:I think that leaders think that the workforce
Speaker:won't be prepared for it. I
Speaker:do think that
Speaker:we can upskill and we can retrain the
Speaker:workforce to be able to make that adjustment. I mean,
Speaker:we're doing it for AI and everyone that
Speaker:is in the technical field know that you always have to be
Speaker:constantly learning the latest and greatest
Speaker:and constantly refreshing your skills.
Speaker:I'm keeping it high level. Another
Speaker:misconception is that it's going to cost
Speaker:a lot of money or that I have to have my own
Speaker:quantum computer. You don't. It's very expensive.
Speaker:But another misconception is
Speaker:that it's only for
Speaker:researchers. It's on the academic
Speaker:level and only researchers and PhDs
Speaker:can do problems on it. But, you know,
Speaker:partnering with researchers and partnering with
Speaker:schools and other research
Speaker:labs and companies
Speaker:and finding use cases that
Speaker:you're able to work with
Speaker:a group of experts on, because you can
Speaker:have the business view and they can have the algorithm or the
Speaker:scientific view on how we can approach this problem.
Speaker:I do think that it's not a field where
Speaker:only people who have PhDs in quantum physicists can thrive
Speaker:in. I do think it is going to take a
Speaker:diverse group of thinkers from various backgrounds
Speaker:thinking different ways to be able to address a
Speaker:problem. And I think it's going to really transform how
Speaker:executives make decisions. So
Speaker:I don't see it as something that's going to disrupt the
Speaker:market and replace all of class. No, we're still
Speaker:going to have a laptop. We're not going to have a quantum computer in our
Speaker:homes or quantum iPads or
Speaker:quantum, you know, tablets for our kids. But I
Speaker:do think it is going to transform
Speaker:how we make decisions, how we make business decisions. And,
Speaker:and it's going to be for the better. That's a good way
Speaker:to put it. Right? Because I think, I think you're right. Like, you don't need
Speaker:to be a PhD, you don't need to be a quantum researcher or a cryptographer.
Speaker:Right? Like, you know, you don't need to understand all
Speaker:the math behind it. But if you understand what's at risk here, and
Speaker:you know, the cliche is, you know, big company has
Speaker:a breach, right? Their stock tanks and all that,
Speaker:all that financial drama. But the next day or two days later on LinkedIn,
Speaker:what do you see? Infosec job openings for same company.
Speaker:Right. I'm trying not to call anyone out in particular, but there was one.
Speaker:There was one. It's not good karma. And like
Speaker:some of them may or may not be customers of any one of our companies.
Speaker:Now I'll Just stop right there. Right. But like, there's a
Speaker:screenshot on LinkedIn, I'm sure elsewhere too, of like, you know, the
Speaker:headline, the job openings, right? Which begs the question,
Speaker:did they not value this prior to the breach?
Speaker:Exactly. It's looking that way. Right. Because no one wants to see. My
Speaker:wife has worked in some form of IT security for, I
Speaker:don't want to say a number of years because I'll get in trouble, but
Speaker:no one's happy when security comes knocking on the door,
Speaker:right? Because especially developers, right? Because they're like,
Speaker:I don't want to have to do that, you know? Right. Like, you want to
Speaker:think security last. Right. If at all. Right. And it's even
Speaker:worse, I think, with hardware companies, right?
Speaker:Particularly consumer hardware companies. Right? Like, you
Speaker:know, you probably heard the joke, The S in IoT stands for security,
Speaker:right? Because it's never thought of, right. Or even just
Speaker:resilience testing, right. Some of this is just good business practices, right? Like
Speaker:when US East 1 went down on AWS, right? Not
Speaker:calling them out, but, you know, outages happen. There was
Speaker:a company that sold a smart bed. Did you hear about
Speaker:this? That the bed would not
Speaker:respond to. Like it was like one of those Craftmatic beds or
Speaker:whatever. Like, it would beat up, it would go down. Like it would raise your
Speaker:legs or whatever, but needed an
Speaker:Internet connection to just
Speaker:move the stupid bed. So it was literally stuck in
Speaker:like whatever position until US east one came back,
Speaker:right? And it's just like as a. As an architect, as a, you
Speaker:know, as a developer, I'm like, how would you. Like you would not. Maybe I'm
Speaker:just old and I remember the pre Internet days, right? Like, or when Internet
Speaker:was Internet connections were very unreliable. Like, really, you
Speaker:could just cache the data locally, you know,
Speaker:do what the user wants and then cache it locally. I don't know, like, of
Speaker:course it's, you know, I heard the best phrase the other day. It was the
Speaker:easiest position on the team is the. The armchair quarterback.
Speaker:So. Sorry I cut you off, Candace. No,
Speaker:no, that's okay. I was thinking about, you know, you're. You're at a
Speaker:really great intersection, right? You're. You're in highly
Speaker:technical content, but you're also involved in
Speaker:business best practices and supply chain.
Speaker:So what kind of leadership lessons have you learned from
Speaker:working at that intersection? Okay,
Speaker:that's a very good question. So
Speaker:one thing I did with one of my major clients,
Speaker:leading the delivery of a
Speaker:quantum safe transformation, one thing I did
Speaker:was I looked up their values of
Speaker:that company. I looked up the core values of that company and also
Speaker:looked up the data that they had about
Speaker:what the employees, how the employees feel about
Speaker:those values. And so I picked three
Speaker:things, right? So two things that really stuck out to me for that
Speaker:client was they value technology
Speaker:and they value innovation, but their feelings about
Speaker:it is that they're not sure if they're able
Speaker:to execute on it. Right. And another
Speaker:key value that was by this
Speaker:company was that they didn't have a
Speaker:good feeling about
Speaker:contractors or other companies coming in, closing the
Speaker:deal, finishing what they started. So
Speaker:I picked those two and that was the source of
Speaker:our objectives and our key results. Number one, we're
Speaker:going to make sure that they feel like they are in the driving seat
Speaker:when it comes to this technology and innovation. We're going to
Speaker:educate them as much as possible, but we're going to follow
Speaker:their lead, but guide them at the same time. So that way
Speaker:since we know they value innovation, that they feel like they
Speaker:have a seat at the table. And the second thing we're going to do is
Speaker:we're going to make sure we execute. We're going to communicate
Speaker:our plan and we're going to show up and we're going to do
Speaker:executive reports, we're going to do final reports, we're going to meet,
Speaker:we're going to make sure they see the progress
Speaker:and that did a huge impact on that
Speaker:client and have follow up business. So
Speaker:being in a leadership position and seeing
Speaker:how really taking a look at not just what the
Speaker:company you're working with, their core values are, but also
Speaker:how they feel about those core values and acting accordingly,
Speaker:really had a major impact on that engagement
Speaker:and a potential follow up engagement with them.
Speaker:It's fascinating. Thank you.
Speaker:Interesting, because everyone can make a shiny toy, but
Speaker:if no one wants to play with it or no one knows how
Speaker:to operate it, they're just gonna put it to the side and
Speaker:collect dust. But it was
Speaker:a true lesson. And in
Speaker:delivery and client success,
Speaker:you. Know, in the broader picture, how should
Speaker:organizations prepare for the talent needs
Speaker:that they're going to have as tech like quantum computing and
Speaker:advanced cybersecurity evolve?
Speaker:Okay,
Speaker:Get on IBM's Quantum website and take the free courses. I'm
Speaker:just going to say it. We've been providing free coursework
Speaker:not just with Quantum, but also with Quantum. Safe
Speaker:free coursework, free certifications, free badges,
Speaker:so many opportunities, YouTube channels, you can
Speaker:learn for free. So
Speaker:I think if clients
Speaker:are, I mean, if companies focus more on
Speaker:growing the interests and the passions of their
Speaker:individual employees and I know that's hard because the purpose of business
Speaker:is making money, but
Speaker:having, I'm sure most companies have quantum champions,
Speaker:people that are passionate about it and that like you, you both are
Speaker:and that are quantum enthusiasts and, and read about it,
Speaker:you know, in your spare time. Lean on these folks
Speaker:and supporting them in every
Speaker:aspect of getting the learning and the training, training that
Speaker:they need. And not just the learning and the training. There's
Speaker:hackathons, there's actual, you know, there's developer
Speaker:conferences, there's so many opportunities to, to test
Speaker:out that knowledge by, by having hands on experience
Speaker:and creating an algorithm. So I think there's,
Speaker:there's lots and lots of
Speaker:artifacts, there's lots of things out there for
Speaker:them to learn. So as a company you don't
Speaker:have to recreate the wheel. IBM has done a lot of the work
Speaker:for you already and they're providing for you for free because
Speaker:we want our clients to be successful. And it is
Speaker:one of the main concerns of our
Speaker:clients. Like we, if we
Speaker:purchase access to this quantum computer, who's going to program
Speaker:it or who's going to create the algorithm?
Speaker:Our leadership was aware of that. We've put things
Speaker:in place to continue
Speaker:providing educational content for
Speaker:free to educate our next
Speaker:generation of quantum developers. And I think that's good too.
Speaker:Right. You know, IBM is recognized early that there is going
Speaker:to be a pipeline shortage in the future. And the best way to know
Speaker:the whole thing, the planting a tree. Right. You know, and I
Speaker:will say, like even though I work for Red Hat, right. And this is not,
Speaker:the show is not sponsored by Red Hat or anyway, it's completely independent.
Speaker:Right. You know, and IBM,
Speaker:IBM is the parent company of Red Hat, right. I don't want to put that
Speaker:out there. Right? No, no, no surprises. IBM is
Speaker:really one of the companies at the forefront, not just of quantum computing,
Speaker:but the quantum training too. Right. With the, the kiskit stuff and
Speaker:things like that. I think they created kiskit, if memory serves
Speaker:too. Right. So like they're really at the forefront of this because I think they've
Speaker:kind of, this is not IBM's first rodeo. Right. Like, you know,
Speaker:IBM was there when the transistor came. Completely changed
Speaker:what we thought of as computers or what's possible. Right. They were there during the,
Speaker:you know, to this day they're called IBM PC compatibles. Right.
Speaker:You know, so, you know, I think they kind of know
Speaker:the long, the long haul picture of it. And fun fact, I don't know if
Speaker:this came up in any previous Conversation you had with Candace. But Candace's
Speaker:dad worked at IBM Research
Speaker:in what, the 90s, 80s, 90s, like. Working on theoretical the 70s
Speaker:through the 90s. But yeah, I mean his like theoreticals. In like quantum
Speaker:stuff. Yeah, exactly. Nice. Right. I was that kid that go into school and didn't
Speaker:know what her dad did for a living, you know, so. He was
Speaker:your dad. That's what he did for a living. There you go. That's a great
Speaker:answer. I love it. Yeah, I'm sorry, Frank, I cut you off. Go
Speaker:ahead. Oh, no worries. That was, that was all I had.
Speaker:So let me ask you this. How do you evaluate
Speaker:whether an organization truly understands its crypto?
Speaker:Agility, preparedness, versus just thinking
Speaker:that they do? Ah,
Speaker:so that's a good question. So we
Speaker:do have a, an entire,
Speaker:we have a software portfolio and
Speaker:we do have an engagement where
Speaker:we identified how prepared they are. And I talked
Speaker:about it previously through the
Speaker:software scanning tool, identifying their
Speaker:cryptographic vulnerabilities
Speaker:and the number that they have. Right. And so
Speaker:from there we also identify if they have any
Speaker:policies. Right, so. Or do they have a policy
Speaker:team that
Speaker:helps govern their cryptography,
Speaker:their cyber security. And we also assess the
Speaker:teams, the different teams that we will interact with. Right.
Speaker:We take a look at their, if they have
Speaker:lots and lots of applications or whatever
Speaker:software they have, or whatever databases they have, we talk to
Speaker:those database or software or application leads and
Speaker:we can sort of, we have a questionnaires where we can assess where they are.
Speaker:So what we're doing is we're, we have a heat map
Speaker:and we go through that process, right? So in the
Speaker:heat map, we ask a series of questions, we have a series of
Speaker:interviews, and before we do any
Speaker:scanning, we look at, you know, their
Speaker:entire landscape of what needs to be protected,
Speaker:and we ask questions based on
Speaker:those items. We have, you know, certain categories. And
Speaker:then based on their responses, we're able to create a heat map.
Speaker:And the heat map actually show, okay, these, these
Speaker:applications or these, this software that's
Speaker:in the red. This, you know, these are the most
Speaker:vulnerable. These are most at stake. And these are, you
Speaker:know, really business, business relevant, right? So like, if
Speaker:something happens to this, it can pretty much affect the entire business.
Speaker:So we start off with that, that heat map and then from that
Speaker:heat map we, we dive deeper,
Speaker:right? So he heat map is on a higher level. Then we dive
Speaker:deeper with the, the software tools
Speaker:that we utilize and then we can get more details. And then,
Speaker:so having the heat map from the top down and then the the
Speaker:results from our software tools from a bottom up
Speaker:we're able to come up with an action plan. And that
Speaker:action plan prioritizes our findings from both the heat
Speaker:map and the software tool results. And then once we have those
Speaker:prioritized, we can provide them with a preliminary
Speaker:roadmap. Right. So this preliminary
Speaker:roadmap would ideally
Speaker:give them from. You mentioned about. It's not going to take long. You're
Speaker:dead on Frank, five to 10 years. So the roadmap can
Speaker:be from five to 10 years long. Like we, we understand you're not going to
Speaker:be able to do this in one year, but here are the things you can
Speaker:do now and we provide that. And so I think I went
Speaker:beyond your question. But
Speaker:yeah. There'S a lot to think about is
Speaker:there? And like there's no, it's the old
Speaker:thing like there's no silver bullets but like if you don't think, if you do
Speaker:nothing it's really bad. Doing nothing
Speaker:is still something. So I learned that I like that in
Speaker:dissertation. Right. So there's going to be an impact if you do nothing.
Speaker:So and you just have to be prepared for what that is
Speaker:or you, you will not be prepared for what that is. So,
Speaker:so like if you, if you could go and, and advise
Speaker:a mid sized enterprise today on preparing for
Speaker:quantum era supply chain risks, what,
Speaker:what three actions would you tell them to start with
Speaker:immediately? Okay so the first
Speaker:thing I would
Speaker:tell them to do is to
Speaker:take inventory of the
Speaker:third party software vendors that you
Speaker:have within your supply
Speaker:chain network and I can explain more why later.
Speaker:And the second thing I would tell them to do
Speaker:is to, to work with them,
Speaker:work with them in making their software
Speaker:more secure. And the third thing I would tell them
Speaker:to do is to really
Speaker:communicate with everyone within that supply chain
Speaker:ecosystem. It really should be first on, on what the weakness is
Speaker:because you're only as strong as you know,
Speaker:right. And that is definitely is the case with security
Speaker:when the supply chain system. But the reason I say
Speaker:to access the third party vendor software
Speaker:solution is because found through my research that
Speaker:this is. These are the weak points. A lot of times
Speaker:the software vendors are reused
Speaker:open source software and that's out for everyone.
Speaker:So you're reusing this and it's even more vulnerable and it's easier
Speaker:to inject bad
Speaker:things into it to be able to, to, to
Speaker:hack into whatever the adversary want to hack into.
Speaker:So yes, thank you for giving me the space to talk about
Speaker:my, my dissertation. I'm early on in it but
Speaker:it's really, really help I talk
Speaker:about it and the more questions that you all ask. Oh no, no,
Speaker:it's like one of those things where it hits the nerve.
Speaker:It hits the nerve that needs to be hit, right? Like how do you,
Speaker:I mean any self improvement guru could tell you this, right? How do you, how
Speaker:do you inspire action without inspiring panic, right? I'm sure
Speaker:that, sure. Like that's, that's a tough, that's
Speaker:a tough needle to thread, right? Like and I think
Speaker:this is going to impact all of us, right? Like I don't think people really
Speaker:realize that quantum computing isn't just hey look, you know, we'll get, you
Speaker:know there will be that, right? We'll get better medicines faster, blah blah, blah blah.
Speaker:Better materials like that will happen. But the thing that I think is and
Speaker:you know, playing kind of the historical realist
Speaker:here, right. Like what's driving investment in this largely is defense
Speaker:and national security stuff right around the world, right? It's not just us.
Speaker:Anybody with enough coin to throw at the problem
Speaker:is throwing this coin at this problem. And that should tell you something
Speaker:right there, right? And
Speaker:you know, whoever figures this out first
Speaker:and I think this also too, right, Whoever figured this out first is going to
Speaker:have a significant tactical advantage. And I think also too like whenever
Speaker:a functional quantum computer is actually built, we may never
Speaker:know the first one. We'll know the second one probably,
Speaker:but the first one is probably going to kept so there's such wraps for as
Speaker:long as they can that. Because that's just. This is how
Speaker:it works, right? It's not how it should work. But you know,
Speaker:here we are. But no, I mean I think, I think, I
Speaker:think, I think your, your dissertation really hits on a nerve of like how do
Speaker:you educate people who are not educated. The people who can, can write the
Speaker:checks, you know, the hippo as we like to call them, the highest paid person's
Speaker:opinion. Ah, that's a good one. I have to take. Yeah, that's an old
Speaker:Microsoft term so feel free to use it. Like more people need to know the
Speaker:hippo, right? Like whoever, right? And the hippo is
Speaker:not, you know, when we talk to startups like and things like that,
Speaker:the person cutting the check for how much this quantum computer solution or quantum solution
Speaker:is going to cost is not going to be a. Chances are they're not going
Speaker:to have a PhD in quantum physics, right? Best you can hope for is an
Speaker:mba, right? So how do you put that term
Speaker:and how do you talk about this tech in ways they can understand. Right.
Speaker:So what role do you see automation and
Speaker:AI playing in helping organizations manage
Speaker:their quantum era cybersecurity challenges? How,
Speaker:how I see them, how I see automation
Speaker:and AI helping in general
Speaker:the supply chain ecosystem
Speaker:is the
Speaker:automation aspect being, I mean
Speaker:really lowering the cost. Okay. Lowering transaction
Speaker:costs. I just, I just studied this. So lowering the
Speaker:transaction costs within the supply
Speaker:chain system so the saving money
Speaker:that way and the way it can help lower transaction
Speaker:costs is automating
Speaker:identifying products or automating finding
Speaker:the right partner or
Speaker:those types of things that
Speaker:were more or less a manual thing previously,
Speaker:but able to
Speaker:shorten that that time or that
Speaker:the space in between those two
Speaker:nodes, supply chain nodes, whether it's a
Speaker:transportation space or whether it's a, it's a time space
Speaker:in getting from one spot to
Speaker:one location to the next. But yes, I do
Speaker:see
Speaker:that in general for supply chain now for
Speaker:quantum. Yes, there are lots of
Speaker:machine learning
Speaker:examples that can be
Speaker:accomplished with both AI and quantum. And
Speaker:I think that the use cases will
Speaker:continue to, to increase.
Speaker:I am looking forward to
Speaker:the intersection of all of those. Right. So where we get to the point
Speaker:where we're using AI and automation in a
Speaker:way to make things better, you
Speaker:know, repetitive operational
Speaker:things, administrative things can be
Speaker:done and that way the focus can be more on the
Speaker:technical side. That is another way
Speaker:I see time and space being
Speaker:dedicated to the innovation
Speaker:and nurturing, developing that innovation and
Speaker:spending less time on the more operational
Speaker:administrative tasks that can really
Speaker:bog down the time of someone managing not just a supply
Speaker:chain, but an entire ecosystem.
Speaker:Interesting. That was a long way to that
Speaker:I had to think it was a. Short question
Speaker:with a long answer. Right. We've been at this as
Speaker:a society like it work for,
Speaker:I mean 60 to 40 to 60 years. Right.
Speaker:And the larger the organization,
Speaker:the same problems they all encounter, you know what I mean?
Speaker:The secure bill of materials and all of this is really I think influenced
Speaker:by. You build something, somebody breaks it and then you go back and fix
Speaker:it. I think it's only been in the last maybe five, 10 years
Speaker:there's been this kind of proactive approach, probably longer, but at
Speaker:least I've only been aware of it for 5 to 10 year time
Speaker:frame of you know, the red teaming, the blue teaming. Right. Like that sort of
Speaker:thing, those types of exercises. And even then only
Speaker:companies like IBM, Microsoft, those are two companies I worked
Speaker:for that I knew that they had this. Right. And I, I talked with
Speaker:people who's not in that field, you know, obviously red hat too.
Speaker:But I just can't imagine, like, how would you
Speaker:explain that 30 years ago? Well, what we're going to do is we're going to
Speaker:have people try to hack you, but they're on our payroll, so they're okay. But
Speaker:they'll report on like an incident. I mean, you can easily imagine.
Speaker:I think there's a lot of people who are in kind of Fortune 500 leadership
Speaker:today that, you know, they, they earned their,
Speaker:you know, they earned their stripes or whatever analogy you want to use, like 30
Speaker:years ago. Right. And they're kind of like in that government too, is actually
Speaker:also in that, also in that space, barring some notable
Speaker:exceptions. Right. So, like, how do you sell, I mean, ultimately, I think at
Speaker:the end of the day, how do you sell being
Speaker:proactive about this? Right. You know,
Speaker:maybe it's like airbags and cars, right. Or seat belts and cars. Right.
Speaker:Like, I, I, obviously it can't, it can't stop
Speaker:accidents, but it can mitigate the risk of it. Right. Again, this is very
Speaker:much top of my mind because of recent
Speaker:events, but I mean, is that a good, healthy way to look at, is that
Speaker:a good way to sell it to the hippos, so to speak?
Speaker:I like this scenario that I've
Speaker:used in the past. Let them know that you are
Speaker:in a huge ship and you have to make
Speaker:a turn in a tight spot, in a tight corner.
Speaker:It's doable, but we have to start
Speaker:now, right? Right, Right, right. Okay. We have to start
Speaker:now. So this, this transformation is going to take some
Speaker:time. And I know we can't do everything at once,
Speaker:but if we start now, we can
Speaker:gradually turn and get us going
Speaker:in the right direction to where we achieve
Speaker:cyber resilience. So.
Speaker:Yeah, and that seemed to go over well. Cyber resilience,
Speaker:I like that. Yeah, that feels strong. Awesome.
Speaker:Yeah. Resilience, I think, is because you can't protect 100 of the
Speaker:time. Right? Right. But resilience, right. Crumple zones and cars,
Speaker:right. Like that sort of thing. For the next week or so, I'm. Probably gonna,
Speaker:it's gonna be about cars. Yeah, cars. Because one of the worst things
Speaker:about car totaling your car, aside from, you know, getting
Speaker:injured, is you have to go shopping for a new car. And
Speaker:that's just, I find that an unpleasant experience. But,
Speaker:but I mean, like, you know, you can't predict, but you can at least mitigate.
Speaker:Right? You can have the crumple zones, the airbags, the seat belts,
Speaker:the, you know, anti lock brakes. Right. Like all those sorts of things. Right.
Speaker:The good tires. Right. But, you know,
Speaker:I think if you put it. I think everyone can kind of relate to that
Speaker:as opposed to, you know, why am I going to pay these kids to try
Speaker:to hack my site? You know, why am I going to do that? Right. I
Speaker:could picture some, you know, somebody saying that with a gravelly voice, you know,
Speaker:and it becomes. But. But I think if you kind of
Speaker:see it as preventative kind of maintenance,
Speaker:I don't know. I know we're coming to the top of the hour. I have
Speaker:a hard stop, and I want to be respectful of your time, but this has
Speaker:been a fascinating look to kind of like the overall notion
Speaker:of this. And that's cool. Quantum safe, is it called? Yes,
Speaker:yes. Cool. That's cool. I'm sorry, Candace.
Speaker:No, I. Thank you so much for coming on. And, you know, we didn't even
Speaker:get to really talk about the whole aerospace and defense
Speaker:interest that you have, but. We do have another podcast in development
Speaker:called Autonomous Warfare AI so just put that out there into the universe. So
Speaker:hopefully by the time folks are listening, it's officially launched. But
Speaker:I did register the domain name, so I do want to put that domain name
Speaker:folks go to autonomouswarfare AI. You'll either see a signup
Speaker:sheet or the actual podcast itself, depending on what happens between
Speaker:here and when we launch season four. I do have one funny
Speaker:story. If we have time on the aerospace
Speaker:side. When I was at Honeywell
Speaker:Aerospace, our team was responsible for creating,
Speaker:like, over 60% of the cabin pressure control systems in the
Speaker:world. And it was a small team of us, right?
Speaker:And so one time I was flying with my family,
Speaker:and the pilot got on and was like, wait a
Speaker:minute, nothing's turning on. We don't know what's going on. We
Speaker:can't do anything. I don't see any lights. And
Speaker:so I had spent years in the lab, you know, with
Speaker:the equipment that eventually went on
Speaker:the airplane, you know, testing the subsystems, making sure
Speaker:software, hardware, all that in the loop integration.
Speaker:And so I. I yell out, do a
Speaker:reset. Put
Speaker:the off and on switch. And I don't know if they heard
Speaker:me, but the pilot was like. And everything came
Speaker:back on. He's like, oh, okay. I just turned it off and turned it back
Speaker:on again. And the people around me start clapping. I was like, I'm not a
Speaker:hero. I just been doing this in the lab. Every time stuff
Speaker:hangs up, you know, the equipment hangs up, I just do a power. A
Speaker:power reset and that and that does it. But, yeah, it reminds me of The
Speaker:IT crowd. If you're. If you've not seen that show, it's. I think it's on
Speaker:Netflix. You never seen that show? No. Oh my God. I
Speaker:don't watch TV much. This is a show that's where at least the first
Speaker:episode. It's hilarious. It's basically about this.
Speaker:It. It. It's dated now. Like it's from like the early 2010s, but it's
Speaker:basically a comedy about this. IT support department in this
Speaker:posh British. They never explained what the company did, but they're basically
Speaker:locked away in the basement. And it's like the support desk and the guy answers
Speaker:the phone. Hello? Did you turn it off and turn it back on? Like that's
Speaker:kind of. Yeah, it's always the first thing they ask you. But it's funny like,
Speaker:and, and you could probably catch like clips of it on,
Speaker:on YouTube and stuff like that. And there's like, you know,
Speaker:every IT stereotype exists is like in
Speaker:there. Whether it's the, the complete disrespect you get from
Speaker:the higher ups to. To. Kind of, you
Speaker:know, the, the socially awkward nerdy types working the work in the
Speaker:D. It's funny. You'll enjoy it. I have to check it out
Speaker:during my break. There you go. All right, so with that
Speaker:we'll. It's a great place to end the show. We'll make sure in the show
Speaker:notes, we have links to the IBM quantum safe program, the qiskit,
Speaker:all the tutorial stuff and anything else of interest that you
Speaker:would like to send. Send our listeners to. Yeah, sure, sure.
Speaker:Definitely send them to the free training. So that'll be good.
Speaker:Awesome. Awesome. Build your skills today. Because it's just like that
Speaker:ship you're talking about, right? Like you're not. No one's going to be a Quantum
Speaker:expert in 20 minutes. Right? There's not going to be that like, you
Speaker:know, quantum computing for dummies type thing that you'll be able to read in 24
Speaker:hours and then be an expert. Right. The. The time
Speaker:to market and the time to learn is, you know, based on the time to
Speaker:market. The time to learn is today. Obviously you can't be
Speaker:like Candace's dad and start in the 70s, right. But the next best thing
Speaker:is to start today. Yeah, yeah, yeah, yeah. Already started with my
Speaker:8 year old. So we started with building a little
Speaker:adult Legos computing chandelier.
Speaker:So we're having fun. That's cool. Awesome. And
Speaker:we'll play the outro music.
Speaker:Quantum podcasts. They're breaking the mold Science has got beats
Speaker:in bold and it's gold.
Speaker:The multiverse is skanking Skanking in time? Black holes
Speaker:are wailing in a horn line so fine From Planck scales to planets they're
Speaker:connecting the dots Candace and Frank, they're the cosmic
Speaker:hot shots.
Speaker:Quantum podcast, turn it up fast Candace and Frank
Speaker:blowing my mind at last Quantum podcast they're breaking
Speaker:the mold Science has got beats it's bold
Speaker:and it's gold.