VDE Press Release on the “seQUcom” Conference published:
Quantum Computing and Artificial Intelligence offer many advantages – but they also undermine the security of traditional cryptographic methods and are reshaping the rules of cybersecurity. What practical solutions are available for users and executives? These will be presented by experts at the user conference “seQUcom – Securing Enterprise Communications 2025: From Quantum Risk to Resilience”, taking place on 16 and 17 October 2025, in Frankfurt am Main.
Data is the gold of the 21st century – and must be protected accordingly. Until now, this has primarily been achieved through cryptographic methods. However, Quantum Computing and the growing power of Artificial Intelligence are increasingly threatening these established systems – it won’t be long before they can break current encryptions and access sensitive information. What was once considered secure may soon no longer provide sufficient protection. For businesses, this means they must transition to quantum-safe cryptographic methods early if they want to avoid data leaks in the future. But which technologies are suitable? What steps need to be taken? And how can infrastructures be secured against these new challenges?
Conference presents practical solutions
The conference “seQUcom – Securing Enterprise Communications 2025: From Quantum Risk to Resilience”, taking place on 16 and 17 October 2025, in Frankfurt am Main, presents practical solutions. “This is not just a conference for researchers – our goal is to specifically engage IT security leaders and executives,” says Imran Khan, Managing Director of KEEQuant GmbH. The event was initiated by KEEQuant in collaboration with the Physikalisch-Technische Bundesanstalt (PTB) as part of the BMFTR-funded umbrella project for Quantum Communication in Germany, the Verband der Elektrotechnik Elektronik Informationstechnik (VDE), the Deutsche Industrieverbund für Quantensicherheit (DIVQSec), the management and technology consultancy BearingPoint, and Quantum Optics Jena GmbH.
Participants will gain strategic insights into the threat landscape shaped by Quantum Computing and Artificial Intelligence, understand regulatory developments, and receive an overview of concrete solutions for organizational challenges, risk assessments, and the integration of Post-Quantum Cryptography (PQC) and Quantum Key Distribution (QKD). A networking reception and a technical exhibition will also provide opportunities to connect with key decision-makers and renowned experts from industry, government, and research, and to directly address individual technical challenges. Why do Quantum Computing and AI pose an immediate and concrete threat to current cybersecurity? Which technologies can ensure cybersecurity in the future, and how can existing systems be migrated? How will upcoming regulations impact operations?
Post-Quantum Cryptography and Quantum Key Distribution
One of the two key technologies for future IT security is Post-Quantum Cryptography. These algorithms are capable of withstanding efficient attacks by Quantum Computers – and they also run on classical computers. The key advantage: they are based on mathematical problems for which neither classical algorithms nor Quantum Algorithms are known to provide efficient solutions. There are several classes of post-quantum cryptographic schemes. For example, lattice-based cryptography is known for its high efficiency; code-based cryptography offers strong theoretical security guarantees; and hash-based cryptography enables digital signatures whose security can be controlled through the properties of hash functions. Both code-based and hash-based approaches are already well researched.
The second fundamental pillar of Quantum Cybersecurity is Quantum Key Distribution (QKD). “Here, the secret key is generated using the physical properties of individual particles of light,” explains Khan. In this case, security does not rely solely on mathematical algorithms but is instead grounded in the principles of Quantum Mechanics – such as Quantum Entanglement or the Heisenberg uncertainty principle. This means that keys which are secure at the time of their creation cannot later be calculated through mathematical operations. Several manufacturers – including the German companies Quantum Optics Jena and KEEQuant – have already brought corresponding modules to market.
Author: Verband der Elektrotechnik Elektronik Informationstechnik (VDE)
Click here for additional information on the conference.
Source reference: https://www.vde.com/resource/blob/2392918/8a6b2a662bd75820242338d423fc573b/press-release-sequcom2025-data.pdf