Post-quantum security

Preparing for Q-Day: The business imperative leaders can’t afford to delay

Hero image
  • Insight
  • 5 minute read
  • April 13, 2026

Quantum threats are moving from theory to enterprise risk. Here’s what leaders need to know about Q-Day, post-quantum cryptography, and the actions organisations should take now.


The takeaways

  • Even though we can’t predict when Q-Day will occur, adversaries aren’t waiting.
  • Post-quantum migration could take years, making early planning essential for resilience.
  • Q-Day is coming sooner than most organisations realise. The time to start preparing is now.

The foundations of digital trust are on the verge of a fundamental shift. Advances in quantum computing threaten to render today’s encryption obsolete, exposing sensitive data and disrupting the systems that support global commerce, communication, and critical infrastructure. What was once a long-term concern is now a strategic priority, as new standards and government guidance signal the start of a multi-year transition to post-quantum security.

The urgency has a name: Q-Day—the day when a cryptographically relevant quantum computer (CRQC) becomes powerful enough to break today’s public-key encryption standards. Although such machines are not yet available at scale, security experts warn that adversaries may already be collecting encrypted data with the intention of decrypting it in the future when quantum capabilities mature—a threat known as 'harvest now, decrypt later.'

Q-Day is coming sooner than most organisations realise. The time to start preparing is now.

In response, governments and standards bodies have begun taking concrete steps to prepare for a post-quantum security environment. In 2024, the US National Institute of Standards and Technology (NIST) finalised the first set of post-quantum cryptography (PQC) standards—a major milestone in the development of quantum-resistant encryption. These standards are now being integrated into federal guidance and procurement policies.

Legislative initiatives have also emerged to coordinate a national migration strategy for federal systems. Similar roadmaps are appearing internationally, with governments such as the United Kingdom urging organisations to begin identifying vulnerable systems and plan for full cryptographic transition within the next decade.

At the same time, policymakers and industry have moved to accelerate adoption. US cybersecurity agencies are urging government agencies and critical infrastructure providers to prioritise technologies that support post-quantum cryptography, while major technology companies are integrating post-quantum cryptographic capabilities into internet infrastructure, cloud services, and secure communication protocols.

Yet many organisations remain unprepared for the transition, as migrating cryptographic systems across large digital infrastructures is technically complex and resource-intensive.

Waiting for certainty means you’ll be too late.

Taken together, these developments show that quantum computing is shifting from a long-term research issue to a near-term cybersecurity priority. Policymakers and security leaders are increasingly treating it as a pressing strategic cybersecurity challenge that calls for coordinated global action. The push for post-quantum cryptography reflects a simple reality: the encryption we rely on today must evolve now in order to remain secure in a future shaped by quantum computing.

It’s time to start preparing for Q-Day. We don’t know exactly when that day will come, but we do know it will happen. When it does, the consequences for digital trust, data confidentiality, and national security will be profound. The organisations that start planning today will be the ones that ride out the disruption with confidence.

What is Q-Day?

More precisely, Q-Day marks the point when a quantum computer becomes powerful enough to run Shor’s algorithm at scale, efficiently factoring large prime numbers and breaking the encryption fundamental to the internet (RSA, Diffie-Hellman, and elliptic-curve cryptography). Because, the vulnerable algorithms are the foundations of nearly every secure communication protocol in use today, the impact would be broad. The ability to decrypt past and present encrypted data would mean instant loss of confidentiality across networks, VPNs, emails, software updates, and even blockchain systems.

Why it matters now

Even though we can’t predict when Q-Day will occur, adversaries aren’t waiting. Nation-states and sophisticated actors have been stealing encrypted data for years in anticipation of the day quantum computing will enable them to read it. Sensitive records, intellectual property, and classified information being transmitted or stored under today’s algorithms could be exposed once CRQCs arrive. Because cryptographic transitions take years across sprawling infrastructures, the window for proactive preparation is open, but is narrowing quickly for organisations that delay.

Transitioning to post-quantum security is not a ‘nice-to-have’—it’s a strategic imperative.

Practical steps for organisations

Most organisations don’t have a clear map of where and how cryptography is used. Start by discovering what algorithms, libraries, certificates, and protocols protect your systems, applications, and data. Treat it as a foundational security inventory exercise.

Future-proofing means designing systems that can swap algorithms easily. Update key management processes, APIs, and protocols so you can adapt quickly as post-quantum cryptography (PQC) standards mature. Agility is the only practical defence against uncertainty.

The National Institute of Standards and Technology has already selected initial algorithms for post-quantum cryptography—including CRYSTALS-Kyber for key establishment and CRYSTALS-Dilithium for digital signatures. Start planning pilots and vendor engagements around these emerging standards.

Experiment with hybrid cryptography (combining classical and post-quantum algorithms) in lower-risk systems. Validate performance, interoperability, and operational impacts. These pilots will uncover the practical challenges that can’t be solved overnight.

Ask your technology suppliers and SaaS partners about their PQC readiness roadmaps. Many dependencies—browsers, cloud providers, identity systems—will move at different speeds. You need visibility to plan your own migration path.

Why the investment is worth it

Transitioning to post-quantum security is not a ‘nice-to-have’—it’s a strategic imperative. Replacing cryptographic primitives across global systems will take a decade or more. Delaying means you’ll be forced to act under crisis conditions when Q-Day arrives. The investment pays off by:

  • Reducing regulatory and reputational risk. Governments and critical-infrastructure regulators are already signalling PQC expectations.
  • Maintaining customer trust. Data loss due to cryptographic obsolescence is indistinguishable from a breach.
  • Securing competitive advantage. Early movers will become trusted custodians of secure data and communications in the quantum era.

The bottom line

Q-Day is coming sooner than most organisations realise. The time to start preparing is now. Cryptographic transitions at global scale move slowly, and waiting for certainty means you’ll be too late.

Leaders should be treating post-quantum readiness as a core pillar of enterprise risk management, not a future research project. Inventory, plan, pilot, and invest today. The organisations that act now won’t just protect their data. They’ll define the secure foundations of the next era of computing.

Authors

Morgan Adamski
Morgan Adamski

Principal, Deputy Platform Leader, Cyber, Data, and Tech Risk, PwC United States

Rob Joyce
Rob Joyce

Cybersecurity Senior Fellow, former Cybersecurity Director, National Security Agency, PwC United States

Global cybersecurity and privacy

We help you reduce risk and increase resilience so you can keep your business moving forward

New world, new rules: The 2026 Global Digital Trust Insights

Get the full C-suite playbook and more of the latest findings for 2026

Follow us

Required fields are marked with an asterisk(*)

Your personal information will be handled in accordance with our Privacy Statement. You can update your communication preferences at any time by clicking the unsubscribe link in a PwC email or by submitting a request as outlined in our Privacy Statement.

Hide