EBOOK

About
Quantum technology interest is accelerating for two key reasons: first, quantum technologies promise transformative capabilities. Indeed, quantum computing is seen as a strategic necessity by the world's leading economies. Second, experts unanimously agree that a cryptographically-relevant quantum computer will have the capability to break classical encryption that keeps our data and transactions private. Thus, organizations are challenged to protect their most sensitive information data and systems before a cryptographically-relevant quantum computer is accessible to hackers despite already over-burdened cybersecurity teams.
Quantum Cybersecurity Program Management by Dr Greg Skulmoski and Dr Ashkan Memari is part of a series of books: Shields Up: Cybersecurity Project Management outlines a risk-based approach to cybersecurity project management including technology and process improvement projects. Cybersecurity Training: A Pathway to Readiness outlines best practices in training and instructional design to upskill the organization's people. Quantum Cybersecurity builds upon Shields Up (technology and process) and Cybersecurity Training (people) to provide a program approach to deliver the diversity of quantum projects and initiatives organizations encounter.
The authors of Quantum Cybersecurity bring together best practices found in standards and frameworks in a risk-based approach to implementing a quantum program of projects. Tailored for quantum champions, IT security architects, business leaders, project managers, digital leadership, and board members, Quantum Cybersecurity offers actionable guidance. Urgent and early adopters will find a practical guide for a quick start to their quantum projects.
Quantum Cybersecurity Program Management by Dr Greg Skulmoski and Dr Ashkan Memari is part of a series of books: Shields Up: Cybersecurity Project Management outlines a risk-based approach to cybersecurity project management including technology and process improvement projects. Cybersecurity Training: A Pathway to Readiness outlines best practices in training and instructional design to upskill the organization's people. Quantum Cybersecurity builds upon Shields Up (technology and process) and Cybersecurity Training (people) to provide a program approach to deliver the diversity of quantum projects and initiatives organizations encounter.
The authors of Quantum Cybersecurity bring together best practices found in standards and frameworks in a risk-based approach to implementing a quantum program of projects. Tailored for quantum champions, IT security architects, business leaders, project managers, digital leadership, and board members, Quantum Cybersecurity offers actionable guidance. Urgent and early adopters will find a practical guide for a quick start to their quantum projects.
Related Subjects
Reviews
"From my review of Quantum Cybersecurity Program Management, I found it to be very thorough and timely with great information for organizations looking to address the VERY real challenges that quantum will undoubtedly bring to cybersecurity strategies. I know of no other resource as comprehensive. I can think of several C-level people who will love the book, as I do get asked about the "quantum th
Bob Dameron, Head of Business Development, Multiverse Computing
"Quantum Cybersecurity Program Management gives actionable steps for project managers, IT managers, and executives alike. Aligning with multiple standards and best practices, it ensures that readers can easily incorporate lessons learned into their current work practices and business strategies. It is a great read and I highly recommend it to all technology leaders and project managers."
Jake McGaffin MBA, MEM, CSM, Project Manager, Gensco Inc.
"As someone who frequently discusses the quantum threat with industry leaders, I can affirm that this book is the definitive resource we've been waiting for. It's a compelling read for anyone who recognizes that the quantum era is on our doorstep and understands the critical need for preparedness. This is essential reading for C-level executives, IT professionals, cybersecurity experts, and especi
Julio Bandeira de Melo, Cybersecurity Leader