Post-quantum cryptography is often framed as an algorithm selection problem. Stefan Kölbl reframes it as something else entirely: a key management and lifecycle discipline challenge. In this episode of Shielded: The Last Line of Cyber Defense, host Jo Lintzen speaks with Stefan, an information security engineer at Google, about what it actually takes to migrate cryptography across complex global systems at scale. They explore why Store Now, Decrypt Later is treated as a real threat inside Google, why hybrid deployments were justified before final NIST standards, and why inventory dashboards alone won’t get organizations across the finish line. The real work, Stefan explains, lies in crypto agility, automated key rotation, lifecycle ownership, and safe-by-default developer frameworks.
AI Summary coming soon
Sign up to get notified when the full AI-powered summary is ready.
Free forever for up to 3 podcasts. No credit card required.
RSA Conference 2026: Views on quantum-safe migrations
Breaking Silos: Resilience as a Cross-Functional Mandate
Mapping the Supply Chain: A Faster Path to Organizational Resilience
Why AI is accelerating both attackers and defenders: From MWC Barcelona
Free AI-powered recaps of Shielded: The Last Line of Cyber Defense and your other favorite podcasts, delivered to your inbox.
Free forever for up to 3 podcasts. No credit card required.