Transcript
A (0:05)
You're listening to the RSA Conference podcast, where the world talks security. Hello listeners, welcome to this edition of our RSAC podcast series. Thank you for tuning in. I'm Tatiana Sanchez.
B (0:21)
And I'm Casey Zirkis and we are
A (0:24)
your RSAC podcast host. Casey, what are we going to discuss today?
B (0:29)
Gosh, Tatiana, it is the leap to quantum computing that's a big one. And I am so fascinated at the level of attention that quantum computing is getting. It's for so long been seen as like this thing that will happen at some time in the future, but it feels like people are paying more and more attention to it. So it isn't just a technical milestone. It's a fundamental shift in the security landscape that demands this, that everyone stop patching the past and start really architecting a future where privileged access is inherently unshakable. So we are excited to welcome our guest today, Malhar Vora, as he explores how to protect critical access against quantum threats and AI powered attacks. Such an important conversation going on across the industry right now. He'll be addressing the current preparedness gap and provide actionable strategies for crypto agility and securing all identities, human and non human, for a resilient future. That's a lot. But are you ready to dive in, Tatiana?
A (1:39)
Yes, I'm absolutely ready to unpack everything. But before we get started, we do want to remind our listeners that here at RSAC we host podcasts twice a month and we encourage you to subscribe, rate and review us on your preferred podcast app so that you can be notified when new tracks are posted. And now we would like to ask our guest to take a quick moment to introduce himself. Malhara.
C (2:01)
Thank you both. Good day to everybody from Australia. My name is Malhar. I am working as a principal security engineer and the engineering leader at the Anz bank here in Australia. I often share the thought process on the various identity topic and today I'm so keen to talk about the content safe Pam, which is actually preparing the privilege access for the post quantum era.
A (2:26)
And thank you for being here today. Melhar. We often hear about quantum computing as a someday problem, but other cybersecurity professionals argue that people need to start preparing now because there's really no due date. And when it's going to come, it can come in 2035, it can come sooner or even after 2035 and it kind of aligns what you talk about that quantum computing is actually a pressing concern. So why is now the time for organizations to stop looking at the horizon and start worrying about their current encryption standards.
