Logo

Webinar: Building Your Post-Quantum Migration Plan

New UAE regulations: 6 months to file your post-quantum migration plan.
Is your organization ready?

Under new UAE cybersecurity requirements, every relevant entity must submit a post-quantum migration plan within 6 months. This includes a full inventory of cryptographic assets including keys, certificates, algorithms, and protocols.

This webinar brings together experts from QuantumGate and industry leaders to walk through what your migration plan should include, how to build a thorough inventory, and how to prioritize action items to meet the deadline.

We’ll cover:

  • Why cryptographic discovery is the foundation of your migration plan
  • How to identify weak or legacy ciphers (RSA-1024, SHA-1, etc.)
  • Methods for locating all certificates and key stores
  • Best practices for structuring and submitting your migration plan
  • Steps to balance compliance, security, and operational realities

Join us to evolve from discovery into a practical roadmap that ensures compliance and prepares your organization for the quantum future.

Details

Image
Date

Tuesday, November 18, 2025

Image
Time

11:00 am - 12:15 pm (GST)

Agenda

Opening presentation The quantum threat to your business’ data.
Fireside chat An expert discussion on key transition challenges and how leaders can best prepare.
Live Q&A Ask our panel of experts your questions.

Register Now

Meet the speakers

Speaker

Janne Hirvimies

CTO, QuantumGate

Janne Hirvimies is the Chief Technology Officer of QuantumGate. He brings extensive experience in developing secure platforms and products, specializing in secure communications, mobile security, and hardware-assisted security solutions.

With a career spanning over 20 years in the tech industry, he possesses deep technical expertise that encompasses complex embedded systems and innovative technology solutions. His extensive leadership experience and technical acumen provide a unique perspective on the evolving security technology landscape.

Speaker

Dr. Victor Mateu

Acting Chief Researcher, Technology Innovation Institute

Dr. Victor Mateu leads the research and development of cryptographic solutions in the cryptographic research center at TII.

His extensive expertise in applied cryptography spans among different areas such as secure protocol design, cryptographic engineering, security architecture for embedded systems, design of electronic voting solutions, zero knowledge proofs, and quantum resistant cryptography.

Dr. Mateu has written multiple conference papers, and also IEEE and Elsevier journal papers and book chapters. Moreover, he has also actively contributed in several open source projects supporting cryptographic libraries and its integration in company products for international companies.

Speaker

Waleed Almansoori

Product Owner, KATIM

Waleed Almansoori is a Product Manager at the forefront of post-quantum secure network encryption. With two years in this role, he has been instrumental in shaping next-generation cryptographic solutions that are resilient against quantum-era threats. His expertise spans both the strategic and technical dimensions of secure communication technologies.

Before stepping into product leadership, Waleed spent two years as a QA Engineer, rigorously testing secure phones and high-assurance network encryption devices. This hands-on engineering background gives him a nuanced understanding of security protocols, hardware-software integration, and compliance requirements—allowing him to bridge the gap between engineering, product, and customer needs.

Speaker

Dr. Mohammad Alhammouri

Partner, Cybersecurity and Digital Trust, PwC Middle East

Dr. Alhammouri is a Partner at PwC Middle East, specializing in cybersecurity with a strategic focus on trust services and digital identity across the region. He currently leads PwC’s services in post-quantum cryptography, helping governments and organizations prepare for the next generation of cryptographic challenges. With over 20 years of experience, Dr. Alhammouri has held key roles in consulting, the World Bank, IMF, academia, and government, including Jordan’s e-Government program.

Have a question about our services or products?