Cyber security is no longer an afterthought. Cyber threads are now shaping the foundation of defense and critical infrastructure systems. At the same time, emerging technologies like quantum computing and AI are accelerating faster than expected, bringing both opportunities and risks.In this episode of Allies in Innovation, host Mikkel Svold sits down once again with Samant Khajuria, Vice President of Quantum and Cyber at Terma. They revisit the evolving cyber landscape, explore how defense organizations are preparing for “Q-Day” (when quantum computers can break today’s encryption), and discuss the crucial role of collaboration in staying ahead. They also cover practical challenges, from legacy systems to shifting standards, and explain why cyber needs to be integrated from the very first design stage and not added later.If you want to understand how the defense industry is gearing up for disruptive technologies, this episode will give you a front-row seat.In this episode, you'll learn about:Why cyber is moving from “add-on” to a core design requirement.How NATO standards are shaping interoperability across defense systems.The convergence of cyber, AI, and quantum - and the risks of misuse.The looming quantum threat: “harvest now, decrypt later.”How post-quantum cryptography and quantum key distribution could secure the future.Real-world challenges in transitioning legacy systems.The importance of partnerships and joint strategies in Europe and beyond.Why quantum sensing might become a game-changer in the next five years.Episode Content00:00 Introduction to Cyber and Quantum with Samant Khajuria01:54 Cybersecurity as a fundamental requirement in defense and infrastructure03:29 The shift from “add-on” security to built-in resilience05:41 Disruptive technologies: cyber, AI, quantum, and their dual-use risks08:58 Collaboration and partnerships to keep pace with rapid innovation09:38 Preparing for Q-Day: harvest now, decrypt later10:52 Post-quantum cryptography and quantum key distribution in practice12:47 Challenges of legacy systems and new cyber standards15:09 Roadmap: proof-of-concepts and quantum key exchange projects16:42 How smaller organizations can prepare for cyber and quantum threats18:06 Quantum sensing and other non-cyber applications of quantum tech19:40 Looking ahead: strategy, digitization, and reducing red tapeProductionThis podcast is brought to you by Terma. This podcast is produced by Montanus.
No persons identified in this episode.
This episode hasn't been transcribed yet
Help us prioritize this episode for transcription by upvoting it.
Popular episodes get transcribed faster
Other recent transcribed episodes
Transcribed and ready to explore now
#2425 - Ethan Hawke
11 Dec 2025
The Joe Rogan Experience
SpaceX Said to Pursue 2026 IPO
10 Dec 2025
Bloomberg Tech
Don’t Call It a Comeback
10 Dec 2025
Motley Fool Money
Japan Claims AGI, Pentagon Adopts Gemini, and MIT Designs New Medicines
10 Dec 2025
The Daily AI Show
Eric Larsen on the emergence and potential of AI in healthcare
10 Dec 2025
McKinsey on Healthcare
What it will take for AI to scale (energy, compute, talent)
10 Dec 2025
Azeem Azhar's Exponential View