SecAppDev 2026 lecture details
Post-Quantum Cryptography (PQC): The Risk of Being Late
Post-Quantum Cryptography (PQC) answers the threat posed by quantum computers. We discuss the emerging standards and national agencies' recommendations for migration. We conclude with performance benchmarks and crypto agility challenges.
Monday June 1st, 11:00 - 12:30
Room Lemaire
Add to calendar (ICS) Add to Google calendarAbstract
The imminent threat posed by quantum computers and public-key cryptographic systems forces a migration to Post-Quantum Cryptography (PQC). Following an examination of quantum computing advancements, we discuss the new and emerging PQC standards and the status of the NIST selection process. Additionally, we explore the migration recommendations and timelines from national agencies. Our talk concludes with an overview of performance benchmarks and an exploration of the challenges surrounding cryptographic agility.
Key takeaway
If you have not yet developed a PQC migration strategy, you should do so in the next 6 months.
Content level
Deep-dive
Target audience
Software developers and architectures, managers, cybersecurity researchers
Prerequisites
Basic understanding of public-key cryptography
Join us for SecAppDev. You will not regret it!
Grab your seat now
Bart Preneel
Full professor, COSIC - University of Leuven
Expertise: Applied cryptography, privacy, cybersecurity policy
Join us for SecAppDev. You will not regret it!
Grab your seat nowRelated lectures
Security by default - A European perspective on cyber resilience
Deep-dive lecture by Freddy Dezeure in room Lemaire
Monday June 1st, 09:15 - 10:30
A technical deep dive into how Microsoft implements security, resilience, and regulatory compliance at scale—mapping NIS2, DORA, and Secure‑by‑Default principles to concrete controls, engineering processes, and tenant‑level protections
Key takeaway: Learn how regulatory requirements become enforceable controls, measurable metrics, and practical Secure‑by‑Default engineering across cloud systems
SBOMs and their Role in Security
Deep-dive lecture by Alexios Zavras in room West Wing
Tuesday June 2nd, 09:00 - 10:30
A practical deep dive into SBOMs: what they are, how they’re built and used, and why they matter for modern software security, from vulnerability response and prioritization to supply‑chain risk and provenance touchpoints.
Key takeaway: Participants will learn about SBOMs, how to think about them in an end-to-end manner, and how to apply them to real security workflows.
Dark Patterns and the AI Era
Introductory lecture by Johanna Gunawan in room Lemaire
Tuesday June 2nd, 16:00 - 17:30
This lecture introduces the concepts of dark patterns from interdisciplinary (HCI, privacy, and legal) literature to highlight the evolution of this UX design phenomena, with implications for the age of AI.
Key takeaway: Dark patterns are a persistent 'threat' to users in a different fashion; security perspectives can contribute to ongoing mitigation efforts.