Preparing for the Quantum Revolution: Understanding the NCSC's New PQC Roadmap

fahd.zafar • April 29, 2025

The UK's National Cyber Security Centre (NCSC) has recently unveiled a critical new roadmap for organisations to prepare for the quantum computing era. As your trusted technology partner, Altiatech is committed to helping you understand these developments and their implications for your security strategy.

The Quantum Threat to Current Encryption

Quantum computing represents one of the most significant technological leaps of our generation. While these advanced systems promise revolutionary benefits across industries, they also pose a substantial risk to our current security infrastructure.

Today's encryption methods rely on mathematical problems that conventional computers find extremely difficult to solve. However, quantum computers have the theoretical capability to solve these same problems exponentially faster, potentially rendering current encryption methods obsolete.

This means sensitive data that is secure today could become vulnerable in the quantum future—including banking transactions, confidential communications, intellectual property, and personal identifiable information.


The NCSC's Three-Phase Migration Plan

To address this looming challenge, the NCSC has outlined a structured timeline for organisations to transition to post-quantum cryptography (PQC)—encryption methods designed to withstand quantum computing attacks. The roadmap consists of three key phases:

Phase 1: Planning and Assessment (Now to 2028)

  • Identify cryptographic services and systems requiring upgrades
  • Build a comprehensive migration plan
  • Begin educating teams on PQC requirements
  • Monitor developments in PQC standards

Phase 2: Priority Implementation (2028-2031)

  • Execute high-priority upgrades for the most sensitive systems
  • Refine migration plans as PQC standards mature
  • Implement dual-mode cryptography where appropriate
  • Begin testing PQC solutions in production environments

Phase 3: Complete Migration (2031-2035)

  • Finalise migration to PQC across all systems, services, and products
  • Phase out legacy cryptographic methods
  • Ensure supply chain partners have also completed their PQC migration
  • Validate security posture in the post-quantum environment


What This Means for Your Organisation

The good news is that for many small and medium-sized businesses, this transition will likely be relatively seamless. Much of the heavy lifting will be handled by service providers and technology vendors through routine updates and upgrades.

However, larger organisations and those in regulated industries or handling particularly sensitive data should begin preparing now. This proactive approach ensures a controlled, methodical migration rather than a rushed implementation when quantum computers eventually become a practical threat.

As Ollie Whitehouse, NCSC Chief Technical Officer, states: "As quantum technology advances, upgrading our collective security is not just important—it's essential."

How Altiatech Can Help

At Altiatech, we're committed to helping our clients navigate technological transitions securely and efficiently. As this post-quantum journey unfolds, we'll be:

  • Staying abreast of evolving PQC standards and best practices
  • Providing guidance on assessing your cryptographic inventory
  • Offering expertise in implementing quantum-resistant solutions
  • Ensuring your systems and data remain protected through the transition

The quantum revolution brings both exciting opportunities and security challenges. By starting preparations now, organisations can ensure they remain secure in the quantum future while leveraging the benefits these powerful new computing paradigms will offer.

For more information on how your organisation can prepare for the post-quantum era, contact our team today at innovate@altiatech.com or call us at +44 (0)330 332 5482.

Ready to move from ideas to delivery?


Whether you’re planning a cloud change, security uplift, cost governance initiative or a digital delivery programme, we can help you shape the scope and the right route to market.


Email:
innovate@altiatech.com or call 0330 332 5842 (Mon–Fri, 9am–5:30pm).


Main contact page: https://www.altiatech.com/contact

A person holds a blue external hard drive connected by a cable to a laptop displaying a login screen.
By Simon Poole March 18, 2026
A practical guide to Microsoft Entra ID hardening and privileged access, with steps to reduce identity risk, strengthen controls, and improve security posture.
A hand clicks a computer mouse, connecting two digital bank icons with a glowing globe showing various currency symbols.
By Simon Poole March 13, 2026
Explores how open banking is scaling across the UAE and GCC and why strong API security and consent controls are essential for compliance, trust, and resilience.
Person holding a phone with a lock icon, using a laptop; digital security concept.
By Simon Poole March 11, 2026
A practical guide to reducing cyber risk exposure fast as geopolitical tensions rise, with clear steps to strengthen resilience, controls, and response.
A person points to an AI interface with glowing circuits, overlaid on a blue background.
By Simon Poole March 4, 2026
Explains how PPN 017 will shape AI procurement in the UK public sector and the questions buyers are likely to ask suppliers about governance, risk, and compliance.
Person using a calculator with a tablet on a wooden table.
By Wafik Rozeik February 25, 2026
Examines AI-augmented attacks targeting FortiGate devices at scale, what the risks mean for organisations, and the immediate steps to strengthen security.
Digital, pixelated person with red data streams, facing forward. Cyberpunk, data glitch effect.
By Simon Poole February 24, 2026
Examines AI-augmented attacks targeting FortiGate devices at scale, what the risks mean for organisations, and the immediate steps to strengthen security.
Person typing on laptop, cloud computing displayed on the screen, on a wooden table.
By Wafik Rozeik February 23, 2026
Explains why AI spend behaves differently and how anomaly management is becoming essential in FinOps to control costs, reduce risk, and improve cloud visibility.
Hand holding a phone displaying the Microsoft Copilot logo with the Microsoft logo blurred in the background.
By Simon Poole February 18, 2026
A practical governance checklist for Microsoft Copilot in 2026, using the Copilot Control System to manage risk, security, compliance, and oversight.
Route to market diagram: Bank to delivery platform, with steps like product mgmt and customer support.
By Simon Poole February 12, 2026
Explains what the Technology Services 4 (TS4) framework means for public sector buyers and how to procure Altiatech services through compliant routes.
Two people shaking hands between cloud data and data analytics dashboards.
By Simon Poole February 10, 2026
Explores where IT waste really comes from and how FinOps helps organisations regain control of cloud spend, improve efficiency, and turn cost visibility into advantage.