The Post-Quantum World: A New Protiviti Podcast Series Explores the Exciting New World of Quantum Computing

Quantum computing capabilities are exploding, causing disruption and opportunities, but many technology and business leaders don’t understand the impact this technology will have on their business. Protiviti has launched a bi-weekly podcast, The Post-Quantum World, as we discuss hot topics and the business impacts, benefits and threats of this exciting new capability.

In each episode, hosted by Konstantinos Karagiannis, Protiviti’s quantum computing services lead, we invite quantum experts and business leaders to discuss and share insights and actions all organizations should be considering today to prepare for mass adoption of quantum computing.

Listen to our two most recent episodes, Microsoft Azure Quantum: With Great Power Comes Great Responsibility, and Bitcoin May Be Doomed. What Can We Learn From The Quantum Resistant Ledger?

To follow the series, subscribe to The Post-Quantum World wherever you listen to your favorite podcasts or bookmark our podcast series page. New podcasts are posted every other Wednesday.

To learn more about our quantum computing services, contact us.

Technology Insights

Subscribe to Topics

Managing Director Shinoy George details some of the common challenges preventing the proper integration of vulnerability management programs into security operations. Read more:

#vulnerabilitymanagement #cybersecurity #cyberattacks

Listen to Protiviti's Konstantinos Karagiannis and @SamMugel, CTO of @MultiverseQC on how finding a specific use case that proves #quantum advantage will radically kickstart the #quantumcomputing industry.

#protivititech #podcast #fsi

TOMORROW! Cloud deployment of #SAP solutions provides a fast, scalable and repeatable process for implementing full SAP stacks in the cloud. Join us June 17th to see how you can unleash the power of SAP on #Microsoft #Azure! Register now!


The CISO Next initiative provides diverse perspectives and cross-industry resources that enable security leaders to address challenges in a dynamic threat landscape. Learn more about the different types of CISOs now. #CISOnext #CISO #Cybersecurity

Are you a (Cyber) Security Professional? Join us for the Virtual Attack & Defend - The Endpoint Threat. Watch and learn as CyberArk White Hat hackers guide you through a hacking and defense simulation covering six real-life endpoint attacks.

Register now:

Load More...