LEADER 08361nam 22005533 450 001 9911069671503321 005 20250108080331.0 010 $a9781637427590 010 $a163742759X 035 $a(MiAaPQ)EBC31648756 035 $a(Au-PeEL)EBL31648756 035 $a(CKB)37147550400041 035 $a(FR-PaCSA)88967705 035 $a(FRCYB88967705)88967705 035 $a(Perlego)4549081 035 $a(OCoLC)1483111212 035 $a(EXLCZ)9937147550400041 100 $a20250108d2025 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aQuantum Cybersecurity Program Management 205 $a1st ed. 210 1$aNew York :$cBusiness Expert Press,$d2025. 210 4$dİ2025. 215 $a1 online resource (216 pages) 311 08$a9781637427583 311 08$a1637427581 327 $aFront cover -- Half title -- Title -- Copyright -- Description -- Contents -- Testimonials -- Quantum Readiness Expertly Simplified and Decoded -- No Other Resource as Comprehensive -- A Wonderful Creation From the Authors of Shields Up and Cybersecurity Training -- Gives Actionable Steps for Project Managers, IT Managers, and Executives -- An Indispensable Guide to Quantum Readiness -- Complex Topics Masterfully Simplified and Demystified -- A Big Win for Professionals in Cybersecurity -- A Valuable Guide Grounded in Best Practices -- A Fine Approach I Can Use -- Foreword -- What Is Microlearning? -- Microlearning -- CHAPTER 1 Quantum Ecosystem -- Introduction -- Quantum: An Emerging Technological Revolution -- Dual Potentialities of Quantum Technologies -- Transition to a Quantum Ecosystem -- Quantum Technologies -- Classical Computing -- Public Encryption -- Microlearning -- The Algorithms of Shor and Grover -- Quantum Technologies 101 -- Quantum Algorithms -- Quantum Computers -- Benefits of Quantum Computing -- Technical Challenges -- Quantum Cybersecurity Risks -- Quantum Cybersecurity Risk Management -- Start Now Imperative -- Microlearning -- Hybrid Quantum Computing -- Adopting Quantum Technologies -- Quantum Ecosystem Drivers -- Quantum Business Use Cases -- Microlearning -- Quantum Risks -- Microlearning -- CHAPTER 2 Quantum Transition Best Practices -- Quantum Awareness -- Technical Frameworks and Standards Alignment -- Information Technology Infrastructure Library -- ITIL Overview -- Quantum Projects the ITIL Way -- ITIL Service Management for Quantum Technology Management -- NIST Cybersecurity Framework for Quantum Technologies -- NIST Framework Core -- NIST Implementation Tiers -- NIST Framework Profiles -- NIST Cybersecurity Framework Summary -- Other NIST Frameworks -- NIST Cybersecurity Training -- Quantum Transition. 327 $aNIST Controls -- Quantum Algorithms -- Microlearning -- ISO/IEC 27000 Information Security Management -- Microlearning -- Project Management Frameworks -- Hybrid Project Management -- Adaptive Delivery Approaches -- Agile Project Management: Technology -- Microlearning -- Lean Six Sigma: Process -- Microlearning -- ADDIE Model of Instructional Design: People -- Microlearning -- CHAPTER 3 Quantum Transition Strategies -- Quantum Business Strategy -- Quantum-Inspired Business Vision -- Microlearning -- Quantum Business Case -- External Analysis -- Internal Analysis -- Organizational Quantum Readiness Gap Analysis -- Microlearning -- Quantum Technology Strategy -- Start With a Quantum Technology Vision -- Quantum Technologies Strategy: What and How -- Current State Risk Identification and Analysis -- Target State Identification-An Agile Quantum Ecosystem -- Quantum Technologies Gap Analysis -- Hybrid State -- Minimum Viable Projects -- Quantum Strategy Elements -- End of Service Strategy -- Microlearning -- Quantum Cybersecurity Strategy -- Quantum Cybersecurity Vision -- Quantum Cybersecurity Risk Assessment -- Quantum Risk Identification -- Cryptographic Inventory -- Quantum Cybersecurity Risk Treatment -- Quantum Key Distribution -- Quantum Random Number Generator -- Post-Quantum Cryptography -- Hybrid Cryptography -- Minimum Viable Cybersecurity Foundation -- No-Regret Cybersecurity Projects -- Cryptographic Agility -- Quantum Readiness Maturity -- Governance -- Risk Management -- Security Policies and Procedures -- Quantum Champions -- Microlearning -- CHAPTER 4 Quantum Program Management -- Strategy Implementation Through Program Management -- Project Prioritization -- Quantum Program Management -- Cybersecurity Foundation Projects -- Microlearning -- Quantum Awareness Projects -- Project Management Optimization Projects. 327 $aService Management Optimization Projects -- Quantum Business Case Projects -- Quantum Technology Projects and Initiatives -- Cryptographic Agility Projects -- Microlearning -- Post-Quantum Cryptographic Migration Projects -- Post-Quantum Cryptographic Migration Quality Assurance -- Quality Truism -- Proof-of-Concept and Quality Assurance -- Quality Assurance Guides -- Post-Quantum Cryptographic Migration Strategy -- Quantum Enabling Projects -- Quantum Program Management Conclusion -- CHAPTER 5 Quantum Project Management -- Hybrid Project Management for Quantum Transition Projects -- Initiate -- Plan -- Design -- Quantum Cybersecurity Workshop Agenda -- Quantum Design Document -- Design Workshops: Quantum Technologies -- Design Workshops: Foundation Projects -- Design Workshops: Cybersecurity -- Design Workshops: Post-Quantum Cryptographic Migration -- Build -- Test -- Transition to Production -- Close Out -- Quantum Program Governance -- Project Risk Management -- Status Reporting -- Service Management Operations -- Continual Improvement -- Quantum Projects -- Quantum Initiatives -- Microlearning -- Conclusion -- Glossary -- References -- About the Authors -- Index -- OTHER TITLES IN THE PORTFOLIO AND PROJECTMANAGEMENT COLLECTION -- Concise and Applied Business Books -- Back cover. 330 8 $aQuantum technology interest is accelerating for two key reasons: first, quantum technologies promise transformative capabilities. Indeed, quantum computing is seen as a strategic necessity by the world's leading economies. Second, experts unanimously agree that a cryptographically-relevant quantum computer will have the capability to break classical encryption that keeps our data and transactions private. Thus, organizations are challenged to protect their most sensitive information data and systems before a cryptographically-relevant quantum computer is accessible to hackers despite already over-burdened cybersecurity teams. Quantum Cybersecurity Program Management by Dr Greg Skulmoski and Dr Ashkan Memari is part of a series of books: Shields Up: Cybersecurity Project Management outlines a risk-based approach to cybersecurity project management including technology and process improvement projects. Cybersecurity Training: A Pathway to Readiness outlines best practices in training and instructional design to upskill the organization's people. Quantum Cybersecurity builds upon Shields Up (technology and process) and Cybersecurity Training (people) to provide a program approach to deliver the diversity of quantum projects and initiatives organizations encounter. The authors of Quantum Cybersecurity bring together best practices found in standards and frameworks in a risk-based approach to implementing a quantum program of projects. Tailored for quantum champions, IT security architects, business leaders, project managers, digital leadership, and board members, Quantum Cybersecurity offers actionable guidance. Urgent and early adopters will find a practical guide for a quick start to their quantum projects. 606 $aBUSINESS & ECONOMICS / Project Management$2bisacsh 606 $aCOMPUTERS / Security / Cryptography$2bisacsh 606 $aCOMPUTERS / Quantum Computing$2bisacsh 615 7$aBUSINESS & ECONOMICS / Project Management 615 7$aCOMPUTERS / Security / Cryptography 615 7$aCOMPUTERS / Quantum Computing 700 $aSkulmoski$b Gregory J$01674356 701 $aMemari$b Ashkan$01897509 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9911069671503321 996 $aQuantum Cybersecurity Program Management$94552704 997 $aUNINA