Background Shape
Icon

Aug 14, 2024

EU Quantum Security Policy Explained: What CISOs and Defence Contractors Must Know

Blog Image
Blog Image
Blog Image
Blog Image

EU Quantum Security Policy Explained: What CISOs and Defence Contractors Must Know

For European organisations, quantum security is no longer theoretical. It is now a policy-driven, regulator-backed transition that directly affects defence suppliers, critical infrastructure operators, and regulated enterprises.

By 2026, the European Union’s position is clear: post-quantum cryptography, or PQC, is a strategic security requirement tied to digital sovereignty, cross-border interoperability, and long-term resilience against state-level adversaries. Unlike jurisdictions that rely primarily on technical standards bodies, the EU is advancing quantum security through coordination, regulation, and procurement alignment.

This piece sets out what EU quantum policy actually says, how it converts into obligations for CISOs and defence contractors, and why 2026 marks a shift from planning to execution. If you operate across borders or supply European governments, these changes are not optional.

1. How the EU frames quantum security, and why it differs

The EU does not treat quantum risk as a narrow cryptographic issue. It frames it as a systemic threat to European digital sovereignty, spanning:

  • defence and security communications

  • critical infrastructure and industrial control systems

  • cross-border digital services and supply chains

  • long-lived sensitive data held by public authorities

This wider lens explains why EU quantum policy is not a single statute about cryptography. Instead, it appears as a web of recommendations, cybersecurity regulation, coordinated roadmaps, and national measures.

The central idea is simple: fragmented national transitions create security gaps. The EU therefore pushes for coordination first, then enforcement. The aim is not merely to adopt new algorithms, but to move in lockstep so cross-border services and joint defence programmes avoid weakest-link exposure.

2. The coordinated roadmap for post-quantum cryptography

The turning point: Commission Recommendation (EU) 2024/1101

In April 2024, the European Commission adopted a recommendation on a coordinated roadmap for the transition to PQC. It does three important things:

  1. It formally recognises quantum computing as a present cybersecurity threat rather than a distant research topic.

  2. It calls on Member States and EU institutions to synchronise their PQC transitions, reducing divergence and supply-chain friction.

  3. It sets phased expectations rather than an abrupt rip-and-replace mandate, reflecting the realities of long-lived systems.

A recommendation is not directly binding, but in EU governance it is a powerful alignment lever, especially when reinforced through cybersecurity regulation and public procurement. It signals intent, establishes milestones, and frames how national authorities and EU agencies will assess progress.

2026 is an execution milestone, not a starting gun

The roadmap makes the timeline explicit:

  • 2024 to 2025: planning, inventory, capability building

  • 2026 onwards: active transition and implementation, with priority on high-risk domains

For CISOs and defence contractors, this means awareness is no longer adequate by 2026. Regulators and contracting authorities will expect evidence of concrete action. The test will move from strategy on paper to demonstrable change in systems, suppliers, and processes.

3. ENISA and the NIS ecosystem

ENISA as the technical-policy bridge

The European Union Agency for Cybersecurity serves as the bridge between policy intent and operational guidance. ENISA has:

  • published threat analyses that reference quantum risk

  • supported Member States through the NIS Cooperation Group

  • shaped how PQC integrates into wider cyber-resilience frameworks

For organisations subject to EU oversight, ENISA outputs often become the de facto technical baseline before national regulators formalise expectations. If you want to anticipate supervisory questions, start with ENISA guidance and map it to your asset inventory and crypto architecture.

NIS2 raises the stakes

NIS2, now being transposed into national law, broadens the scope of regulated entities and elevates expectations around risk management, supply-chain security, and forward-looking controls. While NIS2 does not mandate PQC by name, its demands around:

  • long-term confidentiality

  • resilience against advanced threats

  • proportionate and state-of-the-art measures

create a clear compliance logic. If your systems handle data that must remain confidential for a decade or more, or if replacement cycles are slow, quantum risk becomes relevant. By 2026, ignoring it will be increasingly difficult to justify under a NIS2 risk-based assessment.

4. Implications for defence contractors and aerospace suppliers

Defence procurement is already shifting

EU defence and security procurement emphasises long life cycles, cross-border interoperability, and alignment with allied standards. Within that context, quantum-vulnerable cryptography is seen as a strategic weakness. Expect the following by 2026:

  • PQC readiness becomes part of technical evaluations

  • crypto-agility is assessed during system design reviews

  • vendors must explain migration paths, not just current compliance

This will not be limited to top-level systems. Cryptographic posture, key management, and update pipelines will be examined across subsystems and dependencies, including firmware and embedded components.

Supply-chain pressure is real

Large primes are already pushing PQC expectations down the chain. Even if you do not handle classified data, your software or hardware may sit inside a long-lived defence platform. In practice, that means:

  • signing mechanisms and code-signing infrastructure must be ready for hybrid or PQC approaches

  • update processes must support algorithm agility and secure re-keying

  • cryptographic libraries must be assessed for PQC support and migration roadmaps

Suppliers that cannot articulate their path will face friction in qualification, integration, and sustainment phases.

5. National agency signals: France and Germany set the tone

France: ANSSI and state-led migration

France’s ANSSI has been among the most proactive on PQC. It has published opinions on post-quantum migration, issued FAQs and technical notes on hybrid approaches, and positioned PQC as a state-level concern. For organisations operating in France or supplying French ministries, this translates into earlier expectations around planning, inventories, pilot deployments, and alignment with national guidance.

Germany: BSI and long-term assurance

Germany’s BSI has integrated quantum considerations into cryptographic guidelines, with particular focus on long-term confidentiality and trust services. German regulators often emphasise formal assurance, documented risk analysis, and structured migration. For EU-wide suppliers, aligning with both ANSSI and BSI is increasingly a sensible baseline, smoothing cross-border acceptance and shortening compliance discussions.

6. What a credible 2026 posture looks like for CISOs

For CISOs in regulated or cross-border organisations, quantum security is now part of mainstream cyber governance. By 2026, a credible posture should include:

1) A documented quantum risk assessment

Map where you use public-key cryptography across protocols, products, and services. Identify data sets with long confidentiality requirements and systems that are hard or slow to replace. Prioritise by business impact and replacement lead time. Use this assessment to justify phasing and to explain why certain domains move first.

2) A post-quantum transition roadmap

This should not be a promise to upgrade later. It should set out phased priorities, dependencies on vendors and standards, and decision points aligned to EU and national guidance. Include checks for algorithm agility, key sizes, certificate profiles, and hybrid modes where appropriate. Define triggers for moving from pilot to production.

3) Procurement and supplier controls

Update RFPs, framework agreements, and supplier questionnaires to ask:

  • Do products support or plan to support PQC or hybrid modes

  • How is crypto-agility implemented across stacks and life cycles

  • How will updates, re-keying, and certificate issuance be delivered over time

Make PQC roadmaps part of your supplier risk model. Require attestations or evidence for high-assurance use cases.

4) Alignment with EU coordination

Be ready to show how your programme aligns with EU-level coordination and your national authority’s guidance. Cross-reference ENISA material, national technical notes, and sectoral expectations. If you operate across several Member States, produce a single plan that satisfies the strictest common denominator.

5) Pilot, learn, industrialise

Run pilots in well-scoped environments: code-signing, internal PKI, or selected data-in-transit paths are common starting points. Measure performance, compatibility, and operational overhead. Convert lessons into standard operating procedures and reference architectures. Your goal is not a one-off upgrade, but repeatable capability.

7. Why this matters commercially, not just for compliance

EU quantum policy is quietly reshaping markets. By 2026:

  • PQC readiness becomes a differentiator in public and defence tenders

  • vendors who can explain their roadmap gain trust with authorities and primes

  • late movers risk exclusion from high-assurance projects and from roles in sovereign supply chains

Customers will ask not only whether you are compliant today, but whether your products can stay compliant over the system’s lifetime. The winners will be those who treat PQC as a product and lifecycle issue, not a compliance tick-box.

8. Why this naturally points to a Paris-based PQC event in 2026

EU quantum security policy is coordination-led by design. That makes in-person, cross-border dialogue unusually valuable. A Paris-based event in 2026 sits at the intersection of EU-level execution, French national leadership, defence and critical infrastructure supply chains, and enterprise CISO readiness.

For sponsors and partners, the audience is highly regulated, long-term oriented, and actively budgeting for transition. For attendees, the value lies in clarity on what Europe expects next and how to execute without disrupting operations. Sessions that pair policy leads with engineering teams will be especially useful, translating the roadmap into migration playbooks.

Key takeaway

By 2026, EU quantum security moves from coordination to consequence. CISOs and defence contractors who understand the policy direction and act early will reduce risk and gain commercial advantage. The task is not to predict every algorithmic detail, but to build crypto-agility, align with EU and national guidance, and demonstrate credible progress across systems and suppliers. Those who do will be positioned as trusted, future-ready partners in Europe’s security ecosystem.


EU policy and the coordinated PQC roadmap

  • Commission Recommendation (EU) 2024/1101 on a coordinated implementation roadmap for the transition to post-quantum cryptography — EUR-Lex overview. EUR-Lex

  • The same Recommendation in Official Journal PDF form. EUR-Lex

  • European Commission Digital Strategy page announcing and hosting the Coordinated Implementation Roadmap and timeline for PQC, with downloadable roadmap and press material. Digital Strategy

ENISA guidance and the NIS ecosystem

  • ENISA study: Post-Quantum Cryptography — Current state and quantum mitigation. ENISA

  • ENISA report PDF version of the same study. ENISA

NIS2 Directive and compliance logic

  • Directive (EU) 2022/2555 — NIS2 Directive on a high common level of cybersecurity across the Union — EUR-Lex consolidated entry. EUR-Lex

  • NIS2 as published in the Official Journal, with full articles and recitals. EUR-Lex

National authorities setting expectations

France — ANSSI

  • ANSSI scientific and technical opinion on migration to post-quantum cryptography — updated position, December 2023, PDF. MesServicesCyber

  • ANSSI advisory page on migration to post-quantum cryptography — updated guidance portal entry, January 2024. MesServicesCyber

  • Earlier ANSSI scientific and technical opinion introducing a migration planning approach, April 2022, PDF. MesServicesCyber

Germany — BSI

  • BSI Technical Guideline TR-02102-1: Cryptographic Mechanisms — Recommendations and Key Lengths — landing page. BSI

  • TR-02102-1 current version PDF, including guidance on long-term confidentiality and quantum-safe mechanisms. BSI

Coordination deliverables and timelines

  • NIS Cooperation Group PQC Work Stream — first public deliverable “A Coordinated Implementation Roadmap for the Transition to PQC” summarising the 2024 Recommendation and subsequent coordination steps, PDF. Security Delta

Ready for Qsecdef

Cta Image 01
Cta Image 02

Ready for Qsecdef

Cta Image 01
Cta Image 02

Ready for Qsecdef

Cta Image 01
Cta Image 02

Ready for Qsecdef

Cta Image 01
Cta Image 02