Post-quantum cryptography is often framed as an algorithm selection problem. Stefan Kölbl reframes it as something else entirely: a key management and lifecycle discipline challenge.
In this episode of Shielded: The Last Line of Cyber Defense, host Jo Lintzen speaks with Stefan, an information security engineer at Google, about what it actually takes to migrate cryptography across complex global systems at scale.
They explore why Store Now, Decrypt Later is treated as a real threat inside Google, why hybrid deployments were justified before final NIST standards, and why inventory dashboards alone won’t get organizations across the finish line. The real work, Stefan explains, lies in crypto agility, automated key rotation, lifecycle ownership, and safe-by-default developer frameworks.