The G7 Cyber Expert Group (CEG) has issued a significant advisory to the global financial sector, urging immediate preparation for the advent of quantum computing. In a statement released on January 12, 2026, the group, led by the U.S. Department of the Treasury and the Bank of England, released a roadmap to guide financial institutions in their transition to Post-Quantum Cryptography (PQC). The core concern is that a cryptographically relevant quantum computer (CRQC) will be capable of breaking the asymmetric encryption algorithms (like RSA and ECC) that currently protect virtually all digital financial data and communications. The G7 warns of 'harvest now, decrypt later' attacks, where adversaries are already capturing and storing encrypted data, waiting for the technology to decrypt it. The roadmap provides a framework for organizations to begin inventorying their cryptographic systems, assessing risks, and planning an orderly migration to new, quantum-resilient standards.
The document, titled 'G7 Cyber Expert Group Statement on Planning for the Opportunities and Risks of Quantum Computing,' is not a binding regulation but a strategic roadmap. It outlines a set of principles and recommended actions for both private financial firms and public sector authorities. The key pillars of the guidance include:
The guidance is directed at the entire global financial ecosystem. This includes:
While not yet a mandate, the roadmap signals that future regulatory expectations will require financial firms to demonstrate progress in their PQC transition. Key implicit requirements include:
The transition to PQC represents one of the most significant and complex technological migrations in the history of IT. The impact on financial organizations will be profound:
T1020 - Automated Exfiltration). This data, which may have a long-term strategic value, could be decrypted in the future once a CRQC is built. This makes the transition an urgent, albeit long-term, priority.M1054 - Software Configuration.Transitioning to quantum-resistant encryption algorithms is the ultimate mitigation for the threat.
Developing cryptographic agility by avoiding hard-coded algorithms is a critical preparatory step for the PQC transition.
Mapped D3FEND Techniques:
In the context of the PQC transition, Application Configuration Hardening means architecting for 'crypto-agility.' Financial institutions must move away from the practice of hard-coding cryptographic algorithms and parameters directly into their application source code. Instead, applications should be designed to call cryptographic functions through a centralized, abstracted service or library. This library can then be configured to use specific algorithms (e.g., RSA today, CRYSTALS-Kyber tomorrow) via configuration files. This approach dramatically simplifies the migration process, as updating the cryptography for dozens or hundreds of applications can be achieved by changing a central configuration and deploying an updated library, rather than refactoring, recompiling, and re-deploying each application individually. This is a crucial strategic investment that reduces the long-term cost and risk of the PQC migration.
To counter the immediate 'harvest now, decrypt later' threat, financial institutions should enhance their network traffic analysis capabilities. While the content of encrypted traffic is unreadable, the metadata and patterns can reveal anomalies indicative of data exfiltration. Security teams should use NetFlow analysis and deep packet inspection (where possible) to baseline normal encrypted traffic flows to and from external entities. Alerts should be configured for unusually large or long-duration encrypted sessions, data transfers to unknown or suspicious destinations, or traffic patterns that deviate significantly from the established baseline. This won't stop the harvesting, but it provides a chance to detect and interrupt a large-scale exfiltration campaign in progress, limiting the amount of data an adversary can collect for future decryption.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats