Encryption & Key Management
,
Events
,
RSAC Conference
Alex Doll of Ten Eleven Ventures on Q-Day Risk Considerations
Quantum computing advances push security teams to replace encryption keys faster and adopt quantum-resistant algorithms. Investors and enterprises now treat Q-Day – the date when quantum computers will be able to break widely used encryption – as a near-term risk, forcing changes in key management, PKI and cryptographic standards, said Alex Doll of Ten Eleven Ventures.
See Also: How Technical Debt Puts Critical Infrastructure at Risk
Shorter key life cycles improve resilience. Automation through DevOps simplifies rotation. This trend reflects stronger security hygiene and prepares systems for quantum-era threats, he said.
New quantum-resistant algorithms and improved key management practices aim to protect sensitive data before large-scale quantum systems arrive. But enterprises also face rapid growth in certificates across cloud, endpoints and services, which increases operational complexity and risk, he said.
“The fundamental threat from quantum computing is quantum computers can be used to essentially run a dictionary attack on every possible outcome, and they could actually break the mathematics that underly pre-quantum computing,” he said. “And so it’s very important when quantum computing arrives that we have quantum-resistant encryption.”
In this video interview with Information Security Media Group at RSAC Conference 2026, Doll also discussed:
- Why frequent key rotation strengthens security posture;
- Key management and PKI challenges in cloud-first environments;
- Quantum capabilities outside of cybersecurity for industries such as pharmaceuticals, logistics and finance.
Doll has a background in both entrepreneurship and security, with extensive industry insight in identifying promising startups driving innovation in areas such as data protection, vulnerability management and AI-driven cybersecurity solutions. Under his leadership, Ten Eleven Ventures has backed companies advancing cutting-edge technologies to address evolving digital threats.

