
Please NOTE This will be a HYBRID meeting. Check additional information block for Address.
Topic & Guest Speaker 
Suraj Adeyemo will be presenting on Quantum Supremacy.
This talk will focus on ISC2 Domain 3: Security Architecture and Engineering
Meeting Agenda
- Guest Presentation - 12:00 - 1:00
- Chapter Business - 1:00 - 1:15
- Q&A and Networking - 1:15 - 1:30
About the Speaker
Suraj Adeyemo is a decorated United States Army veteran and senior IT consultant with extensive experience across the Department of Defense, supporting the U.S. Air Force, U.S. Space Force, and U.S. Army. His work spans enterprise cybersecurity architecture, information assurance, and mission‑critical IT modernization in both classified and unclassified environments.
Suraj has led and advised on major security initiatives, including Risk Management Framework (RMF) implementations, network security architecture, and the transition to post‑quantum cryptography in alignment with CNSA 2.0 and NSM‑10 directives. He is a trusted advisor to senior military leadership on cybersecurity posture, compliance, and strategic planning.
He holds both an MBA and an MS degree, and maintains multiple industry certifications including CISM, CISA, CASP+, PMP, and CompTIA Security+, placing him at the intersection of cybersecurity leadership, governance, and operational excellence.
This talk will cover the following: Quantum Computing Practical Implications for Technology and Society.
Abstract Post‑Quantum Cryptography (PQC) addresses the impending risk that quantum computing poses to classical public‑key cryptography, including RSA, ECC, and Diffie‑Hellman. This session examines the cryptographic primitives most vulnerable to quantum attacks, the implications of “harvest now, decrypt later” adversary models, and the current state of NIST‑selected post‑quantum algorithms. Attendees will explore practical impacts to TLS, PKI, identity systems, data‑at‑rest encryption, and hybrid cryptographic deployments, along with architectural and governance considerations for crypto‑agility. The discussion focuses on actionable steps security professionals can take today to assess exposure, plan migration paths, and integrate post‑quantum readiness into existing security and risk management programs.
Continuing Professional Education (CPE) Credit
The membership chairperson will submit one or more CPEs for this event for ISC2 members as appropriate. Please bring your ISC2 membership number to the meeting. Attendees will also receive an attendance receipt via email from the Chapter's Board members to support continuing education requirements.