Exclusive Interview: Samuel Tseitkin, CEO of ExeQuantum, on Australia’s Race Against Quantum Threats
- Juan Allan
- Oct 10
- 2 min read
As quantum computing inches closer to practical reality, cybersecurity leaders are sounding the alarm: the threat isn’t coming, it’s already here. In an exclusive interview, Samuel Tseitkin, CEO of ExeQuantum, breaks down the urgency, challenges, and regulatory pressures shaping Australia’s quantum-readiness landscape.

Quantum Threat & Urgency: “Harvest Now, Decrypt Later” Is Already Happening
“The phrase ‘Harvest Now, Decrypt Later’ isn’t theoretical anymore, it’s already happening,” warns Tseitkin. “Adversaries are collecting encrypted data today, confident they’ll decrypt it once quantum systems mature.”
For Australian organisations, especially those designated as critical infrastructure, that means exposure has already begun. “The Australian Signals Directorate has been explicit: every cryptographic asset must be ready for transition by the end of 2026 and fully transitioned by 2030,” he notes.
The true danger, according to Tseitkin, is inertia. “Systems that stay on legacy cryptography for another five years will carry decades of residual risk. That’s why ExeQuantum focuses on measurable quantum-readiness rather than abstract future-proofing.”
The Transition Challenge: From Algorithm Choice to Cryptographic Discovery
While most enterprises are aware that new NIST-approved algorithms are on the way, Tseitkin emphasizes that “choosing the algorithm is the easy part.”
“The real hurdle is inventory, discovering where cryptography actually lives inside sprawling systems,” he explains. “Keys and protocols are often buried in third-party libraries, devices, and APIs. Most organisations don’t have a map of their cryptographic footprint.”
ExeQuantum’s approach tackles this visibility problem head-on. “Cryptographic agility means being able to replace algorithms without tearing down infrastructure. That requires visibility, automation, and governance. We start with discovery and continuous bill-of-materials generation so organisations can remediate methodically instead of reactively.”
Market Demand for Sovereignty: Security Must Be Verifiable
Across the globe, a clear shift is underway. “Governments and regulated industries are demanding sovereign, transparent, and verifiable security stacks,” says Tseitkin.
In practical terms, that means cryptography that can be independently audited, deployed locally, and proven compliant with data-residency and privacy regulations. “This fundamentally changes procurement,” he explains. “Buyers no longer want black-box security. They want verifiable implementations and a clear compliance lineage.”
ExeQuantum was built around what Tseitkin calls the STAC doctrine, Sovereignty, Transparency, Agility, Compliance. “These aren’t just differentiators anymore,” he says. “They’re becoming procurement requirements.”
Regulatory & Future Outlook: The Compliance Wave Ahead
Looking ahead, Tseitkin predicts that regulation will be the key accelerant driving quantum resilience.
“Finance, healthcare, and government suppliers will face sector-specific mandates to demonstrate quantum-resilient architectures, much like the current Essential Eight maturity framework.”
His advice to security leaders is unequivocal: “Treat Post-Quantum Cryptography (PQC) not as a future research topic but as a present-day migration program. Begin with discovery, establish cryptographic governance, and integrate quantum-safe protocols into every new system from day one.”
For organisations willing to act early, the payoff will be strategic. “Those who move now will set the compliance standard, rather than race to catch up later,” Tseitkin concludes.
About ExeQuantumExeQuantum is an Australian cybersecurity company dedicated to helping enterprises and government agencies achieve measurable quantum-readiness. Its platform enables cryptographic discovery, automation, and governance to transition securely into the post-quantum era.



Comments