{"id":29022,"date":"2026-02-18T16:42:58","date_gmt":"2026-02-18T15:42:58","guid":{"rendered":"https:\/\/www.riskinsight-wavestone.com\/?p=29022"},"modified":"2026-02-20T16:05:36","modified_gmt":"2026-02-20T15:05:36","slug":"post-quantum-cryptography-for-products-ot-from-trends-to-industrial-reality","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/02\/post-quantum-cryptography-for-products-ot-from-trends-to-industrial-reality\/","title":{"rendered":"Post-Quantum Cryptography for\u00a0products\u00a0&amp;\u00a0OT:\u00a0From trends to industrial reality"},"content":{"rendered":"\n<p><b><span data-contrast=\"auto\">Post-Quantum Cryptography<\/span><\/b><span data-contrast=\"auto\">\u00a0<\/span><b><span data-contrast=\"auto\">(PQC)<\/span><\/b><span data-contrast=\"auto\">\u00a0has\u00a0fueled\u00a0debates\u00a0for years, but since the\u00a0<\/span><b><span data-contrast=\"auto\">European Commission\u2019s\u00a0June 2025\u00a0communication\u00a0<\/span><\/b><a href=\"https:\/\/digital-strategy.ec.europa.eu\/en\/library\/coordinated-implementation-roadmap-transition-post-quantum-cryptography\"><b><span data-contrast=\"none\">on the PQC transition roadmap<\/span><\/b><\/a><span data-contrast=\"auto\">,\u00a0the acceleration is undeniable.\u00a0It\u00a0is\u00a0no\u00a0longer\u00a0a question of \u201cif\u201d but rather \u201cwhen\u201d,\u00a0quantum computing will\u00a0disrupt\u00a0our cryptographic\u00a0foundations.\u00a0As\u00a0the\u00a0Wavestone\u00a0RiskInsight\u00a0article\u00a0\u00a0<\/span><a href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/03\/quantum-computing-and-post-quantum-cryptography-how-to-deal-with-these-issues\/\"><span data-contrast=\"none\">\u00ab\u00a0Quantum computing and post-quantum cryptography: what strategy should companies adopt to deal with these issues?\u00a0\u00bb<\/span><\/a><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">reminds us,\u00a0this\u00a0subject shifts from\u00a0a long-term perspective\u00a0to a\u00a0<\/span><b><span data-contrast=\"auto\">strategic imperative\u00a0<\/span><\/b><span data-contrast=\"auto\">for\u00a0CISOs, CTOs\u00a0and\u00a0product\u00a0teams. How does that change your\u00a0<\/span><b><span data-contrast=\"auto\">industrial environments\u00a0<\/span><\/b><span data-contrast=\"auto\">as well as your\u00a0<\/span><b><span data-contrast=\"auto\">smart products<\/span><\/b><span data-contrast=\"auto\">, and how to act as of now?<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<h1><span data-contrast=\"none\">Quantum\u00a0Threats:\u00a0a new era for industrial cryptography<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/h1>\n<p><span data-contrast=\"auto\">Quantum computing represents a threat to traditional cryptographic algorithms which guarantee integrity, authenticity and confidentiality of communications, including those of OT systems and products. Even if \u201c<\/span><b><span data-contrast=\"auto\">Q-Day<\/span><\/b><span data-contrast=\"auto\">\u201d (the day quantum computers will break current cryptography) is still several years away, the risk is already present: threat actors can already use <\/span><b><span data-contrast=\"auto\">\u00ab\u202f<\/span><\/b><b><i><span data-contrast=\"none\">H<\/span><\/i><\/b><b><i><span data-contrast=\"auto\">arvest\u00a0Now,\u00a0Decrypt\u00a0Later<\/span><\/i><\/b><b><span data-contrast=\"auto\">\u202f\u00bb<\/span><\/b><span data-contrast=\"auto\"> attacks by storing encrypted data today to decrypt them as soon as current cryptographic algorithms are broken. Another risk, just as critical, is already appearing:\u00a0<\/span><b><span data-contrast=\"auto\">\u00ab<\/span><\/b><b><span data-contrast=\"auto\">\u202f<\/span><\/b><b><span data-contrast=\"auto\">Trust\u00a0Now, Forge\u00a0Later<\/span><\/b><b><span data-contrast=\"auto\">\u202f<\/span><\/b><b><span data-contrast=\"auto\">\u00bb<\/span><\/b><span data-contrast=\"auto\">. Digital signatures or certificates seen as reliable today could be falsified tomorrow, allowing transparent deployment of malwares or even compromising supply chains. Unlike progressive data breach, this attack triggers <\/span><b><span data-contrast=\"auto\">an immediate collapse of trust and integrity<\/span><\/b><span data-contrast=\"auto\">, with massive impacts on\u00a0<\/span><b><span data-contrast=\"auto\">industrial environments<\/span><\/b><span data-contrast=\"auto\">\u00a0and\u00a0<\/span><b><span data-contrast=\"auto\">smart products<\/span><\/b><span data-contrast=\"auto\">. With the <\/span><b><span data-contrast=\"auto\">European roadmap<\/span><\/b><span data-contrast=\"auto\">, structuring 2026, 2030 and 2035, the question hinges on the sequencing of the transition.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Within the\u00a0industrial sector, where assets\u00a0are used for\u00a0<\/span><b><span data-contrast=\"auto\">multiple\u00a0decades<\/span><\/b><span data-contrast=\"auto\">, this represents a major concern: OT environments and embedded products depend on critical cryptographic usage that will be directly impacted by the arrival of post-quantum algorithms.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Key OT and product use cases include:<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<ul>\n<li><b><span data-contrast=\"auto\">Secure\u00a0administration of OT systems and products<\/span><\/b><span data-contrast=\"auto\">:\u00a0guarantee\u00a0the integrity and confidentiality of operations.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/li>\n<li><b><span data-contrast=\"auto\">Digital signatures and\u00a0firmware integrity<\/span><\/b><span data-contrast=\"auto\">: guarantee\u00a0the reliability of\u00a0software updates (secure boot, code signing, X.509\u2026).<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/li>\n<li><b><span data-contrast=\"auto\">Secure\u00a0remote\u00a0access\u00a0to industrial assets and products<\/span><\/b><span data-contrast=\"auto\">: protect VPN,\u00a0SSH, RDP\u00a0connections\u00a0as well as other protocols from future attacks.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/li>\n<li><b><span data-contrast=\"auto\">Data exchanges IT\/OT<\/span><\/b><span data-contrast=\"auto\">: secure flows between information systems\u00a0and industrial environments (TLS, MQTTS, HTTPS\u2026).<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/li>\n<li><b><span data-contrast=\"auto\">Data confidentiality\u00a0of industrial processes<\/span><\/b><span data-contrast=\"auto\">: preserve the confidentiality of\u00a0sensitive data in transit or\u00a0at rest.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/li>\n<li><b><span data-contrast=\"auto\">Secure logging and event history<\/span><\/b><span data-contrast=\"auto\">: ensure the traceability and integrity of logs and historical data.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-ccp-props=\"{&quot;335551550&quot;:2,&quot;335551620&quot;:2}\"> <img loading=\"lazy\" decoding=\"async\" class=\"alignnone  wp-image-29019 aligncenter\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/02\/PQC_en1.png\" alt=\"\" width=\"687\" height=\"368\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/02\/PQC_en1.png 1027w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/02\/PQC_en1-357x191.png 357w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/02\/PQC_en1-71x39.png 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/02\/PQC_en1-768x411.png 768w\" sizes=\"auto, (max-width: 687px) 100vw, 687px\" \/><\/span><\/p>\n<h1><span data-contrast=\"none\">PQC\u00a0for\u00a0OT &amp;\u00a0Products:\u00a0Address\u00a0the constraints while preserving crypto-agility<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/h1>\n<h2><span data-contrast=\"none\">OT &amp; Products\u00a0context:\u00a0specific constraints<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">OT systems\u00a0and products were never conceived for\u00a0<\/span><b><span data-contrast=\"auto\">crypto-agility<\/span><\/b><span data-contrast=\"auto\">. Numerous industrial protocols, for instance DNP3, Modbus or MQTT, are\u00a0not\u00a0encrypted\u00a0as of today because OT architecture historically depends\u00a0more on network isolation than on cryptography,\u00a0thus there is no reason to think they will be\u00a0encrypted tomorrow\u00a0with post-quantum algorithms.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Nevertheless,\u00a0encrypted communications will undergo this cryptographic\u00a0disruption.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">In a second step, multiple OT devices face significant hardware constraints (CPU, memory, storage capacity) and have a very long lifespan, often between 10 and 30 years. Those characteristics make updates difficult and expensive: secure remote update mechanisms are still rare, and firmware signing is not consistently implemented, which is in fact bad practice.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Those constraints explain why OT environments cannot integrate new\u00a0cryptographic\u00a0primitives\u00a0at the same speed as IT, and why PQC\u00a0isn\u2019t\u00a0yet natively\u00a0considered.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><strong>Nevertheless, even if current products and OT systems aren\u2019t conceived for post-quantum cryptography, the emergence of PQC standards, the evolution of regulatory obligations and the rise of risks linked to quantum computing make this transition essential in the medium term.\u00a0<\/strong><\/p>\n<p><span data-ccp-props=\"{&quot;335551550&quot;:2,&quot;335551620&quot;:2}\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-29017 aligncenter\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/02\/PQC_en2.png\" alt=\"\" width=\"743\" height=\"285\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/02\/PQC_en2.png 1402w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/02\/PQC_en2-437x168.png 437w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/02\/PQC_en2-71x27.png 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/02\/PQC_en2-768x295.png 768w\" sizes=\"auto, (max-width: 743px) 100vw, 743px\" \/><\/span><\/p>\n<h2><span data-contrast=\"none\">Making crypto-agility operational for the industry and products<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">The scoping\u00a0of the PQC project for Products and OT can be\u00a0broken down\u00a0into\u00a0four main\u00a0components:<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">1. Conduct the cryptographical inventory and prioritize critical assets <\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Start\u00a0the dialogue\u00a0with your\u00a0cryptographic platform providers (PKI, KMS, HSM)\u00a0now,\u00a0to\u00a0anticipate\u00a0the migration.<\/span><span data-ccp-props=\"{&quot;335559685&quot;:720}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">2. Conceive and deploy crypto-agile architectures<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Rely\u00a0exclusively on NIST-standardized algorithms (for instance:\u00a0<\/span><b><span data-contrast=\"auto\">ML-KEM, ML-DSA, SLH-DSA<\/span><\/b><span data-contrast=\"auto\">)\u00a0and\u00a0prohibit any\u00a0<\/span><b><span data-contrast=\"auto\">internal development<\/span><\/b><span data-contrast=\"auto\">\u00a0or\u00a0<\/span><b><span data-contrast=\"auto\">non-standard<\/span><\/b><span data-contrast=\"auto\">\u00a0library for cryptographical components;\u00a0prioritizing validated and proven solutions.<\/span><span data-ccp-props=\"{&quot;335559685&quot;:708}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Conceiving crypto-agile architecture implies accounting for the\u00a0<\/span><b><span data-contrast=\"auto\">embedded aspect and its constraints<\/span><\/b><span data-contrast=\"auto\">\u00a0(limited memory,\u00a0PCBs, energy resources). The implementation of PQC algorithms on those systems\u00a0remains\u00a0uncertain. Nevertheless, optimized algorithms for embedded systems are starting to\u00a0emerge\u00a0and open the way to its realistic adoption.<\/span><span data-ccp-props=\"{&quot;335559685&quot;:708}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;335559685&quot;:720}\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone  wp-image-29015 aligncenter\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/02\/PQC_en3.png\" alt=\"\" width=\"747\" height=\"258\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/02\/PQC_en3.png 1444w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/02\/PQC_en3-437x151.png 437w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/02\/PQC_en3-71x25.png 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/02\/PQC_en3-768x265.png 768w\" sizes=\"auto, (max-width: 747px) 100vw, 747px\" \/><\/span><\/p>\n<p><b><span data-contrast=\"auto\">3. Progressively migrate through hybridization and iteration <\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Transition towards post-quantum cryptography cannot be\u00a0approached as a one-off project or a \u201cone-shot\u201d migration.\u00a0<\/span><span data-contrast=\"none\">It is an iterative process\u00a0that must be managed and governed over time,\u00a0by starting with hybridization of algorithms:<\/span><span data-contrast=\"auto\">\u00a0this\u00a0is explicitly recommended by\u00a0ANSSI\u00a0(France\u2019s National\u00a0Cybersecurity\u00a0Agency)\u00a0and the European Commission.<\/span><span data-ccp-props=\"{&quot;335559685&quot;:720}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Crypto-agility\u00a0isn\u2019t\u00a0an option, but a necessity to ensure\u00a0resilience\u00a0and compliance\u00a0for\u00a0industrial\u00a0environments\u00a0and products\u00a0from the quantum threat.\u00a0This depends on a\u00a0<\/span><b><span data-contrast=\"none\">structured\u00a0approach, driven by\u00a0inventory, architecture, hybrid\u00a0migration\u00a0and governance.<\/span><\/b><span data-contrast=\"auto\">\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h1><span data-contrast=\"none\">Operational feedback\u00a0&amp;\u00a0concrete use cases:\u00a0stakeholders\u00a0at\u00a0different stages<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/h1>\n<p><span data-contrast=\"auto\">Our field experience reveals a noteworthy maturity gap between two\u00a0industrial\u00a0organizations\u00a0when dealing with post-quantum\u00a0cryptography:<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">1. Organizations with a rudimentary understanding<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<ul>\n<li><b><span data-contrast=\"auto\">\u00a0Observation<\/span><\/b><span data-contrast=\"auto\">:\u00a0In\u00a0numerous\u00a0industrial environments, PQC\u00a0remains\u00a0an abstract concept, often seen as distant or limited to experts.\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<li><b><span data-contrast=\"auto\">Symptoms<\/span><\/b><span data-contrast=\"auto\">:\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span>\n<ul>\n<li><span data-contrast=\"auto\">Operational and business teams\u00a0aren\u2019t\u00a0part of strategic deliberations on cryptography.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:278}\">\u00a0<\/span><\/li>\n<li><b><span data-contrast=\"auto\">Current roadmaps lack maturity and\u00a0clarity<\/span><\/b><span data-contrast=\"auto\">;\u00a0the underlying\u00a0projects\u00a0costs\u00a0are often\u00a0underestimated. Priority\u00a0remains\u00a0on service availability;\u00a0quantum security is\u00a0therefore deprioritized.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:278}\">\u00a0<\/span><\/li>\n<li><b><span data-contrast=\"auto\">HNDL &amp; TNFL<\/span><\/b><span data-contrast=\"auto\">\u00a0concepts\u00a0are\u00a0poorly\u00a0understood, if not outright ignored.<\/span> \u00a0<\/li>\n<\/ul>\n<\/li>\n<li><b><span data-contrast=\"auto\">Risks<\/span><\/b><span data-contrast=\"auto\">:\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span>\n<ul>\n<li><b><span data-contrast=\"auto\">Disruption of\u00a0industrial production processes and\u00a0data\u00a0breaches<\/span><\/b><span data-contrast=\"auto\">: vulnerable communications between\u00a0critical\u00a0assets, based on outdated algorithms, expose sensitive data and can cause interruptions or major disturbances in industrial operations (loss of integrity of the data).<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:278}\">\u00a0<\/span><\/li>\n<li><b><span data-contrast=\"auto\">Production downtime caused by abrupt\u00a0migration:<\/span><\/b><span data-contrast=\"auto\">\u00a0A forced transition towards post-quantum cryptography, without preparation nor\u00a0crypto-agility, can lead to production interruptions, significant\u00a0additional\u00a0costs\u00a0and severe impacts on operational continuity.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:278}\">\u00a0<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><b><span data-contrast=\"auto\">2. Product suppliers: pioneers already undergoing industrialization<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<ul>\n<li><b><span data-contrast=\"auto\">Observation:\u00a0<\/span><\/b><span data-contrast=\"auto\">On the contrary,\u00a0some product suppliers\u00a0are already ahead\u00a0(including\u00a0automotive and smart objects).<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<li><b><span data-contrast=\"auto\">Symptoms:\u00a0<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span>\n<ul>\n<li><span data-contrast=\"auto\">PQC projects are prioritized\u00a0over critical use\u00a0cases:\u00a0firmware\u00a0and update\u00a0signatures\u00a0(OTA),\u00a0device identity management,\u00a0secure\u00a0remote\u00a0access, etc.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:278}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">Pilot projects are being launched on product lines or representative environments, with concrete feedback on performance,\u00a0compatibility\u00a0and robustness of hybrid solutions\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:278}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">The process is being industrialized:\u00a0Integration of\u00a0PQC clauses in supplier contracts, automation of cryptographic inventory\u00a0<\/span><b><span data-contrast=\"auto\">CBOM<\/span><\/b><span data-contrast=\"auto\">, team upskilling, and dedicated governance.<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h1><span data-contrast=\"none\">Conclusion &amp;\u00a0Roadmap:\u00a0Take action to\u00a0build\u00a0a quantum-safe future<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/h1>\n<p><span data-contrast=\"auto\">Quantum threat\u00a0is no longer a distant prospect: it already\u00a0demands a significant transformation of industrial and product cybersecurity.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<ol>\n<li><b><span data-contrast=\"auto\">Plan ahead to protect the future<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ol>\n<p><span data-contrast=\"auto\">Demystify quantum concepts and\u00a0incorporate\u00a0them\u00a0in\u00a0your cybersecurity processes,\u00a0including\u00a0your products, your OT\u00a0environments\u00a0or your IT systems. Planning ahead is the key to\u00a0preventing\u00a0a major\u00a0disruption.<\/span><span data-ccp-props=\"{&quot;335559685&quot;:708}\">\u00a0<\/span><\/p>\n<ol start=\"2\">\n<li><b><span data-contrast=\"auto\"> Make crypto-agility a strategic vision<\/span><\/b><\/li>\n<\/ol>\n<p><span data-contrast=\"auto\">Stop viewing it as merely a technical project, but as a pillar of your resilience and of your\u00a0digital sovereignty. Build a\u00a0clear roadmap, with\u00a0milestones in the short,\u00a0medium\u00a0and long term.<\/span><span data-ccp-props=\"{&quot;335559685&quot;:708}\">\u00a0<\/span><\/p>\n<ol start=\"3\">\n<li><b><span data-contrast=\"auto\">Rely on trusted partners<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ol>\n<p><span data-contrast=\"auto\">The market is ready: experts and solutions exist to\u00a0support\u00a0you\u00a0through the modernization and\u00a0securing of your critical infrastructure.\u00a0Don\u2019t\u00a0face complexity on your own.\u00a0<\/span><span data-ccp-props=\"{&quot;335559685&quot;:708}\">\u00a0<\/span><\/p>\n<ol start=\"4\">\n<li><b><span data-contrast=\"auto\"> Industrialize the process<\/span><\/b><\/li>\n<\/ol>\n<p><span data-contrast=\"auto\">Move from pilot projects to broader rollout:\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<ul>\n<li><span data-contrast=\"auto\">Implement a PQC strategy to map out,\u00a0prioritize\u00a0and pilot the migration of critical uses (include\u00a0PQC clauses in contracts).<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">Start a transition program to modernize\u00a0trust\u00a0infrastructure components (PKI, CLM, HSM), automate the\u00a0inventory\u00a0and ensure the\u00a0operational continuity.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">Rely on\u00a0peers\u2019\u00a0feedback\u00a0as well as feedback from sectors already engaged in PQC.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ul>\n<h6><strong>Quantum risk is already there:\u00a0weakened asymmetric encryption, leaving signatures and data exposed.\u00a0<\/strong><\/h6>\n<p><span data-contrast=\"auto\">As\u00a0mentioned\u00a0previously, we\u00a0start from the observation that elements that\u00a0aren\u2019t\u00a0encrypted today in OT environments\u00a0are not meant to be encrypted tomorrow with post-quantum algorithms, because already existing measures ensure a risk level judged acceptable.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">In other words, PQC\u00a0doesn\u2019t\u00a0aim to transform the entirety of OT, but to protect the uses that\u00a0<\/span><b><span data-contrast=\"none\">really rely on cryptographical components\u00a0exposed to quantum risk.<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"none\">However, this observation\u00a0doesn\u2019t\u00a0reduce the importance of\u00a0planning.<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h6><strong>The two priorities\u00a0remain\u00a0as\u00a0follows:\u00a0<\/strong><\/h6>\n<ul>\n<li><span data-contrast=\"none\">Migrate your assets before 2030 and\u00a0act today to protect data confidentiality<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"none\">Define your\u00a0perimeter,\u00a0build your roadmap, and\u00a0above all, begin\u00a0the migration process today.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Post-Quantum Cryptography\u00a0(PQC)\u00a0has\u00a0fueled\u00a0debates\u00a0for years, but since the\u00a0European Commission\u2019s\u00a0June 2025\u00a0communication\u00a0on the PQC transition roadmap,\u00a0the acceleration is undeniable.\u00a0It\u00a0is\u00a0no\u00a0longer\u00a0a question of \u201cif\u201d but rather \u201cwhen\u201d,\u00a0quantum computing will\u00a0disrupt\u00a0our cryptographic\u00a0foundations.\u00a0As\u00a0the\u00a0Wavestone\u00a0RiskInsight\u00a0article\u00a0\u00a0\u00ab\u00a0Quantum computing and post-quantum cryptography: what strategy should companies adopt to deal with these issues?\u00a0\u00bb\u00a0reminds us,\u00a0this\u00a0subject shifts&#8230;<\/p>\n","protected":false},"author":81,"featured_media":29044,"comment_status":"open","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3922,3274],"tags":[],"coauthors":[4363,3789,4930,3141],"class_list":["post-29022","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-deep-dive-en","category-manufacturing-industry-4-0-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Post-Quantum Cryptography for\u00a0products\u00a0&amp;\u00a0OT:\u00a0From trends to industrial reality - RiskInsight<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/02\/post-quantum-cryptography-for-products-ot-from-trends-to-industrial-reality\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Post-Quantum Cryptography for\u00a0products\u00a0&amp;\u00a0OT:\u00a0From trends to industrial reality - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"Post-Quantum Cryptography\u00a0(PQC)\u00a0has\u00a0fueled\u00a0debates\u00a0for years, but since the\u00a0European Commission\u2019s\u00a0June 2025\u00a0communication\u00a0on the PQC transition roadmap,\u00a0the acceleration is undeniable.\u00a0It\u00a0is\u00a0no\u00a0longer\u00a0a question of \u201cif\u201d but rather \u201cwhen\u201d,\u00a0quantum computing will\u00a0disrupt\u00a0our cryptographic\u00a0foundations.\u00a0As\u00a0the\u00a0Wavestone\u00a0RiskInsight\u00a0article\u00a0\u00a0\u00ab\u00a0Quantum computing and post-quantum cryptography: what strategy should companies adopt to deal with these issues?\u00a0\u00bb\u00a0reminds us,\u00a0this\u00a0subject shifts...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/02\/post-quantum-cryptography-for-products-ot-from-trends-to-industrial-reality\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-18T15:42:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-20T15:05:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/02\/pexels-maria-geller-801267-2127022-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Ramzi Mouhtadi, Bertrand Carlier, Caroline DE MULDER, Lo\u00efc Lebain\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ramzi Mouhtadi, Bertrand Carlier, Caroline DE MULDER, Lo\u00efc Lebain\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/02\/post-quantum-cryptography-for-products-ot-from-trends-to-industrial-reality\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/02\/post-quantum-cryptography-for-products-ot-from-trends-to-industrial-reality\/\"},\"author\":{\"name\":\"Bertrand Carlier\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/47ccd9b6a5366b0cf6b1d1e9057ae6de\"},\"headline\":\"Post-Quantum Cryptography for\u00a0products\u00a0&amp;\u00a0OT:\u00a0From trends to industrial reality\",\"datePublished\":\"2026-02-18T15:42:58+00:00\",\"dateModified\":\"2026-02-20T15:05:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/02\/post-quantum-cryptography-for-products-ot-from-trends-to-industrial-reality\/\"},\"wordCount\":1385,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/02\/post-quantum-cryptography-for-products-ot-from-trends-to-industrial-reality\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/02\/pexels-maria-geller-801267-2127022-scaled.jpg\",\"articleSection\":[\"Deep-dive\",\"Manufacturing &amp; Industry 4.0\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/02\/post-quantum-cryptography-for-products-ot-from-trends-to-industrial-reality\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/02\/post-quantum-cryptography-for-products-ot-from-trends-to-industrial-reality\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/02\/post-quantum-cryptography-for-products-ot-from-trends-to-industrial-reality\/\",\"name\":\"Post-Quantum Cryptography for\u00a0products\u00a0&amp;\u00a0OT:\u00a0From trends to industrial reality - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/02\/post-quantum-cryptography-for-products-ot-from-trends-to-industrial-reality\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/02\/post-quantum-cryptography-for-products-ot-from-trends-to-industrial-reality\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/02\/pexels-maria-geller-801267-2127022-scaled.jpg\",\"datePublished\":\"2026-02-18T15:42:58+00:00\",\"dateModified\":\"2026-02-20T15:05:36+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/02\/post-quantum-cryptography-for-products-ot-from-trends-to-industrial-reality\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/02\/post-quantum-cryptography-for-products-ot-from-trends-to-industrial-reality\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/02\/post-quantum-cryptography-for-products-ot-from-trends-to-industrial-reality\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/02\/pexels-maria-geller-801267-2127022-scaled.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/02\/pexels-maria-geller-801267-2127022-scaled.jpg\",\"width\":2560,\"height\":1707},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/02\/post-quantum-cryptography-for-products-ot-from-trends-to-industrial-reality\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Post-Quantum Cryptography for\u00a0products\u00a0&amp;\u00a0OT:\u00a0From trends to industrial reality\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/47ccd9b6a5366b0cf6b1d1e9057ae6de\",\"name\":\"Bertrand Carlier\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/bertrand-carlier_\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Post-Quantum Cryptography for\u00a0products\u00a0&amp;\u00a0OT:\u00a0From trends to industrial reality - RiskInsight","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/02\/post-quantum-cryptography-for-products-ot-from-trends-to-industrial-reality\/","og_locale":"en_US","og_type":"article","og_title":"Post-Quantum Cryptography for\u00a0products\u00a0&amp;\u00a0OT:\u00a0From trends to industrial reality - RiskInsight","og_description":"Post-Quantum Cryptography\u00a0(PQC)\u00a0has\u00a0fueled\u00a0debates\u00a0for years, but since the\u00a0European Commission\u2019s\u00a0June 2025\u00a0communication\u00a0on the PQC transition roadmap,\u00a0the acceleration is undeniable.\u00a0It\u00a0is\u00a0no\u00a0longer\u00a0a question of \u201cif\u201d but rather \u201cwhen\u201d,\u00a0quantum computing will\u00a0disrupt\u00a0our cryptographic\u00a0foundations.\u00a0As\u00a0the\u00a0Wavestone\u00a0RiskInsight\u00a0article\u00a0\u00a0\u00ab\u00a0Quantum computing and post-quantum cryptography: what strategy should companies adopt to deal with these issues?\u00a0\u00bb\u00a0reminds us,\u00a0this\u00a0subject shifts...","og_url":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/02\/post-quantum-cryptography-for-products-ot-from-trends-to-industrial-reality\/","og_site_name":"RiskInsight","article_published_time":"2026-02-18T15:42:58+00:00","article_modified_time":"2026-02-20T15:05:36+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/02\/pexels-maria-geller-801267-2127022-scaled.jpg","type":"image\/jpeg"}],"author":"Ramzi Mouhtadi, Bertrand Carlier, Caroline DE MULDER, Lo\u00efc Lebain","twitter_misc":{"Written by":"Ramzi Mouhtadi, Bertrand Carlier, Caroline DE MULDER, Lo\u00efc Lebain","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/02\/post-quantum-cryptography-for-products-ot-from-trends-to-industrial-reality\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/02\/post-quantum-cryptography-for-products-ot-from-trends-to-industrial-reality\/"},"author":{"name":"Bertrand Carlier","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/47ccd9b6a5366b0cf6b1d1e9057ae6de"},"headline":"Post-Quantum Cryptography for\u00a0products\u00a0&amp;\u00a0OT:\u00a0From trends to industrial reality","datePublished":"2026-02-18T15:42:58+00:00","dateModified":"2026-02-20T15:05:36+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/02\/post-quantum-cryptography-for-products-ot-from-trends-to-industrial-reality\/"},"wordCount":1385,"commentCount":0,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/02\/post-quantum-cryptography-for-products-ot-from-trends-to-industrial-reality\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/02\/pexels-maria-geller-801267-2127022-scaled.jpg","articleSection":["Deep-dive","Manufacturing &amp; Industry 4.0"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2026\/02\/post-quantum-cryptography-for-products-ot-from-trends-to-industrial-reality\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/02\/post-quantum-cryptography-for-products-ot-from-trends-to-industrial-reality\/","url":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/02\/post-quantum-cryptography-for-products-ot-from-trends-to-industrial-reality\/","name":"Post-Quantum Cryptography for\u00a0products\u00a0&amp;\u00a0OT:\u00a0From trends to industrial reality - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/02\/post-quantum-cryptography-for-products-ot-from-trends-to-industrial-reality\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/02\/post-quantum-cryptography-for-products-ot-from-trends-to-industrial-reality\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/02\/pexels-maria-geller-801267-2127022-scaled.jpg","datePublished":"2026-02-18T15:42:58+00:00","dateModified":"2026-02-20T15:05:36+00:00","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/02\/post-quantum-cryptography-for-products-ot-from-trends-to-industrial-reality\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2026\/02\/post-quantum-cryptography-for-products-ot-from-trends-to-industrial-reality\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/02\/post-quantum-cryptography-for-products-ot-from-trends-to-industrial-reality\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/02\/pexels-maria-geller-801267-2127022-scaled.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/02\/pexels-maria-geller-801267-2127022-scaled.jpg","width":2560,"height":1707},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/02\/post-quantum-cryptography-for-products-ot-from-trends-to-industrial-reality\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Post-Quantum Cryptography for\u00a0products\u00a0&amp;\u00a0OT:\u00a0From trends to industrial reality"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/47ccd9b6a5366b0cf6b1d1e9057ae6de","name":"Bertrand Carlier","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/bertrand-carlier_\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/29022","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/81"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=29022"}],"version-history":[{"count":22,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/29022\/revisions"}],"predecessor-version":[{"id":29056,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/29022\/revisions\/29056"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/29044"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=29022"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=29022"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=29022"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=29022"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}