ONLINE
THREATS: 4
1
1
0
0
1
0
1
0
0
0
1
0
1
1
1
0
0
0
0
1
1
1
0
0
1
0
0
0
1
1
0
1
1
0
0
0
1
1
1
1
0
1
1
1
1
1
1
1
1
0
Compliance

Emerging Risk Considerations: AI, IoT, and Quantum Computing Compliance

Loading advertisement...
97

The call came in on a Thursday afternoon in early 2023, from a CISO I'd worked with years before at a large hospital system. His voice carried that particular blend of urgency and disbelief I've learned to recognize after fifteen years in this field.

"We've had a breach," he said. "But it's not what you think. It wasn't a phishing email. It wasn't a rogue employee. It was our smart IV pumps."

Forty-seven IoT-connected infusion devices across three hospital floors had been exploited through an unpatched firmware vulnerability. The attacker hadn't changed dosage settings—not this time—but they had used the pumps as pivot points to move laterally into the hospital's administrative network. Patient records for over 62,000 individuals were exfiltrated.

The kicker? The hospital had ISO 27001 certification. Full SOC 2 Type II. A comprehensive HIPAA compliance program. Every checkbox ticked.

Not one of those frameworks had adequately addressed 47 internet-connected medical devices running three-year-old firmware that couldn't be patched without shutting down patient care.

Welcome to the compliance gap of the century.

The Three-Headed Dragon: Why Traditional Compliance Is Breaking

For the better part of two decades, cybersecurity compliance frameworks were built around a relatively stable threat landscape. Servers, workstations, network perimeters, human users. The controls made sense for that world. Access control: check. Encryption: check. Patch management: check.

That world is gone.

Today, a mid-sized manufacturing company might have 12,000 IoT sensors on the factory floor, an AI-powered quality control system making autonomous decisions, and a CFO asking whether post-quantum cryptography needs to be on the agenda. A healthcare organization might run AI diagnostic tools analyzing patient data, 8,000 connected devices across care facilities, and a compliance team that has no idea what quantum computing means for the ePHI they've encrypted since 2018.

The compliance frameworks we rely on—ISO 27001, SOC 2, PCI DSS, HIPAA, NIST—were engineered for a different era. They're not wrong, exactly. But they're dangerously incomplete.

I've spent the last three years working almost exclusively on what I call "emerging risk compliance"—helping organizations understand where their existing frameworks fail when it comes to AI, IoT, and quantum computing. The picture isn't pretty.

"The next major compliance crisis won't come from a failure to implement existing controls. It will come from a failure to recognize that those controls were never designed for the technologies now running your business."

Understanding the Emerging Risk Landscape

Before we dive into compliance frameworks, let's understand what we're actually dealing with. Because in my experience, about 60% of compliance failures start with a fundamental misunderstanding of the risk itself.

The Three Emerging Risk Domains

Risk Domain

Current Enterprise Penetration

Projected 5-Year Growth

Primary Compliance Gaps

Potential Breach Cost Multiplier

Artificial Intelligence

77% of enterprises using some AI

340% growth in AI-powered systems

Training data governance, model explainability, algorithmic bias, AI supply chain

2.1x - 3.8x baseline breach cost

Internet of Things

14.4 billion connected enterprise IoT devices globally

127% growth to 29+ billion by 2030

Device lifecycle, firmware management, network segmentation, shadow IoT

1.8x - 4.2x baseline breach cost

Quantum Computing

Limited current production deployment

Cryptographically-relevant quantum computing projected 2028-2034

Harvest-now-decrypt-later attacks, cryptographic agility, certificate management

3.5x - 7.2x baseline breach cost (data collected today)

These aren't hypothetical future problems. I'm working with clients right now dealing with all three simultaneously—and watching their existing compliance programs fail to address them.

The Compliance Framework Coverage Reality

Here's the honest assessment of how existing major frameworks address these emerging risks:

Compliance Framework

AI Risk Coverage

IoT Risk Coverage

Quantum Risk Coverage

Overall Emerging Risk Readiness

ISO 27001:2022

Partial (new controls A.8.25, mentions AI in guidance)

Partial (asset management, network controls apply)

Minimal (cryptographic policy exists, quantum-specific gap)

35%

SOC 2

Minimal (general processing integrity)

Partial (availability, security TSCs partially apply)

Minimal (no specific guidance)

25%

PCI DSS 4.0

Minimal (limited AI-specific requirements)

Partial (network segmentation requirements apply)

Minimal (new cryptography guidance emerging)

30%

HIPAA

Minimal (general technical safeguards apply)

Partial (technical safeguards partially applicable)

None (no quantum-specific requirements)

20%

NIST CSF 2.0

Good (new govern function, some AI guidance)

Good (comprehensive asset and network coverage)

Fair (post-quantum guidance emerging)

55%

NIST AI RMF

Excellent (purpose-built for AI)

N/A

N/A

85% (AI only)

NIST SP 800-213

N/A

Good (IoT-specific federal guidelines)

N/A

75% (IoT only)

NIST Post-Quantum Standards

N/A

N/A

Excellent (purpose-built)

90% (quantum only)

EU AI Act

Excellent (comprehensive AI regulation)

N/A

N/A

80% (AI only)

ETSI EN 303 645

N/A

Excellent (consumer IoT standard)

N/A

80% (IoT only)

The uncomfortable truth: existing compliance frameworks cover an average of 27% of the emerging risks introduced by AI, IoT, and quantum computing. Organizations that believe SOC 2 certification protects their AI systems are mistaken. Companies that think ISO 27001 covers their IoT deployment are exposed. CFOs who believe current encryption will be compliant in five years may be wrong.

Part One: Artificial Intelligence Compliance

The AI Risk Categories Traditional Compliance Misses

In 2022, I consulted for a financial services firm that was using an AI-powered loan decisioning system. They were SOC 2 Type II certified, ISO 27001 certified, and fully compliant with applicable financial regulations. Their security team was excellent.

The AI system had a problem nobody had thought to look for: training data bias. The model had been trained on historical loan decisions that reflected decades of discriminatory lending practices. The AI was systematically denying loans to applicants from certain zip codes at rates 340% higher than comparable applicants from neighboring zip codes.

No one in compliance had ever asked: "What was this model trained on, and what biases does that data carry?"

That's not a security control. That's not in ISO 27001. That's not in SOC 2. But it's a real, material risk that ultimately cost the company $47 million in regulatory settlements.

AI Risk Taxonomy for Compliance Programs

AI Risk Category

Risk Description

Business Impact

Current Framework Coverage

Required Controls

Compliance Standard Addressing It

Training Data Governance

Poisoned, biased, or improperly sourced training data

Discriminatory outputs, regulatory liability, operational errors

<10% in traditional frameworks

Data provenance, bias testing, lineage tracking

EU AI Act Art. 10, NIST AI RMF

Model Supply Chain

Third-party models with embedded vulnerabilities or backdoors

Adversarial attacks, manipulation, IP theft

<5% in traditional frameworks

Model scanning, provenance verification, SBOMs for AI

NIST AI RMF, EU AI Act

Model Explainability

AI decisions that cannot be explained or audited

Regulatory non-compliance, inability to detect failures

<5% in traditional frameworks

Explainability requirements, decision logging, human oversight

EU AI Act, GDPR Art. 22, NIST AI RMF

Algorithmic Drift

Models degrading in accuracy or fairness over time

Operational failures, compliance violations, safety issues

<5% in traditional frameworks

Continuous monitoring, drift detection, revalidation processes

NIST AI RMF, ISO/IEC 42001

AI Access Control

Unauthorized access to AI systems, APIs, training data

Data breach, model theft, adversarial manipulation

40-60% via traditional access controls

AI-specific RBAC, API security, training data access controls

ISO 27001, SOC 2, plus AI-specific

Prompt Injection & AI-Specific Attacks

Novel attacks targeting AI systems' input processing

Data exfiltration, system manipulation, confidentiality breach

<10% in traditional frameworks

Input validation, output filtering, adversarial testing

Emerging standards, OWASP AI

Synthetic Data & Deepfakes

AI-generated content used to deceive or manipulate

Fraud, social engineering, disinformation

<5% in traditional frameworks

Authentication of content, detection capabilities, policies

Emerging regulatory landscape

AI Automated Decision Impact

High-stakes autonomous decisions without human oversight

Legal liability, harm to individuals, regulatory violation

<15% in traditional frameworks

Human-in-the-loop requirements, decision auditing, override capabilities

EU AI Act, GDPR, sector-specific

AI Privacy Risks

Inference attacks that extract personal data from trained models

Privacy violations, GDPR/HIPAA breaches

20-30% via existing privacy controls

Differential privacy, federated learning, model privacy testing

GDPR, HIPAA, NIST Privacy Framework

Intellectual Property in Training Data

Using copyrighted material in training without authorization

Legal liability, forced model retirement

<5% in traditional frameworks

Training data audits, licensing verification, IP provenance

Emerging legal landscape

Building an AI Compliance Program

After navigating several AI compliance implementations, I've developed a framework I call SCALE—Secure, Compliant, Accountable, Legible, Evaluated.

Phase 1: AI Inventory and Classification (Weeks 1-4)

The most shocking thing I discovered in my first AI compliance engagement: the company had 23 AI systems running in production. The IT department knew about 7. The compliance team knew about 4.

The other 16? Deployed by business units, sourced from SaaS vendors, or built by data science teams who didn't think to notify anyone.

Shadow AI is the new shadow IT. And it's everywhere.

AI System Classification

Risk Level

Required Compliance Controls

Governance Oversight

Audit Frequency

High-Risk AI (decisions affecting people: hiring, lending, healthcare, law enforcement)

Critical

Full EU AI Act compliance, human oversight, explainability, bias testing, registration

Executive and board visibility

Continuous + quarterly formal review

Medium-Risk AI (customer-facing systems, fraud detection, content moderation)

High

Data governance, explainability, output monitoring, incident response

Director-level oversight

Monthly review

Low-Risk AI (internal process automation, analytics, recommendations)

Medium

Basic data governance, access controls, performance monitoring

Manager-level oversight

Quarterly review

AI-Augmented Tools (AI features in standard software)

Low-Medium

Vendor assessment, data flow mapping, terms of use review

Operational oversight

Annual review

Research/Development AI (non-production, experimental)

Variable

Sandboxed environment, data governance, approval for production promotion

Technical oversight

Review at production entry

AI Compliance Control Framework:

Control Domain

Specific Controls

Implementation Approach

Evidence Required

Framework Mapping

AI Inventory Management

Complete AI system registry, vendor AI tracking, automatic discovery

CMDB extension + API scanning + business unit reporting

AI registry with classification, ownership, deployment date

NIST AI RMF MS-1.1, ISO/IEC 42001

Training Data Governance

Data provenance documentation, bias assessment, data quality standards

Data lineage tooling, bias testing frameworks (IBM AI Fairness 360, Google What-If Tool)

Data cards, bias assessment reports, lineage documentation

EU AI Act Art. 10, NIST AI RMF

Model Risk Management

Model validation, performance monitoring, drift detection, revalidation triggers

ML monitoring platforms (Evidently AI, WhyLabs, Fiddler)

Validation reports, monitoring dashboards, drift alerts, revalidation records

SR 11-7 (Banking), NIST AI RMF

AI Explainability

Decision logging, explainability requirements for high-risk decisions, documentation

Explainability frameworks (SHAP, LIME), logging infrastructure

Decision logs, explainability documentation, human oversight records

EU AI Act, GDPR Art. 22

AI Security Testing

Adversarial testing, prompt injection testing, model extraction testing

Specialized AI security tools, manual testing by AI security specialists

Adversarial test results, security assessment reports

NIST AI RMF, OWASP AI Security

AI Incident Response

AI-specific incident classification, response procedures, breach determination

Extensions to existing IRP, AI-specific playbooks

Incident records, response evidence, regulatory notifications

All frameworks + AI-specific

Third-Party AI Assessment

Vendor AI risk questionnaire, contractual AI governance requirements, ongoing monitoring

Vendor assessment program extension with AI-specific module

Vendor assessments, contractual terms, monitoring evidence

ISO 27001 A.15, SOC 2 CC9.2

AI Ethics & Bias Review

Regular bias audits, fairness metrics, ethics committee review

Bias testing automation + human review process

Bias test results, fairness metrics, committee review records

EU AI Act, sector-specific regulations

"AI systems don't fail because of bad intentions. They fail because nobody thought to apply governance to them. Every AI system your organization relies upon is making decisions—and every one of those decisions carries compliance risk your current frameworks weren't designed to manage."

The EU AI Act: The Compliance Standard That's Reshaping Everything

I'd be remiss not to address what is rapidly becoming the most impactful AI regulation in history. The EU AI Act entered into force in August 2024, with a phased implementation through 2026. If you handle data from EU residents, or deploy AI systems that affect EU individuals, this is now your reality.

EU AI Act Risk Category

Examples

Key Requirements

Compliance Timeline

Penalty for Non-Compliance

Unacceptable Risk (Prohibited)

Social scoring, subliminal manipulation, real-time remote biometric surveillance (with limited exceptions)

Complete prohibition

August 2024 (immediate)

Up to €35M or 7% global annual turnover

High-Risk AI Systems

AI in critical infrastructure, education, employment, credit, law enforcement, healthcare

Conformity assessment, human oversight, accuracy/robustness standards, transparency, registration in EU database

August 2026

Up to €15M or 3% global annual turnover

Limited-Risk Systems

Chatbots, deepfake generators, emotion recognition

Transparency obligations, disclosure requirements

August 2025

Up to €7.5M or 1.5% global annual turnover

Minimal-Risk Systems

Spam filters, AI-powered games, basic recommendation engines

Voluntary code of conduct

No mandatory deadline

No mandatory penalties


Part Two: IoT Compliance—The Attack Surface Nobody Is Managing

The Problem with 14.4 Billion Doors

In 2021, I was engaged by a large retail chain after a significant payment card breach. Their PCI DSS compliance was solid—they'd passed their QSA assessment six months prior with zero critical findings.

The breach vector? A network-connected thermostat in a Chicago store.

The thermostat vendor had hard-coded administrative credentials that were publicly documented in a 2018 forum post. The attacker used those credentials, accessed the HVAC management system, and from there pivoted to the network segment containing point-of-sale systems. PCI DSS had required network segmentation. They had network segmentation. The thermostat was inside the segmented retail network because the HVAC technician needed access to store systems. Nobody had thought about it.

Cost of breach: $12.4 million. Cost of the thermostat: $340.

The IoT Risk Landscape

IoT Risk Category

Description

Industry Most Affected

Current Compliance Coverage

Estimated Organizations Exposed

Hardcoded Credentials

Default or unchangeable usernames/passwords

All industries

20-30% via existing controls

68% of organizations with IoT

Unpatched Firmware

Devices running outdated, vulnerable firmware

Healthcare, Manufacturing, Retail

30-40% via patching requirements

73% of organizations with IoT

Insecure Communications

Unencrypted device communications, lack of TLS

Healthcare, Financial, Critical Infrastructure

40-50% via encryption controls

54% of organizations with IoT

Shadow IoT

Unauthorized devices connected to corporate networks

All industries

<10% via traditional asset management

82% of organizations with IoT

Physical Security

Accessible physical ports (USB, JTAG, debug interfaces)

Healthcare, Financial, Government

30-40% via physical security controls

61% of organizations with IoT

Insufficient Authentication

Weak or missing authentication mechanisms

All industries

40-60% via access control frameworks

59% of organizations with IoT

Insecure Update Mechanisms

No secure OTA updates, unsigned firmware

Manufacturing, Healthcare, Energy

<20% via existing controls

77% of organizations with IoT

Privacy Data Collection

Unexpected or excessive data collection by devices

Healthcare, Consumer, Retail

30-50% via privacy frameworks

64% of organizations with IoT

Poor Network Isolation

IoT devices in same network segments as critical systems

All industries

50-60% via segmentation controls

47% of organizations with IoT

End-of-Life Devices

Devices no longer receiving security updates

Healthcare (medical devices), Manufacturing

20-30% via asset management

71% of organizations with IoT

The IoT Compliance Control Architecture

After the hospital breach that opened this article—and a dozen similar engagements since—I've built what I call an IoT Security Assurance Program (ISAP). Here's how it maps to existing compliance frameworks while filling the critical gaps:

Control Domain

Traditional Framework Control

IoT-Specific Extension

Implementation

Evidence Required

Asset Management

ISO 27001 A.8.1; NIST ID.AM-1

IoT device registry with device type, firmware version, vendor, end-of-life date, communication protocols

Automated IoT discovery (Claroty, Armis, Nozomi) + CMDB integration

IoT asset registry, discovery scan reports, CMDB records

Credential Management

ISO 27001 A.9; SOC 2 CC6; PCI Req 8

Default credential elimination policy, unique credential assignment per device, credential vaulting for IoT

IoT-aware PAM solution, credential scanning tools

Credential audit results, PAM enrollment records, default credential scan reports

Network Segmentation

ISO 27001 A.13; PCI Req 1; NIST PR.AC-5

Dedicated IoT network zones by device type and risk level, micro-segmentation, east-west traffic monitoring

VLAN/zone design for IoT, network access control (NAC), zero-trust network policies

Network diagrams, segmentation test results, traffic analysis reports

Firmware & Patch Management

ISO 27001 A.12.6; NIST PR.IP-12

Firmware inventory, vendor patch notification subscriptions, risk-based prioritization for devices that can't be patched

Firmware management platform, vendor notification tracking, compensating control documentation

Firmware inventory, patch status reports, compensating control evidence

Communication Encryption

ISO 27001 A.10, A.13; HIPAA §164.312(e)

Encryption requirements for IoT communications, protocol security assessment, certificate management for IoT

TLS enforcement, IoT-appropriate encryption (lightweight for constrained devices), certificate lifecycle management

Protocol analysis results, encryption configuration evidence, certificate inventory

Monitoring & Anomaly Detection

ISO 27001 A.12.4; SOC 2 CC7; PCI Req 10

IoT-aware monitoring (OT/IoT protocols: MQTT, CoAP, Zigbee), behavioral baselines per device type, anomaly alerting

IoT-aware SIEM rules, specialized OT/IoT monitoring platforms

Monitoring configuration, alert evidence, behavioral baseline documentation

Secure Update Mechanisms

ISO 27001 A.12.6 (partial)

Secure OTA update requirements for new procurement, cryptographic signature verification, rollback capabilities

Procurement requirements for secure updates, signing infrastructure, update management

Procurement requirements, update logs, signature verification evidence

Physical Security

ISO 27001 A.11; PCI Req 9

Physical port restrictions (USB locks, port blockers), tamper detection for critical devices, secure device placement

Physical access controls for IoT infrastructure, tamper detection solutions

Physical inspection records, tamper detection logs, port restriction evidence

Vendor Security Assessment

ISO 27001 A.15; SOC 2 CC9

IoT vendor security questionnaire (SBOM, vulnerability program, patch history, end-of-life policies)

Vendor management program extension with IoT-specific module

IoT vendor assessments, SBOM records, contractual security requirements

End-of-Life Management

ISO 27001 A.8 (partial)

EOL tracking by device, compensating controls for unsupported devices, planned replacement program

EOL tracking in asset registry, risk acceptance process for EOL devices, replacement roadmap

EOL inventory, compensating control documentation, replacement plans

Incident Response—IoT

ISO 27001 A.16; NIST RS

IoT-specific incident playbooks (isolation without disrupting operations, forensics for embedded systems)

IRP extension with IoT playbooks, IoT-aware forensic capabilities

IoT incident playbooks, tabletop exercise records for IoT scenarios

IoT Security Testing

ISO 27001 A.18.2; PCI Req 11

IoT-specific penetration testing (firmware analysis, RF protocol testing, hardware attacks), regular scanning

IoT pen testing by specialists (firmware extraction, RF testing), IoT vulnerability scanning

IoT pen test reports, vulnerability scan results, remediation evidence

The Healthcare-Specific IoT Challenge:

Medical Device Category

FDA Classification

Patchability

Network Risk

HIPAA Compliance Gap

Recommended Approach

Connected Infusion Pumps

Class II-III

Low (requires FDA approval to patch)

High (patient safety critical)

Significant gap in technical safeguard coverage

Network isolation, behavioral monitoring, compensating controls

Patient Monitoring Systems

Class II

Medium

High (continuous data flow)

Moderate gap

Dedicated VLAN, encrypted communications, strict access control

Medical Imaging Systems (PACS, CT, MRI)

Class II-III

Low-Medium

High (large data transfers, often Windows-based)

Significant gap

Network segmentation, application-layer monitoring, controlled internet access

Medication Dispensing Systems

Class II

Medium

High (inventory and PHI)

Moderate gap

Network isolation, encrypted communications, access logging

Building Management Systems (HVAC, elevators)

N/A

Medium

High (often in clinical network)

Indirect gap (pivot point)

Dedicated OT network, strict segmentation from clinical systems

Wearables & Remote Monitoring

Class II

High

Medium (often consumer-grade)

Significant gap (data governance)

Data security assessment, BAA with vendor, data minimization

Laboratory Equipment

Class I-II

Low

Medium

Moderate gap

Controlled network access, monitoring, vendor management

The Converging IT/OT Challenge

The most complex IoT engagement I've managed was a $1.4 billion chemical manufacturer in 2023. They had operational technology (OT) networks running SCADA systems, industrial control systems, and sensors—completely separate from their IT network. Then they deployed an IoT sensor overlay to enable predictive maintenance across 340 pieces of critical equipment.

Those IoT sensors became the bridge between the OT and IT worlds. And nobody had thought about what that meant for compliance, security architecture, or incident response.

The IT/OT Convergence Risk Matrix:

Convergence Scenario

Risk Level

Traditional Framework Guidance

Gap

Required Control

IoT sensors bridging OT and IT networks

Critical

ISO 27001 network controls (insufficient for OT)

OT-specific protocols (Modbus, DNP3) not addressed

Unidirectional gateways, OT-aware monitoring, Purdue model segmentation

Cloud connectivity for OT systems

Critical

Cloud security controls (insufficient for OT constraints)

Real-time control requirements conflict with security controls

Secure connectivity architecture, OT-specific cloud security, offline failover

Remote access to OT environments

High

PAM, VPN requirements (insufficient specificity)

OT remote access presents unique safety risks

OT-specific remote access solutions, session recording, safety interlocks

IoT data flowing to business intelligence systems

Medium

Data governance controls (partial)

Data sovereignty, real-time requirements

Data pipeline security, encryption, access control for OT data flows

OT vendor remote support

High

Third-party access controls (general)

OT vendor access often bypasses security controls

Vendor-specific access management, session monitoring, time-limited access

"Your IoT devices are not just security problems. They're physical safety problems. When we talk about a compromised building management system, we're not talking about data. We're talking about temperature in a server room, access to a facility, or medication storage conditions. The compliance stakes have never been higher."


Part Three: Quantum Computing—The Compliance Threat Your 2025 Audit Won't Catch

The Harvest Now, Decrypt Later Problem

This is the part of my presentations where I see eyes glaze over. Quantum computing feels abstract. Futuristic. Not a "right now" problem.

I'm here to tell you it's absolutely a right now problem.

Let me explain why with a scenario I first described to a roomful of CISOs in 2023, and that I've repeated dozens of times since.

In 2018, a nation-state adversary began systematically collecting encrypted traffic—banking communications, healthcare records, government data, corporate intellectual property. Everything encrypted with RSA-2048 or AES-256. Completely unreadable today.

In 2031, that same nation-state brings a cryptographically-relevant quantum computer online. Within months, they have decrypted every byte of data they collected between 2018 and 2031. Patient medical records. Mergers and acquisitions data. Military communications. Trade secrets. All of it.

This is the harvest now, decrypt later attack. And it's happening right now. CISA, NSA, and intelligence agencies from multiple countries have confirmed it.

The data your systems encrypt today is potentially already being collected for future decryption.

Timeline for Cryptographic Risk:

Milestone

Estimated Timeline

Confidence Level

Compliance Impact

Nation-state harvest now, decrypt later attacks

Already occurring

High (confirmed by intelligence agencies)

All encrypted sensitive data collected today is at risk

Quantum computers breaking RSA-2048

2028-2034

Medium (significant uncertainty)

All current public-key infrastructure becomes vulnerable

Quantum computers breaking ECC-256

2030-2036

Medium

TLS, digital signatures, PKI at risk

Quantum computers breaking AES-128

2035-2045

Low-Medium

Long-lived encrypted data at risk

NIST post-quantum standards fully deployed

2025-2030

High (standards published, migration underway)

Organizations must migrate during this window

Regulatory requirements for post-quantum cryptography

2026-2030

High (NIST, CISA, NSA guidance already issued)

Compliance deadlines emerging

NIST Post-Quantum Standards: What You Need to Know

In August 2024, NIST published its first three finalized post-quantum cryptographic standards. This is not theoretical. These are published standards that organizations are now expected to implement:

NIST Standard

Algorithm

Use Case

Replaces

Implementation Complexity

Performance Impact

FIPS 203 (ML-KEM)

Module-Lattice-Based Key Encapsulation

Key exchange, TLS, VPN

RSA, ECDH

Medium

Larger key sizes (800-1632 bytes vs RSA 256-512 bytes)

FIPS 204 (ML-DSA)

Module-Lattice-Based Digital Signature

Code signing, certificates, authentication

RSA-PSS, ECDSA

Medium

Larger signatures (2420-4595 bytes)

FIPS 205 (SLH-DSA)

Stateless Hash-Based Digital Signature

Long-lived signatures, firmware, code

RSA, ECDSA

Medium-High

Much larger signatures (7856-49856 bytes)

HQC (upcoming)

Code-based KEM

Key exchange (backup algorithm)

RSA, ECDH

Higher

Larger key sizes than ML-KEM

Quantum Risk Assessment by Data Category

Data Category

Current Encryption

Sensitivity Level

Harvest Risk

Regulatory Implication

Migration Priority

Patient Health Information (PHI)

AES-256, RSA-2048 (TLS)

Critical

High (10-15 year collection window)

HIPAA breach if decrypted

Immediate

Financial Records & PAN

AES-256, RSA-2048 (TLS)

Critical

High (7-year retention requirements)

PCI DSS, financial regulations

Immediate

Government Classified Data

Various

Critical

Very High (active targeting)

Federal regulatory framework

Immediate (federal mandate)

Intellectual Property & Trade Secrets

AES-256, RSA-2048 (TLS)

High

High (long-term strategic value)

Legal and competitive impact

Short-term

Employee Personal Data

AES-256, RSA-2048 (TLS)

High

Medium (2-5 year retention)

GDPR, state privacy laws

Medium-term

Business Communications

TLS (RSA/ECC)

Medium-High

Medium (strategic intelligence value)

Varies by industry

Medium-term

Software Signing & Code Integrity

RSA/ECC signatures

Critical

Very High (supply chain attacks)

Operational security integrity

Immediate

Certificate Infrastructure (PKI)

RSA-2048, ECC-256

Critical

Very High (infrastructure attack)

All frameworks with PKI dependencies

Immediate

Customer Credentials & Authentication

Hashed (not typically at risk)

High

Low (hashing not broken by quantum)

Varies

Low (other concerns priority)

Archived/Historical Data

Various (often older algorithms)

Variable

Very High (often weakest encryption)

Depends on data type

Critical review needed

The Cryptographic Migration Challenge

I was engaged by a global insurance company in 2023 to assess their quantum readiness. Three months later, I delivered a report that their CISO described as "the most terrifying document I've ever read."

Not because the risk was new. But because of the scope of what needed to change.

Cryptographic Inventory (their actual results):

System Category

Number of Systems

Primary Encryption

Quantum Vulnerable

Migration Complexity

Estimated Migration Cost

Web applications and APIs

847

TLS 1.2/1.3 (RSA/ECC)

Yes (key exchange)

Medium

$2.3M

Database encryption

234

AES-256 (symmetric, lower risk) + RSA key exchange

Partial

Medium-High

$1.8M

Email and communication systems

189

S/MIME, PGP, TLS

Yes

High (user certificates)

$3.1M

VPN infrastructure

67

RSA/ECC-based key exchange

Yes

Medium

$890K

Code signing infrastructure

23

RSA-2048, ECC-256

Yes

High (ecosystem impact)

$1.4M

PKI (certificates)

4,200+ certificates

RSA-2048

Yes

Very High (rotation of all certs)

$4.7M

Hardware security modules (HSMs)

34

Various

Partial (hardware upgrade needed)

Very High

$2.9M

Legacy applications (pre-2015)

412

Often weak: RSA-1024, 3DES

Yes (critical priority)

Critical (often cannot update)

$8.4M

Total

6,000+

Mixed

~78% vulnerable

High

$25.5M over 5 years

$25.5 million. That's what cryptographic migration looks like for a mid-large enterprise. And that's the cost of doing it right, on a planned timeline. If quantum capabilities emerge faster than expected, that orderly migration collapses into emergency response—and emergency response costs 3-5x as much.

Post-Quantum Compliance Control Framework

Control Domain

Current State

Required Post-Quantum State

Implementation Steps

Timeline

Cryptographic Inventory

No formal inventory of cryptographic algorithms

Complete inventory of all cryptographic implementations, algorithms, key lengths, and dependencies

Deploy cryptographic discovery tools (Cryptosense, Venafi, Keyfactor), SBOM for cryptography

Q1-Q2 2025

Cryptographic Agility Policy

Static cryptographic implementations

Policy requiring cryptographic agility (ability to swap algorithms without system redesign)

Policy development, architecture review, cryptographic abstraction layers in applications

Q2-Q3 2025

Risk Classification of Data by Sensitivity and Longevity

General data classification

Quantum-risk-adjusted classification considering data longevity vs. harvest attack window

Classification review, extension of data taxonomy to include quantum risk dimension

Q2 2025

Harvest Attack Mitigation for Critical Data

Standard encryption

Hybrid encryption (classical + post-quantum) for highest-risk data

Identify critical data at harvest risk, implement hybrid encryption, test performance impact

Q3 2025-Q4 2026

TLS/PKI Migration

RSA/ECC certificates

Post-quantum or hybrid TLS implementations, PQC certificate authorities

Certificate inventory, CA selection or migration, testing, phased rollout

2025-2027

Code Signing Migration

RSA/ECC signing

Post-quantum code signing (ML-DSA, SLH-DSA)

Code signing infrastructure migration, toolchain updates, ecosystem coordination

2025-2027

Hardware Upgrade Planning

Current HSMs, TPMs

Quantum-safe hardware (post-quantum capable HSMs, TPM 2.0 with PQC support)

Hardware lifecycle planning, budget allocation, procurement requirements

2026-2029

Regulatory Monitoring

Standard compliance program

Active monitoring of emerging PQC regulations (NIST, CISA, NSA, sector-specific)

Dedicated regulatory tracking, legal counsel engagement, industry group participation

Ongoing

Vendor Assessment—Cryptography

Standard vendor security assessment

PQC migration roadmap assessment for all vendors handling sensitive data

Vendor questionnaire extension, contractual PQC migration requirements

Q3 2025

Third-Party Algorithm Assessment

Limited scope

Assessment of all third-party cryptographic dependencies (libraries, SDKs, APIs)

Dependency inventory, library version tracking, PQC-ready alternative identification

Q4 2025

"The cryptographic systems protecting your most sensitive data today may be effectively transparent to sophisticated adversaries within a decade. The organizations that begin migration now will complete it on schedule. The organizations that wait will face a crisis."


Part Four: The Integrated Emerging Risk Compliance Framework

Bringing It All Together

AI, IoT, and quantum aren't three separate problems. They're interconnected risk domains that increasingly interact with each other and with your existing compliance landscape.

Consider: an AI system running on IoT infrastructure, processing health data, communicating over channels that will eventually be vulnerable to quantum attacks. The compliance implications touch HIPAA, NIST AI RMF, EU AI Act, IoT security standards, and post-quantum cryptography requirements simultaneously.

Here's how I've learned to approach integrated emerging risk compliance:

Emerging Risk Compliance Integration Matrix

Risk Intersection

Example Scenario

Frameworks Involved

Integrated Control Approach

Complexity

AI + IoT

AI analyzing data from IoT medical devices

HIPAA, NIST AI RMF, FDA, NIST 800-213

Unified data governance covering IoT data sources and AI processing, combined security architecture

Very High

AI + Quantum

AI models that will need to remain trustworthy beyond quantum horizon

EU AI Act, NIST AI RMF, post-quantum standards

Quantum-safe model signing, long-lived AI infrastructure planned for PQC migration

High

IoT + Quantum

IoT devices with hardcoded certificates that can't be updated

PQC standards, NIST 800-213, ISO 27001

Procurement requirements for quantum-safe IoT, phased device replacement, compensating controls

High

All Three

AI-powered industrial IoT with long-lived encrypted data

Multiple frameworks across all categories

Comprehensive emerging risk program with unified governance, integrated risk assessment

Critical

Emerging Risk Governance Structure

Governance Element

Purpose

Responsible Party

Meeting Cadence

Key Outputs

Emerging Technology Risk Committee

Strategic oversight of AI, IoT, quantum risks

CISO, CTO, CPO, Legal, Risk

Quarterly

Risk appetite decisions, budget allocation, policy direction

AI Governance Board

Operational oversight of AI systems, bias review, ethics

AI/Data leaders, Compliance, Legal, Business stakeholders

Monthly

AI system approvals, bias review results, policy updates

IoT Security Council

Technical and operational IoT security management

IT/OT Security, Network, Operations

Monthly

Device risk reviews, security architecture decisions, incident escalations

Quantum Migration Steering Group

Cryptographic migration planning and execution

CISO, Architecture, IT, Finance

Quarterly

Migration milestones, budget tracking, risk assessments

Emerging Regulation Monitoring Working Group

Tracking and responding to new regulatory requirements

Compliance, Legal, CISO

Bi-weekly

Regulatory alerts, gap assessments, response plans

The 18-Month Emerging Risk Compliance Roadmap

Based on implementations with eight organizations facing all three risk domains simultaneously, here's a realistic roadmap:

Quarter

Focus Area

Key Activities

Investment

Deliverables

Q1

Discovery & Assessment

AI inventory, IoT discovery scan, cryptographic inventory, regulatory mapping

$180K-$280K

Current state assessment, risk prioritization, compliance gap analysis

Q2

Foundation & Governance

Governance structure establishment, policy development, tooling procurement

$220K-$380K

Governance charters, emerging risk policies, tooling deployed

Q3

High-Priority Controls

Critical AI controls (high-risk systems), critical IoT controls (patient/payment data), PQC assessment

$280K-$420K

High-risk AI controls implemented, critical IoT remediated, PQC roadmap finalized

Q4

Compliance Alignment

Framework gap remediation, first regulatory assessments, evidence collection

$240K-$360K

Compliance gap closure, regulatory assessment complete, audit-ready documentation

Q5

Deepening Controls

Medium-priority AI/IoT controls, PQC migration initiation, monitoring enhancement

$260K-$400K

Comprehensive control coverage, PQC migration begun, monitoring matured

Q6

Continuous Compliance

Automation, continuous monitoring, mature governance, first external assessments

$200K-$300K

Automated compliance monitoring, first external validation, mature program

Total 18-Month Investment: $1.38M-$2.14M

This sounds like a lot. But consider: the average IoT breach costs $330,000 per incident (IBM 2023). A single AI regulatory violation under the EU AI Act can reach €35 million. And cryptographic migration done in crisis—post-quantum event—will cost 4-5x a planned migration.

The ROI calculation isn't even close.


Real-World Emerging Risk Case Studies

Case Study: Regional Bank—AI Lending Compliance

Situation: Regional bank using AI for loan decisioning, credit risk assessment, and customer service chatbots. Multiple regulatory examinations pending.

Initial State:

  • 7 AI systems in production (2 undiscovered until inventory)

  • No AI governance framework

  • Loan decisioning AI: no bias testing, no explainability, potential ECOA/CFPB exposure

  • No documentation for model risk management (SR 11-7 requirements)

Implementation:

  • AI inventory: discovered 9 total systems (2 in shadow IT)

  • High-risk classification: loan decisioning, credit risk (regulators' primary concern)

  • Bias testing revealed: zip-code-correlated denial rate discrepancy (340% higher in certain areas)

  • Model retrained with bias-corrected data, explainability implemented

  • SR 11-7 compliance program built for all models

Outcomes:

  • Avoided estimated $8-12M in regulatory fines and settlements

  • Cleared subsequent CFPB examination with zero model risk findings

  • Loan decisioning AI now generates explainability reports for every decision

  • Total program cost: $680,000

Case Study: Manufacturing Giant—IoT/OT Security Transformation

Situation: $3.2B manufacturer deploying IoT across 12 facilities for predictive maintenance. ISO 27001 certified but IoT coverage completely absent.

Initial State:

  • 8,400 IoT sensors with no security baseline

  • 2,100 OT systems with no IT/OT convergence controls

  • 17 device types with hardcoded credentials

  • Zero firmware management program

  • Shadow IoT (discovered 2,340 additional devices during inventory)

Implementation Highlights:

Phase

Duration

Key Actions

Cost

Risk Reduction

Discovery

8 weeks

Full IoT/OT inventory, credential audit, segmentation assessment

$145K

Baseline established

Critical Remediation

14 weeks

Credential elimination, critical device segmentation, monitoring deployment

$380K

High and critical risks addressed

Systematic Hardening

20 weeks

Firmware management, patch program, vendor assessments, update mechanisms

$520K

Medium risks addressed

Monitoring & Governance

Ongoing

OT/IoT-aware SIEM, governance program, ongoing compliance

$180K/year

Continuous risk management

Outcomes:

  • Zero IoT-related security incidents in 18 months post-implementation

  • ISO 27001 surveillance audit: first IoT-related finding addressed

  • Insurance premium reduction: $220K/year

  • Identified 3 critical OT vulnerabilities that could have caused production outages

Case Study: Healthcare System—Quantum-Safe Architecture

Situation: Large academic medical center. 47 hospitals, 180,000+ patients annually. Beginning 10-year digital transformation program and wanted to build quantum-safe from the ground up.

Why They Got Ahead of It: Their CISO had read the intelligence community's harvest-now-decrypt-later warnings. The medical center retains patient data for 10+ years. The math was simple: data encrypted today will still need to be confidential in 2040. If cryptographically-relevant quantum computers arrive in 2032, data collected from 2025-2032 is at risk.

Quantum-Safe Architecture Decisions:

System

Traditional Approach

Quantum-Safe Decision

Incremental Cost

Timeline

New EHR system procurement

Standard TLS/encryption requirements

Required vendors to demonstrate PQC migration roadmap, hybrid encryption as procurement requirement

$0 (requirement, not additional purchase)

2024

PKI infrastructure refresh

Standard RSA-2048 certificates

Hybrid certificate infrastructure (classical + ML-KEM), built for PQC transition

+$380K over standard refresh

2024-2025

New data warehouse

Standard AES-256 at rest

Hybrid encryption for sensitive PHI, cryptographic agility architecture

+$290K over standard implementation

2025

VPN infrastructure refresh

Standard IKEv2/RSA

IKEv2 with hybrid KEM support, PQC-ready configuration

+$120K over standard refresh

2025

Code signing infrastructure

Standard RSA-2048 signing

ML-DSA implementation for all internal code signing

+$95K

2025-2026

Total quantum-safe premium: $885K over a 5-year digital transformation program.

Cost of emergency migration if not planned: estimated $18-25M


The Compliance Measurement Framework

How do you know if your emerging risk compliance program is actually working? Here are the KPIs I use across every engagement:

Emerging Risk Compliance KPIs

KPI Category

Metric

Target

Red Threshold

Measurement Frequency

AI Governance

% of production AI systems with documented classification

100%

<90%

Monthly

AI Governance

% of high-risk AI systems with bias testing completed

100%

<95%

Quarterly

AI Governance

Time to detect AI model performance degradation

<30 days

>90 days

Continuous

AI Governance

% of AI-related incidents with root cause within explainability framework

>80%

<50%

Per incident

IoT Security

% of IoT devices in current authorized inventory

>95%

<85%

Monthly

IoT Security

% of IoT devices with no hardcoded/default credentials

100%

<98%

Quarterly

IoT Security

Mean time to patch critical IoT vulnerabilities

<30 days (or compensating controls)

>90 days

Continuous

IoT Security

% of IoT devices in appropriate network segment

>99%

<95%

Monthly

Quantum Readiness

% of cryptographic inventory documented

100%

<85%

Quarterly

Quantum Readiness

% of critical systems with cryptographic agility capability

>80% by 2027

<50% by 2027

Annual

Quantum Readiness

% of high-priority systems migrated to PQC

Per roadmap milestones

>10% behind roadmap

Quarterly

Quantum Readiness

Number of third-party vendors with assessed PQC migration plans

100% of critical vendors

<80%

Annually

Overall Program

% of emerging risk controls with current evidence

>98%

<90%

Monthly

Overall Program

Emerging risk findings in external audits

0 critical

Any critical

Per audit


The Executive Conversation: Communicating Emerging Risk Compliance

The hardest part of my job is not implementing the controls. It's convincing executives to fund them before a crisis forces the conversation.

Here's what actually works in the boardroom:

For AI Risk: "Every AI system making decisions about our customers carries regulatory liability. The EU AI Act fines reach 7% of global annual turnover—for us, that's $[X] million. We have AI systems operating without governance controls. Here's the business case for changing that."

For IoT Risk: "We have [X] connected devices on our network. Our last audit didn't test any of them. Three known critical vulnerabilities affect device types we operate. A breach through any one of them bypasses our $4M perimeter security investment. We need $[Y] to close this gap."

For Quantum Risk: "The data we encrypt today may be visible to sophisticated adversaries within 8-12 years. This isn't theoretical—intelligence agencies have confirmed collection of encrypted data for future decryption. The cost of planned migration over 5 years is $[X]. Emergency migration after a quantum event would cost $[3-5X]. We should start planning now."

"The most dangerous moment in emerging risk compliance isn't when the risk materializes. It's when leadership says 'we'll deal with it when it becomes a real problem.' By then, your encrypted data is already in someone else's collection."


The Bottom Line: The Future Is Already Here

I opened this article with a hospital breach through smart IV pumps. Let me close with a forward-looking scenario that I believe is inevitable:

2029. A healthcare organization suffers a catastrophic breach. The attack vector is an AI diagnostic system that was manipulated through a prompt injection attack, which then leveraged an IoT device in the clinical network for persistence, and exfiltrated data through an encrypted channel that the attacker had been pre-positioning to decrypt using emerging quantum capabilities.

This isn't science fiction. Every element of this attack chain exists today.

The organizations that survive and thrive in the next decade are those building compliance programs that address all three emerging risk domains—not as future considerations, but as present operational requirements.

Your action items, right now:

  1. Conduct an AI inventory this quarter. You almost certainly have more AI systems than you think.

  2. Deploy IoT discovery tooling within 90 days. The devices are already on your network.

  3. Commission a cryptographic inventory before year-end. You need to know what you're protecting and how.

  4. Assign ownership of emerging risk compliance. It needs a named owner with budget and authority.

  5. Build emerging risk into your next compliance assessment cycle. Your auditors will start asking about this soon.

The frameworks are evolving—NIST AI RMF, EU AI Act, NIST PQC standards, IoT-specific regulations—but they won't evolve fast enough to protect organizations that wait for mandatory requirements before acting.

The emerging risks aren't coming. They're here. The question is whether your compliance program is ready to face them.


At PentesterWorld, we specialize in emerging risk compliance—helping organizations build governance programs for AI, IoT, and quantum risks before they become breaches. We've completed emerging risk assessments for healthcare systems, financial institutions, manufacturers, and technology companies across four continents. Subscribe to our newsletter for weekly insights on the compliance challenges that traditional frameworks don't cover.

Ready to assess your emerging risk compliance posture? Contact us for a complimentary framework gap assessment focused on AI, IoT, and quantum readiness.

97

RELATED ARTICLES

COMMENTS (0)

No comments yet. Be the first to share your thoughts!

SYSTEM/FOOTER
OKSEC100%

TOP HACKER

1,247

CERTIFICATIONS

2,156

ACTIVE LABS

8,392

SUCCESS RATE

96.8%

PENTESTERWORLD

ELITE HACKER PLAYGROUND

Your ultimate destination for mastering the art of ethical hacking. Join the elite community of penetration testers and security researchers.

SYSTEM STATUS

CPU:42%
MEMORY:67%
USERS:2,156
THREATS:3
UPTIME:99.97%

CONTACT

EMAIL: [email protected]

SUPPORT: [email protected]

RESPONSE: < 24 HOURS

GLOBAL STATISTICS

127

COUNTRIES

15

LANGUAGES

12,392

LABS COMPLETED

15,847

TOTAL USERS

3,156

CERTIFICATIONS

96.8%

SUCCESS RATE

SECURITY FEATURES

SSL/TLS ENCRYPTION (256-BIT)
TWO-FACTOR AUTHENTICATION
DDoS PROTECTION & MITIGATION
SOC 2 TYPE II CERTIFIED

LEARNING PATHS

WEB APPLICATION SECURITYINTERMEDIATE
NETWORK PENETRATION TESTINGADVANCED
MOBILE SECURITY TESTINGINTERMEDIATE
CLOUD SECURITY ASSESSMENTADVANCED

CERTIFICATIONS

COMPTIA SECURITY+
CEH (CERTIFIED ETHICAL HACKER)
OSCP (OFFENSIVE SECURITY)
CISSP (ISC²)
SSL SECUREDPRIVACY PROTECTED24/7 MONITORING

© 2026 PENTESTERWORLD. ALL RIGHTS RESERVED.