
A comprehensive audit of federal data breach vulnerabilities, quantum threat exposure, and Post-Quantum Cryptography migration readiness across 12 key federal departments and agencies.

The NSA has published CNSA 2.0 algorithm requirements and urged all National Security Systems to begin migrating to quantum-resistant cryptography immediately. The White House NSM-10 and OMB M-23-02 mandate federal agencies to inventory and transition their cryptographic systems.
Nation-state adversaries are actively intercepting and storing encrypted US federal data today, planning to decrypt it once cryptographically relevant quantum computers become operational. NSA has flagged this as a priority concern.
Once operational, quantum computers will break the RSA and ECC encryption protecting federal communications, digital signatures, VPNs, and secure access across all government systems and National Security Systems (NSS).
GAO's 2025 High Risk List identifies federal cybersecurity as a top concern. Over 300 legacy IT systems across agencies have unknown quantum vulnerability, with many lacking funded remediation plans.

This chart illustrates the growing gap between escalating quantum computing capability and current federal PQC readiness. Key milestones include NSM-10 (2022), NIST PQC Standards (2024), CNSA 2.0 target (2027), and full NSS migration (2030). The 'Vulnerability Gap' represents the period during which critical federal data and systems remain exposed.
Analysis of OMB FISMA reports, CISA incident data, and GAO cybersecurity assessments reveals a persistent and escalating challenge. Over 32,000 cybersecurity incidents were reported by federal agencies in FY2023 alone β a 10% increase year-over-year. Key agencies such as DOD, HHS, OPM, and Treasury remain high-value targets for state-sponsored adversaries.
Key Finding
The 2015 OPM breach exposed 22 million records including security clearance data. The 2024 Treasury breach via BeyondTrust involved Chinese state actors. The SolarWinds supply-chain attack compromised 18,000+ organizations including multiple federal agencies. These incidents demonstrate that adversaries are already targeting the exact systems that quantum computing will render completely indefensible β every breach today represents data that can be decrypted in the quantum future.

Bubble chart visualizing breach impact across 12 federal departments. Position indicates incident count and severity; bubble size represents volume of records exposed (millions). Data from OMB FISMA reports and CISA incident tracking.

Heatmap showing the distribution of breach types across federal departments, highlighting the prevalence of state-sponsored APT attacks, phishing, credential theft, and supply chain compromises β all vectors amplified by quantum computing.
Qualitative risk assessment across 12 key federal departments and agencies, evaluated against six critical quantum risk dimensions including data sensitivity, legacy exposure, HNDL risk, and alignment with CNSA 2.0 requirements.
| Department | Risk Score | Breaches | Cost Exposure | PQC Readiness |
|---|---|---|---|---|
01 DOD | 9.5 | 45 | $4500M | 15% |
02 HHS | 8.8 | 68 | $1800M | 10% |
03 DHS | 8.2 | 52 | $1200M | 20% |
04 Treasury | 9.0 | 38 | $1500M | 14% |
05 DOE | 8.7 | 35 | $1100M | 15% |
06 DOJ | 7.8 | 42 | $700M | 15% |
07 State | 8.3 | 30 | $650M | 18% |
08 OPM | 8.5 | 15 | $500M | 10% |
09 VA | 7.5 | 55 | $900M | 12% |
10 DOC | 6.2 | 22 | $250M | 15% |
11 NASA | 7.8 | 18 | $600M | 22% |
12 Education | 5.8 | 28 | $200M | 10% |

Comprehensive risk assessment of US federal departments against key quantum vulnerability indicators. Scores are on a 1-10 scale, with higher scores indicating greater risk. PQC Readiness is inverted (lower = less ready). Data sourced from GAO, CISA, and OMB FISMA reports.
The average cost of a US data breach hit an all-time high of $10.22 million in 2025 (IBM). Projections based on current cybercrime growth trajectories and the escalating quantum threat indicate a potential cumulative cost to the US federal government of over $304 billion by 2035 if PQC migration is not completed.

Stacked area chart projecting the cumulative financial impact of failing to achieve quantum safety across US federal agencies, broken down by cost category. Based on IBM breach cost data ($10.22M US average), GAO risk assessments, and Cybersecurity Ventures growth models.

Compares estimated PQC migration investment against potential financial losses avoided over 10 years per federal department. Bubble size represents ROI multiplier, demonstrating the clear financial benefit of proactive migration aligned with CNSA 2.0 timelines.

A four-phase migration roadmap aligned with NIST standards, NSA CNSA 2.0 requirements, and OMB M-23-02 directives β designed to ensure a smooth, secure, and cost-effective transition to Post-Quantum Cryptography across all federal agencies.
2025 β 2027
2027 β 2030
2030 β 2033
2033 β 2035+

The proposed strategic roadmap for the US federal government's transition to Post-Quantum Cryptography, aligned with CNSA 2.0 and NIST guidance. Outlines key phases, activities, and milestones from 2025 to 2035 and beyond.