PQC Timeline: do I really need to start now?

What is the PQC timeline?

In May 2025, the UK’s National Cyber Security Centre (NCSC) released a Post-Quantum Cryptography (PQC) migration timeline. It maps out how your organisation needs to prepare for the coming quantum shift – a near future where today’s seemingly secure encryption could be broken by quantum computers.

The roadmap sets three key milestones  the first target in 2028. In fact the US version of the NCSC – NIST – sets the first action point at 2026. The truth is that we don’t know when PQC will happen, so FullProxy’s advice would be to meet the earliest date you can so you’re not a soft target. Whichever you follow, very soon you need to have:

  • A completed cryptographic inventory
  • An understanding of where vulnerable algorithms are in use
  • Begun planning for a phased migration to PQC-ready infrastructure

Sounds manageable. But if 2028 feels a long way off, here’s why it isn’t:

PQC timeline roadmap graphic

Why 2028 isn’t really far away

For most enterprises, less than 3 years isn’t much time when it comes to IT transformation:

  • Inventory takes longer than you think. Many organisations can’t easily see which encryption standards are in use across certificates, applications and devices.
  • Dependencies run deep. Cryptographic libraries touch almost every system; replacing them without breaking business processes requires planning and testing.
  • Budgets cycles are slow. Even if you start now, aligning PQC projects with existing IT refresh cycles can take years.

That’s why the NCSC is urging IT and security leaders to begin now, not later.

 

“We don’t know when PQC will happen, so FullProxy’s advice would be to meet the earliest date you can so you’re not a soft target”

Ewan Ferguson, CEO at FullProxy

The risks of waiting

It’s tempting to put PQC readiness on the “future problems” list. But waiting until 2027 or 2028 creates real risks:

  • Crypto debt: the longer outdated encryption persists, the harder and more expensive it is to replace.
  • Compliance gaps: regulators are expected to align with the NCSC’s timeline, meaning non-compliance could become a financial and reputational issue.
  • Lost agility: organisations without crypto-agility will struggle to adapt quickly once PQC algorithms are standardised.

 

What should I do first?

The NCSC highlights one crucial first step: know what you’ve got.

  • Run a cryptographic inventory scan to map certificates, keys and algorithms in use.
  • Identify systems using vulnerable algorithms like RSA and ECC.
  • Begin planning for crypto-agility, ensuring your systems can pivot fast when PQC standards are finalised.

 

How FullProxy can help

FullProxy’s cyber experts work with our leading partners – AppViewX, F5 and Fortinet – to make PQC readiness practical:

  • AppViewX AVX ONE automates certificate discovery and lifecycle management.
  • F5 BIG-IP centralises visibility over encrypted traffic and PQC defends your perimeter
  • Fortinet NGFWs protect performance and enable secure migration without disruption.

Together, these solutions provide visibility, agility and protection — the three pillars of PQC readiness.

 

Next steps:

Don’t wait for 2028 to come around. Start your PQC journey today:

 

Read more:

About the Author

Ewan Ferguson
Chief Executive Officer
FullProxy’s CEO and a passionate web application guru with 25 years’ experience safeguarding networks for organisations of all sizes.
If you're wondering “When does my F5 expire?” (whether it's hardware, software or virtual) you're not alone. Many people run into critical lifecycle milestones without realising it, putting performance, security, and compliance at risk.
In this blog, learn the importance of shifting to a platform-based approach. Traditional cyber security approaches reliant on isolated, fragmented solutions are proving insufficient. We see increasing evidence of the main pain points that effect business and public sector organisations: 
In the rapidly evolving world of network infrastructure, staying current is not just a best practice—it’s a necessity. For F5 users, this means keeping your BIG-IP systems up to date with the latest supported versions. You can find out if you're due for a an upgrade with our bespoke F5 Software Countdown!

Want to be in the know?

We’ve got decades of experience installing. configuring and optimising advanced security solutions for private & public sector organisations with complex security & compliance needs.