For risk assessment and mitigation, adopt a Zero Trust model ... For instance, quantum computers can break many of the encryption algorithms we have in place. The National Institute of Standards (NIST ...
The SESIP methodology is already mapped to other standards and regulations such as ETSI, (EN 303645 / TS 103732), ISO/IEC , RED , UNECE WP.29 (ISO/SAE 21434) and NIST (NIST 8259 / NIST 8425).