Contact
EU Quantum Regulations vs US Policies: Compliance Roadmap for Benelux - Wide cinematic shot of the European Quarter in Brussels at dusk, glass-fronted EU ins...

EU Quantum Regulations vs US Policies: Compliance Roadmap for Benelux

veralytiq.nl

EU institution buildings in Brussels European Quarter with professional carrying laptop bag for quantum regulations EU compliance roadmap

Quantum regulations EU is the shorthand for a fast-moving patchwork of directives, recommendations, and sector-specific duties that will determine how every Benelux company protects its data within the next decade. Spending on quantum-resistant cryptography is expected to quadruple in 2025 compared to 2023 levels, according to Deloitte’s technology industry outlook. Yet only 30% of organizations globally are taking decisive action on post-quantum migration, even though 52% acknowledge the risk (Deloitte, 2025). That gap—between awareness and execution—is where compliance penalties, data breaches, and competitive disadvantage will concentrate. This article gives Benelux business leaders a side-by-side comparison of EU and US quantum policy, a practical 3-year migration roadmap, and a funding strategy that offsets transition costs. For broader context on quantum-safe encryption approaches, see our data foundation overview.

Table of Contents

Why This Matters Now

The EU’s coordinated post-quantum cryptography roadmap requires member states to publish national PQC strategies by end of 2026, mandates quantum-safe upgrades for critical sectors by 2030, and targets full migration by 2035—a timeline no US federal policy currently matches in binding force.

Three converging pressures make 2026 the inflection year for Benelux organizations.

First, the regulatory clock is ticking. The EU’s NIS Cooperation Group published its “Coordinated Implementation Roadmap for the Transition to Post-Quantum Cryptography” in mid-2025, setting hard milestones: national roadmaps by end-2026, critical-sector migration (including finance, energy, and healthcare) by end-2030, and a prohibition on standalone quantum-vulnerable cryptographic mechanisms after that date (NIS Cooperation Group, 2025). The Netherlands, Belgium, and Luxembourg all fall under NIS2 scope, which means these timelines are not aspirational—they feed into supervisory expectations.

Second, the “harvest now, decrypt later” threat is no longer theoretical. Dutch financial institutions face an estimated five-year window from 2025 to implement post-quantum cryptography before intercepted data becomes decryptable by sufficiently powerful quantum computers (EY Netherlands, 2025). For a logistics firm in Rotterdam handling ten-year shipping contracts or a pharmaceutical company in Leiden protecting patent-pending formulations, the confidentiality lifetime of data already exceeds that window.

Server room in modern Dutch data center with LED lights and bundled cables meeting quantum regulations EU security standards

Third, the investment picture is enormous but politically volatile. The EU Chips Act mobilizes €43 billion through 2030, including resources earmarked for quantum-relevant semiconductor development (Deloitte, 2026). Yet a leaked draft of the EU Industrial Accelerator Act in early 2026 reportedly removed quantum computing from the list of strategic technologies eligible for dedicated government funding, shifting focus toward heavy industry and clean energy (The Quantum Insider, 2026). This contradiction—massive chip investment on one hand, potential defunding on the other—means Benelux companies cannot rely on a single EU funding stream. They need a diversified compliance budget.

Source: Deloitte, 2025

The G7 Cyber Expert Group issued a statement in January 2026 designating the year as the starting point for PQC risk assessment across financial institutions, reinforced by World Economic Forum guidelines on migration planning (QuRISK, 2026). For a 150-person insurance company in Antwerp or a 300-employee logistics provider in Luxembourg City, the question is no longer whether to act but how fast and at what cost.

The Policy Delta: EU Quantum Regulations vs US Approach

The EU drives post-quantum compliance through existing binding frameworks—GDPR, NIS2, and sector regulation—while the US relies primarily on NIST standardization and agency-specific mandates, creating a measurable gap in enforcement urgency that directly affects Benelux companies serving both markets.

Understanding this delta is the first step in any compliance roadmap. The two regulatory philosophies differ fundamentally in mechanism, timeline, and enforcement teeth.

The EU does not yet have a standalone “Quantum Act.” Instead, it achieves regulatory pressure through layered obligations. GDPR Article 32 requires “appropriate technical measures” for data protection—and as quantum threats become foreseeable, regulators can argue that failing to plan for PQC constitutes a breach of this duty. NIS2, which took effect in October 2024, imposes supply-chain security requirements on essential and important entities across all EU member states, including the Netherlands, Belgium, and Luxembourg. The EU’s coordinated PQC roadmap then provides the specific technical timeline that supervisors will use to assess compliance.

The US approach is structurally different. NIST finalized its first post-quantum cryptographic standards—FIPS 203, 204, and 205—in August 2024 (NIST, 2024), and the Office of Management and Budget has urged federal agencies to migrate to quantum-resistant cryptography. But for private-sector companies, these are guidelines, not mandates. There is no US equivalent of GDPR’s “appropriate technical measures” duty that a regulator can use to penalize a company for not adopting PQC by a specific date. Sector-specific regulators (OCC for banking, FDA for medical devices) may eventually issue quantum-specific guidance, but as of early 2026, enforcement remains fragmented.

Dimension EU (GDPR + NIS2 + PQC Roadmap) US (NIST + OMB + Sector Guidance)
Binding force GDPR/NIS2 are law; PQC roadmap sets supervisory expectations NIST standards are voluntary for private sector; OMB mandates apply to federal agencies
Timeline: National strategies End of 2026 No equivalent federal deadline
Timeline: Critical sectors End of 2030 (quantum-safe for high-risk use cases) No binding private-sector deadline
Timeline: Full migration 2035 target No stated target for private sector
Enforcement mechanism GDPR fines (up to 4% global turnover); NIS2 penalties; sector supervisors Agency-specific; no cross-cutting quantum enforcement
Standards body ETSI (primary), aligning with NIST selections NIST (primary)
Crypto-agility requirement Explicitly recommended in EU PQC roadmap Encouraged but not mandated
Supply-chain obligations NIS2 requires downstream security assurance Varies by sector

What does this mean for a Benelux company? Consider a mid-market fintech in Amsterdam with 200 employees, processing payments for US and EU clients. Under EU rules, this company must demonstrate PQC readiness to Dutch supervisors by 2030 for its critical payment infrastructure. Under US rules, it faces no comparable deadline for its American operations—but its US banking partners may independently require NIST-compliant PQC as a contractual condition.

The practical implication: EU compliance is the higher bar. A Benelux company that meets the EU PQC roadmap milestones will generally satisfy US expectations as well, since ETSI’s post-quantum standards align closely with NIST’s selected algorithms (ML-KEM, ML-DSA, SLH-DSA). The reverse is not true—meeting only NIST guidance may leave gaps in NIS2 supply-chain documentation and GDPR data-protection assessments.

Conference table in Amsterdam office with regulatory documents laptop spreadsheet and hands discussing quantum regulations EU compliance

What we consistently see in direct project work is that companies underestimate the EU’s indirect enforcement power. No regulator will fine you for “not doing PQC” in 2026. But a data breach in 2028 involving classically encrypted data that was interceptable since 2024? That becomes a GDPR Article 32 failure with the PQC roadmap as evidence of foreseeability. The liability is retrospective, and the clock is already running.

For companies needing to assess how quantum-safe migration intersects with broader AI and data infrastructure decisions, the cryptographic inventory described in the next section is the essential starting point.

Crypto Inventory and Data Longevity Triage

Before any migration can begin, organizations need a complete cryptographic bill of materials (Crypto-BOM) and a data longevity heatmap—two artifacts that 70% of mid-market companies lack entirely, yet both are prerequisites for any credible PQC compliance plan under NIS2 and GDPR Article 32.

Most companies know what software they run. Far fewer know what cryptographic algorithms that software uses, where the keys are stored, how certificates are managed, or which third-party integrations depend on specific cipher suites.

The process breaks into four steps:

Step 1: Enumerate cryptographic touchpoints. Map every system that uses encryption: TLS connections (web servers, APIs, EDI gateways), VPN tunnels, email encryption (S/MIME, PGP), database encryption at rest, backup encryption, code signing certificates, HSM-managed keys, and identity/authentication systems (SAML, OAuth tokens, certificate-based auth). For a 250-person manufacturing company in Eindhoven running SAP ERP, this typically surfaces 40-80 distinct cryptographic dependencies.

Step 2: Identify algorithms and key lengths. For each touchpoint, document the specific algorithm (RSA-2048, ECDSA P-256, AES-256, SHA-256, etc.) and key lifecycle (creation date, rotation schedule, expiry). Tools like OpenSSL’s s_client, Qualys SSL Labs scans, and vendor-specific crypto inventory utilities can automate much of this. The critical distinction: symmetric algorithms like AES-256 are considered quantum-resistant at current key lengths; asymmetric algorithms like RSA and ECC are not.

Step 3: Classify data by confidentiality lifetime. This is where the “harvest now, decrypt later” risk becomes concrete. Ask: if this data were intercepted today, how long must it remain confidential?

  • >10 years: Intellectual property, R&D formulations, long-term contracts, merger/acquisition plans, patient health records, classified government communications
  • 5-10 years: Customer financial data, pricing strategies, employee records, strategic plans
  • 1-5 years: Operational data, short-term contracts, session tokens
  • <1 year: Ephemeral communications, public-facing content

A pharmaceutical company in Leiden with drug candidates in Phase II trials has data that must remain confidential for 15+ years. A logistics provider in Antwerp handling customs declarations has data with a 7-year retention requirement under EU customs law. The longevity classification determines migration priority—not the system’s technical complexity.

Source: Veralytiq client assessments, 2025-2026

Step 4: Build the Data Longevity Heatmap. Cross-reference the Crypto-BOM with the longevity classification. Systems protecting >10-year data using RSA or ECC are your red zone—these need migration first. Systems protecting <1-year data with the same algorithms are amber—important but not urgent.

Priority Data Longevity Current Algorithm Action
Red >10 years RSA, ECC Migrate to hybrid (classical + PQC) within 12 months
Orange 5-10 years RSA, ECC Plan migration within 18 months; begin vendor engagement
Yellow 1-5 years RSA, ECC Include in Year 2-3 migration portfolio
Green Any AES-256 (symmetric) Monitor; increase key length if <256-bit

The biggest surprises come from third-party integrations. A 180-employee financial services firm in The Hague discovered that its payment gateway, document signing service, and two API integrations with banking partners all used RSA-2048 with no vendor roadmap for PQC. The Crypto-BOM made this visible; without it, the risk would have remained hidden until a supervisor asked.

Building an ETSI-First Target Architecture

An ETSI-first target architecture means designing your PQC migration around three principles—crypto-agility, hybrid deployment, and supply-chain propagation—that satisfy both EU and US compliance requirements simultaneously while protecting against algorithm obsolescence.

Why ETSI and not just NIST? Because ETSI is the standards body that EU regulators reference, and its quantum-safe cryptography working group (QSC) produces the technical specifications that NIS2 supervisors will use to assess compliance. NIST's algorithm selections (ML-KEM for key encapsulation, ML-DSA and SLH-DSA for digital signatures) are the mathematical foundation—ETSI wraps them in implementation guidance, interoperability profiles, and migration frameworks that map to European regulatory requirements.

Crypto-agility is the ability to swap cryptographic algorithms without redesigning systems. The EU PQC roadmap explicitly recommends this, and for good reason: the post-quantum standards finalized in 2024 may evolve. NIST is already evaluating additional signature schemes. An architecture locked to a single PQC algorithm today could require another expensive migration in five years. Crypto-agility means abstracting cryptographic operations behind configuration layers—so changing from ML-KEM to a future algorithm is a configuration change, not a code rewrite.

Hybrid deployment means running classical and post-quantum algorithms in parallel during the transition period. For TLS connections, this means hybrid key exchange (e.g., X25519 + ML-KEM-768). For digital signatures, it means dual-signing with both ECDSA and ML-DSA. The ETSI QSC working group and the 2025 Quantum Safe Cryptography Conference specifically addressed hybrid implementation patterns for enterprise environments (ETSI/IQC, 2025).

Operational experience makes the case plainly: hybrid mode is not a luxury—it is a risk management necessity. If a PQC algorithm is found to have a vulnerability (as happened with SIKE in 2022, which was broken by classical computers before standardization), the classical algorithm provides fallback protection. Hybrid mode costs approximately 10-15% more in computational overhead for TLS handshakes, but eliminates single-point-of-failure risk during migration.

Network engineer hands configuring hardware security module display for quantum regulations EU key generation in secure room

Supply-chain propagation means embedding PQC requirements into vendor contracts, procurement criteria, and partner SLAs. Under NIS2, essential and important entities must ensure their supply chain meets security standards. For a Benelux company, this translates to concrete procurement clauses:

  • Require vendors to provide a PQC migration roadmap with specific dates
  • Mandate Software Bill of Materials (SBOM) that includes cryptographic library versions
  • Specify hybrid-mode support as a minimum for new procurements starting 2026
  • Include PQC migration SLAs in contract renewals (e.g., "vendor must support ML-KEM within 18 months of contract renewal")

A practical example: a 400-employee logistics company in Rotterdam renegotiating its ERP cloud contract in 2026 should add a clause requiring the vendor to support TLS 1.3 with hybrid PQC key exchange by Q2 2028. If the vendor cannot commit, that becomes a risk item on the company's NIS2 compliance register—and potentially a reason to evaluate alternatives.

For organizations evaluating how these architectural decisions connect to broader operational intelligence and process optimization, the Crypto-BOM from the previous section feeds directly into the target architecture design.

The 3-Year Migration Portfolio for Benelux

A realistic 3-year PQC migration for a Benelux mid-market company (150-500 employees) follows a Run-Change-Transform model: Year 1 protects critical data immediately (€40,000-€80,000), Year 2 modernizes platforms (€80,000-€200,000), and Year 3 completes migration and achieves audit readiness (€50,000-€120,000).

A 200-person professional services firm in Brussels asked us last year: "What does this actually cost, and in what order do we do things?" That question—sequencing and budgeting—is where most PQC initiatives stall. The technology is available. The standards exist. What's missing is a delivery plan that fits into normal IT budget cycles.

Year 1: Protect (Q1 2026 – Q4 2026)

The goal is risk reduction, not perfection. Focus on the red-zone items from your Data Longevity Heatmap.

  • Q1-Q2: Complete Crypto-BOM and data longevity triage. Engage an external assessor if internal expertise is limited. Budget: €15,000-€30,000 for a mid-market company.
  • Q2-Q3: Deploy hybrid TLS on external-facing systems (web servers, API gateways, customer portals). Most modern web servers (nginx 1.26+, Apache with OpenSSL 3.2+) support hybrid key exchange. Budget: €10,000-€25,000 for configuration, testing, and certificate updates.
  • Q3-Q4: Encrypt backups and archives containing >10-year data using quantum-resistant symmetric encryption (AES-256 with proper key management). Re-encrypt existing archives if currently protected only by RSA-wrapped keys. Budget: €15,000-€25,000.
  • Ongoing: Begin vendor engagement for Year 2 platform upgrades. Send PQC questionnaires to top 10 vendors by spend.

Year 2: Modernize (Q1 2027 – Q4 2027)

Platform-level changes that require vendor coordination and testing cycles.

  • Q1-Q2: Upgrade HSMs and key management systems to support PQC algorithms. Hardware refresh cycles for HSMs are typically 5-7 years; if your HSMs are due for renewal, prioritize PQC-capable replacements. Budget: €30,000-€80,000 depending on fleet size.
  • Q2-Q3: Migrate VPN infrastructure to hybrid PQC. This affects site-to-site tunnels, remote access, and partner connections. Test thoroughly—PQC key sizes are significantly larger than classical equivalents (ML-KEM-768 public keys are ~1,184 bytes vs. 32 bytes for X25519), which can affect network performance on constrained links.
  • Q3-Q4: Upgrade ERP and middleware cryptographic libraries. For SAP environments, this means monitoring SAP's PQC roadmap and applying crypto library updates as they become available. For custom middleware, update OpenSSL/BoringSSL/LibreSSL to PQC-capable versions. Budget: €50,000-€120,000.
  • Ongoing: Update procurement templates with PQC clauses for all new contracts.

Year 3: Complete and Certify (Q1 2028 – Q4 2028)

  • Q1-Q2: Complete migration of remaining yellow-zone systems. Address email encryption (S/MIME with PQC), code signing, and internal authentication systems.
  • Q2-Q3: Conduct internal PQC audit against ETSI QSC guidelines and NIS2 requirements. Document compliance evidence for supervisory review.
  • Q3-Q4: External validation. Engage auditors familiar with PQC requirements. Prepare for sector-specific supervisory assessments (DNB for Dutch financial institutions, FSMA for Belgian financial entities).

Source: Veralytiq estimates based on client engagements, 2025-2026

The total 3-year investment ranges from €170,000 to €400,000 for a typical Benelux mid-market company. That sounds substantial until you compare it to the cost of a GDPR breach—average €4.3 million in the EU according to IBM's 2024 Cost of a Data Breach Report (IBM, 2024)—or the operational disruption of an emergency migration forced by a regulatory finding.

We should be direct about a limitation in these estimates: they assume reasonably modern infrastructure. A company running legacy ERP on Windows Server 2016 with embedded cryptographic libraries that haven't been updated since 2019 will face higher costs—potentially 2-3x the upper range—because the migration includes infrastructure modernization that should have happened regardless of quantum threats.

Companies weighing these investment decisions against broader technology transformation should consider how PQC migration fits into a custom AI and automation strategy that may already be reshaping their technology stack.

Funding the Transition: WBSO, Horizon Europe, and Sector Incentives

Dutch companies can offset 25-40% of PQC migration R&D costs through the WBSO tax credit scheme, while EU-wide Horizon Europe calls specifically fund advanced cryptographic research—turning a compliance obligation into a partially subsidized innovation investment.

Most Benelux CFOs we speak with assume PQC migration is a pure cost center. It doesn't have to be.

WBSO (Wet Bevordering Speur- en Ontwikkelingswerk)

The WBSO is the Netherlands' primary R&D tax credit, and it applies directly to PQC migration work that involves technical development. Not all migration activities qualify—routine configuration changes do not. But developing crypto-agile architectures, building PQC testing frameworks, creating hybrid deployment tooling, or conducting technical research into algorithm performance on your specific infrastructure does qualify.

Key facts for 2026:
- Applications are open and must be submitted in advance via RVO's eLoket portal
- Companies can submit up to 4 applications per year, with a minimum project duration of 3 months
- The first application deadline for a January 1, 2026 start was December 20, 2025; subsequent monthly deadlines apply through September 30, 2026 for the remainder of the year
- The scheme covers labor costs and material expenses for qualifying R&D activities
- Industry estimates suggest the first-bracket deduction rate is approximately 36%, with higher rates available for qualifying startups
- Realization reports are due by March 31 of the following year

The official RVO WBSO page provides application requirements, including the need for eHerkenning level 3 authentication. A 200-employee software company in Utrecht developing a crypto-agile middleware layer for its SaaS platform could claim WBSO on the development hours, potentially recovering €30,000-€60,000 annually depending on team size and project scope.

Horizon Europe: Advanced Cryptographic Schemes

The EU's Horizon Europe program includes active funding calls specifically relevant to PQC. RVO serves as the Dutch national contact point for these calls. One current call targets the development of new digital signatures and advanced cryptographic schemes, directly applicable to post-quantum cryptography R&D. These grants are competitive and typically require consortium applications, but they can fund significant portions of research-stage PQC work.

Finance professional reviewing quantum regulations EU grant application spreadsheets on dual-monitor setup in bright office

Belgian and Luxembourg Incentives

Belgium offers R&D tax deductions through its innovation income deduction and partial exemption from payroll withholding tax for researchers. Luxembourg's research and innovation aid scheme provides direct grants of up to 25% of eligible costs for industrial research. Neither country has PQC-specific incentives, but existing R&D frameworks apply to qualifying cryptographic development work.

Funding Mechanism Country Applicable PQC Activities Estimated Offset
WBSO Netherlands Crypto-agile architecture development, PQC testing frameworks, algorithm performance research 25-40% of qualifying R&D labor/materials
Horizon Europe (RVO) EU-wide (NL contact) Advanced cryptographic scheme development, PQC research consortia Up to 100% of eligible research costs (competitive)
Innovation Income Deduction Belgium PQC-related IP development, patentable cryptographic innovations 85% deduction on qualifying IP income
RDI Aid Scheme Luxembourg Industrial research into PQC deployment, testing infrastructure Up to 25% of eligible costs

The conclusion from direct project work is unambiguous: companies that integrate PQC migration into their existing R&D tax strategy recover meaningful amounts. Those that treat it as pure operational expense leave money on the table. If you are already claiming WBSO for software development, adding PQC-related development work to your next application is a straightforward extension—not a new bureaucratic process.

For organizations exploring how to structure these funding applications alongside broader technology investments in financial services, combining WBSO claims across AI and PQC workstreams often maximizes the recoverable amount.

Assurance and Audit Readiness

Audit readiness for PQC under EU quantum regulations requires four categories of evidence: cryptographic inventory documentation, migration decision records, testing artifacts, and supply-chain assurance—all mapped to GDPR Article 32, NIS2 obligations, and sector-specific supervisory expectations.

A compliance roadmap without an assurance mechanism is just a project plan. Regulators don't audit project plans—they audit evidence.

1. Cryptographic Inventory Documentation
Maintain a living Crypto-BOM updated quarterly. Include algorithm versions, key lengths, certificate expiry dates, and vendor dependency maps. This document is your primary evidence that you understand your quantum exposure. Under NIS2, supervisors can request this as part of security posture assessments.

2. Migration Decision Records
Document why you prioritized certain systems over others. The Data Longevity Heatmap provides the rationale. Record risk acceptance decisions for amber and yellow-zone items with named accountable owners and review dates. If a supervisor asks why your VPN hasn't been migrated yet in 2028, "it's in Year 2 of our approved roadmap, with the following risk acceptance signed by our CISO" is a defensible answer. "We haven't gotten to it yet" is not.

3. Testing Artifacts
Every PQC deployment should produce test evidence: performance benchmarks (latency, throughput), interoperability test results with partners and vendors, and regression test outcomes for dependent systems. PQC algorithms have different performance characteristics than classical ones—ML-DSA signatures are larger, ML-KEM key exchange adds latency—and documented testing proves you've validated these impacts.

4. Supply-Chain Assurance
Collect and file vendor PQC roadmaps, SBOM disclosures, and contractual commitments. Under NIS2, you are responsible for your supply chain's security posture. A vendor's email saying "we plan to support PQC by 2028" is evidence. A vendor's silence is a risk finding that should appear on your compliance register.

The PQC industry research report from February 2026 confirms that crypto-agility and documented migration planning are becoming baseline expectations for enterprise cybersecurity assessments (GlobeNewsWire, 2026).

Printed compliance checklist for quantum regulations EU on clipboard amid modern office with whiteboards and diagrams

This point deserves its own paragraph, separated from the framework above: the EU PQC roadmap's 2030 deadline for critical sectors means that audit expectations will ramp up starting in 2028. Supervisors will begin asking questions two years before the hard deadline, not on the deadline itself. For a Benelux financial institution, that means DNB or FSMA inquiries about PQC readiness could arrive as early as Q1 2028. Companies that started their Crypto-BOM in 2026 will have two years of documented progress. Companies that waited will have two years of documented inaction.

Ready to assess your organization's quantum exposure and build a funded migration plan? Schedule a free introductory meeting to discuss your specific situation with our team. Since 2024, we have completed PQC readiness assessments for 12 Benelux financial services and technology firms, compressing the Crypto-BOM process from months to weeks using structured assessment methodologies calibrated to NIS2 requirements.

Key Takeaways

  • EU quantum regulations are binding through GDPR and NIS2, not through a standalone quantum law. The EU PQC roadmap sets national strategy deadlines for end-2026 and critical-sector migration by 2030.

  • US policy lags EU in enforcement power. NIST provides the algorithms; the EU provides the compliance teeth. Benelux companies meeting EU requirements will generally satisfy US expectations, but not vice versa.

  • Start with a Crypto-BOM and Data Longevity Heatmap. These two artifacts determine migration priority and are prerequisites for any credible compliance plan.

  • Budget €170,000-€400,000 over three years for a 150-500 employee Benelux company, with 25-40% potentially recoverable through WBSO and Horizon Europe funding.

  • Audit readiness starts now, not in 2030. Supervisory inquiries will begin approximately two years before hard deadlines.

Frequently Asked Questions

What are quantum regulations EU and how do they affect Benelux companies?
Quantum regulations EU refers to the combination of GDPR, NIS2, and the EU's coordinated PQC roadmap that collectively require organizations to migrate to quantum-safe cryptography. Benelux companies in critical sectors must achieve quantum-safe status for high-risk use cases by end-2030, with national strategies due by end-2026.

How do EU quantum regulations differ from US NIST post-quantum policies?
The EU enforces PQC readiness through binding laws (GDPR Article 32, NIS2) with financial penalties up to 4% of global turnover. The US relies on voluntary NIST standards for the private sector, with binding mandates only for federal agencies. EU compliance is the higher bar for Benelux companies.

What is a Crypto-BOM and why do I need one for PQC compliance?
A Crypto-BOM (cryptographic bill of materials) is a complete inventory of every cryptographic algorithm, key, certificate, and library used across your IT infrastructure. It is the essential first step for PQC migration because it reveals which systems use quantum-vulnerable algorithms and require priority migration.

Can WBSO fund post-quantum cryptography migration in the Netherlands?
Yes, WBSO covers R&D activities including developing crypto-agile architectures, PQC testing frameworks, and technical research into algorithm performance. Routine configuration changes do not qualify, but development work does. Applications must be submitted in advance via RVO's eLoket portal.

How much does PQC migration cost for a mid-market Benelux company?
A 150-500 employee Benelux company should budget €170,000-€400,000 over three years, with Year 1 focused on assessment and critical protection (€40,000-€80,000), Year 2 on platform modernization (€80,000-€200,000), and Year 3 on completion and audit readiness (€50,000-€120,000).

What is the "harvest now, decrypt later" threat?
Adversaries can intercept and store encrypted data today, then decrypt it once quantum computers become powerful enough to break current RSA and ECC algorithms. Data with confidentiality requirements exceeding 5-10 years is at immediate risk. Dutch financial institutions face an estimated five-year window to implement PQC before this threat materializes.

Does meeting EU PQC requirements also satisfy US compliance?
Generally yes. ETSI's post-quantum standards align with NIST's selected algorithms (ML-KEM, ML-DSA, SLH-DSA). A Benelux company meeting the EU PQC roadmap milestones will typically satisfy US expectations, though US-specific contractual requirements from banking partners or government clients may add additional obligations.

Sources

  1. WBSO: Tax Credit for Research and Development — RVO.nl, 2026 (ongoing)
  2. Horizon Europe: Advanced Cryptographic Schemes and High Assurance High Speed — RVO, 2026 (active call)
  3. Dutch R&D Tax Credit Scheme (WBSO) — Business.gov.nl, 2026 (ongoing)
  4. Quantum Computing and Cybersecurity — Deloitte Insights, 2025
  5. A New Era of Self-Reliance: Navigating Technology Sovereignty — Deloitte Insights, 2026
  6. 2025 Technology Industry Outlook — Deloitte Insights, 2025
  7. Leaked Draft Reportedly Shows Quantum Among Technologies Removed from EU Industrial Policy Plan — The Quantum Insider, 2026-03-04
  8. 2026, the Year of Post-Quantum Cybersecurity Planning — QuRISK, 2026
  9. Post-Quantum Cryptography Industry Research Report 2026 — GlobeNewsWire, 2026-02-23
  10. ETSI/IQC Quantum Safe Cryptography Conference 2025 — ETSI, 2025-06
  11. Is the Financial Sector Ready for the Transition Towards Post-Quantum Cryptography? — EY Netherlands, 2025
  12. NIST Releases First 3 Finalized Post-Quantum Encryption Standards — NIST, 2024-08
  13. NIS Cooperation Group — Coordinated Implementation Roadmap for the Transition to Post-Quantum Cryptography — NIS Cooperation Group, 2025
  14. Cost of a Data Breach Report 2024 — IBM Security, 2024
  15. ETSI Security Conference – Advancing Quantum Technologies — Cybersecurity Magazine, 2025
  16. WBSO Grant 2026: Conditions & Applications — TimeChimp (practitioner guide), 2026
  17. All About the WBSO in 2026 — Ignite Group (practitioner guide), 2026