The Bottom Line
In January 2025, Israel's Supervisor of Banks gave banking corporations one year to submit quantum computing preparedness plans. That deadline has now passed. The directive remains the most prescriptive PQC regulatory instrument issued by any banking regulator—mandating specific governance actions, cryptographic asset mapping, and supply chain assessments with explicit timelines. For multinational financial institutions, it offers a practical preview of where regulatory expectations are heading globally.
Why This Directive Matters
On 7 January 2025, Daniel Hahiashvili, the Supervisor of Banks at the Bank of Israel, issued a directive to all banking corporations and licensed payment service providers on the subject of quantum computing preparedness. The document was addressed directly to the Chairman of the Board and CEO of each institution.
At first glance, this might seem like just another regulator acknowledging the quantum threat. Every major financial regulator has done so by now. What makes the Israeli directive distinctive—and worth studying carefully—is how it tells institutions to respond.
Rather than establishing broad capability requirements and leaving implementation timing to organisational discretion (the EU DORA approach), or setting coordinated but non-binding targets (the G7 CEG approach), the Bank of Israel mandated specific governance actions with explicit deadlines. This is a qualitatively different regulatory model, and financial institutions operating across multiple jurisdictions need to understand the implications.
What the Directive Requires
The directive is structured around three pillars, each with concrete mandates:
Pillar 1: Awareness and Continuous Monitoring
The directive requires institutions to establish mechanisms for ongoing awareness of quantum computing developments. Two requirements stand out. First, boards and senior management must be informed of quantum threats and must discuss organisational preparedness at minimum biennial intervals—not as a one-off briefing, but as a recurring governance obligation. Second, institutions must maintain continuous monitoring of developments in both quantum computing threats and defensive solutions including post-quantum cryptography and quantum key distribution, explicitly including engagement with relevant industry bodies and research institutions.
Pillar 2: Cryptographic Asset Mapping
The mapping requirements are notably comprehensive. Institutions must inventory encrypted data at rest, documenting encryption algorithm type and key length, information ownership, systems and applications involved, the duration for which data must remain protected (explicitly referencing the "harvest now, decrypt later" risk), and the sensitivity and criticality classification of the information.
Beyond data at rest, the directive extends to asymmetrically encrypted data in transit with external entities and—critically—to encrypted data held outside the organisation for any reason, including cloud environments, intentional transfers, backups, and even data exposed through past cyber incidents. This last category is particularly significant: it acknowledges that organisations must map exposure they may not directly control.
Pillar 3: Readiness and Skills Development
The third pillar addresses practical preparation for migration. It requires institutions to assess and plan for employee training, laboratory and testing environments for new cryptographic solutions, infrastructure compatibility assessment for post-quantum algorithms, transition planning that minimises operational disruption, policy and procedure updates for post-quantum compatibility, and contingency planning for cases where systems cannot be converted or the quantum threat materialises earlier than expected.
The directive requires an initial preparedness plan addressing all of these areas, discussed by the board and management, and submitted to the Head of the Technology, Innovation, and Cyber Division at the Banking Supervision Department within one year of the directive's date.
Three Models of PQC Regulation
The Bank of Israel directive is best understood in the context of a regulatory landscape that is converging on the same conclusion—banks must prepare for post-quantum cryptography—while diverging significantly on how prescriptive to be about it.
Model 1: Capability Requirements (EU DORA)
DORA Article 6.4 requires financial entities to implement cryptographic agility mechanisms that can address threats from quantum advancements. The Regulatory Technical Standard references quantum threats explicitly. However, DORA establishes what capability institutions must have without prescribing the specific governance steps or timelines for achieving it. Implementation sequencing is left to organisational discretion.
Strength: Flexibility for diverse organisations. Risk: Permits indefinite deferral of concrete action.
Model 2: Coordinated Targets (G7 CEG)
The G7 Cyber Expert Group, co-chaired by the US Treasury and the Bank of England, published a roadmap in January 2026 establishing 2030–2032 for critical systems migration and 2035 for overall completion. The roadmap defines six phases from awareness through validation. These are coordinated international targets rather than binding mandates, relying on national regulators to translate them into enforceable requirements.
Strength: International coordination and clear horizons. Risk: Non-binding targets may lack enforcement teeth.
Model 3: Prescriptive Mandates (Bank of Israel)
The Israeli directive mandates specific governance actions—board discussions, cryptographic inventories, supply chain assessments, skills readiness—with a hard twelve-month deadline for a preparedness plan. Rather than telling institutions "be crypto-agile" and leaving them to determine what that means, it tells them precisely what governance steps to take and when to complete them.
Strength: Forces concrete, verifiable action on a defined schedule. Risk: May not accommodate the diversity of institution sizes and maturities.
None of these models is inherently superior. Different regulatory environments have different institutional cultures, enforcement mechanisms, and supervisory capacities. What matters for practitioners is recognising that the direction of travel is toward increasing specificity—and the Israeli directive offers a preview of what more prescriptive regulatory expectations look like in practice.
What Multinational Institutions Should Take from This
For financial institutions operating across jurisdictions—which includes most of the organisations we work with—the Israeli directive has several practical implications.
The governance baseline is rising globally. Whether your primary regulator follows the DORA model, the G7 model, or the Israeli model, all three converge on the same foundational requirements: board-level awareness, cryptographic inventory, supply chain assessment, and documented preparation. Institutions that satisfy the Israeli directive's requirements will be well positioned for any of the three models.
Supply chain requirements deserve particular attention. The directive explicitly requires assessment of third-party quantum readiness and instructs institutions to "avoid reliance on suppliers and manufacturers that are not preparing for the quantum era or that may pose a technological risk." This language creates a contractual and procurement obligation that extends PQC preparation beyond the institution's own systems. We expect similar language to appear in other regulators' guidance over the coming year.
The mapping requirements set a high-water mark. Requiring inventory of encrypted data held outside the organisation—including data exposed through past cyber incidents—goes beyond what most cryptographic discovery frameworks currently address. This represents the most comprehensive mapping scope we have seen in any regulatory instrument to date.
Biennial board discussions as a minimum cadence. The requirement for recurring board discussions at minimum two-year intervals establishes governance continuity that one-off briefings cannot provide. For institutions that have treated PQC as a single awareness presentation, this signals an expectation of ongoing executive engagement.
The Pre-Discovery™ Alignment
Readers familiar with our methodology will recognise the directive's governance sequencing. The Bank of Israel effectively mandates what we call Pre-Discovery™: establishing awareness, mapping assets, assessing supply chains, updating policies, and building readiness before deploying technical migration solutions.
This is not coincidental. The governance challenges that the Israeli regulator is addressing—institutions that know they should prepare but haven't begun, boards that haven't been briefed, supply chains that haven't been assessed—are precisely the challenges we encounter in every engagement. The directive validates the principle that governance readiness must precede technical discovery, and provides regulatory authority for a sequencing that many institutions still resist.
One Year On
The twelve-month deadline for preparedness plan submissions has now passed. The Bank of Israel has not yet published aggregate findings on compliance, and we would expect supervisory follow-up to occur through bilateral examination rather than public reporting.
What we can observe is the broader trajectory. In the twelve months since the directive was issued, the G7 CEG published its coordinated roadmap, Europol's QSFF published its prioritisation framework, NIST finalised its post-quantum algorithm standards, and the regulatory consensus has hardened significantly. The Bank of Israel was ahead of the curve in January 2025. A year later, the curve has moved toward its position.
For institutions that have not yet begun structured preparation, the question is no longer whether prescriptive regulatory requirements will arrive in their jurisdiction—it is when.
Source: Bank of Israel: Banking System Preparedness for Cyber Risks Arising from Quantum Computing Capabilities (PDF, January 2025)
Related Reading: