Discussion of standardization for hardware and software changes, such as SIM cards, public key infrastructure, digital certificates and CPE devices. Specific approaches to quantum-safe algorithms and risk assessment frameworks, including code-based, lattice-based, hash-based, multivariate-based, and hybrid approaches. Examples of quantum-safe applications to several telco domains, including devices, 5G networks, SIMs, Operating systems, ERP, infrastructure and the cloud. Motivated bad actors may be harvesting and storing data now in order to decrypt it once certain quantum computing capabilities become available. IBM has spent years building a global team of cryptography experts to develop quantum-safe schemes and preparation plans.