Research, security engineering, and adaptive cryptographic governance.
GWK is a technical organization focused on advanced security, operating across applied research, tooling development, and cryptographic risk consulting — with emphasis on post-quantum scenarios.
The organization sits at the intersection of market and academia, aiming to transform research into viable technical and commercial assets.
GWK is built around a founding technical core responsible for strategic direction and early-stage development, supported by operational roles in machine learning, experimental systems, and project execution.
- Post-quantum security (PQC)
- Technology and security consulting
- Research and development (QKD / experimental systems)
The IEQ (Quantum Exposure Index) is a proprietary model designed to quantify cryptographic risk in post-quantum contexts.
The model integrates:
- Cryptographic surface mapping (TLS, certificates, libraries, APIs)
- Exposure and vulnerability analysis
- Machine learning-based validation
Currently under validation, with large-scale evaluation across ~1,000 entities.
IEQ serves as the foundation for technical reporting and market entry, particularly in the financial sector.
GWK operates an integrated pipeline for cryptographic risk analysis:
- Cryptographic scanner
- Risk modeling (IEQ)
- ML-based validation
- Automated report generation
This pipeline enables direct conversion of technical data into commercial outputs.
Current strategy is centered on:
- Market entry through quantum risk reports
- Initial focus on the financial sector
- Expansion toward infrastructure and continuous services
Technical positioning:
Adaptive cryptographic governance (QKD + PQC)
Design and development of an adaptive control system for QKD environments, focused on:
- Maintaining positive key rates under non-stationary conditions
- Integration with post-quantum fallback mechanisms
- Dynamic parameter control
Currently under development and being prepared for research funding submission.
GWK operates under a hybrid model between research and market, addressing:
- Validation vs speed of deployment
- Dependence on ML for production readiness
- Evolving organizational structure
To build infrastructure and intelligence for cryptographic security in a post-quantum world, connecting:
- deep research
- operational tooling
- real-world commercial application