As for regular assessment of your secure infrastructure, you can read latest “Algorithms, Key Size and Protocols Report”:
https://www.ecrypt.eu.org/csa/documents/D5.4-FinalAlgKeySize...
and practical part of ENISA report:
https://www.enisa.europa.eu/publications/post-quantum-crypto...
As for regular assessment of your secure infrastructure, you can read latest “Algorithms, Key Size and Protocols Report”:
https://www.ecrypt.eu.org/csa/documents/D5.4-FinalAlgKeySize...
and practical part of ENISA report:
https://www.enisa.europa.eu/publications/post-quantum-crypto...