Thinkers360
Interested in getting your own thought leader profile? Get Started Today.

Simon Hartley

Connected Vehicle & Product Cybersecurity at IBM Consulting

Washington D.C., United States

Simon Hartley is an alum of successful startups and Fortune 100 companies, an expert in the business of cybersecurity, mobility, and quantum in hardening critical infrastructure (defense, transport, telco, energy, finance etc.). He joined IBM in 2024 to drive safety, security, and reliability in the US connected vehicles practice. He is also a startup advisor, published author, and public speaker.

- Experienced in startup and Fortune 100 enterprise software management, sales, and marketing
- Skilled at scaling emerging technology, products, and IP in early and highly regulated markets
- Top 25 thought leader and influencer in the business of cybersecurity, mobility, and quantum

Available For: Advising, Consulting, Speaking
Travels From: Washington DC
Speaking Topics: Cybersecurity, Mobility, Quantum

Simon Hartley Points
Academic 20
Author 155
Influencer 35
Speaker 21
Entrepreneur 0
Total 231

Points based upon Thinkers360 patent-pending algorithm.

Thought Leader Profile

Portfolio Mix

Company Information

Company Type: Enterprise
Business Unit: IBM Consulting
Theatre: USA
Minimum Project Size: N/A
Average Hourly Rate: N/A
Number of Employees: 1-10
Company Founded Date: 2024
Media Experience: 15 years

Areas of Expertise

Autonomous Vehicles 44.97
Business Strategy 30.42
Cybersecurity 37.16
Emerging Technology 33.16
Entrepreneurship 34.22
GovTech 31.30
IoT 30.08
IT Strategy 30.23
Mobility 33.69
National Security 31.09
Privacy 32.14
Quantum Computing 32.07
Security 30.07
Startups 34.24

Industry Experience

Aerospace & Defense
Automotive
Federal & Public Sector
Financial Services & Banking
Healthcare
High Tech & Electronics
Oil & Gas
Telecommunications
Travel & Transportation
Utilities

Publications

2 Academic Certifications
Master of Science in Law, Cybersecurity
University of Maryland School of Law
July 30, 2022
Simon Hartley (MSL ’17) is an innovator, forging security solutions in a world rapidly moving through the evolving steps of digital transformation. It’s a world, he argues, where innovation is increasingly entangled with legal and regulatory issues.

See publication

Tags: Cybersecurity, Privacy

Certificate in Principles and Tools for Cybersecurity IT Leaders
UMD / ATARC
January 01, 2019
This certificate, offered by the University of Maryland Robert H. Smith School of Business in collaboration with ATARC, provides Cybersecurity leaders in industry and government with a solid grounding in core business tools and principles as relevant to emerging security threats, mitigation and preparedness.

-- Program was shelved due to Covid.

See publication

Tags: Business Strategy, Cybersecurity

26 Article/Blogs
Revving automotive cybersecurity
Linkedin
October 29, 2024
This note covers highlights from the Detroit Automotive Information Sharing and Analysis Center (Auto ISAC) Summit, the week of 21st October 2024 . The ISAC is built on stakeholder collaboration and leverages the collective expertise of Original Equipment Manufacturers (OEM), hardware, software, and services suppliers given that “an attack on one is an on all”.

See publication

Tags: Autonomous Vehicles, Cybersecurity, Mobility

Gen-x, the Vic-20-and-hi-tech-immigration
Medium
July 31, 2024
This post focuses on Gen X immigrants and their role in building out the modern hi-tech world in which Millennial and Gen X cohorts are “digital natives,” e.g. the leaders of Tesla, Palantir, Google, and Microsoft.

See publication

Tags: Emerging Technology, Entrepreneurship, Startups

Dealing with the Y2K problem
Medium
May 05, 2024
Rapidly advancing quantum technology poses what cryptography expert Bruce Schneier calls a class break threat to today’s cryptography — breaking the confidentiality, integrity, and availability of systems across a connected world. Y2Q the date when advanced quantum computers are forecast to break the widely used public-key cryptography securing the web, mobile apps, and banking. Recommendations to deal with the Y2Q issue include inventorying systems to determine their cryptographic usage, a triage to the most important business areas to protect first and implementing a phased roadmap of hardening to quantum resistant tools under US Government guidelines.

See publication

Tags: Cybersecurity, IT Strategy, Quantum Computing

Random Number Generation - Who Cares?
Medium
October 29, 2023
Random numbers (entropy) are important for everything from scientific modeling, to making video games interesting, to picking lottery winners. They are most important for cryptographic security — the security of your social media accounts, smartphone, the electric grid, school, work, and the government.

See publication

Tags: Cybersecurity, Privacy, Quantum Computing

Tip of iceberg in cybersecurity
Linkedin
June 20, 2023
Thoughts on cybersecurity, emerging tech, and different types of customers -- the 5% in government, finance, healthcare, O&G where specialists abound and the 95% that have to rely far more on specialized vendors and integrators.

See publication

Tags: Cybersecurity, Emerging Technology, Entrepreneurship

Past illuminates quantum R&D today
Linkedin
September 18, 2022
The story of 1950s digital innovation illuminates the arc of 2020's quantum technologies.

See publication

Tags: Emerging Technology, Quantum Computing

Rolling the dice - why hardening keys matters!
Linkedin
March 21, 2022
Short article on why hardening keys matter -- randomness, anti-tamper, and verification for due diligence and defense in depth for critical infrastructure.

See publication

Tags: Cybersecurity, Privacy, Quantum Computing, National Security

Making sandals rather than paving the landscape for secure mobile and ZeroTrust
Linkedin
January 31, 2022
Thoughts on delivering mobile device security that avoids both the thorns of location tracking / personal data exhaust in consumer devices and the costs, time, risk, and impracticality of paving over the existing IT landscape.

See publication

Tags: Cybersecurity, Mobility, Privacy

Power moves in mobile ad tracking
Linkedin
April 19, 2021
Why Apple making its ad tracker opt-in rather than opt-out is a big deal in the mobile world.

See publication

Tags: Cybersecurity, Mobility, Privacy

Now is the time for quantum hardening
Linkedin
March 12, 2021
It is 5-years since NIST and the NSA said "now is the time" to implement quantum hardening ... and the technology is finally at a tipping point into the mainstream.

See publication

Tags: Cybersecurity, Emerging Technology, Quantum Computing

Who Controls Your Smartphone and How to Prevent it from Spying on you?
Open Heath News
December 15, 2020
Why are mobile devices less customizable than PCs? There are two reasons for this: The bundling of Options and the monetization of Personal Data.

See publication

Tags: Cybersecurity, HealthTech, Mobility

Is delivering a new security product like delivering a good wine?
Linkedin
April 27, 2020
What can we learn about introducing a new enterprise security product from looking at legacy products and different kinds of innovation? I wanted to jot down some quick thoughts from the startup world.

See publication

Tags: Business Strategy, Cybersecurity, Design Thinking

Telework Challenges in a Mobile Device World
CIS Mobile
March 17, 2020
The coronavirus pandemic is affecting all walks of life. Hospitals and medical professionals are on high alert. Schools are closing. Professional sports teams are playing in empty stadiums and, in some cases, not at all. Companies and governments are reviewing how to reduce health risks while maintaining productivity. An obvious response is to expand their telework programs for employees.

See publication

Tags: Mobility, Future of Work, Business Continuity

Golidlocks problem of mobile device security in organizations
IIoT
October 28, 2019
The theme is trade-offs between usability of the device and security for confidential organizational data such as conversations, messages, documents, images, and locations.

See publication

Tags: Cybersecurity, Mobility

Securing Mobile Devices
Enterprise Tech Success
September 06, 2019
Article covers the wavetops of mobile device cybersecurity and privacy from three perspectives of increasing sensitivity to risk -- consumers, business, and government organizations.

See publication

Tags: Cybersecurity, Mobility, Supply Chain

Smartphones, execs, & travel overseas
Linkedin
July 09, 2019
Security precautions for enterprise mobile devices.

See publication

Tags: Cybersecurity, Risk Management

The Cyber Risk to a Critical Part of Our Economy and Supply Chain: Commercial Trucking
RunSafe Security
April 11, 2019
12 million trucks, or about 5% of vehicles on U.S. roads, are aggregated into fleets for government or commercial use. About 42% of these are connected with telematics Fleet Management System (FMS) for efficiency and compliance with government Electronic Logging Data (ELD) requirements. Typical FMS data captured includes miles driven, time of day, Global Positioning System (GPS) location, speed, any rapid acceleration, hard braking, hard cornering, and collision detection. Fleets are often early adopters of ADAS (Advanced Driver Assistance Systems) features that promote safety. The unintended consequence of ADAS adoption however is that computers are at the controls.

See publication

Tags: Cybersecurity, Emerging Technology, Autonomous Vehicles

The Common Vulnerability That Fintech and Bananas Share
RunSafe Security
January 08, 2019
Fintech is defined by technologies that span the cloud, mobile devices, blockchain, and AI for financial applications ranging from virtual currencies, to payment processing, money transfers, equity trading, and regulatory compliance, among others.

See publication

Tags: Autonomous Vehicles, Cybersecurity, FinTech

Data centers must look past perimeter security
Data Center Dynamics
August 10, 2018
While data centers have traditionally relied on detection and perimeter security solutions to reduce risk, the proliferation of new types of cyber threats has elevated the need for prevention

See publication

Tags: Cloud, Cybersecurity, Emerging Technology, Data Center

Want to stop cyber attacks? Why are all of your executables the same?
linkedin
May 14, 2018
Mirror, mirror on the wall
When I go to download my favorite app from the vendor’s website, or App Store, and click on the latest version, say 2018.101 for Mac, I get the same version and functionality as millions of other users.

See publication

Tags: Cybersecurity

Supply chain cyberattacks surging -- How can we prevent them?
linkedin
April 02, 2018
Symantec's new "Internet Security Threat Report," shows a 200% increase in reported supply chain cyberattacks year on year [i]. A supply chain attack seeks to damage an organization by targeting vulnerable elements in its global supply network. For example, auto suppliers’ contribution to vehicle has increased from 56% in the 1980s to over 80% today. The supply chain issue is the same whether the organization is involved in automotive, critical infrastructure, Industrial Internet of Things (IIoT), medical devices, or national security.

See publication

Tags: Cybersecurity, Security, National Security

Cybersecurity – a gating issue for safety in a connected and automated vehicle future
Telematics Wire
October 19, 2017
Connected, partially and fully automated vehicles hold the potential to transform our lives, making real smart cities and ushering in undreamed-of efficiencies in the transport of people and goods by land and in the futures, air, and even space. Where things go wrong, however, potential harms are much greater than those of historical data breaches around mobile devices, laptops, desktops and the cloud.

See publication

Tags: Cybersecurity, Autonomous Vehicles, Smart Cities

Top 5 tips to mitigate phone and IoT device hacking in government and enterprise
linkedin
October 17, 2017
There is a growing need for cybersecurity tools to be more effective and for coverage to extend beyond older infrastructures to cover mobile and Internet of Things (IoT) devices. Some of these tool vendors will be well-known veterans of the personal computer / data center era and others will be startups, springing up to cover gaps in the market. A recent report by Gartner quantifies the growing threat to mobile devices - “by 2019, mobile malware will amount to one-third of total malware reported in standard tests, up from 7.5% today” [1].

See publication

Tags: Cybersecurity, IoT, Data Center

Securing the Data Center on Wheels
Infosecurity Magazine
August 24, 2017
Today’s connected car is not so much a smartphone on wheels; with so many microprocessors chatting with one another across and beyond the vehicle, it is now more aptly described as a data center on wheels.

See publication

Tags: Cybersecurity, Autonomous Vehicles, Data Center

Why try to defend against new cyber threats with only legacy technologies?
linkedin
July 19, 2017
Cybersecurity has an asymmetry of economics - defenders must defend everything but attackers need find just one-way in … and it need not be one seen before. Attackers are updating methods more, attacking more and impacting more devices and people.

See publication

Tags: Cybersecurity

2 Books
SAE Cybersecurity for Entrepreneurs
SAE
June 01, 2023
Wrote the secure communications chapter in SAE's 2023 new book "Cybersecurity for Entrepreneurs." for editors Gloria D'Anna and Zach Collier.

See publication

Tags: Cybersecurity, Entrepreneurship, Startups

Cybersecurity for commercial vehicles
SAE
May 26, 2019
My chapter reviews the existing law, policy, cybersecurity, and data privacy considerations around conventional, connected (CV), driver-assisted (ADAS), and fully automated vehicles (AV) It contends that—

(1) The risk of vehicle cyberattack is not just a problem for future model years, but a
real risk to the public, consumer, and commercial fleet vehicles on the road today

(2) Potential harms are much greater than those of historical data breaches
around smartphones, personal computers (PCs), and the cloud, ranging from
driver distraction to Distributed Denial of Service (DDoS) and ransomware to
property damage and bodily injury to death and debilitation of critical transport
infrastructure [3].

(3) Mitigating cyber risk should be addressed by mandatory regulation, as far as
is possible under the present administration, setting a common standard for
engineering, legal, and cyberinsurance purposes across the industry, rather than
relying on a patchwork of voluntary standards that are inconsistently applied to
vehicles assembled just in time (JIT) from long supply chains.

See publication

Tags: Autonomous Vehicles, Cybersecurity, Emerging Technology

5 Speaking Engagements
Automated Driving Systems Conference
Nordtree
June 20, 2018
CAV safety - An Ounce of Cybersecurity Prevention is Worth a Pound of Detection

See publication

Tags: Autonomous Vehicles, Cybersecurity, Privacy

Consumer Electronics Show (CES)
CES
January 12, 2018
Cybersecurity and privacy in connected / automated vehicles (CV/AV)

See publication

Tags: Autonomous Vehicles, Cybersecurity, Privacy

IoT Cybersecurity - An End-to-End Business
Semicon West
May 25, 2017
IoT Cybersecurity

See publication

Tags: Autonomous Vehicles, Cybersecurity, IoT

Cyber Unsafe at Any Speed
Society of Automotive Engineers (SAE) World Congress
April 30, 2017
Cybersecurity in connected / automated vehicles (CV/AV)

See publication

Tags: Autonomous Vehicles, Cybersecurity, Privacy

Simon Hartley Law & Cybersecurity
UMD Carey Law School
April 30, 2017
Simon Hartley (MSL ’17) is an innovator, forging security solutions in a world rapidly moving through the evolving steps of digital transformation. It’s a world, he argues, where innovation is increasingly entangled with legal and regulatory issues.

See publication

Tags: Cybersecurity, Legal and IP, Privacy

3 Videos
Demo of CIS Mobile's altOS
CIS Mobile
April 23, 2020
Short video highlighting some of the key altOS features: Multiple Containers, Geofences, easy Provisioning, and web-based Management.

See publication

Tags: Cybersecurity, GovTech, Mobility

Tachyon Samsung Knox Mobile Enrollment - Samsung Galaxy S6
Kaprica Security
June 29, 2015
This is a 3.5-minute demo of Tachyon with Samsung Knox Mobile Enrollment and AirWatch running on a Samsung Galaxy S6.

See publication

Tags: Cybersecurity, GovTech, Mobility

Secure browser for iPad/ iPhone
Thursby Software (became Identiv)
March 05, 2012
FIPS 140-2 CAC/PIV security for iPad/ iPhone

See publication

Tags: Cybersecurity, GovTech, Mobility

2 Webinars
Foundations of Zero Trust Architecture - Key Hardening from Verifiable Quantum Physics
ATARC - Advanced Technology Academic Research Center
May 11, 2022
During this talk we will discuss the security of today’s digital experiences that rely on layers of security infrastructure. Their foundations are key management, encryption algorithms, and key generation. While the first two are frequently discussed, the issue of predictability in key generation itself is much less well known. This talk focuses on verifiable, tamper proof, and hardware independent key hardening from quantum physics that can easily be added to existing infrastructure, both classical and post quantum.

See publication

Tags: Cybersecurity, GovTech, Quantum Computing

Bastille and CIS Mobile: Enabling the Safe Use of Employees Cell phones in Secure Facilities
Bastille
May 27, 2021
Using Bastille with CIS Mobile's altOS solution can allow employees to safely bring personal cell phones into secure facilities. CIS Mobile's altOS "secure mode" solution can lock cell phone communication abilities when entered into the system. Then, with Bastille's cell phone, Wi-Fi, Bluetooth, and IoT detection capabilities, you can verify that the device in question is not actively transmitting in any of those modes.

See publication

Tags: Cybersecurity, Mobility, GovTech

Thinkers360 Credentials

13 Badges

Blog

Opportunities

1 Service
Quantum Technologies

Location: Washington DC    Fees: 0

Service Type: Service Offered

Quantinuum helps you define what quantum means for your organization. Through close collaborations we:
- Assess where quantum technology can add value to your core missions,
- Analyze how it will fit into your existing computational workflows,
- Help you get started and build a roadmap for scaling up.

Respond to this opportunity

Contact Simon Hartley

Book Simon Hartley for Speaking

Book a Meeting

Media Kit

Share Profile

Contact Info

  Profile

Simon Hartley


Latest Activity

Latest Opportunities