Unlock access to Thinkers360 AI to fast-track your search for analysts and influencers.
This feature is available for Enterprise Lite and Enterprise Members Only.
You have been temporarily restricted. Please be more thoughtful when adding content for your portfolio. Your portfolio and digital media kit and should be reflective of the professional image you wish to convey. Accounts may be temporarily restricted if we receive reports of spamming or if the system detects excessive entries.
Membership
Publish your original ideas on the Thinkers360 platform!
This feature is available for Pro and Pro-Plus Members Only.
Speaker Bureau functionality whereby individuals can be featured speakers within our Speaker Bureau service and enterprises can find and work with speakers.
This feature is available for Pro, Pro-Plus, Premium and Enterprise Members Only.
Highlight your featured products and services within our company directory for enhanced visibility to active B2B buyers worldwide. This feature is available for Pro, Pro Plus, Premium and Enterprise Members Only.
Contribute to the Thinkers360 Member Blog and have your thought leadership featured on our web site, newsletter and social channels. Reach our opt-in B2B thought leader community and influencer marketplace with over 100M followers on social media combined!
You’ve reached your daily limit for entering quotes. Please only add personally-authored content which is reflective of your digital media kit and thought leadership portfolio.
Thinkers360 Content Library
For full access to the Thinkers360 content library, please join ourContent Planor become a contributor by posting your own personally-authored content into the system viaAdd PublicationorImport Publication.
Dashboard
Unlock your personalized dashboard including metrics for your member blogs and press releases as well as all the features and benefits of our member plans!
Interested in getting your own thought leader profile? Get Started Today.
Simon Hartley
Connected Vehicle & Product Cybersecurity at IBM Consulting
Washington D.C., United States
Simon Hartley is an alum of successful startups and Fortune 100 companies, an expert in the business of cybersecurity, mobility, and quantum in hardening critical infrastructure (defense, transport, telco, energy, finance etc.). He joined IBM in 2024 to drive safety, security, and reliability in the US connected vehicles practice. He is also a startup advisor, published author, and public speaker.
- Experienced in startup and Fortune 100 enterprise software management, sales, and marketing
- Skilled at scaling emerging technology, products, and IP in early and highly regulated markets
- Top 25 thought leader and influencer in the business of cybersecurity, mobility, and quantum
Available For: Advising, Consulting, Speaking Travels From: Washington DC Speaking Topics: Cybersecurity, Mobility, Quantum
Simon Hartley
Points
Academic
20
Author
155
Influencer
35
Speaker
21
Entrepreneur
0
Total
231
Points based upon Thinkers360 patent-pending algorithm.
Master of Science in Law, Cybersecurity
University of Maryland School of Law
July 30, 2022
Simon Hartley (MSL ’17) is an innovator, forging security solutions in a world rapidly moving through the evolving steps of digital transformation. It’s a world, he argues, where innovation is increasingly entangled with legal and regulatory issues.
Certificate in Principles and Tools for Cybersecurity IT Leaders
UMD / ATARC
January 01, 2019
This certificate, offered by the University of Maryland Robert H. Smith School of Business in collaboration with ATARC, provides Cybersecurity leaders in industry and government with a solid grounding in core business tools and principles as relevant to emerging security threats, mitigation and preparedness.
Revving automotive cybersecurity
Linkedin
October 29, 2024
This note covers highlights from the Detroit Automotive Information Sharing and Analysis Center (Auto ISAC) Summit, the week of 21st October 2024 . The ISAC is built on stakeholder collaboration and leverages the collective expertise of Original Equipment Manufacturers (OEM), hardware, software, and services suppliers given that “an attack on one is an on all”.
Gen-x, the Vic-20-and-hi-tech-immigration
Medium
July 31, 2024
This post focuses on Gen X immigrants and their role in building out the modern hi-tech world in which Millennial and Gen X cohorts are “digital natives,” e.g. the leaders of Tesla, Palantir, Google, and Microsoft.
Rapidly advancing quantum technology poses what cryptography expert Bruce Schneier calls a class break threat to today’s cryptography — breaking the confidentiality, integrity, and availability of systems across a connected world. Y2Q the date when advanced quantum computers are forecast to break the widely used public-key cryptography securing the web, mobile apps, and banking. Recommendations to deal with the Y2Q issue include inventorying systems to determine their cryptographic usage, a triage to the most important business areas to protect first and implementing a phased roadmap of hardening to quantum resistant tools under US Government guidelines.
Tags: Cybersecurity, IT Strategy, Quantum Computing
Random Number Generation - Who Cares?
Medium
October 29, 2023
Random numbers (entropy) are important for everything from scientific modeling, to making video games interesting, to picking lottery winners. They are most important for cryptographic security — the security of your social media accounts, smartphone, the electric grid, school, work, and the government.
Tip of iceberg in cybersecurity
Linkedin
June 20, 2023
Thoughts on cybersecurity, emerging tech, and different types of customers -- the 5% in government, finance, healthcare, O&G where specialists abound and the 95% that have to rely far more on specialized vendors and integrators.
Rolling the dice - why hardening keys matters!
Linkedin
March 21, 2022
Short article on why hardening keys matter -- randomness, anti-tamper, and verification for due diligence and defense in depth for critical infrastructure.
Tags: Cybersecurity, Privacy, Quantum Computing, National Security
Making sandals rather than paving the landscape for secure mobile and ZeroTrust
Linkedin
January 31, 2022
Thoughts on delivering mobile device security that avoids both the thorns of location tracking / personal data exhaust in consumer devices and the costs, time, risk, and impracticality of paving over the existing IT landscape.
Now is the time for quantum hardening
Linkedin
March 12, 2021
It is 5-years since NIST and the NSA said "now is the time" to implement quantum hardening ... and the technology is finally at a tipping point into the mainstream.
Is delivering a new security product like delivering a good wine?
Linkedin
April 27, 2020
What can we learn about introducing a new enterprise security product from looking at legacy products and different kinds of innovation? I wanted to jot down some quick thoughts from the startup world.
Tags: Business Strategy, Cybersecurity, Design Thinking
Telework Challenges in a Mobile Device World
CIS Mobile
March 17, 2020
The coronavirus pandemic is affecting all walks of life. Hospitals and medical professionals are on high alert. Schools are closing. Professional sports teams are playing in empty stadiums and, in some cases, not at all. Companies and governments are reviewing how to reduce health risks while maintaining productivity. An obvious response is to expand their telework programs for employees.
Tags: Mobility, Future of Work, Business Continuity
Golidlocks problem of mobile device security in organizations
IIoT
October 28, 2019
The theme is trade-offs between usability of the device and security for confidential organizational data such as conversations, messages, documents, images, and locations.
Securing Mobile Devices
Enterprise Tech Success
September 06, 2019
Article covers the wavetops of mobile device cybersecurity and privacy from three perspectives of increasing sensitivity to risk -- consumers, business, and government organizations.
The Cyber Risk to a Critical Part of Our Economy and Supply Chain: Commercial Trucking
RunSafe Security
April 11, 2019
12 million trucks, or about 5% of vehicles on U.S. roads, are aggregated into fleets for government or commercial use. About 42% of these are connected with telematics Fleet Management System (FMS) for efficiency and compliance with government Electronic Logging Data (ELD) requirements. Typical FMS data captured includes miles driven, time of day, Global Positioning System (GPS) location, speed, any rapid acceleration, hard braking, hard cornering, and collision detection. Fleets are often early adopters of ADAS (Advanced Driver Assistance Systems) features that promote safety. The unintended consequence of ADAS adoption however is that computers are at the controls.
The Common Vulnerability That Fintech and Bananas Share
RunSafe Security
January 08, 2019
Fintech is defined by technologies that span the cloud, mobile devices, blockchain, and AI for financial applications ranging from virtual currencies, to payment processing, money transfers, equity trading, and regulatory compliance, among others.
Data centers must look past perimeter security
Data Center Dynamics
August 10, 2018
While data centers have traditionally relied on detection and perimeter security solutions to reduce risk, the proliferation of new types of cyber threats has elevated the need for prevention
Tags: Cloud, Cybersecurity, Emerging Technology, Data Center
Want to stop cyber attacks? Why are all of your executables the same?
linkedin
May 14, 2018
Mirror, mirror on the wall
When I go to download my favorite app from the vendor’s website, or App Store, and click on the latest version, say 2018.101 for Mac, I get the same version and functionality as millions of other users.
Supply chain cyberattacks surging -- How can we prevent them?
linkedin
April 02, 2018
Symantec's new "Internet Security Threat Report," shows a 200% increase in reported supply chain cyberattacks year on year [i]. A supply chain attack seeks to damage an organization by targeting vulnerable elements in its global supply network. For example, auto suppliers’ contribution to vehicle has increased from 56% in the 1980s to over 80% today. The supply chain issue is the same whether the organization is involved in automotive, critical infrastructure, Industrial Internet of Things (IIoT), medical devices, or national security.
Cybersecurity – a gating issue for safety in a connected and automated vehicle future
Telematics Wire
October 19, 2017
Connected, partially and fully automated vehicles hold the potential to transform our lives, making real smart cities and ushering in undreamed-of efficiencies in the transport of people and goods by land and in the futures, air, and even space. Where things go wrong, however, potential harms are much greater than those of historical data breaches around mobile devices, laptops, desktops and the cloud.
Top 5 tips to mitigate phone and IoT device hacking in government and enterprise
linkedin
October 17, 2017
There is a growing need for cybersecurity tools to be more effective and for coverage to extend beyond older infrastructures to cover mobile and Internet of Things (IoT) devices. Some of these tool vendors will be well-known veterans of the personal computer / data center era and others will be startups, springing up to cover gaps in the market. A recent report by Gartner quantifies the growing threat to mobile devices - “by 2019, mobile malware will amount to one-third of total malware reported in standard tests, up from 7.5% today” [1].
Securing the Data Center on Wheels
Infosecurity Magazine
August 24, 2017
Today’s connected car is not so much a smartphone on wheels; with so many microprocessors chatting with one another across and beyond the vehicle, it is now more aptly described as a data center on wheels.
Tags: Cybersecurity, Autonomous Vehicles, Data Center
Why try to defend against new cyber threats with only legacy technologies?
linkedin
July 19, 2017
Cybersecurity has an asymmetry of economics - defenders must defend everything but attackers need find just one-way in … and it need not be one seen before. Attackers are updating methods more, attacking more and impacting more devices and people.
Cybersecurity for commercial vehicles
SAE
May 26, 2019
My chapter reviews the existing law, policy, cybersecurity, and data privacy considerations around conventional, connected (CV), driver-assisted (ADAS), and fully automated vehicles (AV) It contends that—
(1) The risk of vehicle cyberattack is not just a problem for future model years, but a
real risk to the public, consumer, and commercial fleet vehicles on the road today
(2) Potential harms are much greater than those of historical data breaches
around smartphones, personal computers (PCs), and the cloud, ranging from
driver distraction to Distributed Denial of Service (DDoS) and ransomware to
property damage and bodily injury to death and debilitation of critical transport
infrastructure [3].
(3) Mitigating cyber risk should be addressed by mandatory regulation, as far as
is possible under the present administration, setting a common standard for
engineering, legal, and cyberinsurance purposes across the industry, rather than
relying on a patchwork of voluntary standards that are inconsistently applied to
vehicles assembled just in time (JIT) from long supply chains.
Simon Hartley Law & Cybersecurity
UMD Carey Law School
April 30, 2017
Simon Hartley (MSL ’17) is an innovator, forging security solutions in a world rapidly moving through the evolving steps of digital transformation. It’s a world, he argues, where innovation is increasingly entangled with legal and regulatory issues.
Foundations of Zero Trust Architecture - Key Hardening from Verifiable Quantum Physics
ATARC - Advanced Technology Academic Research Center
May 11, 2022
During this talk we will discuss the security of today’s digital experiences that rely on layers of security infrastructure. Their foundations are key management, encryption algorithms, and key generation. While the first two are frequently discussed, the issue of predictability in key generation itself is much less well known. This talk focuses on verifiable, tamper proof, and hardware independent key hardening from quantum physics that can easily be added to existing infrastructure, both classical and post quantum.
Bastille and CIS Mobile: Enabling the Safe Use of Employees Cell phones in Secure Facilities
Bastille
May 27, 2021
Using Bastille with CIS Mobile's altOS solution can allow employees to safely bring personal cell phones into secure facilities. CIS Mobile's altOS "secure mode" solution can lock cell phone communication abilities when entered into the system. Then, with Bastille's cell phone, Wi-Fi, Bluetooth, and IoT detection capabilities, you can verify that the device in question is not actively transmitting in any of those modes.
Quantinuum helps you define what quantum means for your organization. Through close collaborations we:
- Assess where quantum technology can add value to your core missions,
- Analyze how it will fit into your existing computational workflows,
- Help you get started and build a roadmap for scaling up.
Join Thinkers360 for free! Are you a Reader/Writer, Thought Leader/Influencer (looking to increase your earnings), or an Enterprise User (looking to work with experts)?