Interested in getting your own thought leader profile? Get Started Today.

Simon Hartley

US Sales & Business Development at Quantinuum

Washington D.C., United States

Simon Hartley is a veteran of successful startups and Fortune 100 companies, a subject matter expert in the business of quantum, cybersecurity, and hardening critical infrastructure.

• Experienced in startup and Fortune 100 enterprise software management, sales, and marketing.
• Skilled at scaling emerging technology, products, and IP in early and highly regulated markets.
• Top 25 global thought leader and influencer in the business of quantum, cybersecurity, and mobility.

He recently joined Quantinuum (QNTM) to accelerate US Sales and Business Development in quantum technologies and is a startup advisor, author, and speaker.

He is a cleared US citizen, a CISSP, and holds BS in Physics, MS in Law & Cybersecurity, and MBA degrees.

Available For: Advising, Authoring, Speaking
Travels From: Washington DC
Speaking Topics: Quantum, Cybersecurity, Mobility

Speaking Fee $0 (In-Person)

Personal Speaking Website:
Simon Hartley Points
Academic 20
Author 90
Influencer 35
Speaker 21
Entrepreneur 0
Total 166

Points based upon Thinkers360 patent-pending algorithm.

Thought Leader Profile

Portfolio Mix

Featured Videos

SAE World Congress
August 02, 2022
U-Maryland Cybersecurity & Law
August 02, 2022
CIS Mobile Secure Smartphone Demo
August 02, 2022

Featured Topics


Focuses on the "threat" and "promise" of quantum technologies.


Focuses on preventive/proactive cybersecurity and collaboration - "defense is the new offense" and "Have to get past all of us to get past one of us!"


Focuses on computing at the edge -- smartphones, vehicles, 5G, and the Internet of Everything.

Company Information

Company Type: Enterprise
Theatre: USA
Media Experience: 15 years

Areas of Expertise

Autonomous Vehicles 44.78
Cybersecurity 36.31
Emerging Technology 33.18
GovTech 32.63
IoT 30.29
Mobility 33.50
Privacy 32.20
Quantum Computing 31.59
Legal and IP 30.86
Business Strategy 30.44
Security 30.18
National Security 31.19

Industry Experience

Aerospace & Defense
Federal & Public Sector
Financial Services & Banking
High Tech & Electronics
Oil & Gas
Travel & Transportation


2 Academic Certifications
Master of Science in Law, Cybersecurity
University of Maryland School of Law
July 30, 2022
Simon Hartley (MSL ’17) is an innovator, forging security solutions in a world rapidly moving through the evolving steps of digital transformation. It’s a world, he argues, where innovation is increasingly entangled with legal and regulatory issues.

See publication

Tags: Cybersecurity, Privacy

Certificate in Principles and Tools for Cybersecurity IT Leaders
January 01, 2019
This certificate, offered by the University of Maryland Robert H. Smith School of Business in collaboration with ATARC, provides Cybersecurity leaders in industry and government with a solid grounding in core business tools and principles as relevant to emerging security threats, mitigation and preparedness.

-- Program was shelved due to Covid.

See publication

Tags: Business Strategy, Cybersecurity

21 Article/Blogs
Past illuminates quantum R&D today
September 18, 2022
The story of 1950s digital innovation illuminates the arc of 2020's quantum technologies.

See publication

Tags: Emerging Technology, Quantum Computing

Rolling the dice - why hardening keys matters!
March 21, 2022
Short article on why hardening keys matter -- randomness, anti-tamper, and verification for due diligence and defense in depth for critical infrastructure.

See publication

Tags: Cybersecurity, Privacy, Quantum Computing, National Security

Making sandals rather than paving the landscape for secure mobile and ZeroTrust
January 31, 2022
Thoughts on delivering mobile device security that avoids both the thorns of location tracking / personal data exhaust in consumer devices and the costs, time, risk, and impracticality of paving over the existing IT landscape.

See publication

Tags: Cybersecurity, Mobility, Privacy

Power moves in mobile ad tracking
April 19, 2021
Why Apple making its ad tracker opt-in rather than opt-out is a big deal in the mobile world.

See publication

Tags: Cybersecurity, Mobility, Privacy

Now is the time for quantum hardening
March 12, 2021
It is 5-years since NIST and the NSA said "now is the time" to implement quantum hardening ... and the technology is finally at a tipping point into the mainstream.

See publication

Tags: Cybersecurity, Emerging Technology, Quantum Computing

Who Controls Your Smartphone and How to Prevent it from Spying on you?
Open Heath News
December 15, 2020
Why are mobile devices less customizable than PCs? There are two reasons for this: The bundling of Options and the monetization of Personal Data.

See publication

Tags: Cybersecurity, HealthTech, Mobility

Is delivering a new security product like delivering a good wine?
April 27, 2020
What can we learn about introducing a new enterprise security product from looking at legacy products and different kinds of innovation? I wanted to jot down some quick thoughts from the startup world.

See publication

Tags: Business Strategy, Cybersecurity, Design Thinking

Telework Challenges in a Mobile Device World
CIS Mobile
March 17, 2020
The coronavirus pandemic is affecting all walks of life. Hospitals and medical professionals are on high alert. Schools are closing. Professional sports teams are playing in empty stadiums and, in some cases, not at all. Companies and governments are reviewing how to reduce health risks while maintaining productivity. An obvious response is to expand their telework programs for employees.

See publication

Tags: Mobility, Future of Work, Business Continuity

Golidlocks problem of mobile device security in organizations
October 28, 2019
The theme is trade-offs between usability of the device and security for confidential organizational data such as conversations, messages, documents, images, and locations.

See publication

Tags: Cybersecurity, Mobility

Securing Mobile Devices
Enterprise Tech Success
September 06, 2019
Article covers the wavetops of mobile device cybersecurity and privacy from three perspectives of increasing sensitivity to risk -- consumers, business, and government organizations.

See publication

Tags: Cybersecurity, Mobility, Supply Chain

Smartphones, execs, & travel overseas
July 09, 2019
Security precautions for enterprise mobile devices.

See publication

Tags: Cybersecurity, Risk Management

The Cyber Risk to a Critical Part of Our Economy and Supply Chain: Commercial Trucking
RunSafe Security
April 11, 2019
12 million trucks, or about 5% of vehicles on U.S. roads, are aggregated into fleets for government or commercial use. About 42% of these are connected with telematics Fleet Management System (FMS) for efficiency and compliance with government Electronic Logging Data (ELD) requirements. Typical FMS data captured includes miles driven, time of day, Global Positioning System (GPS) location, speed, any rapid acceleration, hard braking, hard cornering, and collision detection. Fleets are often early adopters of ADAS (Advanced Driver Assistance Systems) features that promote safety. The unintended consequence of ADAS adoption however is that computers are at the controls.

See publication

Tags: Cybersecurity, Emerging Technology, Autonomous Vehicles

The Common Vulnerability That Fintech and Bananas Share
RunSafe Security
January 08, 2019
Fintech is defined by technologies that span the cloud, mobile devices, blockchain, and AI for financial applications ranging from virtual currencies, to payment processing, money transfers, equity trading, and regulatory compliance, among others.

See publication

Tags: Autonomous Vehicles, Cybersecurity, FinTech

Data centers must look past perimeter security
Data Center Dynamics
August 10, 2018
While data centers have traditionally relied on detection and perimeter security solutions to reduce risk, the proliferation of new types of cyber threats has elevated the need for prevention

See publication

Tags: Cloud, Cybersecurity, Emerging Technology, Data Center

Want to stop cyber attacks? Why are all of your executables the same?
May 14, 2018
Mirror, mirror on the wall
When I go to download my favorite app from the vendor’s website, or App Store, and click on the latest version, say 2018.101 for Mac, I get the same version and functionality as millions of other users.

See publication

Tags: Cybersecurity

Supply chain cyberattacks surging -- How can we prevent them?
April 02, 2018
Symantec's new "Internet Security Threat Report," shows a 200% increase in reported supply chain cyberattacks year on year [i]. A supply chain attack seeks to damage an organization by targeting vulnerable elements in its global supply network. For example, auto suppliers’ contribution to vehicle has increased from 56% in the 1980s to over 80% today. The supply chain issue is the same whether the organization is involved in automotive, critical infrastructure, Industrial Internet of Things (IIoT), medical devices, or national security.

See publication

Tags: Cybersecurity, Security, National Security

Cybersecurity – a gating issue for safety in a connected and automated vehicle future
Telematics Wire
October 19, 2017
Connected, partially and fully automated vehicles hold the potential to transform our lives, making real smart cities and ushering in undreamed-of efficiencies in the transport of people and goods by land and in the futures, air, and even space. Where things go wrong, however, potential harms are much greater than those of historical data breaches around mobile devices, laptops, desktops and the cloud.

See publication

Tags: Cybersecurity, Autonomous Vehicles, Smart Cities

Top 5 tips to mitigate phone and IoT device hacking in government and enterprise
October 17, 2017
There is a growing need for cybersecurity tools to be more effective and for coverage to extend beyond older infrastructures to cover mobile and Internet of Things (IoT) devices. Some of these tool vendors will be well-known veterans of the personal computer / data center era and others will be startups, springing up to cover gaps in the market. A recent report by Gartner quantifies the growing threat to mobile devices - “by 2019, mobile malware will amount to one-third of total malware reported in standard tests, up from 7.5% today” [1].

See publication

Tags: Cybersecurity, IoT, Data Center

Securing the Data Center on Wheels
Infosecurity Magazine
August 24, 2017
Today’s connected car is not so much a smartphone on wheels; with so many microprocessors chatting with one another across and beyond the vehicle, it is now more aptly described as a data center on wheels.

See publication

Tags: Cybersecurity, Autonomous Vehicles, Data Center

Why try to defend against new cyber threats with only legacy technologies?
July 19, 2017
Cybersecurity has an asymmetry of economics - defenders must defend everything but attackers need find just one-way in … and it need not be one seen before. Attackers are updating methods more, attacking more and impacting more devices and people.

See publication

Tags: Cybersecurity

Wake up call of week's cyberattacks ... how to avoid more
May 15, 2017
The bad news is that the last week has seen an unprecedented number of ransomware attacks around the world which have hit some large organizations very hard.
The good news is that these particular attacks are entirely preventable with some easy short term steps, which are cornerstones of a larger cybersecurity strategy that can prevent others.

See publication

Tags: Cybersecurity

1 Book
Cybersecurity for commercial vehicles
May 26, 2019
My chapter reviews the existing law, policy, cybersecurity, and data privacy considerations around conventional, connected (CV), driver-assisted (ADAS), and fully automated vehicles (AV) It contends that—

(1) The risk of vehicle cyberattack is not just a problem for future model years, but a
real risk to the public, consumer, and commercial fleet vehicles on the road today

(2) Potential harms are much greater than those of historical data breaches
around smartphones, personal computers (PCs), and the cloud, ranging from
driver distraction to Distributed Denial of Service (DDoS) and ransomware to
property damage and bodily injury to death and debilitation of critical transport
infrastructure [3].

(3) Mitigating cyber risk should be addressed by mandatory regulation, as far as
is possible under the present administration, setting a common standard for
engineering, legal, and cyberinsurance purposes across the industry, rather than
relying on a patchwork of voluntary standards that are inconsistently applied to
vehicles assembled just in time (JIT) from long supply chains.

See publication

Tags: Autonomous Vehicles, Cybersecurity, Emerging Technology

5 Speaking Engagements
Automated Driving Systems Conference
June 20, 2018
CAV safety - An Ounce of Cybersecurity Prevention is Worth a Pound of Detection

See publication

Tags: Autonomous Vehicles, Cybersecurity, Privacy

Consumer Electronics Show (CES)
January 12, 2018
Cybersecurity and privacy in connected / automated vehicles (CV/AV)

See publication

Tags: Autonomous Vehicles, Cybersecurity, Privacy

IoT Cybersecurity - An End-to-End Business
Semicon West
May 25, 2017
IoT Cybersecurity

See publication

Tags: Autonomous Vehicles, Cybersecurity, IoT

Cyber Unsafe at Any Speed
Society of Automotive Engineers (SAE) World Congress
April 30, 2017
Cybersecurity in connected / automated vehicles (CV/AV)

See publication

Tags: Autonomous Vehicles, Cybersecurity, Privacy

Simon Hartley Law & Cybersecurity
UMD Carey Law School
April 30, 2017
Simon Hartley (MSL ’17) is an innovator, forging security solutions in a world rapidly moving through the evolving steps of digital transformation. It’s a world, he argues, where innovation is increasingly entangled with legal and regulatory issues.

See publication

Tags: Cybersecurity, Legal and IP, Privacy

3 Videos
Demo of CIS Mobile's altOS
CIS Mobile
April 23, 2020
Short video highlighting some of the key altOS features: Multiple Containers, Geofences, easy Provisioning, and web-based Management.

See publication

Tags: Cybersecurity, GovTech, Mobility

Tachyon Samsung Knox Mobile Enrollment - Samsung Galaxy S6
Kaprica Security
June 29, 2015
This is a 3.5-minute demo of Tachyon with Samsung Knox Mobile Enrollment and AirWatch running on a Samsung Galaxy S6.

See publication

Tags: Cybersecurity, GovTech, Mobility

Secure browser for iPad/ iPhone
Thursby Software (became Identiv)
March 05, 2012
FIPS 140-2 CAC/PIV security for iPad/ iPhone

See publication

Tags: Cybersecurity, GovTech, Mobility

2 Webinars
Foundations of Zero Trust Architecture - Key Hardening from Verifiable Quantum Physics
ATARC - Advanced Technology Academic Research Center
May 11, 2022
During this talk we will discuss the security of today’s digital experiences that rely on layers of security infrastructure. Their foundations are key management, encryption algorithms, and key generation. While the first two are frequently discussed, the issue of predictability in key generation itself is much less well known. This talk focuses on verifiable, tamper proof, and hardware independent key hardening from quantum physics that can easily be added to existing infrastructure, both classical and post quantum.

See publication

Tags: Cybersecurity, GovTech, Quantum Computing

Bastille and CIS Mobile: Enabling the Safe Use of Employees Cell phones in Secure Facilities
May 27, 2021
Using Bastille with CIS Mobile's altOS solution can allow employees to safely bring personal cell phones into secure facilities. CIS Mobile's altOS "secure mode" solution can lock cell phone communication abilities when entered into the system. Then, with Bastille's cell phone, Wi-Fi, Bluetooth, and IoT detection capabilities, you can verify that the device in question is not actively transmitting in any of those modes.

See publication

Tags: Cybersecurity, Mobility, GovTech

Thinkers360 Credentials

12 Badges


1 Technology
Quantum PQC / Entropy

Date : December 07, 2022

2023 will see increasing adoption of (1) Post Quantum Crypto (PQC) algorithms and (2) entropy for key/certificate generation that is both created *and* verified by quantum rather than classical processes.

These will mitigate the Store Now Decrypt Later (SNDL) attacks of near peer nation states focused on cracking (1) algorithmic "locks" or (2) their keys/certificates, when generated or verified from classical approaches.

See Radar



1 Service
Quantum Technologies

Location: Washington DC    Date Available: July 21st, 2022     Fees: 0

Submission Date: July 21st, 2022     Service Type: Service Offered

Quantinuum helps you define what quantum means for your organization. Through close collaborations we:
- Assess where quantum technology can add value to your core missions,
- Analyze how it will fit into your existing computational workflows,
- Help you get started and build a roadmap for scaling up.

Respond to this opportunity

Contact Simon Hartley

Book Simon Hartley for Speaking

Book a Meeting

Media Kit

Share Profile

Contact Info


Simon Hartley