Thinkers360
Interested in getting your own thought leader profile? Get Started Today.

Simon Hartley

US Cybersecurity Sales & Business Development at Cambridge Quantum

Washington D.C., United States

Simon Hartley is a veteran of successful startups and Fortune 100 companies, a subject matter expert in the business of cybersecurity and hardening critical infrastructure. Most recently, he introduced the altOS mobile security platform with startup CIS Mobile, after earlier working with Apple and Samsung to harden their platforms for US Government security needs.

• Experienced in startup and Fortune 100 enterprise software product management, sales, and marketing.
• Skilled at scaling emerging technology, products, and IP in early and highly regulated markets.
• Top 25 global thought leader and influencer in the business of cybersecurity, mobility, and IoT.

Previously, Simon was VP Business Development/Co-Founder of $25 million IoT cybersecurity startup RunSafe Security, VP Sales & Marketing at mobile cybersecurity startup Kaprica Security (now Samsung), and Director Worldwide Sales & Marketing re-starting Thursby Software (now Identiv) in mobile security.

He began his career in nuclear software engineering in England and France. He then held executive roles at HP, Red Hat, and Capgemini. Past end customers include the IC, DoD, and Federal Civilian agencies (government), Morgan Stanley and PayPal (finance), Epic and ManorCare (healthcare), Bosch and Lear (transport), Chevron and EDF (energy).

“I have been captivated by innovation since first setting eyes on a computer in grade school. I love growing new business, communication, and teamwork with customers, colleagues, partners, investors, and the community. My strengths are problem solving, analysis, and constant learning in the highly dynamic markets around emerging technologies.”

He is a cleared US citizen, a CISSP, and holds BS in Physics, MS in Law & Cybersecurity, and MBA degrees.

Simon Hartley Points
Academic 0
Author 86
Influencer 35
Speaker 3
Entrepreneur 0
Total 124

Points based upon Thinkers360 patent-pending algorithm.

Thought Leader Profile

Portfolio Mix

Company Information

Company Type: Enterprise
Theatre: USA
Media Experience: 10 years

Areas of Expertise

Autonomous Vehicles 43.03
Business Strategy 30.04
Cloud 30.11
Cybersecurity 37.06
Emerging Technology 33.43
Entrepreneurship
Fintech 30.10
Govtech 30.53
Innovation
IoT 30.12
Lean Startup
Management
Marketing
Mobility 32.33
Risk Management 30.14
Sales
Startups 30.34
Supply Chain 30.04
Data Center 30.40
Design Thinking 30.10
Business Continuity 30.21
Future of Work 30.05
Healthtech 30.19
Smart Cities 30.81
Quantum Computing 30.54
Privacy 30.26

Industry Experience

Automotive
Federal & Public Sector
Financial Services & Banking
Healthcare
High Tech & Electronics
Oil & Gas
Telecommunications
Travel & Transportation
Utilities

Publications

20 Article/Blogs
Rolling the dice - why hardening keys matters!
Linkedin
March 21, 2022
Short article on why hardening keys matter -- randomness, anti-tamper, and verification for due diligence and defense in depth for critical infrastructure.

See publication

Tags: Cybersecurity, Privacy, Quantum Computing

Making sandals rather than paving the landscape for secure mobile and ZeroTrust
Linkedin
January 31, 2022
Thoughts on delivering mobile device security that avoids both the thorns of location tracking / personal data exhaust in consumer devices and the costs, time, risk, and impracticality of paving over the existing IT landscape.

See publication

Tags: Cybersecurity, Mobility, Privacy

Power moves in mobile ad tracking
Linkedin
April 19, 2021
Why Apple making its ad tracker opt-in rather than opt-out is a big deal in the mobile world.

See publication

Tags: Cybersecurity, Mobility, Privacy

Now is the time for quantum hardening
Linkedin
March 12, 2021
It is 5-years since NIST and the NSA said "now is the time" to implement quantum hardening ... and the technology is finally at a tipping point into the mainstream.

See publication

Tags: Cybersecurity, Emerging Technology, Quantum Computing

Who Controls Your Smartphone and How to Prevent it from Spying on you?
Open Heath News
December 15, 2020
Why are mobile devices less customizable than PCs? There are two reasons for this: The bundling of Options and the monetization of Personal Data.

See publication

Tags: Cybersecurity, Healthtech, Mobility

Is delivering a new security product like delivering a good wine?
Linkedin
April 27, 2020
What can we learn about introducing a new enterprise security product from looking at legacy products and different kinds of innovation? I wanted to jot down some quick thoughts from the startup world.

See publication

Tags: Business Strategy, Cybersecurity, Design Thinking

Telework Challenges in a Mobile Device World
CIS Mobile
March 17, 2020
The coronavirus pandemic is affecting all walks of life. Hospitals and medical professionals are on high alert. Schools are closing. Professional sports teams are playing in empty stadiums and, in some cases, not at all. Companies and governments are reviewing how to reduce health risks while maintaining productivity. An obvious response is to expand their telework programs for employees.

See publication

Tags: Mobility, Future of Work, Business Continuity

Golidlocks problem of mobile device security in organizations
IIoT
October 28, 2019
The theme is trade-offs between usability of the device and security for confidential organizational data such as conversations, messages, documents, images, and locations.

See publication

Tags: Cybersecurity, Mobility

Securing Mobile Devices
Enterprise Tech Success
September 06, 2019
Article covers the wavetops of mobile device cybersecurity and privacy from three perspectives of increasing sensitivity to risk -- consumers, business, and government organizations.

See publication

Tags: Cybersecurity, Mobility, Supply Chain

Smartphones, execs, & travel overseas
Linkedin
July 09, 2019
Security precautions for enterprise mobile devices.

See publication

Tags: Cybersecurity, Risk Management

The Cyber Risk to a Critical Part of Our Economy and Supply Chain: Commercial Trucking
RunSafe Security
April 11, 2019
12 million trucks, or about 5% of vehicles on U.S. roads, are aggregated into fleets for government or commercial use. About 42% of these are connected with telematics Fleet Management System (FMS) for efficiency and compliance with government Electronic Logging Data (ELD) requirements. Typical FMS data captured includes miles driven, time of day, Global Positioning System (GPS) location, speed, any rapid acceleration, hard braking, hard cornering, and collision detection. Fleets are often early adopters of ADAS (Advanced Driver Assistance Systems) features that promote safety. The unintended consequence of ADAS adoption however is that computers are at the controls.

See publication

Tags: Cybersecurity, Emerging Technology, Autonomous Vehicles

The Common Vulnerability That Fintech and Bananas Share
RunSafe Security
January 08, 2019
Fintech is defined by technologies that span the cloud, mobile devices, blockchain, and AI for financial applications ranging from virtual currencies, to payment processing, money transfers, equity trading, and regulatory compliance, among others.

See publication

Tags: Autonomous Vehicles, Cybersecurity, Fintech

Data centers must look past perimeter security
Data Center Dynamics
August 10, 2018
While data centers have traditionally relied on detection and perimeter security solutions to reduce risk, the proliferation of new types of cyber threats has elevated the need for prevention

See publication

Tags: Cloud, Cybersecurity, Emerging Technology, Data Center

Want to stop cyber attacks? Why are all of your executables the same?
linkedin
May 14, 2018
Mirror, mirror on the wall
When I go to download my favorite app from the vendor’s website, or App Store, and click on the latest version, say 2018.101 for Mac, I get the same version and functionality as millions of other users.

See publication

Tags: Cybersecurity

Supply chain cyberattacks surging -- How can we prevent them?
linkedin
April 02, 2018
Symantec's new "Internet Security Threat Report," shows a 200% increase in reported supply chain cyberattacks year on year [i]. A supply chain attack seeks to damage an organization by targeting vulnerable elements in its global supply network. For example, auto suppliers’ contribution to vehicle has increased from 56% in the 1980s to over 80% today. The supply chain issue is the same whether the organization is involved in automotive, critical infrastructure, Industrial Internet of Things (IIoT), medical devices, or national security.

See publication

Tags: Cybersecurity

Cybersecurity – a gating issue for safety in a connected and automated vehicle future
Telematics Wire
October 19, 2017
Connected, partially and fully automated vehicles hold the potential to transform our lives, making real smart cities and ushering in undreamed-of efficiencies in the transport of people and goods by land and in the futures, air, and even space. Where things go wrong, however, potential harms are much greater than those of historical data breaches around mobile devices, laptops, desktops and the cloud.

See publication

Tags: Cybersecurity, Autonomous Vehicles, Smart Cities

Top 5 tips to mitigate phone and IoT device hacking in government and enterprise
linkedin
October 17, 2017
There is a growing need for cybersecurity tools to be more effective and for coverage to extend beyond older infrastructures to cover mobile and Internet of Things (IoT) devices. Some of these tool vendors will be well-known veterans of the personal computer / data center era and others will be startups, springing up to cover gaps in the market. A recent report by Gartner quantifies the growing threat to mobile devices - “by 2019, mobile malware will amount to one-third of total malware reported in standard tests, up from 7.5% today” [1].

See publication

Tags: Cybersecurity, IoT, Data Center

Securing the Data Center on Wheels
Infosecurity Magazine
August 24, 2017
Today’s connected car is not so much a smartphone on wheels; with so many microprocessors chatting with one another across and beyond the vehicle, it is now more aptly described as a data center on wheels.

See publication

Tags: Cybersecurity, Autonomous Vehicles, Data Center

Why try to defend against new cyber threats with only legacy technologies?
linkedin
July 19, 2017
Cybersecurity has an asymmetry of economics - defenders must defend everything but attackers need find just one-way in … and it need not be one seen before. Attackers are updating methods more, attacking more and impacting more devices and people.

See publication

Tags: Cybersecurity

Wake up call of week's cyberattacks ... how to avoid more
linkedin
May 15, 2017
The bad news is that the last week has seen an unprecedented number of ransomware attacks around the world which have hit some large organizations very hard.
The good news is that these particular attacks are entirely preventable with some easy short term steps, which are cornerstones of a larger cybersecurity strategy that can prevent others.

See publication

Tags: Cybersecurity

1 Book
Cybersecurity for commercial vehicles
SAE
May 26, 2019
One of several SME authors under Editor G. D'Anna

See publication

Tags: Autonomous Vehicles, Cybersecurity, Emerging Technology

2 Videos
Demo of CIS Mobile's altOS
CIS Mobile
April 23, 2020
Short video highlighting some of the key altOS features: Multiple Containers, Geofences, easy Provisioning, and web-based Management.

See publication

Tags: Cybersecurity, Mobility, Startups

Cyber Unsafe at Any Speed - The Need for Cybersecurity and Data Privacy Regulation for Motor Vehicles
SAE
April 05, 2017

See publication

Tags: Autonomous Vehicles, Cybersecurity, Emerging Technology

1 Webinar
Bastille and CIS Mobile: Enabling the Safe Use of Employees Cell phones in Secure Facilities
Bastille
May 27, 2021
Using Bastille with CIS Mobile's altOS solution can allow employees to safely bring personal cell phones into secure facilities. CIS Mobile's altOS "secure mode" solution can lock cell phone communication abilities when entered into the system. Then, with Bastille's cell phone, Wi-Fi, Bluetooth, and IoT detection capabilities, you can verify that the device in question is not actively transmitting in any of those modes.

See publication

Tags: Cybersecurity, Mobility, Govtech

Blog

Opportunities

Contact Simon Hartley

Book a Meeting

Media Kit

Share Profile

Contact Info

  Profile

Simon Hartley