Thinkers360
Interested in getting your own thought leader profile? Get Started Today.

Simon Hartley

Strategic Sales altOS Platform at CIS Mobile

Washington D.C., United States

5913 Followers

Simon has been captivated by innovation since first setting eyes on an Apple II in grade school. Today, he works with US government customers at CIS Mobile with its altOS mobile security platform.

Previously, he worked with Apple and Samsung in hardening their mobile devices for US Government use, and is a frequent speaker on cybersecurity at industry events. He was VP and Co-Founder of startup RunSafe Security, VP at startup Kaprica Security (exited to Samsung), and Mobile Program Director at DMI, managed mobility market leader.

Simon began his career in nuclear software engineering then executive roles at HP, Red Hat, and Capgemini. He holds BS, MS, and MBA degrees, along with several cybersecurity and privacy certifications.

? Expert in scaling emerging tech for government, energy, transport, finance, and health.
? Experienced in enterprise software management, marketing, and sales leadership.
? Skilled in cybersecurity, mobility, and IoT with cloud, AI/ML, and compliance standards.

Simon HartleyPoints
Academic0
Author66
Influencer59
Speaker0
Entrepreneur0
Total125

Points based upon Thinkers360 patent-pending algorithm.

Thought Leader Profile

Portfolio Mix

Company Information

Company Type: Enterprise
Email: sales@cismobile.com
Phone: 703-996-0500

Areas of Expertise

Autonomous Vehicles 100
Business Strategy
Cloud 30.19
Cybersecurity 39.53
Emerging Technology 41.10
Entrepreneurship
Fintech 30.28
Govtech
Innovation
IoT 30.33
Lean Startup
Management
Marketing
Mobility 30.40
Risk Management 30.39
Sales
Startups
Supply Chain 30.30
Data Center 31.49

Industry Experience

Automotive
Federal & Public Sector
Financial Services & Banking
Healthcare
High Tech & Electronics
Oil & Gas
Telecommunications
Travel & Transportation
Utilities

Publications

13 Article/Blogs
Golidlocks problem of mobile device security in organizations
IIoT
October 28, 2019
The theme is trade-offs between usability of the device and security for confidential organizational data such as conversations, messages, documents, images, and locations.

See publication

Tags: Cybersecurity, Mobility

Securing Mobile Devices
Enterprise Tech Success
September 06, 2019
Article covers the wavetops of mobile device cybersecurity and privacy from three perspectives of increasing sensitivity to risk -- consumers, business, and government organizations.

See publication

Tags: Cybersecurity, Mobility, Supply Chain

Smartphones, execs, & travel overseas
Linkedin
July 09, 2019
Security precautions for enterprise mobile devices.

See publication

Tags: Cybersecurity, Risk Management

The Cyber Risk to a Critical Part of Our Economy and Supply Chain: Commercial Trucking
RunSafe Security
April 11, 2019
12 million trucks, or about 5% of vehicles on U.S. roads, are aggregated into fleets for government or commercial use. About 42% of these are connected with telematics Fleet Management System (FMS) for efficiency and compliance with government Electronic Logging Data (ELD) requirements. Typical FMS data captured includes miles driven, time of day, Global Positioning System (GPS) location, speed, any rapid acceleration, hard braking, hard cornering, and collision detection. Fleets are often early adopters of ADAS (Advanced Driver Assistance Systems) features that promote safety. The unintended consequence of ADAS adoption however is that computers are at the controls.

See publication

Tags: Cybersecurity, Emerging Technology, Autonomous Vehicles

The Common Vulnerability That Fintech and Bananas Share
RunSafe Security
January 08, 2019
Fintech is defined by technologies that span the cloud, mobile devices, blockchain, and AI for financial applications ranging from virtual currencies, to payment processing, money transfers, equity trading, and regulatory compliance, among others.

See publication

Tags: Autonomous Vehicles, Cybersecurity, Fintech

Data centers must look past perimeter security
Data Center Dynamics
August 10, 2018
While data centers have traditionally relied on detection and perimeter security solutions to reduce risk, the proliferation of new types of cyber threats has elevated the need for prevention

See publication

Tags: Cloud, Cybersecurity, Emerging Technology, Data Center

Want to stop cyber attacks? Why are all of your executables the same?
linkedin
May 14, 2018
Mirror, mirror on the wall
When I go to download my favorite app from the vendor’s website, or App Store, and click on the latest version, say 2018.101 for Mac, I get the same version and functionality as millions of other users.

See publication

Tags: Cybersecurity

Supply chain cyberattacks surging -- How can we prevent them?
linkedin
April 02, 2018
Symantec's new "Internet Security Threat Report," shows a 200% increase in reported supply chain cyberattacks year on year [i]. A supply chain attack seeks to damage an organization by targeting vulnerable elements in its global supply network. For example, auto suppliers’ contribution to vehicle has increased from 56% in the 1980s to over 80% today. The supply chain issue is the same whether the organization is involved in automotive, critical infrastructure, Industrial Internet of Things (IIoT), medical devices, or national security.

See publication

Tags: Cybersecurity

Cybersecurity – a gating issue for safety in a connected and automated vehicle future
Telematics Wire
October 19, 2017
Connected, partially and fully automated vehicles hold the potential to transform our lives, making real smart cities and ushering in undreamed-of efficiencies in the transport of people and goods by land and in the futures, air, and even space. Where things go wrong, however, potential harms are much greater than those of historical data breaches around mobile devices, laptops, desktops and the cloud.

See publication

Tags: Autonomous Vehicles, Cybersecurity, Emerging Technology

Top 5 tips to mitigate phone and IoT device hacking in government and enterprise
linkedin
October 17, 2017
There is a growing need for cybersecurity tools to be more effective and for coverage to extend beyond older infrastructures to cover mobile and Internet of Things (IoT) devices. Some of these tool vendors will be well-known veterans of the personal computer / data center era and others will be startups, springing up to cover gaps in the market. A recent report by Gartner quantifies the growing threat to mobile devices - “by 2019, mobile malware will amount to one-third of total malware reported in standard tests, up from 7.5% today” [1].

See publication

Tags: Cybersecurity, IoT, Data Center

Securing the Data Center on Wheels
Infosecurity Magazine
August 24, 2017
Today’s connected car is not so much a smartphone on wheels; with so many microprocessors chatting with one another across and beyond the vehicle, it is now more aptly described as a data center on wheels.

See publication

Tags: Cybersecurity, Autonomous Vehicles, Data Center

Why try to defend against new cyber threats with only legacy technologies?
linkedin
July 19, 2017
Cybersecurity has an asymmetry of economics - defenders must defend everything but attackers need find just one-way in … and it need not be one seen before. Attackers are updating methods more, attacking more and impacting more devices and people.

See publication

Tags: Cybersecurity

Wake up call of week's cyberattacks ... how to avoid more
linkedin
May 15, 2017
The bad news is that the last week has seen an unprecedented number of ransomware attacks around the world which have hit some large organizations very hard.
The good news is that these particular attacks are entirely preventable with some easy short term steps, which are cornerstones of a larger cybersecurity strategy that can prevent others.

See publication

Tags: Cybersecurity

1 Book
Cybersecurity for commercial vehicles
SAE
May 26, 2019
One of several SME authors under Editor G. D'Anna

See publication

Tags: Autonomous Vehicles, Cybersecurity, Emerging Technology

1 Video
Cyber Unsafe at Any Speed - The Need for Cybersecurity and Data Privacy Regulation for Motor Vehicles
SAE
April 05, 2017

See publication

Tags: Autonomous Vehicles, Cybersecurity, Emerging Technology

Blog

Opportunities

Contact Simon Hartley

Media Kit

Share Profile

Contact Info

  Profile

Simon Hartley