About

Cesare GarlatiCesare Garlati is an internationally renowned expert
in information security. Former Vice President of
mobile security at Trend Micro, Cesare currently
serves as Chief Security Strategist at prpl Foundation
– a technology nonprofit dedicated to enabling
security and interoperability of embedded systems.
Cesare is a long-time supporter of the RISC-V
Foundation, a key member of the RISC-V security
group and co-founder of Hex Five Security – the
creator of the first trusted execution environment for
RISC-V.

Cesare has been frequently quoted in the press,
including such media outlets as The Economist,
Financial Times, The Register, The Guardian, ZD
Net, SC Magazine, Computing and CBS News. An
accomplished public speaker, Cesare also has
delivered presentations and highlighted speeches at
many tier-1 events, including Embedded World
Conference, IoT World, Mobile World Congress,
Gartner Security Summits, IDC CIO Forums, CTIA
Applications, CSA Congress, DAC, IoT Innovation
and many editions of the RSA Conference –
the world’s leading information security event.

Cesare holds a U.C. Berkeley MBA, a Master in
Electrical Engineering and Computer Sciences,
professional certifications from Microsoft, Cisco and
Oracle, and he is a Fellow of the Cloud Security
Alliance, where he founded and chaired the Mobile
Security and IoT Security groups.

Cesare’s biggest prediction for information security in the next 12 months: “The odds dictate that there will be a major security incident during 2018 due to the exploitation of vulnerabilities in the Internet of Things – in a worst case scenario these flaws will result in human fatalities.”

2018 – Appointed member of the Embedded World Conference 2019 program committee

2018 – Appointed chair of the Developers Conference at IoT World 2018

2017 – Named Research Fellow of the Cloud Security Alliance

2016 – Named “Embedded Top Innovator 2016” (Embedded Computing Design)

2015 – Appointed Chief Security Strategist at prpl Foundation

2013 – Named “Top BYOD Blogger” (IDG)

2013 – Named “Mobile industry’s top 180 influencers” (VentureBeat)

2011 – Named “Top 10 Consumerization Thought Leaders”

Join me on Twitter @CesareGarlati    Follow CesareGarlati on Twitter

 

PUBLIC SPEAKING

Smart Home Summit
November 6-7, 2018, San Francisco
“Smart Home Interoperability”

China Cloud CIO Summit
September 12-13, 2018, Shanghai
“Keynote: Device to cloud security”

Design Automation Conference
June 24-28, 2018, San Francisco
“RISC-V Software Tools Ecosystem”

Design Automation Conference
June 24-28, 2018, San Francisco
“RISC-V Market opportunity in IoT and AI”

IoT World
May 14-17, 2018, Santa Clara, CA USA
“Chairman’s Opening – Developers Conference”

IoT Build
Mar 27-28, 2018, San Francisco
“Keynote: The $1B Industry’s Path to Interoperability”

Embedded World Conference
Feb 27 – Mar 1, 2018, Nuremberg, Germany
“Embedded Hypervisors: Hype or Reality?”

Embedded World Conference
Feb 27 – Mar 1, 2018, Nuremberg, Germany
“Benchmarking Embedded Hypervisors”

Embedded World Conference
Feb 27 – Mar 1, 2018, Nuremberg, Germany
“PUF: A New Way to Establish Trust in Silicon”

Embedded World Conference
Feb 27 – Mar 1, 2018, Nuremberg, Germany
“OpenWRT: How to Build a Linux Embedded System”

Embedded World Conference
Feb 27 – Mar 1, 2018, Nuremberg, Germany
“Live Hacking of a Linux Home Gateway”

Smart Home Summit
November 15-16, 2017, Palo Alto, CA USA
“How to Secure the Smart Home”

Smart Home Summit
November 15-16, 2017, Palo Alto, CA USA
“Security at the edge: properly secured devices defending the home”

ARM TechCon
October 24-26, 2017, Santa Clara, CA USA
“Hypervisors: A Real Trend in Embedded, or Just Hype?”

SIIA – Deciphering IoT
July 25, 2017, San Francisco, CA USA
“Why IoT Security is so Critical”

IoT World
May 16-18, 2017, Santa Clara, CA USA
“IoT Security – Working together Towards a Trustworthy IoT”

IoT World
May 16-18, 2017, Santa Clara, CA USA
“The Only Way to do IoT Security: Layered Security”

IoT World
May 16-18, 2017, Santa Clara, CA USA
“Overcoming privacy obstacles in the Smart Home”

IoT DevCon
April 26-27, 2017, Santa Clara, CA USA
“How to Save the Smart Home from Cyber Invasion”

IoT Security Foundation
March 27, 2017, Santa Clara, CA USA
“In Silicon we Trust: How to Fix the Internet of Broken Things”

Embedded World Conference
March 14, 2017, Nuremberg, Germany
“How to fix embedded computing through Open Source”

Embedded World Conference
March 14, 2017, Nuremberg, Germany
“Hardware-based approach to embedded computing security”

Infosecurity Magazine Panel
February 2, 2017, London, UK
“Securing the Internet of Unnecessary Things”

IoT Security Foundation Conference
December 16, 2016, London, UK
“In Silicon we Trust: How to Fix the Internet of Broken Things”

RSA Conference
November 16, 2016, Abu Dhabi, UAE
“A new hardware-based approach to secure the Internet of Things”

The RANT Conference
November 3, 2016, London, UK
panel “The Internet of Things to be hacked”

Smart Home Summit
November 1, 2016, Palo Alto, US
panel “The imperative for transparency & trust”

IoT Security Summit
October 19, 2016, Boston, US
panel “Regulations and standards for IoT”

openWRT Summit
October 13, 2016, Berlin, DE
“Smart Home Security Report 2016”

Connect Security World
September 28, 2016, Marseilles, FR
“Critical security challenges in embedded computing”

Smart Summit London
September 22, 2016, London, UK
“How to fix the industrial IoT with silicon-layer security”
panel “Addressing Smart Home Security Concerns”

Cloud Connect China
September 21, 2016, Shanghai, CN
Keynote “A new hardware-level approach to fix the IoT”

IEEE SOCC Conference
September 8, 2016, Seattle, USA
“In silicon we trust – How to fix the IoT”

IoT Evolution
July 14, 2016, Las Vegas, USA
“Security by Separation in Embedded Devices”

Cloud Security Alliance Summit
May 18, 2016, Milan, Italy
Keynote “Securing the Internet of broken things”
Panel “Open Source Security”

IT Security Analyst and CISO Forum
April 19, 2016, London
Panel “How to keep IoT from damaging your business”

Imagination Summit Asia
November 13, 2015, Beijing, China
Keynote “Securing the Internet of (broken) Things”

Imagination Summit Asia
November 11, 2015, Shanghai, China
Keynote “Interoperable standards for IoT”

Embedded Linux Conference Europe
October 8, 2015, Dublin, Ireland
“Securing the Internet of (broken) Things”

Imagination Summit Asia
September 13, 2015, Taipei, Taiwan
“Securing the Internet of (broken) Things”

Imagination Summit Asia
September 11, 2015, Hsinchu, Taiwan
“Interoperable standards for IoT”

Imagination Summit Asia
September 9, 2015, Tokyo, Japan
“IoT Open Security Must Rule”

Infosecurity Magazine
July 7, 2015, Webinar
“Empower and Secure your Mobile Workforce”

Cloud and Mobile Security Forum
November 28, 2013, Stockholm
“BYOD and Mobile Security”

CSA Innovation Conference
July 18, 2013, Santa Clara, CA
“Cloud Security Innovation – How to Adopt It?”

SIIA AATC – All About The Cloud
May 7 – 9, 2013, San Francisco, CA
“Empowering Your Mobile Workforce”

Cloud Connect
April 2 – 5, 2013, Santa Clara, CA
“Security in the Mobile Cloud World”

VentureBeat Mobile Summit
April 1 – 2, 2013, San Francisco, CA
“What’s next for enterprise?”

AppNation
December 12, 2012 – San Francisco, CA
“The state of security in the mobile enterprise”

Mobile Device Security Conference
December 5 – 6, 2012 – London, UK
“Strategies for an enterprise MDM deployment”

Cloud Security Alliance Congress
November 7 – 8, 2012 – Orlando, FL
“Guidance on Mobile Computing and the Cloud”

RSA Conference
October 9-11, 2012 – London, UK
“Smartphone Security Winners & Losers”
“The Dark Side of BYOD”
“10 Reasons Not to Virtualize”

Mobile 2.0 Conference
September 11, 2012 – San Francisco, CA
“Mobile Enterprise & Consumerization of IT”

RSA Conference
August 28-29, 2012 – Chengdu, CN
“Smartphone Security Winners & Losers”

DIRECTION EXPO
August 7-8, 2012 – Tokyo, JP
“Mobile Security”

The Institution of Engineering and Technology
June 20, 2012 – London, UK
“Security for Mobile Devices”

Mobile Convention Amsterdam
May 8, 2012 – Amsterdam, NL
“Consumer Mobile Technology in the Enterprise: A leap of faith?”

TabTimes Tablet Strategy Conference
April 27, 2012 – New York, NY
“Secrets of a good corporate app”

Mobile World Congress
February 27 – March 1, 2012 – Barcelona, Spain
“Consumer technology in the enterprise: A leap of faith?”

IDC Enterprise mobileNext Forum
November 30 – December 1 2011, San Francisco, USA
“Mobility Management & Security ‐ A Customer Panel”

CTIA Enterprise Mobility Boot Camp
October 10 ‐ 13, 2011, San Diego, USA
“Consumerization Report 2011”

Gartner Security & Risk Management Summit
September 19–20 2011, London UK
“Embrace Consumerization. Unlock Opportunity”

Channel Link
September 14‐16 2011, Los Angeles USA
“Embrace Consumerization. Unlock Opportunity”

IDC CIO Summit
July 28‐29 2011, Singapore
“The Consumerization of IT: Embrace Consumerization, Unlock Opportunity”

Mobile Computing Summit
June 28‐30 2011, San Francisco USA
“Mobile Landscape Security Risks and Opportunities”

Gartner Security & Risk Management Summit
June 20–23 2011, Washington DC USA
“Virtualization, Consumerization, Security Three Worlds Collide?”

 

7 Responses to About

  1. Pingback: RISC-V security: First piece of the puzzle falls into place | BringYourOwnIT.com

  2. Pingback: When IoT Attacks – The End of the World as We Know It? | BringYourOwnIT.com

  3. Pingback: Embedded World 2017 – the IoT’s coming of age. | prpl.works

  4. Pingback: Dronejacking – a disaster waiting to happen. | BringYourOwnIT.com

  5. Pingback: The Internet of Things: Life-changing tech or a disaster waiting to happen? | prpl.works

  6. Pingback: IoT is already here – and it is broken | BringYourOwnIT.com

  7. Pingback: Mobile 2.0 San Francisco

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: