About

SEP 2016:  Awarded the Cloud Security Alliance Fellowship: Cloud Security Alliance Honors Inaugural Research Fellows

 

Cesare GarlatiCesare Garlati is an internationally renowned leader in information security. Former Vice President of mobile security at Trend Micro, Cesare currently serves as Chief Security Strategist at prpl Foundation – a technology nonprofit dedicated to enabling security and interoperability of embedded systems. Prior to Trend Micro, Mr. Garlati held leadership positions within leading mobility companies such as iPass, Smith Micro Software and WaveMarket.  Prior to this, he was an engineering manager at Oracle, where he led the development of Oracle’s first cloud application and many other modules of the Oracle E-Business Suite.

Cesare has been frequently quoted in the press, including such media outlets as The Economist, Financial Times, The Register, The Guardian, ZD Net, SC Magazine, Computing and CBS News. An accomplished public speaker, Cesare also has delivered presentations and highlighted speeches at many events, including Embedded World, Mobile World Congress, Gartner Security Summits, IDC CIO Forums, CTIA Applications, CSA Congress and many editions of the RSA Conferences.

Cesare holds a Master in Business Administration from U.C Berkeley, a BS in Electrical Engineering and Computer Sciences, professional certifications from Microsoft, Cisco and Sun, and he is a Fellow of the Cloud Security Alliance.

 

Cesare’s biggest prediction for information security in the next 12 months: “The odds dictate that there will be a major security incident during 2017 due to the exploitation of vulnerabilities in the Internet of Things – in a worst case scenario these flaws will result in human fatalities.”

 

2016 – Named Research Fellow of the Cloud Security Alliance

2016 – Named “Embedded Top Innovator 2016” (Embedded Computing Design)

2015 – Appointed Chief Security Strategist at prpl Foundation

2013 – Named “Top BYOD Blogger” (IDG)

2013 – Named “Mobile industry’s top 180 influencers” (VentureBeat)

2011 – Named “Top 10 Consumerization Thought Leaders”

Join me on Twitter @CesareGarlati    Follow CesareGarlati on Twitter

 

 

PUBLIC SPEAKING

Smart Home Summit
November 15-16, 2017, Palo Alto, CA USA
“How to Secure the Smart Home”

ARM TechCon 2017
October 24-26, 2017, Santa Clara, CA USA
“Hypervisors: A Real Trend in Embedded, or Just Hype?”

SIIA – Deciphering IoT
July 25, 2017, San Francisco, CA USA
“Why IoT Security is so Critical”

IoT World 2017
May 16-18, 2017, Santa Clara, CA USA
“IoT Security – Working together Towards a Trustworthy IoT”

IoT World 2017
May 16-18, 2017, Santa Clara, CA USA
“The Only Way to do IoT Security: Layered Security”

IoT World 2017
May 16-18, 2017, Santa Clara, CA USA
“Overcoming privacy obstacles in the Smart Home”

IoT DevCon 2017
April 26-27, 2017, Santa Clara, CA USA
“How to Save the Smart Home from Cyber Invasion”

IoT Security Foundation
March 27, 2017, Santa Clara, CA USA
“In Silicon we Trust: How to Fix the Internet of Broken Things”

Embedded World Conference
March 14, 2017, Nuremberg, Germany
“How to fix embedded computing through Open Source”

Embedded World Conference
March 14, 2017, Nuremberg, Germany
“Hardware-based approach to embedded computing security”

Infosecurity Magazine Panel
February 2, 2017, London, UK
“Securing the Internet of Unnecessary Things”

IoT Security Foundation Conference
December 16, 2016, London, UK
“In Silicon we Trust: How to Fix the Internet of Broken Things”

RSA Conference
November 16, 2016, Abu Dhabi, UAE
“A new hardware-based approach to secure the Internet of Things”

The RANT Conference
November 3, 2016, London, UK
panel “The Internet of Things to be hacked”

Smart Home Summit
November 1, 2016, Palo Alto, US
panel “The imperative for transparency & trust”

IoT Security Summit
October 19, 2016, Boston, US
panel “Regulations and standards for IoT”

openWRT Summit
October 13, 2016, Berlin, DE
“Smart Home Security Report 2016”

Connect Security World
September 28, 2016, Marseilles, FR
“Critical security challenges in embedded computing”

Smart Summit London
September 22, 2016, London, UK
“How to fix the industrial IoT with silicon-layer security”
panel “Addressing Smart Home Security Concerns”

Cloud Connect China
September 21, 2016, Shanghai, CN
Keynote “A new hardware-level approach to fix the IoT”

IEEE SOCC Conference
September 8, 2016, Seattle, USA
“In silicon we trust – How to fix the IoT”

IoT Evolution
July 14, 2016, Las Vegas, USA
“Security by Separation in Embedded Devices”

Cloud Security Alliance Summit
May 18, 2016, Milan, Italy
Keynote “Securing the Internet of broken things”
Panel “Open Source Security”

IT Security Analyst and CISO Forum
April 19, 2016, London
Panel “How to keep IoT from damaging your business”

Imagination Summit Asia
November 13, 2015, Beijing, China
Keynote “Securing the Internet of (broken) Things”

Imagination Summit Asia
November 11, 2015, Shanghai, China
Keynote “Interoperable standards for IoT”

Embedded Linux Conference Europe
October 8, 2015, Dublin, Ireland
“Securing the Internet of (broken) Things”

Imagination Summit Asia
September 13, 2015, Taipei, Taiwan
“Securing the Internet of (broken) Things”

Imagination Summit Asia
September 11, 2015, Hsinchu, Taiwan
“Interoperable standards for IoT”

Imagination Summit Asia
September 9, 2015, Tokyo, Japan
“IoT Open Security Must Rule”

Infosecurity Magazine
July 7, 2015, Webinar
“Empower and Secure your Mobile Workforce”

Cloud and Mobile Security Forum
November 28, 2013, Stockholm
“BYOD and Mobile Security”

CSA Innovation Conference
July 18, 2013, Santa Clara, CA
“Cloud Security Innovation – How to Adopt It?”

SIIA AATC – All About The Cloud
May 7 – 9, 2013, San Francisco, CA
“Empowering Your Mobile Workforce”

Cloud Connect
April 2 – 5, 2013, Santa Clara, CA
“Security in the Mobile Cloud World”

VentureBeat Mobile Summit
April 1 – 2, 2013, San Francisco, CA
“What’s next for enterprise?”

AppNation
December 12, 2012 – San Francisco, CA
“The state of security in the mobile enterprise”

Mobile Device Security Conference
December 5 – 6, 2012 – London, UK
“Strategies for an enterprise MDM deployment”

Cloud Security Alliance Congress
November 7 – 8, 2012 – Orlando, FL
“Guidance on Mobile Computing and the Cloud”

RSA Conference
October 9-11, 2012 – London, UK
“Smartphone Security Winners & Losers”
“The Dark Side of BYOD”
“10 Reasons Not to Virtualize”

Mobile 2.0 Conference
September 11, 2012 – San Francisco, CA
“Mobile Enterprise & Consumerization of IT”

RSA Conference
August 28-29, 2012 – Chengdu, CN
“Smartphone Security Winners & Losers”

DIRECTION EXPO
August 7-8, 2012 – Tokyo, JP
“Mobile Security”

The Institution of Engineering and Technology
June 20, 2012 – London, UK
“Security for Mobile Devices”

Mobile Convention Amsterdam
May 8, 2012 – Amsterdam, NL
“Consumer Mobile Technology in the Enterprise: A leap of faith?”

TabTimes Tablet Strategy Conference
April 27, 2012 – New York, NY
“Secrets of a good corporate app”

Mobile World Congress
February 27 – March 1, 2012 – Barcelona, Spain
“Consumer technology in the enterprise: A leap of faith?”

IDC Enterprise mobileNext Forum
November 30 – December 1 2011, San Francisco, USA
“Mobility Management & Security ‐ A Customer Panel”

CTIA Enterprise Mobility Boot Camp
October 10 ‐ 13, 2011, San Diego, USA
“Consumerization Report 2011”

Gartner Security & Risk Management Summit
September 19–20 2011, London UK
“Embrace Consumerization. Unlock Opportunity”

Channel Link
September 14‐16 2011, Los Angeles USA
“Embrace Consumerization. Unlock Opportunity”

IDC CIO Summit
July 28‐29 2011, Singapore
“The Consumerization of IT: Embrace Consumerization, Unlock Opportunity”

Mobile Computing Summit
June 28‐30 2011, San Francisco USA
“Mobile Landscape Security Risks and Opportunities”

Gartner Security & Risk Management Summit
June 20–23 2011, Washington DC USA
“Virtualization, Consumerization, Security Three Worlds Collide?”

 

5 Responses to About

  1. Pingback: Embedded World 2017 – the IoT’s coming of age. | prpl.works

  2. Pingback: Dronejacking – a disaster waiting to happen. | BringYourOwnIT.com

  3. Pingback: The Internet of Things: Life-changing tech or a disaster waiting to happen? | prpl.works

  4. Pingback: IoT is already here – and it is broken | BringYourOwnIT.com

  5. Pingback: Mobile 2.0 San Francisco

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: