Show simple item record

dc.contributor.authorKuchynski, Dmitry
dc.contributor.authorIskander, Yousef
dc.date.accessioned2016-10-18T17:09:54Z
dc.date.available2016-10-18T17:09:54Z
dc.date.issued2016-10-07
dc.identifier.urihttp://hdl.handle.net/1853/55946
dc.descriptionPresented on October 7, 2016 at 12:00 p.m. in the Klaus Advanced Computing Builidng, Room 1116W.en_US
dc.descriptionDmitry Kuchynski serves as a security principal in Cisco Global Security Services Advisory. As a former public sector chief information security officer (CISO), Dmitry acts in CISO and chief security officer advisory role to private and public companies in the area of cyber risk quantification, communication to executive boards and public on cyber incidents and disclosure, IT security planning and budgeting. He develops and implements security strategies and program initiatives for CISOs, help address privacy standards and establish information security governance programs and compliance processes.en_US
dc.descriptionYousef S. Iskander is a hardware security researcher with Cisco System's Advanced Security Initiatives Group where he focuses on security assessments of Cisco products. Yousef holds a Ph.D. in Computer Engineering from Virginia Tech, a Masters in Electrical and Computer Engineering from Georgia Tech, and a bachelor's degree in Electrical Engineering with a Minor in Mathematics from the University of Tennessee at Chattanooga. His research interests include trust and reliability in FPGAs, and reconfigurable and adaptive computing on FPGAs.en_US
dc.descriptionRuntime: 63:19 minutesen_US
dc.description.abstractCisco is a multi-national corporation that manufactures and sells networking and data center equipment that powers the world’s largest corporations, telecommunications providers, and national infrastructures. A majority of Cisco’s equipment contains custom Application Specific Integrated Circuits (ASICs) and logic in Field-Programmable Gate Arrays (FPGAs), as well as the millions of lines of software running on these proprietary platforms. All of these are key competitive differentiators. This presentation will discuss how Cisco is investing in preserving the integrity of these systems and platforms from the design stages, through a global supply and manufacturing chain, and onto customer premises. These platform protections need to prevent not just traditional market threats such as counterfeits, but unauthorized modification and tampering throughout the product’s lifecycle as well as the workloads and data entrusted to it.
dc.format.extent63:19 minutes
dc.language.isoen_USen_US
dc.publisherGeorgia Institute of Technologyen_US
dc.relation.ispartofseriesCybersecurity Lecture Seriesen_US
dc.subjectCybersecurityen_US
dc.subjectProduct securityen_US
dc.subjectSupply chainen_US
dc.titleManaging Product Security and Integrity in a Global Supply Chainen_US
dc.typeLectureen_US
dc.typeVideoen_US
dc.contributor.corporatenameGeorgia Institute of Technology. Institute for Information Security & Privacyen_US
dc.contributor.corporatenameCisco Security Groupen_US


Files in this item

This item appears in the following Collection(s)

Show simple item record