dc.contributor.author | Kuchynski, Dmitry | |
dc.contributor.author | Iskander, Yousef | |
dc.date.accessioned | 2016-10-18T17:09:54Z | |
dc.date.available | 2016-10-18T17:09:54Z | |
dc.date.issued | 2016-10-07 | |
dc.identifier.uri | http://hdl.handle.net/1853/55946 | |
dc.description | Presented on October 7, 2016 at 12:00 p.m. in the Klaus Advanced Computing Builidng, Room 1116W. | en_US |
dc.description | Dmitry Kuchynski serves as a security principal in Cisco Global Security Services Advisory. As a former public sector chief information security officer (CISO), Dmitry acts in CISO and chief security officer advisory role to private and public companies in the area of cyber risk quantification, communication to executive boards and public on cyber incidents and disclosure, IT security planning and budgeting. He develops and implements security strategies and program initiatives for CISOs, help address privacy standards and establish information security governance programs and compliance processes. | en_US |
dc.description | Yousef S. Iskander is a hardware security researcher with Cisco System's Advanced Security Initiatives Group where he focuses on security assessments of Cisco products. Yousef holds a Ph.D. in Computer Engineering from Virginia Tech, a Masters in Electrical and Computer Engineering from Georgia Tech, and a bachelor's degree in Electrical Engineering with a Minor in Mathematics from the University of Tennessee at Chattanooga. His research interests include trust and reliability in FPGAs, and reconfigurable and adaptive computing on FPGAs. | en_US |
dc.description | Runtime: 63:19 minutes | en_US |
dc.description.abstract | Cisco is a multi-national corporation that manufactures and sells networking and data center equipment that powers the world’s largest corporations, telecommunications providers, and national infrastructures. A majority of Cisco’s equipment contains custom Application Specific Integrated Circuits (ASICs) and logic in Field-Programmable Gate Arrays (FPGAs), as well as the millions of lines of software running on these proprietary platforms. All of these are key competitive differentiators. This presentation will discuss how Cisco is investing in preserving the integrity of these systems and platforms from the design stages, through a global supply and manufacturing chain, and onto customer premises. These platform protections need to prevent not just traditional market threats such as counterfeits, but unauthorized modification and tampering throughout the product’s lifecycle as well as the workloads and data entrusted to it. | |
dc.format.extent | 63:19 minutes | |
dc.language.iso | en_US | en_US |
dc.publisher | Georgia Institute of Technology | en_US |
dc.relation.ispartofseries | Cybersecurity Lecture Series | en_US |
dc.subject | Cybersecurity | en_US |
dc.subject | Product security | en_US |
dc.subject | Supply chain | en_US |
dc.title | Managing Product Security and Integrity in a Global Supply Chain | en_US |
dc.type | Lecture | en_US |
dc.type | Video | en_US |
dc.contributor.corporatename | Georgia Institute of Technology. Institute for Information Security & Privacy | en_US |
dc.contributor.corporatename | Cisco Security Group | en_US |