Simon Hartley

Simon Hartley

Washington DC-Baltimore Area
11K followers 500+ connections

About

Simon Hartley is an alum of successful startups and Fortune 100 companies, an expert in…

Articles by Simon

Activity

Join now to see all activity

Experience

  • IBM Graphic

    IBM

    Bethesda, Maryland, United States

  • -

    Washington DC-Baltimore Area

  • -

    Washington DC-Baltimore Area

  • -

    Ashburn, Virginia, United States

  • -

    McLean, Virginia, United States

  • -

    College Park, Maryland, United States

  • -

    Bethesda, Maryland, United States

  • -

    Dallas, Texas, United States

Education

  • University of Maryland - Robert H. Smith School of Business Graphic

    University of Maryland - Robert H. Smith School of Business

    Worked full time while studying in-person in a program accenting leadership, cross-functional problem solving, and executive coaching.

  • Worked full time while studying in-person for the first advanced degree to focus on the law and policy of cybersecurity.

  • Physics was a great foundation for analyzing complex problems and leveraging quantitative tools. Manchester, England, is where Rolls met Royce, the atom was split, and the first programmable computer was built.

  • -

    Working full time while studying in the first degree of its kind to be offered by a US tier-one research university (R1) part-time and 100% online.

Licenses & Certifications

Volunteer Experience

  • Rancher Labs Graphic

    Customer Advisory Board

    Rancher Labs

    - 3 years

    Science and Technology

    The SUSE-Rancher Government Solution (RGS) Customer Advisory Board (CAB) was established as a forum for Federal IT leaders and execs to provide strategic guidance to the SUSE exec management team.

  • Volunteer

    AFCEA -- Quantum Working Group

    - 1 year 7 months

    The Armed Forces Communications & Electronics Association International (AFCEA) is a nonprofit membership association serving the military, government, industry, and academia as a forum for advancing professional knowledge and relationships in the fields of communications, information technology, intelligence and global security.

  • Volunteer

    ACT-IACT -- Quantum Working Group

    - 1 year 7 months

    The American Council for Technology (ACT) and Industry Advisory Council (IAC) is a non-profit forum where government and industry exchange information and collaborate on technology issues in the public sector.

  • QED-C Graphic

    Volunteer

    QED-C

    - 3 years

    Science and Technology

    QED-C is a consortium of stakeholders that aims to enable and grow the U.S. quantum industry.

  • SmartCity2030 Graphic

    Advisor

    SmartCity2030

    - 2 years

    Science and Technology

    IoT and signals improving cities

  • Quantum Trilogy Graphic

    Advisor

    Quantum Trilogy

    - 1 year 1 month

    Science and Technology

    Hardening messaging platforms.

  • MACH37 Cyber Accelerator Graphic

    Ambassador

    MACH37 Cyber Accelerator

    - 2 years

    Science and Technology

    Forbes calls it the "granddaddy of cybersecurity accelerators." Kaprica Security, RunSafe Security, and Quantum Trilogy are just some of the alums of the program I am proud to have worked with.

  • SAE International Graphic

    G-32 Cyber-Physical Systems Security (CPSS) Committee Volunteer

    SAE International

    - Present 6 years

    Science and Technology

    G-32 addresses the need for cross-industry collaboration for Cyber-Physical Systems Security -- particular emphasis on supply chain integrity.

  • SAE International Graphic

    Cybersecurity Internet of Things (IoT) Committee Volunteer

    SAE International

    - 2 years

    Science and Technology

Publications

  • Cybersecurity for Entrepreneurs Book

    SAE International

    Wrote "Securing Your Communications" chapter for editors Gloria D'Anna and Zachary Collier, which is about to be released 4/1/2023.

    Communication with stakeholders is the heart of business. We all need to stay in touch with the folks who are helping us grow, whether customers, prospects, partners, investors, or reviewers. An initial contact becomes a meeting, a demo, and a sale, or plants a seed for the future in a self-reinforcing spiral of success.

    Business communications…

    Wrote "Securing Your Communications" chapter for editors Gloria D'Anna and Zachary Collier, which is about to be released 4/1/2023.

    Communication with stakeholders is the heart of business. We all need to stay in touch with the folks who are helping us grow, whether customers, prospects, partners, investors, or reviewers. An initial contact becomes a meeting, a demo, and a sale, or plants a seed for the future in a self-reinforcing spiral of success.

    Business communications range from traditional events, face-to-face meetings, and calls to a myriad of electronic channels, from webinars and social media, to emails, instant messaging, and texts. Post Covid, there has been a shift towards more electronic contacts. The ideal there is to foster communications and avoid extremes like ignoring unfamiliar channels or forcing everything to being a phone call. Worst of all might be inadvertently sharing too much to scammers pretending to be someone else.

    Maintaining the confidentiality, integrity (no tampering), and availability of digital communications (the so-called “CIA” triad) need not be a “007” level of effort (although that is the international dialing code for Russia). It can be achieved affordably and easily with a thoughtful set of security principles, cloud-based tool choices, and the setups detailed below. Ease of use is a key theme since it is the security that you use that matters most, not that “shelf ware” service that you are paying for but never setup.

    Other authors
    See publication
  • Thinkers360 interview

    Thinkers360

    My days are varied, focusing on the quantum needs of customers, partners, academia, events, and in coordinating with the global teams of PHDs, product managers, and engineers that make the magic possible at Quantinuum.

    See publication
  • Foundations of Zero Trust Architecture (ZTA): Key Hardening from Verifiable Quantum Physics

    ATARC

    Quantum Working Group Speaker Series: Simon Hartley

    Join ATARC as we continue our Quantum Working Group Speaker Series with Simon Hartley. Simon recently joined Cambridge Quantum in the role of US Cybersecurity Sales & Business Development. The new “Quantinuum” startup is US-owned, has $300+ million of funding, 150+ PHDs, and combines the world class Cambridge Quantum software and Honeywell Quantum hardware. During this talk we will discuss the security of today’s digital experiences…

    Quantum Working Group Speaker Series: Simon Hartley

    Join ATARC as we continue our Quantum Working Group Speaker Series with Simon Hartley. Simon recently joined Cambridge Quantum in the role of US Cybersecurity Sales & Business Development. The new “Quantinuum” startup is US-owned, has $300+ million of funding, 150+ PHDs, and combines the world class Cambridge Quantum software and Honeywell Quantum hardware. During this talk we will discuss the security of today’s digital experiences that rely on layers of security infrastructure. Their foundations are key management, encryption algorithms, and key generation. While the first two are frequently discussed, the issue of predictability in key generation itself is much less well known. This talk focuses on verifiable, tamper proof, and hardware independent key hardening from quantum physics that can easily be added to existing infrastructure, both classical and post quantum.

    See publication
  • Enabling the Safe Use of Employees Cell phones in Secure Facilities

    Bastille and CIS Mobile

    Using Bastille with CIS Mobile's altOS solution can allow employees to safely bring personal cell phones into secure facilities. CIS Mobile's altOS "secure mode" solution can lock cell phone communication abilities when entered into the system. Then, with Bastille's cell phone, Wi-Fi, Bluetooth, and IoT detection capabilities, you can verify that the device in question is not actively transmitting in any of those modes.

    Other authors
    • Dr Bob Baxley
    See publication
  • Who Controls Your Smartphone?

    Open Health News

    Why are mobile devices less customizable than PCs? There are two reasons for this: The bundling of Options and the monetization of Personal Data.

    See publication
  • Golidlocks problem of mobile device security in organizations

    IIoT World

    This article considers mobile device security for organizations.

    See publication
  • Securing mobile devices

    Enterprise Tech Success

    Article covers the wavetops of mobile device cybersecurity and privacy from three perspectives of increasing sensitivity to risk -- consumers, business, and government organizations.

    See publication
  • Data centers must look past perimeter security

    Data Center Dynamics

    While data centers have traditionally relied on detection and perimeter security solutions to reduce risk, the proliferation of new types of cyber threats has elevated the need for prevention

    See publication
  • Cybersecurity for Commercial Vehicles Book

    SAE International

    Wrote "Law, Policy, Cybersecurity, and Data Privacy" chapter for editor Gloria D'Anna. Cybersecurity for all segments of the commercial vehicle industry requires comprehensive solutions to secure networked vehicles and the transportation infrastructure. It clearly demonstrates the likelihood that an attack can happen, the impacts that would occur, and the need to continue to address those possibilities. This multi-authored presentation by subject-matter experts provides an interesting and…

    Wrote "Law, Policy, Cybersecurity, and Data Privacy" chapter for editor Gloria D'Anna. Cybersecurity for all segments of the commercial vehicle industry requires comprehensive solutions to secure networked vehicles and the transportation infrastructure. It clearly demonstrates the likelihood that an attack can happen, the impacts that would occur, and the need to continue to address those possibilities. This multi-authored presentation by subject-matter experts provides an interesting and dynamic story of how industry is developing solutions that address the critical security issues; the key social, policy, and privacy perspectives; as well as the integrated efforts of industry, academia, and government to shape the current knowledge and future cybersecurity for the commercial vehicle industry.

    Other authors
    See publication
  • Cybersecurity – a gating issue for safety in a connected and automated vehicle future

    Telematics Wire

    Connected, partially and fully automated vehicles hold the potential to transform our lives, making real smart cities and ushering in undreamed-of efficiencies in the transport of people and goods by land and in the futures, air, and even space. Where things go wrong, however, potential harms are much greater than those of historical data breaches around mobile devices, laptops, desktops and the cloud.

    See publication
  • Securing the Data Center on Wheels

    Info Security Magazine

    Today’s connected car is not so much a smartphone on wheels; with so many microprocessors chatting with one another across and beyond the vehicle, it is now more aptly described as a data center on wheels.

    See publication

Honors & Awards

  • Simon Hartley - Top 50 Global Cybersecurity Influencers

    Thinkers 360

  • Simon Hartley - Top 50 Govtech thought leader 2022

    Thinkers360

    https://www.linkedin.com/posts/quantinuumqc_top-50-global-thought-leaders-and-influencers-activity-6993589181939679233-PT49?utm_source=share&utm_medium=member_desktop

  • Simon Hartley - Top 50 Mobility Thought Leader & Influencer (January 2022)

    Thinkers360

    https://www.linkedin.com/posts/thinkers360_top-50-global-thought-leaders-and-influencers-activity-6883813058444181505-6UnM

  • CIS Mobile - DHS Astor Gold Award Winner - Best Mobile Technology Product

    Department of Homelands Security

    https://viewer.joomag.com/ast-edition-59/0595174001633880288/p36?short&

  • Simon Hartley - Top 50 GovTech Thought Leader & Influencer (November 2021)

    Thinkers 360

    https://www.thinkers360.com/top-50-global-thought-leaders-and-influencers-on-govtech-november-2021/

  • CIS Mobile - Awarded Air Force Advanced Battle Management System (ABMS) Contract

    United States Air Force

    CIS Mobile, a wholly-owned subsidiary of CIS Secure, has been awarded a $950,000,000 ceiling indefinite-delivery/indefinite-quantity contract for the maturation, demonstration and proliferation of capability across platforms and domains, leveraging open systems design, modern software and algorithm development in order to enable Joint All Domain Command and Control (JADC2).

  • Simon Hartley - Top 50 Global Thought Leaders and Influencers on Mobility (January 2021)

    Thinkers 360

    Mobility Category

  • Simon Hartley - Top 10 Global Thought Leaders and Influencers on Cybersecurity

    Thinkers360

    Automated Vehicle Category

  • CIS Mobile - Selected by AFRL to develop a secure mobility platform for the US Air Force.

    USAF

    https://cismobile.com/air-force-research-laboratory-selected-cis-mobile-to-develop-a-secure-mobility-platform/

  • RunSafe - CyberTacos Cybersecurity Impact Award

    CyberTacos

  • RunSafe - Network World Top 10 hot IoT security startups to watch

    Network World

  • Simon Hartley - Top 20 Global Thought Leaders and Influencers on Cybersecurity

    Thinkers 360

  • RunSafe - DCA Red Hot Cyber Security Company

    DCA Live

  • RunSafe - GWIA Cybersecurity Innovator of the Year

    Greater Washington Innovation Awards

  • RunSafe - Forrester Key Innovator RASP Global Forecast to 2022

    Forrester Research

  • Kaprica - Recognized as Samsung Gold Partner

    Samsung

  • Kaprica - Gartner Critical capabilities for high-security mobility management

    Gartner

  • Kaprica - Chosen by DARPA to help improve vehicle security

    DARPA

  • Thursby - Selected as Defense Information Systems Agency (DISA) Two-Factor CAC (Common Access Card) Authenticator for Apple iOS mobile devices

    DISA

Languages

  • English

    Native or bilingual proficiency

  • Spanish

    Limited working proficiency

  • French

    Full professional proficiency

Organizations

  • 202 Strong - CrossFit fitness

    Member

  • ATARC - Advanced Technology Academic Research Center

    Advisor

  • Auto ISAC

    Member

  • EC Council - International Council of Electronic Commerce Consultants

    Member

  • FBI InfraGard - US Critical Infrastructure Security

    Member

  • IAPP - International Association of Privacy Professionals

    Member

  • ISACA - Information Systems Audit and Control Association,

    Member

  • ISC2 - International Information System Security Certification Consortium

    Member

  • MACH37 - Grandaddy of cybersecurity accelerators

    Advisor

  • Maryland Jeet Kune Do and Kali - martial arts

    Member

  • SAE - Society of Automotive Engineers

    Member

Recommendations received

More activity by Simon

View Simon’s full profile

  • See who you know in common
  • Get introduced
  • Contact Simon directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named Simon Hartley