Events Add an event Speakers Talks Collections
 

Speakers

Sort by
Newest
Trending
1-30 of 71
1-30 of 71
Filter
Aggelos Kiayias
Chair in Cyber Security and Privacy at University of Edinburgh
#realworldcrypto, ada, ada coin, adrestia, algorand, algorithm, alia bhatt, anonymity, api, application layer, arpanet, association for computing machinery, auditorium, automation, bank, bitcoin, bitcoin network, bitcoin protocol, blockchain, blockchain protocol, blockchain technology, bluetooth, c-fund, cardano, certificate authority, chainlink, charles hoskinson, coin flipping, communication protocol, computer network, computer programming, computer security, consensus (computer science), control flow, cryptocurrency, cryptographic hash function, cryptography , dapps, decentralization, defi, domain name system, efficient energy use, encryption, entrepreneurship, eos, erc-20, ethereum, evidence-based design, fee, field (mathematics), financial transaction, flag, floor, food, for loop, formal verification, function (mathematics), gilbert and sullivan, goguen, governance, h.m.s. pinafore, haskell, haskell coding, hoskinson, hsbc, immutable object, implementation, incentive, inequality (mathematics), information, infrastructure, input output, input/output, international association for cryptologic research, internet, internet protocol suite, interoperability, iohk, jurisdiction, larry page, lawn, leadership, logistics, lunch, machine learning, mathematical optimization, mathematical proof, mathematics, matrix (mathematics), mean, mind, mining pool, mobile phone, modal logic, money, money laundering, multi-asset, multiplication, multistakeholder governance, native assets, net neutrality, network time protocol, neural network, news, number, online and offline, ouroboros, ouroborous, peter straub, polynomial, price, privacy, programming language, proof of stake, proof of work, public key certificate, public key infrastructure, public toilet, public-key cryptography, quality assurance, rail transport, randomness, reason, record linkage, reliability engineering, research, room, router (computing), routing, russian laundromat, science, shelley, simulation, smart contract, smart contracts, smartphone, software development, solidity, specification (technical standard), stipend, support vector machine, sustainability, system, telecommunication, tessellation, tezos, the lawn, vechain, visa inc., voltaire, wechat, wen, world wide web, youtube, zero of a function, zero-knowledge proof
Vint Cerf
VP, Chief Internet Evangelist at Google
ada, ada coin, adrestia, algorand, anthos, api, api management, apis, application modernization, arpanet, big data, bigquery, bitcoin protocol, blockchain, blockchain protocol, blockchain technology, c-fund, cardano, central processing unit, certificate authority, chainlink, charles hoskinson, cloud ai, cloud computing, cloud migration, cloud next 2020, cloud run, communication protocol, compute engine, computer network, computing, cost management, covid, covid-19, cryptocurrency, cyberwarfare, dapps, data analytics, data center, data management, data science, data security, defi, dei, devops, digital transformation, domain name system, email, encryption, enterprise data, eos, erc-20, ethereum, field-programmable gate array, g suite, gcp, gilbert and sullivan, goguen, google, google cloud, google cloud next, governance, graphics processing unit, h.m.s. pinafore, haskell, haskell coding, hoskinson, immutable object, infrastructure, input output, internet, internet bot, internet protocol suite, interoperability, iohk, jess leroy, jurisdiction, kubernetes , larry page, machine learning, malware, memory controller, mobile phone, multi-asset, multistakeholder governance, multitenancy, native assets, net neutrality, next onair, onair apac, operation management, ouroboros, palo alto networks, parallel computing, phishing, privacy, proof of stake, proof of work, public key certificate, public key infrastructure, public-key cryptography, remote workforce, router (computing), shelley, smart contracts, smartphone, software development, solidity, spamming, sre, sunil potti, telecommunication, tezos, usability, vechain, virtual private network, voltaire, wechat, wen, world wide web, youtube
Matthijs Hoekstra
Senior Program Manager Azure Identity at Microsoft
active directory, ankur patel, authentication, authenticator, background check, build, business, c1x9, credential, domain name system, down with sign-ups just sign-in! | od491, general data protection regulation, identity document, internet, internet privacy, matthijs hoekstra, microsoft, microsoft build, microsoft build 2021, microsoft developer, msft build, msft build 2021, multi-factor authentication, od491, on-demand, password, personal identification number, privacy, public key infrastructure, public-key cryptography, qr code, security, twitter, url redirection, user (computing), verifiable credentials, world wide web, youtube
Ankur Patel
Principal Program Manager at Microsoft
active directory, ankur patel, authentication, authenticator, background check, build, business, c1x9, credential, domain name system, down with sign-ups just sign-in! | od491, general data protection regulation, identity document, internet, internet privacy, matthijs hoekstra, microsoft, microsoft build, microsoft build 2021, microsoft developer, msft build, msft build 2021, multi-factor authentication, od491, on-demand, password, personal identification number, privacy, public key infrastructure, public-key cryptography, qr code, security, twitter, url redirection, user (computing), verifiable credentials, world wide web, youtube
Akash Modi
Senior Technical Program Manager at AWS
bank, computer security, computing, creativity, credit, cryptography , database, decentralization, digital signature, driving, energy development, engine, fleet management, fuso (company), infrastructure, life-cycle assessment, machine to machine, market (economics), public key infrastructure, self-driving car, transport, truck driver, vehicle registration plate
Zulfikar Ramzan
Chief Technology Officer at RSA
ai in finance, amazon web services, analytics, ananth madhavan, antivirus software, apple inc., application software, artificial neural network, authentication, automation, bank, bitcoin, blackrock, blockchain, bloomberg, bluetooth, certificate authority, christina qi, cluster analysis, computer security, computer virus, computing, configuration management database, consumer price index, covid-19 pandemic, credit card, cryptanalysis, cryptograph, cryptography , cybersecurity, database, day trading, differential privacy, diffie–hellman key exchange, digital identity, digital privacy, digital signature, domeyard fund, economics, elon musk, encryption, end user, ethics, exchange-traded fund, expectation of privacy, facebook, facial recognition system, federated identity, financial technology, flash boys, general data protection regulation, governance, identity assurance, identity management, immunity passport, index fund, information, information security, information theory, infosec, intel, internet of things, keith rabois, key (cryptography), key exchange, khosla ventures, liberty alliance, machine learning, malware, market (economics), market analysis, martin hellman, medical privacy, microcode, microsoft account, mit, mit ai conference, mitcnc, monopoly, multi-factor authentication, natural language processing, online shopping, password, peer-to-peer, post-quantum cryptography, precedent, prepaid mobile phone, price index, privacy, programming language, proof of work, psychological resilience, public key infrastructure, public-key cryptography, qr code, quantitative analysis (finance), quantum computing, quantum supremacy, ransomware, reason, recidivism, regulatory compliance, right to be forgotten, risk management, ron rivest, rsa, rsa (cryptosystem), rsac, rsaconference, secret sharing, secure multi-party computation, security, security hacker, security token, selina wang, sim card, sms, supervised learning, supply chain, supply chain attack, surveillance, telecommuting, trading room, transport layer security, trust (social science), underwriting, unsupervised learning, usability, venture capital, verifiable secret sharing, voter-verified paper audit trail, vulnerability (computing), web search engine, whitfield diffie, workforce, zulfikar ramzan
Mike Jankowski-Lorek
Director of Consulting at CQURE Inc.
api, application software, authentication, authorization, biometrics, certificate authority, client (computing), cloud computing, code signing, computer file, computer network, computer security, cybersecurity, data breach, data security, digital signature, dmz (computing), domain controller (windows), email, encryption, help desk, hypertext transfer protocol, information, infosec, internet, iris recognition, kodi (software), laptop, microsoft windows, modern identity hacking, multi-factor authentication, outlook.com, password, personal identification number, physical security, powershell, public key certificate, public key infrastructure, public-key cryptography, remote desktop services, rsa, rsac, rsaconference, security, server (computing), telecommuting, url redirection, user (computing), web browser, whatsapp, windows 10, world wide web
Graig Wright
Chief Scientist at nChain
advertising, aibcsummit, bernie madoff, bitcoin, bitcoin cash, bitcoin network, bitcoin sv, bitcoinsv, blackmail, blockchain, bounty (reward), bribery, bsv, btc, capitalism, child, child pornography, coingeek, coingeek london, coingeek london conference, communication protocol, computer, computer network, conference, contract, corruption, craig wright, craig wright satoshi, craigwright, credit card, crime, crypto, cryptocurrency, currency, cypherpunk, decentralization, developers, digital currency, digital signature, distributed computing, double-spending, ecology, electronic lock, email, encryption, eos.io, ethereum, evidence, explanation, exponential growth, facebook, fee, fentanyl, fiat money, financial transaction, fintech, fintect, fireside chat, firewall (computing), fraud, gateway (telecommunications), hacker, hbgary, heroin, hope, hyundai motor company, information, initial coin offering, internet, internet of things, internet protocol, internetwork packet exchange, investment, ip address, jimmy nguyen, julian assange, jurisdiction, kidnapping, law, liberty reserve, life imprisonment, london, malware, man-in-the-middle attack, message, micropayment, mining, monero, money, multiplayer video game, nakamoto, network packet, novell, online and offline, osi model, payment, paypal, peer-to-peer, pornography, price, privacy, proof of work, public key infrastructure, punishment, realsatoshi, reason, satoshi, satoshi nakamoto, security hacker, sentence (law), seoul, server (computing), silk road (marketplace), sms, south korea, statute of frauds, stock exchange, subsidy, taekwondo, technology, time, transmission control protocol, transport layer, u.s. securities and exchange commission, uk, ukraine, user datagram protocol, visa inc., web of trust, wikileaks, world of warcraft, world wide web
Clarence Liu
Chief Technology Officer at Tacen
android (operating system), apple id, apple inc., biometrics, bitcoin, blockchain, cash, cloud computing, commodity futures trading commission, computer, credential, decentralization, decentralized exchange, derivative (finance), education, email, entrepreneurship, facebook, financial transaction, futures contract, google, google account, hash function, instagram, insurance, interest, interest rate, internet, internet forum, ios, iris recognition, messaging apps, microsoft, mobile app, money, money laundering, money market, multi-factor authentication, peer-to-peer, privacy, property, public key infrastructure, public-key cryptography, smart contract, web browser, world wide web
Tiago Teles
ДолжностьSecurity Business Developer / InfoSec Evangelist at ABN AMRO Bank N.V.
#realworldcrypto, bloom filter, certificate revocation list, cloud computing, collision attack, cryptographic hash function, digital signature, elliptic curve digital signature algorithm, firefox, key management, kubernetes , load balancing (computing), md5, ocsp stapling, online certificate status protocol, padding (cryptography), payment card industry data security standard, post-quantum cryptography, public key certificate, public key infrastructure, public-key cryptography, rsa (cryptosystem), sha-1, sha-2, transport layer security, world wide web
Thyla van der Merwe
Managing Director at ETH Zürich
#realworldcrypto, bloom filter, certificate revocation list, cloud computing, collision attack, cryptographic hash function, digital signature, elliptic curve digital signature algorithm, firefox, key management, kubernetes , load balancing (computing), md5, ocsp stapling, online certificate status protocol, padding (cryptography), payment card industry data security standard, post-quantum cryptography, public key certificate, public key infrastructure, public-key cryptography, rsa (cryptosystem), sha-1, sha-2, transport layer security, world wide web
Christiane Peters
ДолжностьEMEA Data Security Services Lead at IBM
#realworldcrypto, bloom filter, certificate revocation list, cloud computing, collision attack, cryptographic hash function, digital signature, elliptic curve digital signature algorithm, firefox, key management, kubernetes , load balancing (computing), md5, ocsp stapling, online certificate status protocol, padding (cryptography), payment card industry data security standard, post-quantum cryptography, public key certificate, public key infrastructure, public-key cryptography, rsa (cryptosystem), sha-1, sha-2, transport layer security, world wide web
Dan Shumow
Software Development Engineer at Microsoft
#realworldcrypto, bloom filter, certificate revocation list, cloud computing, collision attack, cryptographic hash function, digital signature, elliptic curve digital signature algorithm, firefox, key management, kubernetes , load balancing (computing), md5, ocsp stapling, online certificate status protocol, padding (cryptography), payment card industry data security standard, post-quantum cryptography, public key certificate, public key infrastructure, public-key cryptography, rsa (cryptosystem), sha-1, sha-2, transport layer security, world wide web
Nadia Heninger
Associate Professor at University of California San Diego
#realworldcrypto, bloom filter, certificate revocation list, cloud computing, collision attack, cryptographic hash function, digital signature, elliptic curve digital signature algorithm, firefox, key management, kubernetes , load balancing (computing), md5, ocsp stapling, online certificate status protocol, padding (cryptography), payment card industry data security standard, post-quantum cryptography, public key certificate, public key infrastructure, public-key cryptography, rsa (cryptosystem), sha-1, sha-2, transport layer security, world wide web
Gaven Watson
Director - Advanced Cryptography, Visa Research at Visa
#realworldcrypto, bloom filter, certificate revocation list, cloud computing, collision attack, cryptographic hash function, digital signature, elliptic curve digital signature algorithm, firefox, key management, kubernetes , load balancing (computing), md5, ocsp stapling, online certificate status protocol, padding (cryptography), payment card industry data security standard, post-quantum cryptography, public key certificate, public key infrastructure, public-key cryptography, rsa (cryptosystem), sha-1, sha-2, transport layer security, world wide web
Gaëtan Leurent
Researcher at Inria
#realworldcrypto, authentication, ciphertext, cryptographic protocol, cryptography , curve25519, determinism, ethics, free and open-source software, go (programming language), hmac, internet standard, privacy, public key infrastructure, random number generation, random oracle, randomness, reverse engineering, scheme (programming language), secret sharing, sha-1, software , symmetric-key algorithm, transport layer security, web of trust, world wide web
Phillip Rogaway
Professor at UC Davis
#realworldcrypto, authentication, ciphertext, cryptographic protocol, cryptography , curve25519, determinism, ethics, free and open-source software, go (programming language), hmac, internet standard, privacy, public key infrastructure, random number generation, random oracle, randomness, reverse engineering, scheme (programming language), secret sharing, sha-1, software , symmetric-key algorithm, transport layer security, web of trust, world wide web
Jean-Philippe Aumasson
Kudelski Security
#realworldcrypto, authentication, block cipher, block cipher mode of operation, c++, ciphertext, collision (computer science), cryptographic hash function, cryptographic nonce, cryptographic protocol, cryptography , curve25519, determinism, ethics, feeling, free and open-source software, garbage collection (computer science), go (programming language), hash function, hmac, inspection, internet standard, key (cryptography), md5, password, pointer (computer programming), prediction, price, privacy, public key infrastructure, public-key cryptography, random number generation, random oracle, randomness, regulatory compliance, reverse engineering, scheme (programming language), secret sharing, sha-1, signal, software , software bug, specification (technical standard), stack (abstract data type), symmetric-key algorithm, tax, transport layer security, truth, web of trust, world wide web
Roberto Avanzi
Cryptology and Security Architect (Sr. Principal) at ARM
#realworldcrypto, block cipher mode of operation, ciphertext, cloud computing, computer file, cryptography , digital signature, disk partitioning, encryption, file system, fips 140-2, handshaking, hash function, key (cryptography), library (computing), microcontroller, operating system, plaintext, proprietary software, public key infrastructure, security token, software , tamperproofing, transport layer security, trusted computing, trusted platform module
Helena Handschuh
VP Security Technologies, Fellow at Rambus
#realworldcrypto, block cipher mode of operation, ciphertext, cloud computing, computer file, cryptography , digital signature, disk partitioning, encryption, file system, fips 140-2, handshaking, hash function, key (cryptography), library (computing), microcontroller, operating system, plaintext, proprietary software, public key infrastructure, security token, software , tamperproofing, transport layer security, trusted computing, trusted platform module
Jean-Baptiste Bédrune
Ledger at Head of Security Research
#realworldcrypto, block cipher mode of operation, ciphertext, cloud computing, computer file, cryptography , digital signature, disk partitioning, encryption, file system, fips 140-2, handshaking, hash function, key (cryptography), library (computing), microcontroller, operating system, plaintext, proprietary software, public key infrastructure, security token, software , tamperproofing, transport layer security, trusted computing, trusted platform module
Daniel Moghimi
PhD candidate in the Department of Electrical and Computer Engineering at Worcester Polytechnic Institute
#realworldcrypto, block cipher mode of operation, central processing unit, ciphertext, cloud computing, common criteria, computer file, computer network, computing, cryptanalysis, cryptography , digital signature, disk partitioning, elliptic curve digital signature algorithm, encryption, file system, fips 140-2, handshaking, hash function, instruction set architecture, interface (computing), international association for cryptologic research, internet, key (cryptography), library (computing), meltdown (security vulnerability), microcontroller, motherboard, openssl, operating system, plaintext, proprietary software, public key infrastructure, public-key cryptography, rsa (cryptosystem), security token, software , spectre (security vulnerability), tamperproofing, transport layer security, trusted computing, trusted platform module, virtual private network
Daniel Buchner
Technical Product Lead for Decentralized Identity at Microsoft
2019, belief, big data, bitcoin, blockchain, brady dale, business, certificate authority, coindesk, communication, communication protocol, computer network, conflict-free replicated data type, consensus, consensus (computer science), consensus 2019, cryptocurrency, cryptography , daniel buchner, database, decentralization, determinism, email, encryption, facebook, google drive, health insurance portability and accountability act, identifier, identity document, identity.com, incentive, information privacy, kadena, login, microsoft, password, personal data, personal message, phillip shoemaker, privacy, proof of work, public key infrastructure, public-key cryptography, replication (computing), routing, smart contract, social media, software , telecommunication, twitter, universe, user (computing), whatsapp, william martino, world wide web
Yorke Rhodes
Director Digital Transformation, Blockchain, Cloud Supply Chain at Microsoft
anonymity, apple inc., application software, arkansas, attention, audit, authentication, backup, bank, bing (search engine), bitcoin, blockchain, bond (finance), brand, business, carbon credit, cash, central bank, charging station, citizenship, citizenship of the united states, cloudflare, college, communication protocol, compiler, computer programming, consensys, consent, conversation, covid-19 pandemic, credential, credit, credit card, crime, criminal record, cryptocurrency, database, decentralization, definition, degree, demand, developers, digital identity, digital ownership, digital transformation, digital twin, education, employment, enterprise, epic, ethereum, fiat money, financial transaction, general data protection regulation, health informatics, homelessness, inductive charging, inflation, innovation, intellectual property, internet, internet of things, internet privacy, interoperability, inventory, kilowatt-hour, magento, market (economics), mass market, medicine, microsoft, microsoft visual studio, mind, mobile app, near-field communication, net neutrality, news, nfts, open-source software, organization, p2p, password, pegasys, personal data, plug-in hybrid, point of care, pretty good privacy, privacy, privacy and blockchain, property, psychology, public key certificate, public key infrastructure, public-key cryptography, reality, reason, regulatory compliance, reputation, risk, sales, science, self-driving car, siri, skype, startup company, supply chain, surveillance, sustainability, sustainable energy, tax, tech, technology, tim berners-lee, transparency (behavior), transport layer security, trust (social science), understanding, university, value proposition, venture capital, venture capital financing, walton, watson (computer), web 2.0, web browser, web of trust, web3, webassembly, wi-fi, world wide web, x.509, xbox one, yt:cc=on
Jonathan T Levi
Founder at HACERA
alternative investment, analytics, anonymity, api, application programming interface, automated teller machine, bank, bitcoin, blockchain, bloomberg l.p., browser game, cake, capital market, cash, citigroup, cloud computing, comma-separated values, computer, consent, conversation, credit, crowdfunding, cryptocarrency , cryptocurrency, cryptography , debit card, decentralization, digital identity, distributed computing, equation, ethereum, federal deposit insurance corporation, fee, financial transaction, general data protection regulation, health informatics, ibm cloud computing, input/output, integer, internet, internet of things, internet privacy, interoperability, inventory, investment banking, json, laptop, lexical analysis, line of credit, lobbying, market (economics), medicine, microsoft, mind, mortgage loan, oracle corporation, parameter, pdf, personal data, point of care, prediction, pretty good privacy, privacy, programmer, programming language, project jupyter, prototype, public key certificate, public key infrastructure, public-key cryptography, reality, regression analysis, research, right to be forgotten, risk, risk management, simulation, software , splunk, startup company, stock, surveillance, system, template (c++), thought, transparency (behavior), transport layer security, truth, united kingdom, watson (computer), web of trust, x.509, xml
Jonathan Holt
Chief Medical Informatics Officer (CMIO) & Identity Leader at ConsenSys Health
anonymity, blockchain, collective intelligence, computer security, consent, credential, cryptocurrency, digital identity, electronic health record, experiment, game theory, general data protection regulation, hackathon, health informatics, hypothesis, immunity passport, internet of things, internet privacy, interoperability, inventory, medical license, medicine, mentorship, mind, open source, open-source software, open-source-software movement, personal data, physician burnout, point of care, pretty good privacy, privacy, public key certificate, public key infrastructure, public-key cryptography, reality, shame, simulation, surveillance, transparency (behavior), transport layer security, watson (computer), web of trust, x.509
Gari Singh
CTO - Blockchain at IBM
aerospace, amazon (company), anonymity, arm architecture, authentication, blockchain, browser extension, business model, cache (computing), central processing unit, climate change mitigation, cloud computing, command-line interface, computer, computer network, computing, consensus (computer science), consent, counterfeit, cryptocurrency, database, devops, digital identity, digital signature, eddie vedder, encryption, ethereum, firefox, general data protection regulation, github, greenhouse gas, hardware security module, health informatics, honeywell, hyperledger, ibm, ibm cloud computing, ibm pc compatible, intel, interest, internet of things, internet privacy, interoperability, inventory, javascript, kubernetes , language, laptop, lenovo, linux distribution, matter, medicine, metadata, microsoft excel, mind, motorola, online and offline, open-source software, openshift, pearl jam, personal data, point of care, pretty good privacy, privacy, public key certificate, public key infrastructure, public-key cryptography, reality, red hat, reliability engineering, software , storytelling, surveillance, tablet computer, ticketmaster, time, transparency (behavior), transport layer security, value proposition, visual studio code, watson (computer), web of trust, world wide web, x.509
MacLane Wilkison
Founder at NuCypher
ansible (software), bank, blockchain, bond (finance), cipher, command-line interface, computer network, crypto, cryptocurrency, cryptography , decentralization, decentralized application, economics, fee, financial transaction, firefox, github, graphics processing unit, health care, hospital, hypertext transfer protocol, inflation, information privacy, infrastructure, insurance, kitchen, language, linux, market (economics), medical record, mobile payment, patient, peer-to-peer, privacy, proxy server, public key infrastructure, public-key cryptography, sales, security hacker, sms, software , stablecoin, staking, technology, venmo, web browser, wechat
Marek Olszewski
Partner at cLab
andreessen horowitz, art, bank, blockchain, blog, bond (finance), cloud computing, communication protocol, community, computer network, consensus (computer science), conversation, crypto, cryptocurrency, cryptography , data center, decentralization, decision-making, economics, entrepreneurship, ethereum, fee, financial transaction, imagination, inflation, information privacy, infrastructure, insight, interest, interoperability, investment, jeans, kubernetes , linux, machine learning, market (economics), mind, mobile payment, money, open-source software, patch (computing), peer-to-peer, privacy, proxy server, public key infrastructure, public-key cryptography, reality, reason, risk, rocket, sales, scalability, smart contract, sms, software , software bug, stablecoin, staking, sustainable business, technology, telephone, truth, venmo, venture capital, wechat, world wide web
Matthew Niemerg
President at Aleph Zero
access control, android (operating system), application software, blockchain, byzantine fault, communication protocol, consensus (computer science), crowdsourcing, cryptocurrency, cryptography , database, distributed computing, education, information, innovation, input/output, internet of things, interoperability, intuition, learning, machine learning, mathematics, mobile app, modularity, monetization, news, privacy, public key infrastructure, public-key cryptography, raw data, reason, red pill and blue pill, research, safety, secure multi-party computation, semantic web, smart contract, social media, software framework, usability, valuation (finance), world wide web
1 2 3
1-30 of 71