The security threats to electronic systems grow with each passing day. Headline-generating exploits like Spectre, Meltdown and Foreshadow will inevitably be followed by other vulnerabilities that put systems and data at risk. Attackers grow ever more sophisticated and have growing motivation for compromising systems and critical technologies for financial gain or cyberterrorism. In this lunch-and-learn, we’ll cover key topics for securing electronic systems and devices in this dynamic threat environment:
Please join us for a commercially-focused Lunch & Learn coming to a city near you for an opportunity to meet with our Rambus security experts.
Munich
NH Hotel Munchen Airport
Lohstraße 21, 85445
Schwaig/Oberding
Postponed – Date TBD
Stuttgart
WÖLLHAF Conference and Banquet Center
Stuttgart Airport
Postponed – Date TBD
Ben Levine has over twenty years of experience in security, ASIC design, and system architecture. Dr. Levine joined Cryptography Research, Inc, in 2008, prior to its acquisition by Rambus in 2011. His work there has included content protection, anti-counterfeiting, anti-tamper, and hardware roots of trust. Prior to joining Cryptography Research, he was Director of Engineering at Rapport, Inc., a fabless semiconductor company commercializing massively parallel reconfigurable computing architectures that he helped develop at Carnegie Mellon University (CMU). Before his work in industry, he was a research faculty member at CMU and an Assistant Professor at the University of Pittsburgh. He has a B.S and M.S in Electrical Engineering from the University of Tennessee, Knoxville, and a Ph.D. in Electrical and Computer Engineering from CMU.
Ben Levine, Ph.D.
Senior Director, Product Management, Rambus
Mark Marson has over 25 years of experience in developing security solutions for commercial and classified applications. As Technical Director at Cryptography Research he contributes his expertise on cryptography, side-channel analysis and hardware security applications.
Trained in cryptography and cryptanalysis, Dr. Marson has additional expertise in hardware and software design. He previously worked at the National Security Agency for over 6 years as a senior cryptographer, and for 5 years at Raytheon’s Space and Airborne division developing anti-tamper systems.
Dr. Marson received his undergraduate degree in mathematics from SUNY Binghamton, and his Ph.D. in mathematics from UC San Diego.
Mark Marson, Ph.D.
Technical Director, Cryptography, Rambus
Steve Singer is a senior director of field applications engineering at Rambus, and a well-recognized expert in embedded security with design experience encompassing the protection of semiconductors, mobile devices, networking equipment and the Internet of Things. Steve began his embedded security career at SafeNet in 2001 as a Staff ASIC Design Engineer where he worked on a development team responsible for building leading edge security processors. Today he directs a global team of field application engineers at Rambus in their Cryptography Division, and is directly responsible for technical field support activities in North America. Steve holds a BS/MS is Computer Engineering from Northeastern University in Boston, MA.
Steve Singer
Sr. Director, Field Applications Engineering, Rambus
Bart Stevens is Senior Director of product management for the Rambus Secure Silicon IP business. He is an expert on embedded security for Enterprise, Cloud, Automotive, Networking, Wireless, IoT and Mobile applications. Before joining Rambus, Bart held positions at Inside Secure as Vice President of silicon IP and secure communication, and as Director of product management, with responsibility for security chip and silicon IP products. Prior to those roles, Bart managed SafeNet’s OEM networking and wireless HW research and development teams. He has also held product and engineering management roles at Securealink and Philips Semiconductors in the Netherlands. He began his career as an ASIC designer.
Bart Stevens
Sr. Director, Product Management, Rambus
FREE Webinar: Understanding Fault Injection Attacks and Their Mitigation