{"id":590,"date":"2021-09-09T15:32:47","date_gmt":"2021-09-09T15:32:47","guid":{"rendered":"http:\/\/cad4security.org\/?page_id=590"},"modified":"2022-07-27T13:11:11","modified_gmt":"2022-07-27T13:11:11","slug":"speakers","status":"publish","type":"page","link":"http:\/\/cad4security.org\/index.php\/technical-events\/cad4sec-workshop-2022\/speakers\/","title":{"rendered":"Speakers"},"content":{"rendered":"<nav class=\"is-responsive items-justified-center wp-block-navigation is-content-justification-center is-layout-flex wp-container-core-navigation-layout-1 wp-block-navigation-is-layout-flex\" aria-label=\"CAD4Sec Workshop 2022\" \n\t\t\tdata-wp-interactive\n\t\t\tdata-wp-context='{\"core\":{\"navigation\":{\"overlayOpenedBy\":[],\"type\":\"overlay\",\"roleAttribute\":\"\",\"ariaLabel\":\"Menu\"}}}'\n\t\t><button aria-haspopup=\"true\" aria-label=\"Open menu\" class=\"wp-block-navigation__responsive-container-open \" \n\t\t\tdata-wp-on--click=\"actions.core.navigation.openMenuOnClick\"\n\t\t\tdata-wp-on--keydown=\"actions.core.navigation.handleMenuKeydown\"\n\t\t><svg width=\"24\" height=\"24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 24 24\" aria-hidden=\"true\" focusable=\"false\"><rect x=\"4\" y=\"7.5\" width=\"16\" height=\"1.5\" \/><rect x=\"4\" y=\"15\" width=\"16\" height=\"1.5\" \/><\/svg><\/button>\n\t\t\t<div class=\"wp-block-navigation__responsive-container  \" style=\"\" id=\"modal-1\" \n\t\t\tdata-wp-class--has-modal-open=\"selectors.core.navigation.isMenuOpen\"\n\t\t\tdata-wp-class--is-menu-open=\"selectors.core.navigation.isMenuOpen\"\n\t\t\tdata-wp-effect=\"effects.core.navigation.initMenu\"\n\t\t\tdata-wp-on--keydown=\"actions.core.navigation.handleMenuKeydown\"\n\t\t\tdata-wp-on--focusout=\"actions.core.navigation.handleMenuFocusout\"\n\t\t\ttabindex=\"-1\"\n\t\t>\n\t\t\t\t<div class=\"wp-block-navigation__responsive-close\" tabindex=\"-1\">\n\t\t\t\t\t<div class=\"wp-block-navigation__responsive-dialog\" \n\t\t\tdata-wp-bind--aria-modal=\"selectors.core.navigation.ariaModal\"\n\t\t\tdata-wp-bind--aria-label=\"selectors.core.navigation.ariaLabel\"\n\t\t\tdata-wp-bind--role=\"selectors.core.navigation.roleAttribute\"\n\t\t\tdata-wp-effect=\"effects.core.navigation.focusFirstElement\"\n\t\t>\n\t\t\t\t\t\t\t<button aria-label=\"Close menu\" class=\"wp-block-navigation__responsive-container-close\" \n\t\t\tdata-wp-on--click=\"actions.core.navigation.closeMenuOnClick\"\n\t\t><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 24 24\" width=\"24\" height=\"24\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M13 11.8l6.1-6.3-1-1-6.1 6.2-6.1-6.2-1 1 6.1 6.3-6.5 6.7 1 1 6.5-6.6 6.5 6.6 1-1z\"><\/path><\/svg><\/button>\n\t\t\t\t\t\t<div class=\"wp-block-navigation__responsive-container-content\" id=\"modal-1-content\">\n\t\t\t\t\t\t\t<ul class=\"wp-block-navigation__container is-responsive items-justified-center wp-block-navigation\"><li class=\" wp-block-navigation-item wp-block-navigation-link\"><a class=\"wp-block-navigation-item__content\"  href=\"http:\/\/cad4security.org\/index.php\/technical-events\/cad4sec-workshop-2022\/\"><span class=\"wp-block-navigation-item__label\">Home<\/span><\/a><\/li><li class=\" wp-block-navigation-item wp-block-navigation-link\"><a class=\"wp-block-navigation-item__content\"  href=\"http:\/\/cad4security.org\/index.php\/technical-events\/cad4sec-workshop-2022\/people\/\"><span class=\"wp-block-navigation-item__label\">Program Committee<\/span><\/a><\/li><li class=\" wp-block-navigation-item wp-block-navigation-link\"><a class=\"wp-block-navigation-item__content\"  href=\"http:\/\/cad4security.org\/index.php\/technical-events\/cad4sec-workshop-2022\/speakers\/\"><span class=\"wp-block-navigation-item__label\">Speakers<\/span><\/a><\/li><li class=\" wp-block-navigation-item wp-block-navigation-link\"><a class=\"wp-block-navigation-item__content\"  href=\"http:\/\/cad4security.org\/index.php\/technical-events\/cad4sec-workshop-2022\/program\/\"><span class=\"wp-block-navigation-item__label\">Detailed Program &amp; Slides<\/span><\/a><\/li><li class=\" wp-block-navigation-item wp-block-navigation-link\"><a class=\"wp-block-navigation-item__content\"  href=\"http:\/\/cad4security.org\/index.php\/technical-events\/cad4sec-workshop-2022\/gallery\/\"><span class=\"wp-block-navigation-item__label\">Gallery<\/span><\/a><\/li><\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div><\/nav>\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-block-group is-layout-flex wp-block-group-is-layout-flex has-md-padding-top has-md-padding-bottom has-md-padding-left has-md-padding-right\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-layout-1 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:20%\">\n<figure class=\"wp-block-image size-full is-style-rounded\"><img loading=\"lazy\" decoding=\"async\" width=\"220\" height=\"220\" src=\"http:\/\/cad4security.org\/wp-content\/uploads\/cropped-2_Sp_Jay_Lewis.png\" alt=\"\" class=\"wp-image-1831\" srcset=\"http:\/\/cad4security.org\/wp-content\/uploads\/cropped-2_Sp_Jay_Lewis-150x150.png 150w, http:\/\/cad4security.org\/wp-content\/uploads\/cropped-2_Sp_Jay_Lewis.png 220w\" sizes=\"(max-width: 220px) 100vw, 220px\" \/><\/figure><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:80%\">\n<h2 class=\"wp-block-heading\">Jay Lewis<\/h2>\n\n\n\n<p class=\"is-style-default has-sm-font-size\">Team Lead of Silicon Security<\/p>\n\n\n\n<p class=\"is-style-subheading\">Microsoft<\/p>\n\n\n\n<p>Dr. Jay Lewis is a Partner at Microsoft focusing on technology incubation, and on strategic semiconductor supply chain risks. In the tech incubation role, this means ensuring that new ideas have a path to become the next generation of products and customer capabilities. The supply chain role includes addressing critical risks to the continuity and integrity of the hardware supply chain. Prior to starting at Microsoft in 2020 Jay was the Deputy Director of the Microsystems Technology Office at DARPA, and prior to that was a Program Manager at DARPA. He has published over 35 refereed articles and been awarded more than 10 patents.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n\n<hr class=\"wp-block-separator is-style-wide\"\/>\n\n\n\n<div class=\"wp-block-group is-layout-flex wp-block-group-is-layout-flex has-md-padding-top has-md-padding-bottom has-md-padding-left has-md-padding-right\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-layout-2 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:20%\">\n<figure class=\"wp-block-image size-full is-style-rounded\"><img loading=\"lazy\" decoding=\"async\" width=\"225\" height=\"225\" src=\"http:\/\/cad4security.org\/wp-content\/uploads\/2_Sp_Norman_Chang.jpg\" alt=\"\" class=\"wp-image-1498\" srcset=\"http:\/\/cad4security.org\/wp-content\/uploads\/2_Sp_Norman_Chang-150x150.jpg 150w, http:\/\/cad4security.org\/wp-content\/uploads\/2_Sp_Norman_Chang.jpg 225w\" sizes=\"(max-width: 225px) 100vw, 225px\" \/><\/figure><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:80%\">\n<h2 class=\"wp-block-heading\"><strong>Norman Chang<\/strong><\/h2>\n\n\n\n<p class=\"is-style-default has-sm-font-size\">Chief Technologist<\/p>\n\n\n\n<p class=\"is-style-subheading\"><strong>ANSYS, Inc.<\/strong><\/p>\n\n\n\n<p>Norman Chang co-founded Apache Design Solutions in February 2001 and currently serves as Ansys Fellow and Chief Technologist of Electronics, Semiconductor, and Optics BU, ANSYS, Inc. He is also currently leading AI\/ML and security initiatives at ANSYS. Prior to Apache, he lead a research group on the research of Power\/Signal\/Thermal Integrity of chipsets based on VLIW architecture at HP Labs. Dr. Chang received his Ph.D. in Electrical Engineering and Computer Sciences from University of California, Berkeley. He holds twenty patents and has co-authored over 60 technical papers and a popular book on \u201cInterconnect Analysis and Synthesis\u201d by Wiley-Interscience at 2000. He is currently in the committee for EDPS, ESDA-EDA and SI2 AI\/ML SIG, and an IEEE Senior Member.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n\n<hr class=\"wp-block-separator is-style-wide\"\/>\n\n\n\n<div class=\"wp-block-group is-layout-flex wp-block-group-is-layout-flex has-md-padding-top has-md-padding-bottom has-md-padding-left has-md-padding-right\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-layout-3 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:20%\">\n<figure class=\"wp-block-image size-full is-style-rounded\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"http:\/\/cad4security.org\/wp-content\/uploads\/2_Sp_Jason_Oberg-1.jpg\" alt=\"\" class=\"wp-image-1835\" srcset=\"http:\/\/cad4security.org\/wp-content\/uploads\/2_Sp_Jason_Oberg-1-150x150.jpg 150w, http:\/\/cad4security.org\/wp-content\/uploads\/2_Sp_Jason_Oberg-1.jpg 300w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/figure><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:80%\">\n<h2 class=\"wp-block-heading\"><strong><strong>Jason Oberg<\/strong><\/strong><\/h2>\n\n\n\n<p class=\"is-style-default has-sm-font-size\">Co-Founder and CTO<\/p>\n\n\n\n<p class=\"is-style-subheading\"><strong><strong>Cycurity<\/strong><\/strong><\/p>\n\n\n\n<p>Dr. Jason Oberg is a co-founder and Chief Technology Officer (CTO) of Cycuity, where he is responsible for overseeing the company\u2019s technology and strategic positioning. Dr. Oberg works closely with Cycuit\u2019s executive management team, engineering teams, and customers to drive the company\u2019s next-generation hardware security products. As a leading expert in hardware security, Dr. Oberg brings years of deep expertise and has facilitated the development of several disruptive hardware security technologies. His work has been cited over 1000 times and he holds seven issued and pending patents. Prior to his CTO role, Dr. Oberg led Cycuity as co-founder and CEO from 2014 \u2013 2020, during which he facilitated raising capital, recruited the initial team, and drove the company\u2019s product revenue growth YoY. He received his B.S. in Computer Engineering from UC Santa Barbara and an M.S. and Ph.D. in Computer Science from UC San Diego.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n\n<hr class=\"wp-block-separator is-style-wide\"\/>\n\n\n\n<div class=\"wp-block-group is-layout-flex wp-block-group-is-layout-flex has-md-padding-top has-md-padding-bottom has-md-padding-left has-md-padding-right\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-layout-4 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:20%\">\n<figure class=\"wp-block-image size-full is-style-rounded\"><img loading=\"lazy\" decoding=\"async\" width=\"602\" height=\"602\" src=\"http:\/\/cad4security.org\/wp-content\/uploads\/1_sp_nicole_fern.jpg\" alt=\"\" class=\"wp-image-2022\" srcset=\"http:\/\/cad4security.org\/wp-content\/uploads\/1_sp_nicole_fern-150x150.jpg 150w, http:\/\/cad4security.org\/wp-content\/uploads\/1_sp_nicole_fern-300x300.jpg 300w, http:\/\/cad4security.org\/wp-content\/uploads\/1_sp_nicole_fern.jpg 602w\" sizes=\"(max-width: 602px) 100vw, 602px\" \/><\/figure><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:80%\">\n<h2 class=\"wp-block-heading\"><strong><strong>Nicole Fern<\/strong><\/strong><\/h2>\n\n\n\n<p class=\"is-style-default has-sm-font-size\">Senior Security Analyst<\/p>\n\n\n\n<p class=\"is-style-subheading\"><strong><strong>Riscure<\/strong><\/strong><\/p>\n\n\n\n<p>Nicole Fern is a Senior Security Analyst at Riscure. She received her PhD degree in Electrical &#038; Computer Engineering from University of California, Santa Barbara in 2016 and continued her research in hardware security as a post-doc before joining industry in 2018. She joined Riscure in 2021 and is currently interested in all things embedded security and hardware hacking!<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n\n<hr class=\"wp-block-separator is-style-wide\"\/>\n\n\n\n<div class=\"wp-block-group is-layout-flex wp-block-group-is-layout-flex has-md-padding-top has-md-padding-bottom has-md-padding-left has-md-padding-right\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-layout-5 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:20%\">\n<figure class=\"wp-block-image size-full is-style-rounded\"><img loading=\"lazy\" decoding=\"async\" width=\"804\" height=\"805\" src=\"http:\/\/cad4security.org\/wp-content\/uploads\/2_Sp_Dan_walters-1.jpg\" alt=\"\" class=\"wp-image-1941\" srcset=\"http:\/\/cad4security.org\/wp-content\/uploads\/2_Sp_Dan_walters-1-150x150.jpg 150w, http:\/\/cad4security.org\/wp-content\/uploads\/2_Sp_Dan_walters-1-300x300.jpg 300w, http:\/\/cad4security.org\/wp-content\/uploads\/2_Sp_Dan_walters-1-768x769.jpg 768w, http:\/\/cad4security.org\/wp-content\/uploads\/2_Sp_Dan_walters-1.jpg 804w\" sizes=\"(max-width: 804px) 100vw, 804px\" \/><\/figure><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:80%\">\n<h2 class=\"wp-block-heading\"><strong><strong>Dan Walters<\/strong><\/strong><\/h2>\n\n\n\n<p class=\"is-style-default has-sm-font-size\">Principal Embedded Security Engineer<\/p>\n\n\n\n<p class=\"is-style-subheading\"><strong><strong>MITRE<\/strong><\/strong><\/p>\n\n\n\n<p>Dan Walters is a Principal Embedded Security Engineer and Group Leader at MITRE Labs in the department for Electronics System Development and Embedded Security. Dan helped to develop MITRE\u2019s Secure Electronics Lab, which has advanced capabilities for researching implementation security issues such as side-channel leakage, fault induction, and trusted hardware. Dan is also a part-time lecturer at the University of Massachusetts-Amherst where he teaches embedded security topics at the graduate level. He received his M.S. in Computer Science with a focus on machine learning for security applications from Tufts University; and his B.S.E. in Computer Engineering, B.S.E. in Electrical Engineering, and B.S.E. in Mathematics from the University of Michigan.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n\n<hr class=\"wp-block-separator is-style-wide\"\/>\n\n\n\n<div class=\"wp-block-group is-layout-flex wp-block-group-is-layout-flex has-md-padding-top has-md-padding-bottom has-md-padding-left has-md-padding-right\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-layout-6 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:20%\">\n<figure class=\"wp-block-image size-full is-style-rounded\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"800\" src=\"http:\/\/cad4security.org\/wp-content\/uploads\/2_sp_Jeremy_Bellay.png\" alt=\"\" class=\"wp-image-2093\" srcset=\"http:\/\/cad4security.org\/wp-content\/uploads\/2_sp_Jeremy_Bellay-150x150.png 150w, http:\/\/cad4security.org\/wp-content\/uploads\/2_sp_Jeremy_Bellay-300x300.png 300w, http:\/\/cad4security.org\/wp-content\/uploads\/2_sp_Jeremy_Bellay-768x768.png 768w, http:\/\/cad4security.org\/wp-content\/uploads\/2_sp_Jeremy_Bellay.png 800w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/figure><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:80%\">\n<h2 class=\"wp-block-heading\"><strong><strong>Jeremy Bellay<\/strong><\/strong><\/h2>\n\n\n\n<p class=\"is-style-default has-sm-font-size\">Principal Investigator<\/p>\n\n\n\n<p class=\"is-style-subheading\"><strong><strong>Battelle<\/strong><\/strong><\/p>\n\n\n\n<p>Jeremy Bellay, Ph.D. is a principal investigator in Battelle&#8217;s Cyber Trust and Analytics division. He specializes in problems that require the synthesis of complex knowledge structures with sophisticated data driven approaches. Jeremy is particularly interested in an integrative approach to risk and assurance in cyber systems. He led the TAME Forum working group on Hardware Assurance, Weaknesses, Collaboration and Sharing. He is currently an active participant in the SAE G32 Hardware Assurance effort and the ICT SCRM HBOM development working group.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n\n<hr class=\"wp-block-separator is-style-wide\"\/>\n\n\n\n<div class=\"wp-block-group is-layout-flex wp-block-group-is-layout-flex has-md-padding-top has-md-padding-bottom has-md-padding-left has-md-padding-right\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-layout-7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:20%\">\n<figure class=\"wp-block-image size-full is-style-rounded\"><img loading=\"lazy\" decoding=\"async\" width=\"532\" height=\"532\" src=\"http:\/\/cad4security.org\/wp-content\/uploads\/cropped-2_Sp_Ujjwal.png\" alt=\"\" class=\"wp-image-2057\" srcset=\"http:\/\/cad4security.org\/wp-content\/uploads\/cropped-2_Sp_Ujjwal-150x150.png 150w, http:\/\/cad4security.org\/wp-content\/uploads\/cropped-2_Sp_Ujjwal-300x300.png 300w, http:\/\/cad4security.org\/wp-content\/uploads\/cropped-2_Sp_Ujjwal.png 532w\" sizes=\"(max-width: 532px) 100vw, 532px\" \/><\/figure><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:80%\">\n<h2 class=\"wp-block-heading\"><strong><strong><strong>Ujjwal Guin<\/strong><\/strong><\/strong><\/h2>\n\n\n\n<p class=\"is-style-default has-sm-font-size\">Assistant Professor<\/p>\n\n\n\n<p class=\"is-style-subheading\"><strong><strong><strong>Auburn University<\/strong><\/strong><\/strong><\/p>\n\n\n\n<p>Ujjwal Guin (Member, IEEE) received the Ph.D. degree from the Department of Electrical and Computer Engineering, University of Connecticut, in 2016. He is currently an Assistant Professor with the Department of Electrical and Computer Engineering, Auburn University, Auburn, AL, USA. He has developed several on-chip structures and techniques to improve the security, trustworthiness, and reliability of integrated circuits. He has authored several journal articles and refereed conference papers. He serves on the organizing committees of HOST, VTS, and PAINE. His current research interests include hardware security and trust, Blockchain, and VLSI design and test. He is a member of the ACM. He has been serving on the technical program committees of several reputed conferences, such as DAC, HOST, VTS, PAINE, VLSID, GLSVLSI, ISVLSI, and Blockchain. He is an active participant in the SAE International G-19A Test Laboratory Standards Development Committee and G-32 Cyber-Physical Systems Security Committee.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n\n<hr class=\"wp-block-separator is-style-wide\"\/>\n\n\n\n<div class=\"wp-block-group is-layout-flex wp-block-group-is-layout-flex has-md-padding-top has-md-padding-bottom has-md-padding-left has-md-padding-right\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-layout-8 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:20%\">\n<figure class=\"wp-block-image size-full is-style-rounded\"><img loading=\"lazy\" decoding=\"async\" width=\"376\" height=\"376\" src=\"http:\/\/cad4security.org\/wp-content\/uploads\/cropped-2_Sp_saverio_fazzari.gif\" alt=\"\" class=\"wp-image-1833\"><\/figure><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:80%\">\n<h2 class=\"wp-block-heading\"><strong><strong><strong><strong>Saverio Fazzari<\/strong><\/strong><\/strong><\/strong><\/h2>\n\n\n\n<p class=\"is-style-default has-sm-font-size\">Senior Lead Engineer<\/p>\n\n\n\n<p class=\"is-style-subheading\"><strong><strong><strong><strong>Booz Allen Hamilton<\/strong><\/strong><\/strong><\/strong><\/p>\n\n\n\n<p>Saverio Fazzari works for Booz Allen acting as a senior technical advisor to DARPA and other government agencies for numerous programs. His specialty is advanced circuit design and development strategies with a focus on hardware cyber security issues including trusted design and fabrication. Mr. Fazzari&#8217; s experience includes extensive commercial experience, leading production innovation and development across all facets of the electronic design process. Mr. Saverio Fazzari has over 25 years of experience covering the entire electronic product development flow. He has a BSEE from Johns Hopkins, and MSEE from the University of Pittsburgh. He has published over 14 papers in industry journals and technical conferences.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n\n<hr class=\"wp-block-separator is-style-wide\"\/>\n\n\n\n<div class=\"wp-block-group is-layout-flex wp-block-group-is-layout-flex has-md-padding-top has-md-padding-bottom has-md-padding-left has-md-padding-right\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-layout-9 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:20%\">\n<figure class=\"wp-block-image size-full is-style-rounded\"><img loading=\"lazy\" decoding=\"async\" width=\"225\" height=\"225\" src=\"http:\/\/cad4security.org\/wp-content\/uploads\/2_Sp_Sohrab-Aftabjahani.jpg\" alt=\"\" class=\"wp-image-1507\" srcset=\"http:\/\/cad4security.org\/wp-content\/uploads\/2_Sp_Sohrab-Aftabjahani-150x150.jpg 150w, http:\/\/cad4security.org\/wp-content\/uploads\/2_Sp_Sohrab-Aftabjahani.jpg 225w\" sizes=\"(max-width: 225px) 100vw, 225px\" \/><\/figure><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:80%\">\n<h2 class=\"wp-block-heading\"><strong><strong><strong><strong><strong>Sohrab Aftabjahani<\/strong><\/strong><\/strong><\/strong><\/strong><\/h2>\n\n\n\n<p class=\"is-style-default has-sm-font-size\">Product Security Expert\/Sr. Staff Security Researcher<\/p>\n\n\n\n<p class=\"is-style-subheading\"><strong><strong><strong><strong><strong>Intel Corporation<\/strong><\/strong><\/strong><\/strong><\/strong><\/p>\n\n\n\n<p>Sohrab Aftabjahani received his Ph.D. in Electrical and Computer Engineering from the Georgia Institute of Technology in 2011. Since 2010, he has been with the Intel Corporation in Oregon contributing to its state-of-art R&#038;D projects in various roles including senior security researcher, senior DFT engineer, senior digital design and validation engineer, and graphics Integration validation engineer. He joined Intel after 9 years of experience working as software and hardware engineer for TRW and Computer Science Corporation, Telecommunications Research Center, and several electronic system design companies. He is a senior IEEE\/ACM member and serves as the chair of the IEEE Oregon section computer society and the chair of the Semiconductor Research Corporation (SRC) Trustworthy and Secure Semiconductors and Systems (T3S) Technical Advisory Board (TAB). He has served as a TAB for the SRC T3S and Computer-Aided Design and Test (CADT) since 2014. He was a 2-time recipient of the SRC Mahboob Khan outstanding liaison award in 2016 and 2019.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n\n<hr class=\"wp-block-separator is-style-wide\"\/>\n\n\n\n<div class=\"wp-block-group is-layout-flex wp-block-group-is-layout-flex has-md-padding-top has-md-padding-bottom has-md-padding-left has-md-padding-right\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-layout-10 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:20%\">\n<figure class=\"wp-block-image size-large is-style-rounded\"><img loading=\"lazy\" decoding=\"async\" width=\"1022\" height=\"1024\" src=\"http:\/\/cad4security.org\/wp-content\/uploads\/cropped-2_Sp_Beau_Bakken-scaled-1-1022x1024.jpg\" alt=\"\" class=\"wp-image-2112\" srcset=\"http:\/\/cad4security.org\/wp-content\/uploads\/cropped-2_Sp_Beau_Bakken-scaled-1-150x150.jpg 150w, http:\/\/cad4security.org\/wp-content\/uploads\/cropped-2_Sp_Beau_Bakken-scaled-1-300x300.jpg 300w, http:\/\/cad4security.org\/wp-content\/uploads\/cropped-2_Sp_Beau_Bakken-scaled-1-768x770.jpg 768w, http:\/\/cad4security.org\/wp-content\/uploads\/cropped-2_Sp_Beau_Bakken-scaled-1-1022x1024.jpg 1022w, http:\/\/cad4security.org\/wp-content\/uploads\/cropped-2_Sp_Beau_Bakken-scaled-1-1533x1536.jpg 1533w, http:\/\/cad4security.org\/wp-content\/uploads\/cropped-2_Sp_Beau_Bakken-scaled-1-2044x2048.jpg 2044w\" sizes=\"(max-width: 1022px) 100vw, 1022px\" \/><\/figure><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:80%\">\n<h2 class=\"wp-block-heading\"><strong><strong><strong><strong><strong>Beau Bakken<\/strong><\/strong><\/strong><\/strong><\/strong><\/h2>\n\n\n\n<p class=\"is-style-default has-sm-font-size\">Principal Engineer<\/p>\n\n\n\n<p class=\"is-style-subheading\"><strong><strong><strong><strong><strong>Caspia Technologies<\/strong><\/strong><\/strong><\/strong><\/strong><\/p>\n\n\n\n<p>Beau Bakken is a Principal Engineer at Caspia Technologies leading projects in multiple areas of microelectronic security, including IP protection, fault injection assessment, side-channel analysis, and PCB assurance. He joined Caspia in 2020 and holds a degree in Computer Engineering from the University of Florida.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n\n<hr class=\"wp-block-separator is-style-wide\"\/>\n\n\n\n<div class=\"wp-block-group is-layout-flex wp-block-group-is-layout-flex has-md-padding-top has-md-padding-bottom has-md-padding-left has-md-padding-right\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-layout-11 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:20%\">\n<figure class=\"wp-block-image size-full is-style-rounded\"><img loading=\"lazy\" decoding=\"async\" width=\"225\" height=\"225\" src=\"http:\/\/cad4security.org\/wp-content\/uploads\/2_Sp_Mike_Borza-1.jpg\" alt=\"\" class=\"wp-image-1935\" srcset=\"http:\/\/cad4security.org\/wp-content\/uploads\/2_Sp_Mike_Borza-1-150x150.jpg 150w, http:\/\/cad4security.org\/wp-content\/uploads\/2_Sp_Mike_Borza-1.jpg 225w\" sizes=\"(max-width: 225px) 100vw, 225px\" \/><\/figure><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:80%\">\n<h2 class=\"wp-block-heading\"><strong><strong><strong><strong><strong>Mike Borza<\/strong><\/strong><\/strong><\/strong><\/strong><\/h2>\n\n\n\n<p class=\"is-style-default has-sm-font-size\">Scientist<\/p>\n\n\n\n<p class=\"is-style-subheading\"><strong><strong><strong><strong><strong>Synopsys<\/strong><\/strong><\/strong><\/strong><\/strong><\/p>\n\n\n\n<p>Mike Borza is a member of the technical staff for Synopsys security IP. He has more than 20 years of experience in security system engineering, and safety critical engineering before that. He is a founder and CTO of Elliptic Technologies, which was acquired by Synopsys. Borza has been an active contributor to the Security Task Group of IEEE 802.1; was an editor of the 802.1AR Secure Device Identifier standard; and is one of the founding members of the prpl Foundation and co-chair of its Security Engineering Group. He holds a Master\u2019s Degree in Electrical Engineering from McMaster University.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n\n<hr class=\"wp-block-separator is-style-wide\"\/>\n\n\n\n<div class=\"wp-block-group is-layout-flex wp-block-group-is-layout-flex has-md-padding-top has-md-padding-bottom has-md-padding-left has-md-padding-right\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-layout-12 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:20%\">\n<figure class=\"wp-block-image size-full is-style-rounded\"><img loading=\"lazy\" decoding=\"async\" width=\"1018\" height=\"1018\" src=\"http:\/\/cad4security.org\/wp-content\/uploads\/cropped-cropped-cropped-Hadi_Mardani_Kamali.jpg\" alt=\"\" class=\"wp-image-2124\" srcset=\"http:\/\/cad4security.org\/wp-content\/uploads\/cropped-cropped-cropped-Hadi_Mardani_Kamali-150x150.jpg 150w, http:\/\/cad4security.org\/wp-content\/uploads\/cropped-cropped-cropped-Hadi_Mardani_Kamali-300x300.jpg 300w, http:\/\/cad4security.org\/wp-content\/uploads\/cropped-cropped-cropped-Hadi_Mardani_Kamali-768x768.jpg 768w, http:\/\/cad4security.org\/wp-content\/uploads\/cropped-cropped-cropped-Hadi_Mardani_Kamali.jpg 1018w\" sizes=\"(max-width: 1018px) 100vw, 1018px\" \/><\/figure><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:80%\">\n<h2 class=\"wp-block-heading\"><strong><strong><strong><strong><strong>Hadi M Kamali<\/strong><\/strong><\/strong><\/strong><\/strong><\/h2>\n\n\n\n<p class=\"is-style-default has-sm-font-size\">Postdoctoral Research Associate<\/p>\n\n\n\n<p class=\"is-style-subheading\"><strong><strong><strong><strong><strong>University of Florida<\/strong><\/strong><\/strong><\/strong><\/strong><\/p>\n\n\n\n<p>Hadi Mardani Kamali is a postdoctoral research associate at Florida Institute for Cybersecurity Research (FICS), the Department of Electrical and Computer Engineering at the University of Florida. He received his Ph.D. degree from the Department of Electrical and Computer Engineering at George Mason University, 2021. His research delves into hardware security with a particular focus on exploiting IP protection techniques, design-for-trust for VLSI circuits, and CAD frameworks for security (design-for-security), in which he has numerous publications in top journals and conferences including IEEE TC\/TVLSI\/TCAD, IACR Transactions on CHES, DAC, ICCAD, HOST, etc., with awards including nominations\/selection for Best Paper Award in ISVLSI\u201920, ICCAD\u201919, ICCAD\u201920, IEEE CAS 2020, and HOST 2022.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n\n<hr class=\"wp-block-separator is-style-wide\"\/>\n\n\n\n<div class=\"wp-block-group is-layout-flex wp-block-group-is-layout-flex has-md-padding-top has-md-padding-bottom has-md-padding-left has-md-padding-right\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-layout-13 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:20%\">\n<figure class=\"wp-block-image size-full is-style-rounded\"><img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"http:\/\/cad4security.org\/wp-content\/uploads\/2_Sp_Dan_Benua-1.jpg\" alt=\"\" class=\"wp-image-1944\" srcset=\"http:\/\/cad4security.org\/wp-content\/uploads\/2_Sp_Dan_Benua-1-150x150.jpg 150w, http:\/\/cad4security.org\/wp-content\/uploads\/2_Sp_Dan_Benua-1.jpg 200w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/><\/figure><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:80%\">\n<h2 class=\"wp-block-heading\"><strong><strong><strong><strong><strong>Dan Benua<\/strong><\/strong><\/strong><\/strong><\/strong><\/h2>\n\n\n\n<p class=\"is-style-default has-sm-font-size\">Director of Application Engineering<\/p>\n\n\n\n<p class=\"is-style-subheading\"><strong><strong><strong><strong><strong>Cadence Design Systems<\/strong><\/strong><\/strong><\/strong><\/strong><\/p>\n\n\n\n<p>Daniel Benua is an AE Director at Cadence Design Systems based in San Jose, California. Previously, Daniel was a Principal CAE at Synopsys. Dan is an industry expert in the application of formal technology to hardware design verification problems, and he has rich experiences in verification-based tool support, methodology consulting, training, and product direction.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n\n<hr class=\"wp-block-separator is-style-wide\"\/>\n\n\n\n<div class=\"wp-block-group is-layout-flex wp-block-group-is-layout-flex has-md-padding-top has-md-padding-bottom has-md-padding-left has-md-padding-right\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-layout-14 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:20%\">\n<figure class=\"wp-block-image size-large is-style-rounded\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"http:\/\/cad4security.org\/wp-content\/uploads\/cropped-2_Sp_Sid_Allman-1024x1024.jpg\" alt=\"\" class=\"wp-image-2115\" srcset=\"http:\/\/cad4security.org\/wp-content\/uploads\/cropped-2_Sp_Sid_Allman-150x150.jpg 150w, http:\/\/cad4security.org\/wp-content\/uploads\/cropped-2_Sp_Sid_Allman-300x300.jpg 300w, http:\/\/cad4security.org\/wp-content\/uploads\/cropped-2_Sp_Sid_Allman-768x768.jpg 768w, http:\/\/cad4security.org\/wp-content\/uploads\/cropped-2_Sp_Sid_Allman-1024x1024.jpg 1024w, http:\/\/cad4security.org\/wp-content\/uploads\/cropped-2_Sp_Sid_Allman.jpg 1055w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:80%\">\n<h2 class=\"wp-block-heading\"><strong><strong><strong><strong><strong>Sid Allman<\/strong><\/strong><\/strong><\/strong><\/strong><\/h2>\n\n\n\n<p class=\"is-style-default has-sm-font-size\">Senior Director ASIC Business Unit<\/p>\n\n\n\n<p class=\"is-style-subheading\"><strong><strong><strong><strong><strong>Marvell Technology<\/strong><\/strong><\/strong><\/strong><\/strong><\/p>\n\n\n\n<p>Sid Allman is a Senior Director in the ASIC Business Unit of Marvell Technology and has been working in the field of custom silicon development for over 3 decades. Sid is from Ottawa Canada and started with BNR\/Nortel building their in-house silicon products. After BNR, Sid held Engineering leadership positions with LSI Logic, Cisco Systems, eSilicon, Inphi, and is now with Marvell Technology. Sid started investigating Secure Hardware while at Cisco, and is now part of the leadership team driving the Secure Development Process at Marvell.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n\n<hr class=\"wp-block-separator is-style-wide\"\/>\n\n\n\n<div class=\"wp-block-group is-layout-flex wp-block-group-is-layout-flex has-md-padding-top has-md-padding-bottom has-md-padding-left has-md-padding-right\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-layout-15 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:20%\">\n<figure class=\"wp-block-image size-large is-style-rounded\"><img loading=\"lazy\" decoding=\"async\" width=\"1022\" height=\"1024\" src=\"http:\/\/cad4security.org\/wp-content\/uploads\/cropped-2_sp_adam_kimura-1022x1024.png\" alt=\"\" class=\"wp-image-2090\" srcset=\"http:\/\/cad4security.org\/wp-content\/uploads\/cropped-2_sp_adam_kimura-150x150.png 150w, http:\/\/cad4security.org\/wp-content\/uploads\/cropped-2_sp_adam_kimura-300x300.png 300w, http:\/\/cad4security.org\/wp-content\/uploads\/cropped-2_sp_adam_kimura-768x769.png 768w, http:\/\/cad4security.org\/wp-content\/uploads\/cropped-2_sp_adam_kimura-1022x1024.png 1022w, http:\/\/cad4security.org\/wp-content\/uploads\/cropped-2_sp_adam_kimura.png 1133w\" sizes=\"(max-width: 1022px) 100vw, 1022px\" \/><\/figure><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:80%\">\n<h2 class=\"wp-block-heading\"><strong><strong><strong><strong><strong>Adam Kimura<\/strong><\/strong><\/strong><\/strong><\/strong><\/h2>\n\n\n\n<p class=\"is-style-default has-sm-font-size\">Senior Research Scientist<\/p>\n\n\n\n<p class=\"is-style-subheading\"><strong><strong><strong><strong><strong>Battelle Memorial Institute<\/strong><\/strong><\/strong><\/strong><\/strong><\/p>\n\n\n\n<p>Dr. Adam Kimura is a Senior Research Scientist at Battelle Memorial Institute and has been working in the field of Trusted and Assured Microelectronics since 2013. He currently serves as the technical director for Battelle\u2019s Cyber Trust and Analytics investment R&#038;D portfolio and is the principal investigator for Battelle\u2019s post-silicon verification and validation research. Dr. Kimura holds his B.S, M.S., and Ph.D. in Electrical &#038; Computer Engineering from The Ohio State University.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n\n<hr class=\"wp-block-separator is-style-wide\"\/>\n\n\n\n<div class=\"wp-block-group is-layout-flex wp-block-group-is-layout-flex has-md-padding-top has-md-padding-bottom has-md-padding-left has-md-padding-right\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-layout-16 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:20%\">\n<figure class=\"wp-block-image size-full is-style-rounded\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"800\" src=\"http:\/\/cad4security.org\/wp-content\/uploads\/cropped-2_Sp_Adam_Cron.jpg\" alt=\"\" class=\"wp-image-1977\" srcset=\"http:\/\/cad4security.org\/wp-content\/uploads\/cropped-2_Sp_Adam_Cron-150x150.jpg 150w, http:\/\/cad4security.org\/wp-content\/uploads\/cropped-2_Sp_Adam_Cron-300x300.jpg 300w, http:\/\/cad4security.org\/wp-content\/uploads\/cropped-2_Sp_Adam_Cron-768x768.jpg 768w, http:\/\/cad4security.org\/wp-content\/uploads\/cropped-2_Sp_Adam_Cron.jpg 800w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/figure><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:80%\">\n<h2 class=\"wp-block-heading\"><strong><strong><strong><strong><strong>Adam Cron<\/strong><\/strong><\/strong><\/strong><\/strong><\/h2>\n\n\n\n<p class=\"is-style-default has-sm-font-size\">Distinguished Architect<\/p>\n\n\n\n<p class=\"is-style-subheading\"><strong><strong><strong><strong><strong>Synopsys<\/strong><\/strong><\/strong><\/strong><\/strong><\/p>\n\n\n\n<p>Adam Cron is a Distinguished Architect at Synopsys working with customers worldwide on complex Security, DFT, and ATPG issues for SoCs. He is part of the Hardware Analytics and Test R&#038;D group, and has been with Synopsys for over 24 years. Adam is helping to automate the implementation of secure silicon as part of the DARPA AISS program. Adam is Chair of IEEE Std 1838 which standardized 3D-IC test access, editor of IEEE Std P1149.4, and is an IEEE Golden Core recipient. He also chairs a working group creating a Rest API for MITRE&#8217;s CWE and CAPEC databases.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n\n<hr class=\"wp-block-separator is-style-wide\"\/>\n\n\n\n<div class=\"wp-block-group is-layout-flex wp-block-group-is-layout-flex has-md-padding-top has-md-padding-bottom has-md-padding-left has-md-padding-right\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-layout-17 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:20%\">\n<figure class=\"wp-block-image size-full is-style-rounded\"><img loading=\"lazy\" decoding=\"async\" width=\"449\" height=\"449\" src=\"http:\/\/cad4security.org\/wp-content\/uploads\/2_Sp_John_Goodenough-1.jpg\" alt=\"\" class=\"wp-image-1929\" srcset=\"http:\/\/cad4security.org\/wp-content\/uploads\/2_Sp_John_Goodenough-1-150x150.jpg 150w, http:\/\/cad4security.org\/wp-content\/uploads\/2_Sp_John_Goodenough-1-300x300.jpg 300w, http:\/\/cad4security.org\/wp-content\/uploads\/2_Sp_John_Goodenough-1.jpg 449w\" sizes=\"(max-width: 449px) 100vw, 449px\" \/><\/figure><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:80%\">\n<h2 class=\"wp-block-heading\"><strong><strong><strong><strong><strong>John Goodenough<\/strong><\/strong><\/strong><\/strong><\/strong><\/h2>\n\n\n\n<p class=\"is-style-default has-sm-font-size\">Former VP Research Collaboration<\/p>\n\n\n\n<p class=\"is-style-subheading\"><strong><strong><strong><strong><strong>ARM<\/strong><\/strong><\/strong><\/strong><\/strong><\/p>\n\n\n\n<p>John is a former VP Research Collaboration at Arm and has been with the company for 20 years. He has held a number of executive technology management roles in Engineering, Design Automation M&#038;A and IT Services. Reporting to the CTO, Johns current focus is on the external research ecosystem working to both support their activities and accelerate arms technology roadmaps. John has long been a champion of Design Enablement to drive best in class integration and interoperability of arms technology and has previously served as Board Director of various Design Automation standards groups. He is currently PI for AISS a major collaborative DARPA program which addresses several aspects if rapid turnaround design and deployment methodologies for the secure SoC Device. Dr Goodenough Holds a BSc from Durham University and a PhD in VLSI Architecture from the University of Sheffield.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n<\/div><\/div>\n\n\n","protected":false},"excerpt":{"rendered":"<p>Jay Lewis Team Lead of Silicon Security Microsoft Dr. Jay Lewis is a Partner at Microsoft focusing on technology incubation, and on strategic semiconductor supply chain risks. In the tech incubation role, this means ensuring that new ideas have a path to become the next generation of products and customer capabilities. The supply chain role &hellip;<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":2245,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"acf":[],"_links":{"self":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/590"}],"collection":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/comments?post=590"}],"version-history":[{"count":59,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/590\/revisions"}],"predecessor-version":[{"id":2417,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/590\/revisions\/2417"}],"up":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/2245"}],"wp:attachment":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/media?parent=590"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}