Former Director of the NASA and Cal Tech Jet Propulsion Laboratory
A leader in the innovative technology that prevents cloud data from being accessed without authorization. Speaker Michael Coates has developed security programs and overseen their implementation for some of the world's largest banks, corporations, and governments. Organizations book Michael Coates to learn about how security is eating the world, the future of security, and the strategies for securing the future of technology.
Want to book Michael Coates as a speaker for your event? Please provide the info below and we’ll get in touch within 24h:
Cybersecurity speaker Michael Coates co-founded Altitude Networks and is also its CEO. San Francisco-based Altitude Networks is a startup that focuses on enterprise cloud security.
The company uses innovative technology to prevent its customers’ cloud data from being accessed without authorization. It also protects it from malicious and accidental sharing, as well as information theft. In order to identify risk, Altitude Networks employ intelligent automation to delve into patterns and variations. They efficiently safeguard SaaS apps and cloud collaboration.
In the past, Michael served as Twitter’s Chief Information Security Officer. During his tenure at Twitter, he was responsible for overseeing all aspects of the company’s information security program. His work at Mozilla and Twitter has impacted hundreds of millions of people.
His other professional experience includes serving as OWASP’s chairman of the board of directors. OWASP is the most prominent non-profit application security organization in the world. In fact, the organization has 200 chapters in more than 100 countries worldwide. Michael serves as an advisor for several promising security startups.
Speaker Michael Coates worked as Shape Security’s Director of Product Security before joining Twitter. When he took on this position, he radically changed Shape Security’s defenses against modern application attacks.
Michael has developed security programs and overseen their implementation for some of the world’s largest banks, corporations, and governments. In 2012, SC Magazine named Michael as one of its Influential Security Minds. In addition, he has been an advisor to a number of startups.
Technology influences nearly every part of our existence and will shape our future significantly. It touches everything, from how we travel, heal, to how we communicate. Yet, we regularly witness major security breaches affecting our tech-dependent world. While security basics are straightforward, applying them is complex. With intertwined tech systems, data surges, quick market launches, and human biases in play, the answer isn't just more human intervention. The mantra is: automate or become obsolete. Security's future lies in embracing autonomy, scalability, and speed. Let's delve into this topic, discussing bold viewpoints and stark truths to chart a path for technology's secure future.
Web3 is reshaping discussions in tech, promising to redefine our everyday interactions. With the internet's latest evolution, we're seeing digital assets symbolizing ownership, blockchain-driven decentralized data transfer, intellectual property safeguards via NFTs, and immersive metaverses with vivid virtual realities. But, how will this impact businesses, institutions, and our system's future? Join Michael Coates, a cybersecurity and digital asset specialist, as he unpacks Web3's innovations, relevance, and prospects for organizational and societal strategies. He'll also address Web3's challenges, offering pragmatic advice for maintaining system security in this advanced digital era.
|Basic Data Protection Information|
|Data controller||AURUM SPEAKERS BUREAU S.L.|
|Address||Doctor Ullés 2, 3º 1ª, CP 08224, TERRASSA (Barcelona)|
|Purposes||We will use your data to respond to your requests and deliver our services to you.|
|Marketing||We will only send you marketing correspondence if you have given your prior consent, which you can do by ticking the box for that purpose.|
|Lawful basis||We will only process your data if you have given your prior consent, which you can do by ticking the box for that purpose.|
|Recipients||Generally, only our members of staff who have been duly authorised may access the data that you have provided.|
|Your Rights||You have the right to know what information we hold about you, to rectify it and to erase it, as explained in the additional information available on our website.|