Chief Strategy & Technology Officer
BlackRidge Technology International, Inc
Chief Strategy and Technology Officer of BlackRidge Technology International, Inc. (BRTI), formerly VP Secure Technology Group Analog Devices, and President of Sypris Cyber Solutions. John is responsible for working with the BlackRidge and customer teams to develop products and channel solutions that meet their needs and the needs of the market. He has a background in high assurance systems security, Security Assurance Frameworks and Implementation, IoT/ IIoT, Secure Semiconductor, Assured Identity, cryptographic key management, systems penetration testing, and the development of trusted architectures using identity as a core element. Mr. Walsh holds 11 identity architecture-related patents with additional patents pending. While he is experienced in developing and nurturing longterm customer relationships, John is a thought leader in the growing need to develop a broader view in today’s business / tech ecosystems in the environment of connectivity and new / emerging value chains as part of establishing successful global strategies, partnerships, new product / services development and launches. John is a globally recognized leader and contributor in IoT, Smart Cities, Identity Based Trust Models / Architectures, and Trusted Identity Solutions using HRoT, securing trust point to point and is engaged with many of the leaders in this area.
Some of the priorities that the government has established through 2021 include:
• Establishing assured identity to improve our posture in zero trust environments
• Enhancing monitoring, analytics, and adaptive cyber response
• Moving to software-defined environments for perimeters (SDP), networks (SDN), and endpoints
• Securing access to commercial cloud platforms and preventing domain squatting and side channel and trojan attacks
The presentation will provide an overview of the BlackRidge Transport Access Control solution and example use cases illustrating enabling architectural capabilities for achieving objectives consistent with government priorities listed. These include use of endpoint identity characteristics and a transport layer architecture that enables non-interactive authentication, the enforcement of rules and policies for segmentation and segregation (including Privileged Access Management), cloaking of endpoints and network assets, and the ability to accomplish these in topology-independent environments including SDN and SDP.