Greg Akers is the Senior Vice President & CTO of Advanced Security Research &
Government and Chief Technology Officer within the Security & Trust Organization (STO)
group at Cisco. With more than two decades of executive experience, Akers brings a
wide range of technical and security knowledge to his current role. A major focus of his
group is to expand security awareness and launch product resiliency initiatives
throughout Cisco’s development organization to deliver high-quality and secure products
to customers. He also serves as executive sponsor of the Cisco Disability Awareness Network.
Akers joined Cisco in 1993. He has held a variety of technical, managerial and executive
roles at Cisco. These have included networking engineer, Vice President for the
Worldwide Technical Assistance Center, Senior Vice President-CTO Services and Senior
Vice President-Global Governments Solutions Group. He also holds the CCIE
In addition, Akers is an Internet security and critical infrastructure protection advisor to
Cisco customers and to the U.S. government. He regularly advises and directs activities
relative to technology and security matters of domestic and international importance.
Akers has also advised the U.S. Department of Defense and the federal intelligence
community for more than fifteen years.
Before joining Cisco, Akers’ career included more than 15 years of designing, building,
and running large networks for Fortune 100 companies. He has held senior technical
and leadership roles at Fechheimer Brothers, a holding of Berkshire Hathaway, and
Procter and Gamble.
Akers holds a bachelor of science degree in chemical engineering from the University of Akron.
Title: Hardware Anchored Trust in a Software Defined World
Abstract: We will explore the composition of hardware derived trust, privacy and security in a world of untrusted software defined components.
Looking at historical precedence and the likely future. We will explore the needs in a world of Quantum Computing, pervasive AI, and
entirely a cloud world. As the world evolves to Not, in most aspects of our lives, we compose increasingly complex and intertwined systems
that have limited verifiably robust security and trust. We will explore how critically position hardware roots of trust may improve these