DigiCert announced the hiring of Mike Ahmadias Global Director of IoT Security. Ahmadi will help build DigiCert IoT security solutions for critical infrastructure markets including healthcare, transportation, industrial, and smart city.
"Mike is a respected voice on issues related to IoT cybersecurity, information security, and standards creation, and his extensive knowledge will help us continue to provide customers with market-leading solutions for securing their connected devices," said DigiCert VP of IoT Mike Nelson. "We are excited to have him join our team to advance our critical work."
"I'm excited to join the wonderful people at DigiCert in advancing customer solutions for IoT security," said Ahmadi. "DigiCert has proven to be a global leader and I look forward to this exciting opportunity to bring important innovation to the market."
Ahmadi currently serves in various capacities to advance industry standards for IoT security, including as a member of the technical steering committee for the ISA Security Compliance Institute (ISCI), and also the Chairman of the Cybersecurity Assurance Testing Task Force under the Society for Automotive Engineering (SAE). He also is an active member of the U.S. Department of Homeland Security Industrial Control Systems Joint Working Group, as part of the advisory board for the U.S. Secret Service Electronic Crimes Task Force.
Ahmadi makes regular appearances as a speaker and subject matter expert at various cybersecurity events internationally. Previously, Ahmadi has served on the editorial board of ISSA Journal, and been a co-author for AAMI Journals as well as several other publications, including the American Bar Association Security and Privacy guide.
DigiCert, which recently announced an agreement to acquire Symantec's Website Security business and related PKI solutions, secures connected devices for leading manufacturers and OEMs across various industries. The company's IoT security solutions enable automated certificate provisioning, data encryption, secure boot, patch management, machine-to-machine mutual authentication, user authentication, and data integrity to help prevent unauthorized intrusions and data manipulation.