
Mohammed Ilyas Ahmed
- Security Architect
- Adobe, USA
Mohammed Ilyas Ahmed is a seasoned professional with extensive expertise in security within the DevSecOps domain, dedicated to helping organizations enhance their security posture. His insights and guidance are invaluable for those navigating the complex landscape of DevSecOps. An active contributor to the industry, Mohammed is a sought-after speaker at prestigious conferences such as DEF CON, KubeCon Paris, and IANS, among others. He also serves as a judge for technical sessions, bringing his expertise to the forefront of industry events. His commitment to advancing knowledge is evident through his research contributions at Harvard University, where he publishes work that enriches academic discourse on security practices. As a distinguished member of the Harvard Business Review Advisory Council, Mohammed fosters collaboration between academia and industry, emphasizing knowledge sharing and innovation.
Mohammed’s influence extends globally as a Member of the Global Advisory Board at VigiTrust Limited, based in Dublin, Ireland, where he contributes to shaping international cybersecurity and data protection strategies. His numerous certifications further highlight his dedication to excellence and reflect his depth of knowledge in the security field Beyond his professional endeavors, Mohammed is a multi-faceted individual with diverse interests, adding depth and perspective to his work and personal life. He is also the author of Cloud-Native DevOps, where he shares insights on building scalable, secure cloud-native applications. Learn more about the book here: Cloud-Native DevOps on Amazon. Mohammed’s areas of interest include cybersecurity, cloud-native technologies, DevSecOps, risk management, and AI in cloud-native
ecosystems.
Sessions
-
AI and Cyber in CI
Is AI a force for good or evil? AI enhances critical infrastructure cybersecurity by improving threat detection, automating responses, and predicting attacks. Machine learning algorithms can analyze vast data volumes to identify anomalies, enabling proactive defense. However, AI also presents challenges, as malicious actors can use it to create sophisticated attacks. Effective critical infrastructure protection requires leveraging AI’s strengths while mitigating its potential risks through robust security measures and continuous adaptation.