Today, large corporations generate, collect and store enormous amounts of data in order to drive efficiency and insight. Protecting such data is fundamental as cyber threats become more and more sophisticated but solutions are limited by user resistance, complexity and ROI. On April 24th, the Global Open Innovation Network held a TechMeeting in San Francisco aiming at understanding current security challenges and how to address them.

The event kicked off with a panel discussion between:

  • Robert de Monts, Advisor and former CEO of Security companies
  • Swathi Joshi, Crisis Management Lead at Netflix
  • Dhia Mahjoub, Head of Security R&D at Open DNS – Cisco
  • Loïc Houssier, VP Engineering at DocuSign

The panel first discussed the importance of security and authentication in the digital era. Dhia Mahjoub provided some ground to the discussion by sharing some facts: in 2018, businesses operating in the US incurred a loss of over $650 billion due to cyberattacks. For Swathi Joshi, incidence is inevitable and there is no best defense to protect against attacks. However, companies can protect themselves by acting fast to detect, contain and solve security issues. It is then necessary to learn from those incidents, and make sure they never happen again. Loïc Houssier nuanced that answer by reminding the critical role of trust for businesses such as DocuSign, who place cybersecurity at the core of their business.

According to Robert de Monts, trust has become a central topic for cybersecurity players. As a matter of fact, Zero Trustbecame 2019’s buzzword in the security field, succeeding to Machine Learning in 2018, and Sandboxingin 2017. Zero Trust, or Zero Trust Architecture,refers to a security model that no longer assumes that actors, systems or services operating from within the security perimeter should be automatically trusted, and instead must verify anything and everything trying to connect to its systems before granting access[1].

Loïc Houssier then highlighted the importance of buzzwords to raise awareness, spread knowledge and encourage good practices. For Robert de Monts, these missions are crucial given the fragmented nature of the cybersecurity industry. Indeed, with the lack of global standards and little differentiation between security startups, the sector is coping with a lot of noise. This fragmentation makes it difficult for businesses as they need to manage all aspects of security while relying on an array of providers. As a conclusion, the panelists called for a common framework that would allow security providers to better integrate with existing systems and cope with national regulations.

The discussion was followed by the pitch of 9 startups:

Trillium Secure

Trillium Secure provides an Edge to Edge Automotive Cybersecurity Platform that delivers Lifecycle Protection for Connected and Autonomous Vehicles. By establishing trust in data integrity, Trillium facilitates uses of trusted data, applications and services, in addition to positioning customers for compliance with privacy regulations and protecting them from cyber-threats. Trillium accelerates innovation and security for OEMs, insurance and mobility-as-a-service providers.


ShieldIO maintains the integrity of the data enabling compliance to national and international regulations, without impeding data use. To do so, the company leverages current cryptography methods, together with Real-Time homomorphic encryption. All without exposing a proven security threats that come from having a key store and super-user access to the data.

Redrock Biometrics

Developer of a palm-print based authentication software designed to secure identity. The company’s software is more accurate than fingerprint authentication which converts the palm image to a unique signature and requires less light to function than produced by the average device screen, enabling customers to improve their identification.


Developer of an enterprise security software designed to offer data protection services. The company’s software protects data at rest and data during motion, while keeping keys, data, and applications completely protected from external and internal threats and all types of backdoors, whether deployed on-premise or on any cloud provider, enabling clients to keep their information safe and prevent cyber-crimes.

TrueFace AI

Provider of a facial recognition platform intended to make immediate decisions based on identified patterns. The company’s platform applies advanced computer vision technology to camera footage and images, enabling users to identifying persons of interest and objects easily.

Alcatraz AI

Developer of a facial authentication platform designed to replace badging as an access point authentication system. The company’s platform uses 3D face modeling, artificial intelligence and deep learning technology along with facial depth points to step up the biometric security level, enabling companies to implement highly secure and frictionless access points.


Provider of identity management services designed to help brands and enterprises create personalized experiences for their customers. The company’s identity management services support advertising, personalization, content management, product recommendations, validation, and risk detection.


Provider of a passive behavioral authentication platform intended to identify users without any conscious user action. The company’s authentication system utilizes sensor fusion and machine learning in order to achieve greater accuracy while improving user experience during authentication both in-app, and in the physical world, enabling users to identify themselves in a unique way that is extremely difficult to forge or crack.


PencilDATA helps organizations operate in a trusted environment by making it easy to take advantage of advanced blockchain technologies. Chainkit is a cloud-based API from PencilDATA that enables organizations to improve the data integrity in their existing systems and business processes using the immutable strength of blockchain.


Join us for our next events:


[1] John KINDERVAG, 4 Major Myths of Zero Trust Architecture in Sirius Edge, January 18, 2018.
Available at: 

Photo credit: Unsplash