Matthew Rosenquist joined Intel Corp in 1996 and benefits from 28 diverse years in the fields of cyber, physical, and information security. Mr. Rosenquist specializes in security strategy, measuring value, developing best-practices for cost effective capabilities, and establishing organizations which deliver optimal levels of cybersecurity. As a cybersecurity strategist for the Intel, he identifies risks and opportunities to build organizations that balance risks, costs, and usability factors across hardware, firmware, software, artificial intelligence, and services. Mr. Rosenquist is active in the industry and consults on best-practices and emerging risks to academic, business, and government audiences around the globe. Mr. Rosenquist built and managed Intel’s first global 24x7 Security Operations Center, oversaw several internal platform security products and services, deployed the enterprise intrusion detection program, and was Intel’s first Incident Commander for worldwide IT emergency responses. He has conducted investigations and risk assessments in defense of corporate assets and managed the security playbook for Intel security features landing in the PC architecture. Mr. Rosenquist ran security for Intel’s multi-billion dollar mergers and acquisitions activities and quantitatively justified the improvement strategy protecting Intel’s global manufacturing capability. His development of the Threat Agent Risk Assessment (TARA) methodology to optimize security, has influenced how organizations view and prioritize risks. Currently, he is leading cybersecurity for Intel’s Artificial Intelligence group, with a focus on how AI will transform security, privacy, and safety. Mr. Rosenquist is very active in the industry, speaks at conferences, consults with industry partners, member of multiple advisory boards, and has published acclaimed white papers, blogs, and videos on a wide range of cybersecurity topics. In 2018, he was named one of LinkedIn’s Top Voices for technology. He is very passionate about cybersecurity and strives to blend practical risk mitigation practices, business processes, and technology capabilities to achieve an optimal level of security.