Shiva Dasari is a Senior Distinguished Technologist and the Chief Infrastructure Security Architect in the Office of the CTO at Hewlett Packard Enterprise (HPE). He leads end-to-end infrastructure security architecture for HPE products including Servers and Storage.
Shiva plays an active role in various TCG forums including the Board, Technical Committee. He chairs the Server work group and co-chairs the Vulnerability Response Board Subcommittee. He is an active contributor to many TCG specifications. He was also a contributor to NIST publications including SP800-193.
In addition to security architecture, he is also a thought leader in Secure Development Lifecycle, Supply Chain Security, Signing Server Infrastructure, Product Security Incident Handling Process, and Security Certification processes.
Prior to HPE, Shiva served as the Security CTO for Lenovo’s Enterprise Business Group. Preceding to IBM System x acquisition by Lenovo, Shiva worked at IBM over 18 years in the x86 server development in various roles including the Chief Security Architect of System x & Flex Servers. He was responsible for security architecture, strategy, and roadmap of IBM System x & Flex servers. Shiva was the driving force in making TPM shipped as a standard component in IBM x86 servers which significantly accelerated its penetration into server ecosystem. Shiva was the pioneer in architecting and delivering an industry leading solution for securing IBM’s BMC called Integrated Management Modules (IMM) using security innovation in conjunction with TCG technologies.
Shiva has over 40 patents in the areas of Security, Server Architecture, Memory, PCI, and Processor Architecture. Shiva holds a master’s degree in software systems. He is also a Certified Information System Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Cloud Security Professional (CCSP), and Certified Information Security Auditor (CISA).
Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.
Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.
Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.