Today we’d like to introduce you to Adam Perschke.
Adam, let’s start with your story. We’d love to hear how you got started and how the journey has been so far.
From a young age, I was competitive. I feel that same drive to compete to this day. Growing up, I was an adventurer. I loved exploring wooded areas, open-air towers, and being creative with my surroundings. I gain knowledge and insight through experiences, conversations, and actively taking part in the present moment.
My strong single-mother raised me and my sister through some difficult times. Throughout my life, I was taught to think strategically about my decisions and creatively about solutions. I am a visual learner and a strategic thinker. This led me to where I am today and the way I solve problems for global organizations.
Thinking differently meant turning down acceptance and lucrative scholarships to SMU’s Temerlin Advertising Institute. Don’t get me wrong, school is great in many ways (SMU is a fantastic university) and has many benefits – it just didn’t fulfill all my needs and where I wanted to grow as a person and in business at the time.
I have since provided technology innovation support, guidance, and consultation to various universities, organizations and government entities including but not limited to the U.S. Department of Defense National Security Technology Accelerator (MD5), Amazon, T-Mobile, Toyota Connected, the Association for Unmanned Vehicle Systems International (AUVSI), Earthx, SMU Hunt Institute, among others.
Fast forward a few years –
I co-founded Inteligus Solutions in 2016, joined by two amazing partners in the cybersecurity and government sectors, focused on Identity and Access Management (IAM) solutions. Within a few months, we landed the largest Hewlett Packard Enterprise (HPE) Original Equipment Manufacturer (OEM) as a client. Their business is in the digital security and surveillance industry. This prompted our business growth to accelerate and have the opportunity to implement technologies within 50+ countries and 50,000+ recording devices for multi-national embassies, international airports, correctional facilities, schools, stadiums, and other critical infrastructures.
In 2016, the Mirai Internet of Things (IoT) botnet occurred which spurred a frenzy among organizations, security experts, and governments. We had internal discussions of the global repercussions for lack of identity and access management and external discussions with telecoms and OEMs. Mirai accessed IoT devices by using default usernames and passwords, essentially bypassing security measures by fully authenticating itself and installing malware onto the device without issue. Mirai was the inspiration that spurred two years of research to solve the issue of protecting and securing IoT devices and ecosystems using distributed leger technology.
In 2018, we founded NOVAM. Read below to find out more.
Overall, has it been relatively smooth? If not, what were some of the struggles along the way?
Working with trusted business partners, combined with expert knowledge and experience in various industries, has helped pave the way to a successful and fairly smooth road. Of course, day-to-day hiccups will happen in any organization. It’s non-negotiable.
I know my partners’ abilities very well, as they know mine. An executive team should know the strengths and weaknesses of their co-founders and employees, otherwise, they will fail to recognize ways to remediate problems quickly as they arise.
NOVAM – what should we know? What do you guys do best? What sets you apart from the competition?
NOVAM is a patent-pending distributed cybersecurity company focused on the Internet of Things (IoT) security in all industries worldwide. Using Distributed Ledger Technology (DLT) we aim to protect IoT devices from being infected by malware and ransomware, automatically mitigating threats, while providing auditing and compliance to the enterprise.
We ensure firmware and software running on an IoT device is legitimate, and if not, it is replaced with the correct version or software bundles without an intermediary. DLT will reduce the cost associated with automatically mitigating IoT threats while decreasing the time to mitigate an attack and ensure accurate attestation, auditing, and compliance.
How does it work?
1. Enterprise can initiate a health check for an individual or group of devices. This can occur both in the boot process and during runtime and include the entire Chain of Trust or an individual statistic like firmware, operating system or applications.
2. The state of a device is recorded on an enterprise-specific CDN. This can be used as an external element for future device health checks.
3. Subsequent health checks compare the internal and external state of a device with NOVAM stored internal and external states, signed by the vendor, to determine if the device is healthy or compromised.
4. When a device is considered healthy and unmodified, no mitigation occurs.
5. If a device is considered unhealthy and compromised, based on the system health check, autonomous mitigation will occur.
Our future roadmap includes an enterprise network artificial intelligence (AI), using probabilistic mathematics, architected with inspiration from biomimicry and the human immune system.
What is “success” or “successful” for you?
There are many ways to define success and success is defined differently for everyone.
I define success for myself as being able to do something that’s interesting and innovative on a daily basis.
I like helping others think differently to solve hard problems. Having the ability to talk with others that bring different perspectives and experience to conversations with an open mind is truly amazing.
Contact Info:
- Website: www.novam.ai
- Email: adam@novam.ai
- Facebook: https://facebook.com/novamintl
- Twitter: https://twitter.com/novamintl
- Other: https://www.linkedin.com/in/adamperschke
Getting in touch: VoyageDallas is built on recommendations from the community; it’s how we uncover hidden gems, so if you know someone who deserves recognition please let us know here.