SNIA Developer Conference September 15-17, 2025 | Santa Clara, CA
The immune system has evolved from ground-up to protect us. It offers a rich and innovative set of strategies and tactics. Drawing parallels to the digital world, we can adopt a number of these strategies to develop a more secure enterprise infrastructure. The immune system comprises specialized system information pathways, memory bank of recipes to create antigens and even fabricate interceptor molecules that impede spread of pathogens not yet encountered. Using biomimicry, similar specialized monitoring and protection mechanisms can be built into key OS and networking modules. The body is judicious in how it spends energy and other resources on immune responses. The presentation discussed architecting similar efficient “inline” monitoring of systems. In the event of a viral attack, many similarities can be observed between viral and ransomware attacks. As first line of defense, intentional vaccination are used to increase herd immunity. In parallel, agents spreading the infection are identified and isolated. Using this as an analogy, the presentation various we discuss digital tactics that could be deployed. The immune response uses various strategies to differentiate between cells that belong to the body versus foreign cell and identify and destroy them. The presentation discussed deploying similar strategies to detect and quarantine errant "foreign" code and data.
Ransomware attacks pose an existential threat to enterprise infrastructure, with devastating consequences for organizations and individuals alike. Drawing inspiration from the human immune system, this talk proposes a novel approach to ransomware mitigation using biomimicry. By studying the immune system's strategies and tactics, we can develop innovative solutions to detect, respond to, and prevent ransomware attacks. This talk will explore the parallels between biological and digital systems, highlighting key biomimicry-inspired strategies for ransomware mitigation, including system protection, pathogen recognition, and adaptive response. By leveraging the power of biomimicry, we can create more robust and resilient cybersecurity systems, better equipped to defend against the evolving threat of ransomware.
The blurring of the lines between data centers and automobiles continues to grow fuzzier. This talk explores the trends in automotive fabrics tying together a wild array of sensors, displays, processors, memory, and storage. Another data center trend that may actually appear first in cars is the need for post-quantum security algorithms, preventing malicious intruders from steering our cars off bridges.
Storage developers need to understand that the algorithms and protocols used for data protection are in the midst of significant changes. This is driven by increases in the size of storage devices, the complexity of large data storage systems, discoveries of weaknesses, and improvements in attacks on encryption. Storage devices are seeing changes in block encryption algorithms and in implementations of those algorithms. Post-quantum cryptographic (PQC) algorithms will improve resistance to attacks using quantum computers, and a new timeline is in effect for adoption of those algorithms. Various protocols are being updated to use the new algorithms and to manage the transition to PQC.
DMTF’s Security Protocol and Data Model (SPDM) protocol is a widely used set of standards that enable secure communication and device authentication for platform-level security. This session will give an update on major developments by the SPDM Working Group, and where the group is going over the next year. In the past year, DMTF has released SPDM version 1.4, the first version to support CNSA 2.0 algorithms for post-quantum cryptography. This was added to the specification in a way that maintains backwards compatibility with existing deployments and enables platforms to adopt forward-looking requirements. The SPDM to Storage binding (version 1.0) was also released, enabling SPDM to secure a broad range of storage transports using a common command set. This release enables SPDM across a variety of storage protocols using a broadly compatible command set. DMTF has also released the SPDM Authorization specification, which adds access policies on top of SPDM. The authorization specification leverages the capabilities of SPDM to bring access control, credential provisioning, and policy management to modern platforms, including support for CXL. The session will conclude with a look at the SPDM Working Group’s roadmap, including anticipated enhancements and potential new use cases.