SlideShare a Scribd company logo
1 of 2
Download to read offline
DK Matai Profile: Chairman, mi2g, Philanthropia Φ ATCA – 2006




              DK MATAI
               CHAIRMAN
mi2g ° PHILANTHROPIA Φ ° ATCA

  DK Matai is an engineer turned entrepreneur and philanthropist with a keen interest in the well
  being of global society. DK founded mi2g in 1995, the global risk specialists, in London, UK,
  whilst developing simulations for his PhD at Imperial College. DK helped found ATCA – The
  Asymmetric Threats Contingency Alliance – in 2001, a philanthropic expert initiative to address
  complex global challenges through Socratic dialogue and joint executive action to build a wisdom
  based global economy. ATCA addresses opportunities and threats arising from climate chaos,
  radical poverty, organised crime, extremism, informatics, nanotechnology, robotics, genetics,
  artificial intelligence and financial systems. ATCA has 5,000+ distinguished members from over
  100 countries: including several from the House of Lords, House of Commons, EU Parliament,
  US Congress & Senate, G10's Senior Government officials and over 1,500 CEOs from financial
  institutions, scientific corporates, NGOs and 750+ Profs from academic centres of excellence.
  Philanthropy – DK co-founded The Philanthropia in 2005 – to include the Trinity Club,
  Syndicates and Ethical Investment Funds – with 1,000 leading philanthropists, family offices,
  foundations, private banks, NGOs and specialist advisors to resolve complex global challenges
  through collaborative & sustained efforts. DK’s other voluntary interests are Sant Bani (Voice of
  Saints), a culturally diverse fellowship dedicated to the unity of humankind; World Future Council’s
  Board of Advisors and Donors; Shirley Foundation, Oxford Internet Institute at University of Oxford
  and The Trinity Forum, where he advises on a pro bono basis.
  Honours – DK was selected to present knowledge management to The Queen in 1998 and
  mi2g won The Queen’s Award for Enterprise in the category of Innovation for Bespoke Security
  Architecture in 2003. This led to a visit to Buckingham Palace, a celebration hosted at Lloyd’s of
  London, and by The Lord Mayor at Mansion House, followed by a joint visit to Zurich, Switzerland.
  Innovation – DK spends about half of his time innovating with mi2g teams focused on digital
  banking, digital risk management and bespoke security architecture for major financial institutions,
  government agencies and multi-nationals in Europe, America and Asia. DK believes passionately
  that the next generation of private and corporate banking involves the global safe custody of
  valuable data and intellectual property alongside financial deposits with “guaranteed security”.
  D2-Banking is holistic and includes the online vaulting of genomic maps and medical records;
  art, photo, music and video collections; digital messages and personal files including wills, deeds
  and memoirs; and other intellectual property alongside traditional financial services.
  Authority – DK is an authority on countering complex global threats; strategic risk management
  & visualisation; contingency planning; Information Operations (IO); electronic defence; biometric
  authentication; secure payment systems and Open Source hardened kernel solutions. He is an
  invited contributor to defence and global security analysis in the UK, USA, EU, Canada,
  Switzerland, Japan and India. mi2g intelligence has been cited by several government agencies
  including NISCC in the UK, FBI in the US and United Nations agencies in New York and Geneva.
  Background – DK is a British subject, a Freeman of the City of London, a Liveryman of the
  Worshipful Company of Information Technologists, and a member of the Institute of Directors and
  The Institution of Engineering and Technology. He has worked formerly in the R&D labs of IBM,
  Inmos, ST Microelectronics and Helvar Electrosonic on Massive Parallel Processing and
  supercomputing applications. He enjoys meeting people, sharing thoughts, reading history and
  learning languages. He is vegetarian, teetotal and an optimist. He has lived in Asia, the Middle
  East, Europe and North America and he now lives with his family in Europe, with London as hub.


For further information:

Please contact Intelligence Unit on +44 (0) 20 7712 1782 or intelligence.unit@mi2g.com

www.mi2g.net provides articles under ‘Latest News’ and speeches under ‘Presentations’
DK Matai Profile: Chairman, mi2g, Philanthropia Φ ATCA – 2006


                                    SEMINAL PRESENTATIONS
Helping to build a better world – Private, Public & NGO roles     Credit Suisse Geneva; UBS Zurich
New Paradigms – 21st Century Holistic Wealth Management           Global Family Office Summit Geneva
Holistic Wealth Mgmnt – Ethics in Technology Investing            Dr Hoeller INVERA Fortune Vienna
Asymmetric Threats with Unintended Consequences                   HSBC Global HQ London
Anytime, Anywhere, Active Computing Security 21st Century         CERN Geneva & Fortune Berne
The Startup’s Guide to Net Security & Managing Digital Risk       Reuters/Bloomberg London/New York
Critical role of micro-finance in reducing radical poverty        Reserve Bank of India New Delhi
Role of The Philanthropia in resolving Complex Global Risks       Heim Foundation Geneva
Cyber Crime – Strategic issues for the future                     CIMA Global Conference London
Global Risk, Clean Technology and Fiduciary Responsibility        Bankinter Fundacion Madrid
Exploration of the effects of Asymmetric Attack on Insurance      Lloyd’s and IUA City of London
Addressing Complex Global challenges via Philanthropy             San Fedele Siena; BNP Paribas Paris
Rating & Profiling Catastrophic Risk Exposures                    World Future Council Geneva
Re-thinking the Digital Future – Robotics, Bio, Nano, AI & IT     Wolfsberg (UBS) Switzerland
Impact on Confidence of War with Iraq – Financial fall out        VISA, London / San Francisco
New Generation Philanthropists – Social Entrepreneurship          Skoll World Forum Oxford University
Unforeseen Threats Summit – CBRN-DS Issues                        UK Government Agencies London
Global Risk Management – Top 10 Asymmetric Threats                School of Diplomacy & IR Geneva
Business Continuity in the context of Global Risk Mgmnt           Fairfax Financial Holdings Toronto
Digital Risk Mgmnt, Data Custody, Privacy & Identity Theft        ISO17799 Comm & LGT Bank Vaduz
Organised Crime, Terrorism and the Internet                       Oxford Internet Institute Oxford
Service Level Management & Digital Risk Opportunities             British Bankers’ Association London
Holistic Risk Solutions: Pivotal Role of Technology               ETH Centre Security Studies Luzern
Is the UK prepared for Cyber Warfare?                             PITCOM Palace of Westminster
Strategic & Tactical Risk Visualisation – Tools and Systems       CERN & Fortune Management Geneva
World beyond 9/11 – Asymmetric impact of Technology               British Computer Soc / RTC Whitehall
50 Years of Computing: Future & Past; Risks & Precautions         The Guildhall City of London



                              MEDIA INTERVIEWS AND COVERAGE
  Broadcast                BBC, Bloomberg, CNN, Channel 4, ITN, ARD, MSNBC, Reuters, Sky

  Press                    Financial Times, New York Times, Washington Post, The Guardian, Globe &
                           Mail, The Independent, Observer, The Times, The Sunday Times, Sydney
                           Morning Herald, Wall Street Journal
  Journals                 The Economist, Business Week, Time, Newsweek, Fortune, Forbes,
                           European Banker, Computer Weekly, IDG, Silicon, VNU, ZDNet



                                        mi2g CREDENTIALS
  mi2g works primarily with major financial institutions & government agencies as long
  term partners and has set-up, managed and transferred trans-national engineering
  projects in excess of USD 100 million delivering significant savings globally. mi2g has
  worked with private, public and voluntary organisations at Chairman and CEO level with
  annual budgets in excess of USD 5 billion or assets under management in excess of
  USD 25 billion. mi2g was conferred the Queen’s Award for Enterprise in the category of
  Innovation in 2003 for Bespoke Security Architecture (BSA). BSA is based on mi2g’s
  pioneering digital risk management methodology. Main products are: Digital Risk
  Matrix (DRM), Contingency Capability Radar (CCR), Electronic Data Fort Initiative
  (eDFi) or D2-Banking, Knowledge Management Object Database System (KMODS)
  & Security Intelligence Products and Systems (SIPS) digital attack database.


For further information:

Please contact Intelligence Unit on +44 (0) 20 7712 1782 or intelligence.unit@mi2g.com

www.mi2g.net provides articles under ‘Latest News’ and speeches under ‘Presentations’

More Related Content

Viewers also liked

Componenti motorie del grafismo
Componenti motorie del grafismoComponenti motorie del grafismo
Componenti motorie del grafismoiva martini
 
All419378memoria lavoro
All419378memoria lavoroAll419378memoria lavoro
All419378memoria lavoroiva martini
 
1.ferreiro teberosky
1.ferreiro teberosky1.ferreiro teberosky
1.ferreiro teberoskyiva martini
 
TecnologíA Educativa
TecnologíA EducativaTecnologíA Educativa
TecnologíA Educativagueste4ae1c
 
Iv Tramo Ruta Del Gallipato[1]
Iv Tramo Ruta Del Gallipato[1]Iv Tramo Ruta Del Gallipato[1]
Iv Tramo Ruta Del Gallipato[1]guestd3205d6
 
18 25marzo2009 delloro dislessia
18 25marzo2009 delloro dislessia18 25marzo2009 delloro dislessia
18 25marzo2009 delloro dislessiaiva martini
 
Ltdbmm™ Updated 4.5
Ltdbmm™ Updated 4.5Ltdbmm™ Updated 4.5
Ltdbmm™ Updated 4.5guestb8e62a43
 
Molteni apprendimento letto scrittura
Molteni apprendimento letto scritturaMolteni apprendimento letto scrittura
Molteni apprendimento letto scritturaiva martini
 
Nuovi modelli di_funzioni_esecutive_in_eta_evolutiva-crippa
Nuovi modelli di_funzioni_esecutive_in_eta_evolutiva-crippaNuovi modelli di_funzioni_esecutive_in_eta_evolutiva-crippa
Nuovi modelli di_funzioni_esecutive_in_eta_evolutiva-crippaiva martini
 
Empatia neuronimirror
Empatia neuronimirrorEmpatia neuronimirror
Empatia neuronimirroriva martini
 
Lettoscrittura 2
Lettoscrittura 2Lettoscrittura 2
Lettoscrittura 2iva martini
 
When Google, Restricte Your Access Without Reason
When Google, Restricte Your Access Without ReasonWhen Google, Restricte Your Access Without Reason
When Google, Restricte Your Access Without Reasonion tudor
 

Viewers also liked (20)

Componenti motorie del grafismo
Componenti motorie del grafismoComponenti motorie del grafismo
Componenti motorie del grafismo
 
All419378memoria lavoro
All419378memoria lavoroAll419378memoria lavoro
All419378memoria lavoro
 
Vcorsi 13 5_09
Vcorsi 13 5_09Vcorsi 13 5_09
Vcorsi 13 5_09
 
Lez 09 03
Lez 09 03Lez 09 03
Lez 09 03
 
Untitled
UntitledUntitled
Untitled
 
1.ferreiro teberosky
1.ferreiro teberosky1.ferreiro teberosky
1.ferreiro teberosky
 
TecnologíA Educativa
TecnologíA EducativaTecnologíA Educativa
TecnologíA Educativa
 
Iv Tramo Ruta Del Gallipato[1]
Iv Tramo Ruta Del Gallipato[1]Iv Tramo Ruta Del Gallipato[1]
Iv Tramo Ruta Del Gallipato[1]
 
Mapa3
Mapa3Mapa3
Mapa3
 
Pacifico
PacificoPacifico
Pacifico
 
2^lezione
2^lezione2^lezione
2^lezione
 
18 25marzo2009 delloro dislessia
18 25marzo2009 delloro dislessia18 25marzo2009 delloro dislessia
18 25marzo2009 delloro dislessia
 
Ltdbmm™ Updated 4.5
Ltdbmm™ Updated 4.5Ltdbmm™ Updated 4.5
Ltdbmm™ Updated 4.5
 
Molteni apprendimento letto scrittura
Molteni apprendimento letto scritturaMolteni apprendimento letto scrittura
Molteni apprendimento letto scrittura
 
Nuovi modelli di_funzioni_esecutive_in_eta_evolutiva-crippa
Nuovi modelli di_funzioni_esecutive_in_eta_evolutiva-crippaNuovi modelli di_funzioni_esecutive_in_eta_evolutiva-crippa
Nuovi modelli di_funzioni_esecutive_in_eta_evolutiva-crippa
 
Empatia neuronimirror
Empatia neuronimirrorEmpatia neuronimirror
Empatia neuronimirror
 
Referral Program
Referral ProgramReferral Program
Referral Program
 
Img002
Img002Img002
Img002
 
Lettoscrittura 2
Lettoscrittura 2Lettoscrittura 2
Lettoscrittura 2
 
When Google, Restricte Your Access Without Reason
When Google, Restricte Your Access Without ReasonWhen Google, Restricte Your Access Without Reason
When Google, Restricte Your Access Without Reason
 

Similar to Dkm Profile

Top Cyber News Magazine. Margo Koniuszewski
Top Cyber News Magazine. Margo KoniuszewskiTop Cyber News Magazine. Margo Koniuszewski
Top Cyber News Magazine. Margo KoniuszewskiTopCyberNewsMAGAZINE
 
Agenda PWC Cybersecurity Day - 18 octobre 2016
Agenda PWC Cybersecurity Day - 18 octobre 2016Agenda PWC Cybersecurity Day - 18 octobre 2016
Agenda PWC Cybersecurity Day - 18 octobre 2016ITnation Luxembourg
 
hybrid_threats.pdf
hybrid_threats.pdfhybrid_threats.pdf
hybrid_threats.pdfdarg0001
 
[Webinar Slides] How to Transform Your Legacy Processes to Keep up with the D...
[Webinar Slides] How to Transform Your Legacy Processes to Keep up with the D...[Webinar Slides] How to Transform Your Legacy Processes to Keep up with the D...
[Webinar Slides] How to Transform Your Legacy Processes to Keep up with the D...AIIM International
 
Maryland-Netherlands Cybersecurity Soft Landing Program (Panel discussion Oct...
Maryland-Netherlands Cybersecurity Soft Landing Program (Panel discussion Oct...Maryland-Netherlands Cybersecurity Soft Landing Program (Panel discussion Oct...
Maryland-Netherlands Cybersecurity Soft Landing Program (Panel discussion Oct...Baltimore-Rotterdam Sister City Committee
 
Minimizing cyber security risks – Digital Security School DSS380
Minimizing cyber security risks – Digital Security School DSS380Minimizing cyber security risks – Digital Security School DSS380
Minimizing cyber security risks – Digital Security School DSS380Internews Ukraine
 
Is Your Organization in Crisis?
Is Your Organization in Crisis?Is Your Organization in Crisis?
Is Your Organization in Crisis?BlackBerry
 
Credit Suisse High-Tech Forum Report
Credit Suisse High-Tech Forum ReportCredit Suisse High-Tech Forum Report
Credit Suisse High-Tech Forum ReportStuart Daniel
 
Information Risk Insurance Concept and Basic Aspects
Information Risk Insurance Concept and Basic AspectsInformation Risk Insurance Concept and Basic Aspects
Information Risk Insurance Concept and Basic Aspectsijtsrd
 
The Internet of Things 2012 - New Horizon
The Internet of Things 2012 - New HorizonThe Internet of Things 2012 - New Horizon
The Internet of Things 2012 - New HorizonLittle Daisy
 
The National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationThe National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationMark Johnson
 
Enterprise risk magazine - IRM India Affiliate
Enterprise risk magazine - IRM India Affiliate Enterprise risk magazine - IRM India Affiliate
Enterprise risk magazine - IRM India Affiliate IRM India Affiliate
 
How Should Risk Leaders of Future Work With AI.pdf
How Should Risk Leaders of Future Work With AI.pdfHow Should Risk Leaders of Future Work With AI.pdf
How Should Risk Leaders of Future Work With AI.pdfThe IRM India
 
Top Cyber News MAGAZINE. Troels Oerting
Top Cyber News MAGAZINE. Troels Oerting Top Cyber News MAGAZINE. Troels Oerting
Top Cyber News MAGAZINE. Troels Oerting TopCyberNewsMAGAZINE
 
Scot Secure 2017
Scot Secure 2017Scot Secure 2017
Scot Secure 2017Ray Bugg
 
European Cyber Security Perspectives 2016
European Cyber Security Perspectives 2016European Cyber Security Perspectives 2016
European Cyber Security Perspectives 2016Omer Coskun
 
The global information technology report 2012 (wef)
The global information technology report 2012 (wef)The global information technology report 2012 (wef)
The global information technology report 2012 (wef)Dr Lendy Spires
 
Cyber savvy (2)
Cyber savvy (2)Cyber savvy (2)
Cyber savvy (2)naveen p
 

Similar to Dkm Profile (20)

Top Cyber News Magazine. Margo Koniuszewski
Top Cyber News Magazine. Margo KoniuszewskiTop Cyber News Magazine. Margo Koniuszewski
Top Cyber News Magazine. Margo Koniuszewski
 
Agenda PWC Cybersecurity Day - 18 octobre 2016
Agenda PWC Cybersecurity Day - 18 octobre 2016Agenda PWC Cybersecurity Day - 18 octobre 2016
Agenda PWC Cybersecurity Day - 18 octobre 2016
 
Security in a Mobile World
Security in a Mobile WorldSecurity in a Mobile World
Security in a Mobile World
 
hybrid_threats.pdf
hybrid_threats.pdfhybrid_threats.pdf
hybrid_threats.pdf
 
[Webinar Slides] How to Transform Your Legacy Processes to Keep up with the D...
[Webinar Slides] How to Transform Your Legacy Processes to Keep up with the D...[Webinar Slides] How to Transform Your Legacy Processes to Keep up with the D...
[Webinar Slides] How to Transform Your Legacy Processes to Keep up with the D...
 
Maryland-Netherlands Cybersecurity Soft Landing Program (Panel discussion Oct...
Maryland-Netherlands Cybersecurity Soft Landing Program (Panel discussion Oct...Maryland-Netherlands Cybersecurity Soft Landing Program (Panel discussion Oct...
Maryland-Netherlands Cybersecurity Soft Landing Program (Panel discussion Oct...
 
Minimizing cyber security risks – Digital Security School DSS380
Minimizing cyber security risks – Digital Security School DSS380Minimizing cyber security risks – Digital Security School DSS380
Minimizing cyber security risks – Digital Security School DSS380
 
Is Your Organization in Crisis?
Is Your Organization in Crisis?Is Your Organization in Crisis?
Is Your Organization in Crisis?
 
Credit Suisse High-Tech Forum Report
Credit Suisse High-Tech Forum ReportCredit Suisse High-Tech Forum Report
Credit Suisse High-Tech Forum Report
 
Information Risk Insurance Concept and Basic Aspects
Information Risk Insurance Concept and Basic AspectsInformation Risk Insurance Concept and Basic Aspects
Information Risk Insurance Concept and Basic Aspects
 
The Internet of Things 2012 - New Horizon
The Internet of Things 2012 - New HorizonThe Internet of Things 2012 - New Horizon
The Internet of Things 2012 - New Horizon
 
The National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationThe National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through Cooperation
 
Enterprise risk magazine - IRM India Affiliate
Enterprise risk magazine - IRM India Affiliate Enterprise risk magazine - IRM India Affiliate
Enterprise risk magazine - IRM India Affiliate
 
How Should Risk Leaders of Future Work With AI.pdf
How Should Risk Leaders of Future Work With AI.pdfHow Should Risk Leaders of Future Work With AI.pdf
How Should Risk Leaders of Future Work With AI.pdf
 
Top Cyber News MAGAZINE. Troels Oerting
Top Cyber News MAGAZINE. Troels Oerting Top Cyber News MAGAZINE. Troels Oerting
Top Cyber News MAGAZINE. Troels Oerting
 
Scot Secure 2017
Scot Secure 2017Scot Secure 2017
Scot Secure 2017
 
European Cyber Security Perspectives 2016
European Cyber Security Perspectives 2016European Cyber Security Perspectives 2016
European Cyber Security Perspectives 2016
 
The global information technology report 2012 (wef)
The global information technology report 2012 (wef)The global information technology report 2012 (wef)
The global information technology report 2012 (wef)
 
Delusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceoDelusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceo
 
Cyber savvy (2)
Cyber savvy (2)Cyber savvy (2)
Cyber savvy (2)
 

More from ion tudor

Tezaurul 120703045758-phpapp02
Tezaurul 120703045758-phpapp02Tezaurul 120703045758-phpapp02
Tezaurul 120703045758-phpapp02ion tudor
 
Maica domnului
Maica domnuluiMaica domnului
Maica domnuluiion tudor
 
Tfm7whvbtqgi32i4uop2 signature-1eceba3bbe763366798b33eff9f8ee329b787206043780...
Tfm7whvbtqgi32i4uop2 signature-1eceba3bbe763366798b33eff9f8ee329b787206043780...Tfm7whvbtqgi32i4uop2 signature-1eceba3bbe763366798b33eff9f8ee329b787206043780...
Tfm7whvbtqgi32i4uop2 signature-1eceba3bbe763366798b33eff9f8ee329b787206043780...ion tudor
 
Mystery of time1
Mystery of time1Mystery of time1
Mystery of time1ion tudor
 
Cccepdf 140723105921-phpapp02
Cccepdf 140723105921-phpapp02Cccepdf 140723105921-phpapp02
Cccepdf 140723105921-phpapp02ion tudor
 
Awesome the wraith cv
Awesome the wraith cvAwesome the wraith cv
Awesome the wraith cvion tudor
 
Mysteries Of Time A Theory Of Transcendence By Ion C. Tudor 1
Mysteries Of Time   A Theory Of Transcendence  By Ion C. Tudor 1Mysteries Of Time   A Theory Of Transcendence  By Ion C. Tudor 1
Mysteries Of Time A Theory Of Transcendence By Ion C. Tudor 1ion tudor
 
14987 Hagu Edecision
14987 Hagu Edecision14987 Hagu Edecision
14987 Hagu Edecisionion tudor
 
Awesome Genius
Awesome GeniusAwesome Genius
Awesome Geniusion tudor
 
Readermanifesto
ReadermanifestoReadermanifesto
Readermanifestoion tudor
 
Comunicare Stiintifica
Comunicare StiintificaComunicare Stiintifica
Comunicare Stiintificaion tudor
 
Forces Unified Ion Tudor (1)
Forces Unified Ion Tudor (1)Forces Unified Ion Tudor (1)
Forces Unified Ion Tudor (1)ion tudor
 
Trying To Corrupte Awesome
Trying To Corrupte AwesomeTrying To Corrupte Awesome
Trying To Corrupte Awesomeion tudor
 
Hidden Goverment
Hidden GovermentHidden Goverment
Hidden Govermention tudor
 

More from ion tudor (20)

Tezaurul 120703045758-phpapp02
Tezaurul 120703045758-phpapp02Tezaurul 120703045758-phpapp02
Tezaurul 120703045758-phpapp02
 
Maica domnului
Maica domnuluiMaica domnului
Maica domnului
 
Tfm7whvbtqgi32i4uop2 signature-1eceba3bbe763366798b33eff9f8ee329b787206043780...
Tfm7whvbtqgi32i4uop2 signature-1eceba3bbe763366798b33eff9f8ee329b787206043780...Tfm7whvbtqgi32i4uop2 signature-1eceba3bbe763366798b33eff9f8ee329b787206043780...
Tfm7whvbtqgi32i4uop2 signature-1eceba3bbe763366798b33eff9f8ee329b787206043780...
 
Mystery of time1
Mystery of time1Mystery of time1
Mystery of time1
 
Cccepdf 140723105921-phpapp02
Cccepdf 140723105921-phpapp02Cccepdf 140723105921-phpapp02
Cccepdf 140723105921-phpapp02
 
1404.7369
1404.73691404.7369
1404.7369
 
Awesome the wraith cv
Awesome the wraith cvAwesome the wraith cv
Awesome the wraith cv
 
Mysteries Of Time A Theory Of Transcendence By Ion C. Tudor 1
Mysteries Of Time   A Theory Of Transcendence  By Ion C. Tudor 1Mysteries Of Time   A Theory Of Transcendence  By Ion C. Tudor 1
Mysteries Of Time A Theory Of Transcendence By Ion C. Tudor 1
 
14987 Hagu Edecision
14987 Hagu Edecision14987 Hagu Edecision
14987 Hagu Edecision
 
Awesome Genius
Awesome GeniusAwesome Genius
Awesome Genius
 
Dkm Profile
Dkm ProfileDkm Profile
Dkm Profile
 
Readermanifesto
ReadermanifestoReadermanifesto
Readermanifesto
 
Dkm Profile
Dkm ProfileDkm Profile
Dkm Profile
 
Comunicare Stiintifica
Comunicare StiintificaComunicare Stiintifica
Comunicare Stiintifica
 
Forces Unified Ion Tudor (1)
Forces Unified Ion Tudor (1)Forces Unified Ion Tudor (1)
Forces Unified Ion Tudor (1)
 
Evr2008
Evr2008Evr2008
Evr2008
 
Trying To Corrupte Awesome
Trying To Corrupte AwesomeTrying To Corrupte Awesome
Trying To Corrupte Awesome
 
Spy Ritual
Spy RitualSpy Ritual
Spy Ritual
 
Spionaj
SpionajSpionaj
Spionaj
 
Hidden Goverment
Hidden GovermentHidden Goverment
Hidden Goverment
 

Recently uploaded

2024.03 Strategic Resources Presentation
2024.03 Strategic Resources Presentation2024.03 Strategic Resources Presentation
2024.03 Strategic Resources PresentationAdnet Communications
 
Work and Pensions report into UK corporate DB funding
Work and Pensions report into UK corporate DB fundingWork and Pensions report into UK corporate DB funding
Work and Pensions report into UK corporate DB fundingHenry Tapper
 
Slideshare - ONS Economic Forum Slidepack - 18 March 2024.pptx
Slideshare - ONS Economic Forum Slidepack - 18 March 2024.pptxSlideshare - ONS Economic Forum Slidepack - 18 March 2024.pptx
Slideshare - ONS Economic Forum Slidepack - 18 March 2024.pptxOffice for National Statistics
 
Solution manual for Intermediate Accounting, 11th Edition by David Spiceland...
Solution manual for  Intermediate Accounting, 11th Edition by David Spiceland...Solution manual for  Intermediate Accounting, 11th Edition by David Spiceland...
Solution manual for Intermediate Accounting, 11th Edition by David Spiceland...mwangimwangi222
 
The unequal battle of inflation and the appropriate sustainable solution | Eu...
The unequal battle of inflation and the appropriate sustainable solution | Eu...The unequal battle of inflation and the appropriate sustainable solution | Eu...
The unequal battle of inflation and the appropriate sustainable solution | Eu...Antonis Zairis
 
Lundin Gold March 2024 Corporate Presentation - PDAC v1.pdf
Lundin Gold March 2024 Corporate Presentation - PDAC v1.pdfLundin Gold March 2024 Corporate Presentation - PDAC v1.pdf
Lundin Gold March 2024 Corporate Presentation - PDAC v1.pdfAdnet Communications
 
MARKET FAILURE SITUATION IN THE ECONOMY.
MARKET FAILURE SITUATION IN THE ECONOMY.MARKET FAILURE SITUATION IN THE ECONOMY.
MARKET FAILURE SITUATION IN THE ECONOMY.Arifa Saeed
 
Contracts with Interdependent Preferences
Contracts with Interdependent PreferencesContracts with Interdependent Preferences
Contracts with Interdependent PreferencesGRAPE
 
ACCOUNTING FOR BUSINESS.II DEPARTMENTAL ACCOUNTS.
ACCOUNTING FOR BUSINESS.II DEPARTMENTAL ACCOUNTS.ACCOUNTING FOR BUSINESS.II DEPARTMENTAL ACCOUNTS.
ACCOUNTING FOR BUSINESS.II DEPARTMENTAL ACCOUNTS.KumarJayaraman3
 
20240314 Calibre March 2024 Investor Presentation (FINAL).pdf
20240314 Calibre March 2024 Investor Presentation (FINAL).pdf20240314 Calibre March 2024 Investor Presentation (FINAL).pdf
20240314 Calibre March 2024 Investor Presentation (FINAL).pdfAdnet Communications
 
LIC PRIVATISATION its a bane or boon.pptx
LIC PRIVATISATION its a bane or boon.pptxLIC PRIVATISATION its a bane or boon.pptx
LIC PRIVATISATION its a bane or boon.pptxsonamyadav7097
 
ACCOUNTING FOR BUSINESS.II BRANCH ACCOUNTS NOTES
ACCOUNTING FOR BUSINESS.II BRANCH ACCOUNTS NOTESACCOUNTING FOR BUSINESS.II BRANCH ACCOUNTS NOTES
ACCOUNTING FOR BUSINESS.II BRANCH ACCOUNTS NOTESKumarJayaraman3
 
Taipei, A Hidden Jewel in East Asia - PR Strategy for Tourism
Taipei, A Hidden Jewel in East Asia - PR Strategy for TourismTaipei, A Hidden Jewel in East Asia - PR Strategy for Tourism
Taipei, A Hidden Jewel in East Asia - PR Strategy for TourismBrian Lin
 
The Power Laws of Bitcoin: How can an S-curve be a power law?
The Power Laws of Bitcoin: How can an S-curve be a power law?The Power Laws of Bitcoin: How can an S-curve be a power law?
The Power Laws of Bitcoin: How can an S-curve be a power law?Stephen Perrenod
 
Stock Market Brief Deck for 3/22/2024.pdf
Stock Market Brief Deck for 3/22/2024.pdfStock Market Brief Deck for 3/22/2024.pdf
Stock Market Brief Deck for 3/22/2024.pdfMichael Silva
 
Hungarys economy made by Robert Miklos
Hungarys economy   made by Robert MiklosHungarys economy   made by Robert Miklos
Hungarys economy made by Robert Miklosbeduinpower135
 

Recently uploaded (20)

2024.03 Strategic Resources Presentation
2024.03 Strategic Resources Presentation2024.03 Strategic Resources Presentation
2024.03 Strategic Resources Presentation
 
Work and Pensions report into UK corporate DB funding
Work and Pensions report into UK corporate DB fundingWork and Pensions report into UK corporate DB funding
Work and Pensions report into UK corporate DB funding
 
Slideshare - ONS Economic Forum Slidepack - 18 March 2024.pptx
Slideshare - ONS Economic Forum Slidepack - 18 March 2024.pptxSlideshare - ONS Economic Forum Slidepack - 18 March 2024.pptx
Slideshare - ONS Economic Forum Slidepack - 18 March 2024.pptx
 
Monthly Economic Monitoring of Ukraine No.230, March 2024
Monthly Economic Monitoring of Ukraine No.230, March 2024Monthly Economic Monitoring of Ukraine No.230, March 2024
Monthly Economic Monitoring of Ukraine No.230, March 2024
 
New Monthly Enterprises Survey. Issue 21. (01.2024) Ukrainian Business in War...
New Monthly Enterprises Survey. Issue 21. (01.2024) Ukrainian Business in War...New Monthly Enterprises Survey. Issue 21. (01.2024) Ukrainian Business in War...
New Monthly Enterprises Survey. Issue 21. (01.2024) Ukrainian Business in War...
 
Effects & Policies Of Bank Consolidation
Effects & Policies Of Bank ConsolidationEffects & Policies Of Bank Consolidation
Effects & Policies Of Bank Consolidation
 
Solution manual for Intermediate Accounting, 11th Edition by David Spiceland...
Solution manual for  Intermediate Accounting, 11th Edition by David Spiceland...Solution manual for  Intermediate Accounting, 11th Edition by David Spiceland...
Solution manual for Intermediate Accounting, 11th Edition by David Spiceland...
 
The unequal battle of inflation and the appropriate sustainable solution | Eu...
The unequal battle of inflation and the appropriate sustainable solution | Eu...The unequal battle of inflation and the appropriate sustainable solution | Eu...
The unequal battle of inflation and the appropriate sustainable solution | Eu...
 
Lundin Gold March 2024 Corporate Presentation - PDAC v1.pdf
Lundin Gold March 2024 Corporate Presentation - PDAC v1.pdfLundin Gold March 2024 Corporate Presentation - PDAC v1.pdf
Lundin Gold March 2024 Corporate Presentation - PDAC v1.pdf
 
MARKET FAILURE SITUATION IN THE ECONOMY.
MARKET FAILURE SITUATION IN THE ECONOMY.MARKET FAILURE SITUATION IN THE ECONOMY.
MARKET FAILURE SITUATION IN THE ECONOMY.
 
Commercial Bank Economic Capsule - March 2024
Commercial Bank Economic Capsule - March 2024Commercial Bank Economic Capsule - March 2024
Commercial Bank Economic Capsule - March 2024
 
Contracts with Interdependent Preferences
Contracts with Interdependent PreferencesContracts with Interdependent Preferences
Contracts with Interdependent Preferences
 
ACCOUNTING FOR BUSINESS.II DEPARTMENTAL ACCOUNTS.
ACCOUNTING FOR BUSINESS.II DEPARTMENTAL ACCOUNTS.ACCOUNTING FOR BUSINESS.II DEPARTMENTAL ACCOUNTS.
ACCOUNTING FOR BUSINESS.II DEPARTMENTAL ACCOUNTS.
 
20240314 Calibre March 2024 Investor Presentation (FINAL).pdf
20240314 Calibre March 2024 Investor Presentation (FINAL).pdf20240314 Calibre March 2024 Investor Presentation (FINAL).pdf
20240314 Calibre March 2024 Investor Presentation (FINAL).pdf
 
LIC PRIVATISATION its a bane or boon.pptx
LIC PRIVATISATION its a bane or boon.pptxLIC PRIVATISATION its a bane or boon.pptx
LIC PRIVATISATION its a bane or boon.pptx
 
ACCOUNTING FOR BUSINESS.II BRANCH ACCOUNTS NOTES
ACCOUNTING FOR BUSINESS.II BRANCH ACCOUNTS NOTESACCOUNTING FOR BUSINESS.II BRANCH ACCOUNTS NOTES
ACCOUNTING FOR BUSINESS.II BRANCH ACCOUNTS NOTES
 
Taipei, A Hidden Jewel in East Asia - PR Strategy for Tourism
Taipei, A Hidden Jewel in East Asia - PR Strategy for TourismTaipei, A Hidden Jewel in East Asia - PR Strategy for Tourism
Taipei, A Hidden Jewel in East Asia - PR Strategy for Tourism
 
The Power Laws of Bitcoin: How can an S-curve be a power law?
The Power Laws of Bitcoin: How can an S-curve be a power law?The Power Laws of Bitcoin: How can an S-curve be a power law?
The Power Laws of Bitcoin: How can an S-curve be a power law?
 
Stock Market Brief Deck for 3/22/2024.pdf
Stock Market Brief Deck for 3/22/2024.pdfStock Market Brief Deck for 3/22/2024.pdf
Stock Market Brief Deck for 3/22/2024.pdf
 
Hungarys economy made by Robert Miklos
Hungarys economy   made by Robert MiklosHungarys economy   made by Robert Miklos
Hungarys economy made by Robert Miklos
 

Dkm Profile

  • 1. DK Matai Profile: Chairman, mi2g, Philanthropia Φ ATCA – 2006 DK MATAI CHAIRMAN mi2g ° PHILANTHROPIA Φ ° ATCA DK Matai is an engineer turned entrepreneur and philanthropist with a keen interest in the well being of global society. DK founded mi2g in 1995, the global risk specialists, in London, UK, whilst developing simulations for his PhD at Imperial College. DK helped found ATCA – The Asymmetric Threats Contingency Alliance – in 2001, a philanthropic expert initiative to address complex global challenges through Socratic dialogue and joint executive action to build a wisdom based global economy. ATCA addresses opportunities and threats arising from climate chaos, radical poverty, organised crime, extremism, informatics, nanotechnology, robotics, genetics, artificial intelligence and financial systems. ATCA has 5,000+ distinguished members from over 100 countries: including several from the House of Lords, House of Commons, EU Parliament, US Congress & Senate, G10's Senior Government officials and over 1,500 CEOs from financial institutions, scientific corporates, NGOs and 750+ Profs from academic centres of excellence. Philanthropy – DK co-founded The Philanthropia in 2005 – to include the Trinity Club, Syndicates and Ethical Investment Funds – with 1,000 leading philanthropists, family offices, foundations, private banks, NGOs and specialist advisors to resolve complex global challenges through collaborative & sustained efforts. DK’s other voluntary interests are Sant Bani (Voice of Saints), a culturally diverse fellowship dedicated to the unity of humankind; World Future Council’s Board of Advisors and Donors; Shirley Foundation, Oxford Internet Institute at University of Oxford and The Trinity Forum, where he advises on a pro bono basis. Honours – DK was selected to present knowledge management to The Queen in 1998 and mi2g won The Queen’s Award for Enterprise in the category of Innovation for Bespoke Security Architecture in 2003. This led to a visit to Buckingham Palace, a celebration hosted at Lloyd’s of London, and by The Lord Mayor at Mansion House, followed by a joint visit to Zurich, Switzerland. Innovation – DK spends about half of his time innovating with mi2g teams focused on digital banking, digital risk management and bespoke security architecture for major financial institutions, government agencies and multi-nationals in Europe, America and Asia. DK believes passionately that the next generation of private and corporate banking involves the global safe custody of valuable data and intellectual property alongside financial deposits with “guaranteed security”. D2-Banking is holistic and includes the online vaulting of genomic maps and medical records; art, photo, music and video collections; digital messages and personal files including wills, deeds and memoirs; and other intellectual property alongside traditional financial services. Authority – DK is an authority on countering complex global threats; strategic risk management & visualisation; contingency planning; Information Operations (IO); electronic defence; biometric authentication; secure payment systems and Open Source hardened kernel solutions. He is an invited contributor to defence and global security analysis in the UK, USA, EU, Canada, Switzerland, Japan and India. mi2g intelligence has been cited by several government agencies including NISCC in the UK, FBI in the US and United Nations agencies in New York and Geneva. Background – DK is a British subject, a Freeman of the City of London, a Liveryman of the Worshipful Company of Information Technologists, and a member of the Institute of Directors and The Institution of Engineering and Technology. He has worked formerly in the R&D labs of IBM, Inmos, ST Microelectronics and Helvar Electrosonic on Massive Parallel Processing and supercomputing applications. He enjoys meeting people, sharing thoughts, reading history and learning languages. He is vegetarian, teetotal and an optimist. He has lived in Asia, the Middle East, Europe and North America and he now lives with his family in Europe, with London as hub. For further information: Please contact Intelligence Unit on +44 (0) 20 7712 1782 or intelligence.unit@mi2g.com www.mi2g.net provides articles under ‘Latest News’ and speeches under ‘Presentations’
  • 2. DK Matai Profile: Chairman, mi2g, Philanthropia Φ ATCA – 2006 SEMINAL PRESENTATIONS Helping to build a better world – Private, Public & NGO roles Credit Suisse Geneva; UBS Zurich New Paradigms – 21st Century Holistic Wealth Management Global Family Office Summit Geneva Holistic Wealth Mgmnt – Ethics in Technology Investing Dr Hoeller INVERA Fortune Vienna Asymmetric Threats with Unintended Consequences HSBC Global HQ London Anytime, Anywhere, Active Computing Security 21st Century CERN Geneva & Fortune Berne The Startup’s Guide to Net Security & Managing Digital Risk Reuters/Bloomberg London/New York Critical role of micro-finance in reducing radical poverty Reserve Bank of India New Delhi Role of The Philanthropia in resolving Complex Global Risks Heim Foundation Geneva Cyber Crime – Strategic issues for the future CIMA Global Conference London Global Risk, Clean Technology and Fiduciary Responsibility Bankinter Fundacion Madrid Exploration of the effects of Asymmetric Attack on Insurance Lloyd’s and IUA City of London Addressing Complex Global challenges via Philanthropy San Fedele Siena; BNP Paribas Paris Rating & Profiling Catastrophic Risk Exposures World Future Council Geneva Re-thinking the Digital Future – Robotics, Bio, Nano, AI & IT Wolfsberg (UBS) Switzerland Impact on Confidence of War with Iraq – Financial fall out VISA, London / San Francisco New Generation Philanthropists – Social Entrepreneurship Skoll World Forum Oxford University Unforeseen Threats Summit – CBRN-DS Issues UK Government Agencies London Global Risk Management – Top 10 Asymmetric Threats School of Diplomacy & IR Geneva Business Continuity in the context of Global Risk Mgmnt Fairfax Financial Holdings Toronto Digital Risk Mgmnt, Data Custody, Privacy & Identity Theft ISO17799 Comm & LGT Bank Vaduz Organised Crime, Terrorism and the Internet Oxford Internet Institute Oxford Service Level Management & Digital Risk Opportunities British Bankers’ Association London Holistic Risk Solutions: Pivotal Role of Technology ETH Centre Security Studies Luzern Is the UK prepared for Cyber Warfare? PITCOM Palace of Westminster Strategic & Tactical Risk Visualisation – Tools and Systems CERN & Fortune Management Geneva World beyond 9/11 – Asymmetric impact of Technology British Computer Soc / RTC Whitehall 50 Years of Computing: Future & Past; Risks & Precautions The Guildhall City of London MEDIA INTERVIEWS AND COVERAGE Broadcast BBC, Bloomberg, CNN, Channel 4, ITN, ARD, MSNBC, Reuters, Sky Press Financial Times, New York Times, Washington Post, The Guardian, Globe & Mail, The Independent, Observer, The Times, The Sunday Times, Sydney Morning Herald, Wall Street Journal Journals The Economist, Business Week, Time, Newsweek, Fortune, Forbes, European Banker, Computer Weekly, IDG, Silicon, VNU, ZDNet mi2g CREDENTIALS mi2g works primarily with major financial institutions & government agencies as long term partners and has set-up, managed and transferred trans-national engineering projects in excess of USD 100 million delivering significant savings globally. mi2g has worked with private, public and voluntary organisations at Chairman and CEO level with annual budgets in excess of USD 5 billion or assets under management in excess of USD 25 billion. mi2g was conferred the Queen’s Award for Enterprise in the category of Innovation in 2003 for Bespoke Security Architecture (BSA). BSA is based on mi2g’s pioneering digital risk management methodology. Main products are: Digital Risk Matrix (DRM), Contingency Capability Radar (CCR), Electronic Data Fort Initiative (eDFi) or D2-Banking, Knowledge Management Object Database System (KMODS) & Security Intelligence Products and Systems (SIPS) digital attack database. For further information: Please contact Intelligence Unit on +44 (0) 20 7712 1782 or intelligence.unit@mi2g.com www.mi2g.net provides articles under ‘Latest News’ and speeches under ‘Presentations’