Winston Tan is the Senior Cybersecurity Director for Sales and Business Development at X-PHY INC, where he leads strategic initiatives at the intersection of cybersecurity innovation and business growth. With a strong foundation in both technical expertise and executive leadership, Winston bridges the gap between cutting-edge security solutions and enterprise-scale client needs.
He holds multiple industry-recognized certifications, including Certified Ethical Hacker (CEH), Microsoft Certified: Security, Compliance & Identity, Cloud Practitioner in both Microsoft Azure and AWS, and Certified CyberArk Cloud Security & Privileged Access Management (PAM). He is also certified in DevSecOps and holds the ITIL® 4 Foundation certification, underpinning his process-driven approach to cybersecurity operations.
Winston is proficient and highly competent in key governance and risk frameworks, including CISSP, CISA, CGEIT, and CRISC, making him a trusted advisor in risk management, security architecture, and cloud strategy.
With a career spanning both technical implementation and business development, Winston is a driving force in enabling organizations to embed secure-by-design.
As AI agents become increasingly autonomous and context-aware, they must manage dynamic memory, sensitive data, and tool execution — all while remaining secure and reliable. These “agentic” systems introduce new security risks, including memory poisoning, impersonation, context manipulation, and tool misuse. Traditional software-based defenses are insufficient, particularly when agents operate across distributed systems or interface with volatile memory and external APIs in real time.
This session introduces a novel, hardware-anchored security framework where X-PHY’s AI-embedded SSD acts as the foundational guardrail for the Model Context Protocol (MCP) — the structure that governs memory, context sharing, and decision-making in AI agents. We demonstrate how X-PHY’s firmware-based anomaly detection, immutable hardware identity, and real-time response mechanisms can enforce secure context transitions, validate agent provenance, and detect ransomware or data exfiltration attempts before they impact system integrity. Technical content will include MCP architecture patterns, SDK/API integrations with X-PHY, and a red-team-hardened agent design blueprint.