David Venable

David "Dave" Venable (born January 11, 1978 in Little Rock, Arkansas) is a former intelligence officer with the United States National Security Agency, and current cyber security professional and businessman.[1][2] He is an author and speaker on the topics of cyber security, cyberwarfare, and international security; has developed security-related internet protocols;[3][4][5][6][7] and has been named as one of the most influential people in security.[8]

David Venable
Born (1978-01-11) January 11, 1978
NationalityAmerican
OccupationIntelligence Officer
Cyber Security
Author
Speaker
Espionage activity
Allegiance United States of America
Service branch National Security Agency
Department of State

Early life and education

Dave Venable grew up in Little Rock, Arkansas, Arkansas and later attended the University of Arkansas, majoring in mathematics. After college, Venable joined the United States Air Force and studied Korean at the Defense Language Institute in Monterey, California, a Department of Defense educational and research institution which provides linguistic and cultural instruction to the DoD and other Federal Agencies. Venable has also pursued graduate education in mathematics at the University of Texas, and international relations at Harvard University.[2][9]

Career

Until 2005 Venable served in several intelligence roles with the National Security Agency, including Computer Network Exploitation, Cyberwarfare, Information Operations, and Digital Network Intelligence in support of global anti-terrorism operations. He has also taught about these subjects while serving as adjunct faculty at the National Cryptologic School, a school within the National Security Agency that provides training to members of the United States Intelligence Community.[2][10][11]

After leaving federal service Venable founded and served as CEO of Vanda Security, a Dallas-based security consultancy, which ultimately became the security professional services practice of Masergy Communications where Venable currently serves as Vice President of Cyber Security. Venable regularly speaks at industry and government conferences including Black Hat Briefings and the Warsaw Security Forum, serves as a cyber security expert with think tanks and policy research institutes, serves on The Colony, Texas technology board, and is a cybersecurity expert and speaker with the United States Department of State. [12][13][14][15][16][17]

Bibliography

Venable frequently contributes to and appears in Forbes, BBC, Harvard Business Review, Bloomberg Businessweek, InformationWeek, IDG Connect, and other media outlets in matters pertaining to cyber security, cyberwarfare, and international security.[9][18][19][20]

gollark: Ah, it looks very hackery, you see.
gollark: processor : 0vendor_id : AuthenticAMDcpu family : 23model : 1model name : AMD Ryzen 3 1200 Quad-Core Processorstepping : 1microcode : 0x800111ccpu MHz : 3410.279cache size : 512 KBphysical id : 0siblings : 4core id : 0cpu cores : 4apicid : 0initial apicid : 0fpu : yesfpu_exception : yescpuid level : 13wp : yesflags : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush mmx fxsr sse sse2 ht syscall nx mmxext fxsr_opt pdpe1gb rdtscp lm constant_tsc rep_good nopl nonstop_tsc cpuid extd_apicid aperfmperf pni pclmulqdq monitor ssse3 fma cx16 sse4_1 sse4_2 movbe popcnt aes xsave avx f16c rdrand lahf_lm cmp_legacy svm extapic cr8_legacy abm sse4a misalignsse 3dnowprefetch osvw skinit wdt tce topoext perfctr_core perfctr_nb bpext perfctr_llc mwaitx cpb hw_pstate sme ssbd sev vmmcall fsgsbase bmi1 avx2 smep bmi2 rdseed adx smap clflushopt sha_ni xsaveopt xsavec xgetbv1 xsaves clzero irperf xsaveerptr arat npt lbrv svm_lock nrip_save tsc_scale vmcb_clean flushbyasid decodeassists pausefilter pfthreshold avic v_vmsave_vmload vgif overflow_recov succor smcabugs : sysret_ss_attrs null_seg spectre_v1 spectre_v2 spec_store_bypassbogomips : 6989.20TLB size : 2560 4K pagesclflush size : 64cache_alignment : 64address sizes : 43 bits physical, 48 bits virtualpower management: ts ttp tm hwpstate eff_freq_ro [13] [14]
gollark: I mean, you might accidentally hack into the pentagon, and then if you hit the virtual firewall they'll backtrace your IP with visual basic.
gollark: Yes, well.
gollark: `/usr/bin/hack --master /dev/fbi`

References

  1. Geer, David. "Why are there still so many website vulnerabilities?". CSO Online. CSO. Retrieved October 19, 2016.
  2. "Black Hat Europe 2016". blackhat.com. Retrieved October 19, 2016.
  3. Bruen, Garth (2016). WHOIS Running the Internet: Protocol, Policy, and Privacy. New York: John Wiley & Sons. pp. 132–133. ISBN 978-1-118-67955-5. Retrieved October 19, 2016.
  4. Venable, David. "Ransomware: Why you mustn't pay the ransom". IDG Connect.
  5. Venable, David. "State-Sponsored Cybercrime: A Growing Business Threat". Dark Reading. Retrieved October 19, 2016.
  6. "The Exploitation Game". Computing Security. BTC.
  7. Alvarez, Dean (June 6, 2016). "Q&A with David Venable". IT Security Guru.
  8. "Security's Most Influential People in Security 2019 - David Venable". www.securitymagazine.com. September 1, 2019.
  9. "David Venable - Authors & Columnists". InformationWeek.
  10. Solomon, Howard. "Web vulnerabilities need to be stamped out". IT World Canada. IT World Canada. Retrieved October 21, 2016.
  11. Howlett, William IV (June 2016). "The Rise of China's Hacking Culture: Defining Chinese Hackers". Electronic Theses, Projects, and Dissertations. (383): 6. Retrieved October 21, 2016.
  12. ढुंगाना, कृष्ण. "अमेरिका नेपाललाई साईबर सुरक्षामा सहयोग गर्न तयार छः डेब भेनावेल (अन्तर्वार्ता)". NepalKhabar.
  13. "Speakers". Warsaw Security Forum.
  14. "Team and partners". Strategikon. Archived from the original on October 15, 2016. Retrieved October 19, 2016.
  15. Baker, Pam. "Cyberwar Part 1: What IT Can Do To Survive". InformationWeek. Retrieved October 19, 2016.
  16. Winder, Davey (June 3, 2016). "The rise and rise of ransomware". SC Magazine UK. Retrieved October 19, 2016.
  17. "Technologies Board". thecolonytx.gov. Retrieved October 19, 2016.
  18. Venable, David; McCown, Brigham. "China On The March: Cybersecurity And Hidden Risks". Forbes.
  19. Ward, Matthew Wall and Mark (May 19, 2017). "WannaCry: What can you do to protect your business?". BBC News.
  20. Lawrence, Dune. "North Korea's Bitcoin Play". www.bloomberg.com. Bloomberg Businessweek.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.