David Venable

David Venable
Allegiance  United States of America
Service National Security Agency (NSA)

Born (1978-01-11) January 11, 1978
Little Rock, Arkansas
Nationality American
Occupation Intelligence Officer
Cyber Security
Author

David "Dave" Venable (born January 11, 1978 in Little Rock, Arkansas) is a former intelligence officer with the United States National Security Agency, and current cyber security professional and businessman.[1][2] He is an author and speaker on the topics of cyber security, cyberwarfare, and international security; and has also developed security-related internet protocols.[3][4][5][6][7]

Early life and education

Dave Venable grew up in Little Rock, Arkansas, Arkansas and later attended the University of Arkansas, majoring in mathematics. After college, Venable joined the United States Air Force and studied Korean at the Defense Language Institute in Monterey, California, a Department of Defense educational and research institution which provides linguistic and cultural instruction to the DoD and other Federal Agencies. Venable has also pursued graduate education in mathematics at the University of Texas.[2][8]

Career

Until 2005 Venable served in several intelligence roles with the National Security Agency, including Computer Network Exploitation, Cyberwarfare, Information Operations, and Digital Network Intelligence in support of global anti-terrorism operations. He has also taught about these subjects while serving as adjunct faculty at the National Cryptologic School, a school within the National Security Agency that provides training to members of the United States Intelligence Community.[2][9][10]

After leaving federal service Venable founded and served as CEO of Vanda Security, a Dallas-based security consultancy, which ultimately became the security professional services practice of Masergy Communications where Venable currently serves as Vice President of Cyber Security. Venable regularly speaks at industry and government conferences including Black Hat Briefings and the Warsaw Security Forum, serves as a cyber security expert with think tanks and policy research institutes, and serves on The Colony, Texas technology board.[11][12][13][14][15]

Bibliography

Venable contributes to InformationWeek, IDG Connect, and other media outlets in matters pertaining to cyber security, cyberwarfare, and international security.[8]

References

  1. Geer, David. "Why are there still so many website vulnerabilities?". CSO Online. CSO. Retrieved 19 October 2016.
  2. 1 2 3 "Black Hat Europe 2016". www.blackhat.com. Retrieved 19 October 2016.
  3. Bruen, Garth (2016). WHOIS Running the Internet: Protocol, Policy, and Privacy. New York: John Wiley & Sons. pp. 132–133. ISBN 978-1-118-67955-5. Retrieved 19 October 2016.
  4. Venable, David. "IDG Connect – Ransomware: Why you mustn't pay the ransom". www.idgconnect.com.
  5. Venable, David. "State-Sponsored Cybercrime: A Growing Business Threat". Dark Reading. Retrieved 19 October 2016.
  6. "The Exploitation Game". Computing Security. BTC.
  7. Alvarez, Dean (6 June 2016). "Q&A with David Venable". IT Security Guru.
  8. 1 2 "David Venable - Authors & Columnists - InformationWeek". InformationWeek.
  9. Solomon, Howard. "Web vulnerabilities need to be stamped out". IT World Canada. IT World Canada. Retrieved 21 October 2016.
  10. Howlett, William IV (June 2016). "The Rise of China's Hacking Culture: Defining Chinese Hackers". Electronic Theses, Projects, and Dissertations. (383): 6. Retrieved 21 October 2016.
  11. "Speakers". Warsaw Security Forum.
  12. "Team and partners - Strategikon". Strategikon.
  13. Baker, Pam. "Cyberwar Part 1: What IT Can Do To Survive - InformationWeek". InformationWeek. Retrieved 2016-10-19.
  14. Winder, Davey (2016-06-03). "The rise and rise of ransomware". SC Magazine UK. Retrieved 2016-10-19.
  15. "Technologies Board". thecolonytx.gov. Retrieved 2016-10-19.
This article is issued from Wikipedia - version of the 10/21/2016. The text is available under the Creative Commons Attribution/Share Alike but additional terms may apply for the media files.