请输入您要查询的百科知识:

 

词条 David Venable
释义

  1. Early life and education

  2. Career

  3. Bibliography

  4. References

{{for|the TV personality|David Venable (TV personality)}}{{Use mdy dates|date=March 2017}}{{Infobox spy|name=David Venable|image=DaveVenable.jpg|birth_date={{birth date and age|mf=yes|1978|1|11}}|birth_place=Little Rock, Arkansas|allegiance={{Flag|United States of America}}|nickname=|caption=|service=National Security Agency (NSA)|serviceyears=|death_date=|death_place=|nationality=American|occupation=Intelligence Officer
Cyber Security
Author}}David "Dave" Venable (born January 11, 1978 in Little Rock, Arkansas) is a former intelligence officer with the United States National Security Agency, and current cyber security professional and businessman.[1][2] He is an author and speaker on the topics of cyber security, cyberwarfare, and international security; and has also developed security-related internet protocols.[3][4][5][6][7]

Early life and education

Dave Venable grew up in Little Rock, Arkansas, Arkansas and later attended the University of Arkansas, majoring in mathematics. After college, Venable joined the United States Air Force and studied Korean at the Defense Language Institute in Monterey, California, a Department of Defense educational and research institution which provides linguistic and cultural instruction to the DoD and other Federal Agencies. Venable has also pursued graduate education in mathematics at the University of Texas, and international relations at Harvard University.[2][8]

Career

Until 2005 Venable served in several intelligence roles with the National Security Agency, including Computer Network Exploitation, Cyberwarfare, Information Operations, and Digital Network Intelligence in support of global anti-terrorism operations. He has also taught about these subjects while serving as adjunct faculty at the National Cryptologic School, a school within the National Security Agency that provides training to members of the United States Intelligence Community.[2][9][10]

After leaving federal service Venable founded and served as CEO of Vanda Security, a Dallas-based security consultancy, which ultimately became the security professional services practice of Masergy Communications where Venable currently serves as Vice President of Cyber Security. Venable regularly speaks at industry and government conferences including Black Hat Briefings and the Warsaw Security Forum, serves as a cyber security expert with think tanks and policy research institutes, and serves on The Colony, Texas technology board.[11][12][13][14][15]

Bibliography

Venable frequently contributes to and appears in Forbes, BBC, Harvard Business Review, Bloomberg Businessweek, InformationWeek, IDG Connect, and other media outlets in matters pertaining to cyber security, cyberwarfare, and international security.[8][16][17][18]

References

1. ^{{cite web|url=http://www.csoonline.com/article/2936619/data-protection/why-are-there-still-so-many-website-vulnerabilities.html|title=Why are there still so many website vulnerabilities?|website=CSO Online|publisher=CSO|last1=Geer|first1=David|accessdate=October 19, 2016}}
2. ^{{cite web|url=https://www.blackhat.com/eu-16/speakers/David-Venable.html|title=Black Hat Europe 2016|publisher=blackhat.com|accessdate=October 19, 2016}}
3. ^{{cite book|url=http://www.wiley.com/WileyCDA/WileyTitle/productCd-1118679555.html|title=WHOIS Running the Internet: Protocol, Policy, and Privacy|date=2016|publisher=John Wiley & Sons|isbn=978-1-118-67955-5|location=New York|pages=132–133|last1=Bruen|first1=Garth|accessdate=October 19, 2016}}
4. ^{{cite web|url=http://www.idgconnect.com/blog-abstract/18030/ransomware-why-mustn-pay-ransom|title=Ransomware: Why you mustn’t pay the ransom|publisher=IDG Connect|last1=Venable|first1=David}}
5. ^{{cite web|last1=Venable|first1=David|title=State-Sponsored Cybercrime: A Growing Business Threat|url=http://www.darkreading.com/vulnerabilities---threats/state-sponsored-cybercrime-a-growing-business-threat/a/d-id/1320555|website=Dark Reading|accessdate=October 19, 2016}}
6. ^{{cite web|title=The Exploitation Game|url=http://www.btc.co.uk/Articles/index.php?mag=Security&page=compDetails&link=6067&cp=3|website=Computing Security|publisher=BTC}}
7. ^{{cite web|last1=Alvarez|first1=Dean|title=Q&A with David Venable|url=http://www.itsecurityguru.org/2016/06/06/qa-with-david-venable-masergy/|website=IT Security Guru|date=June 6, 2016}}
8. ^{{cite web|title=David Venable - Authors & Columnists|url=http://www.informationweek.com/author-bio.asp?author_id=2270|website=InformationWeek}}
9. ^{{cite web|last1=Solomon|first1=Howard|title=Web vulnerabilities need to be stamped out|url=http://www.itworldcanada.com/post/web-vulnerabilities-need-to-be-stamped-out|website=IT World Canada|publisher=IT World Canada|accessdate=October 21, 2016}}
10. ^{{cite journal|last1=Howlett|first1=William IV|title=The Rise of China's Hacking Culture: Defining Chinese Hackers|journal=Electronic Theses, Projects, and Dissertations.|date=June 2016|issue=383|page=6|url=http://scholarworks.lib.csusb.edu/cgi/viewcontent.cgi?article=1413&context=etd|accessdate=October 21, 2016}}
11. ^{{cite web|url=http://warsawsecurityforum.org/speakers/|title=Speakers|website=Warsaw Security Forum}}
12. ^{{cite web|url=http://strategikon.ro/team-and-partners/|title=Team and partners|website=Strategikon}}
13. ^{{Cite news|url=http://www.informationweek.com/government/cybersecurity/cyberwar-part-1-what-it-can-do-to-survive/a/d-id/1323165|title=Cyberwar Part 1: What IT Can Do To Survive|newspaper=InformationWeek|access-date=October 19, 2016|last1=Baker|first1=Pam}}
14. ^{{Cite news|url=http://www.scmagazineuk.com/the-rise-and-rise-of-ransomware/article/500858/|title=The rise and rise of ransomware|date=June 3, 2016|newspaper=SC Magazine UK|access-date=October 19, 2016|last1=Winder|first1=Davey}}
15. ^{{Cite web|url=http://thecolonytx.gov/Boards/Tech/TechnologiesBoard.html|title=Technologies Board|publisher=thecolonytx.gov|access-date=October 19, 2016}}
16. ^{{cite web |last1=Venable |first1=David |last2=McCown |first2=Brigham |title=China On The March: Cybersecurity And Hidden Risks |url=https://www.forbes.com/sites/brighammccown/2018/12/17/china-on-the-march-cybersecurity-and-hidden-risks/#6e27675e4b88 |website=Forbes |language=en}}
17. ^{{cite web |last1=Ward |first1=Matthew Wall and Mark |title=WannaCry: What can you do to protect your business? |url=https://www.bbc.com/news/business-39947944 |website=BBC News |date=19 May 2017}}
18. ^{{cite web |last1=Lawrence |first1=Dune |title=North Korea’s Bitcoin Play |url=https://www.bloomberg.com/news/articles/2017-12-14/north-korea-s-bitcoin-play |website=www.bloomberg.com |publisher=Bloomberg Businessweek}}
{{DEFAULTSORT:Venable, David}}

13 : 1978 births|Living people|American technology writers|People associated with computer security|People from Little Rock, Arkansas|Writers from Little Rock, Arkansas|Businesspeople from Little Rock, Arkansas|Military personnel from Little Rock, Arkansas|National Security Agency people|United States Air Force personnel|Defense Language Institute alumni|University of Texas alumni|American technology chief executives

随便看

 

开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。

 

Copyright © 2023 OENC.NET All Rights Reserved
京ICP备2021023879号 更新时间:2024/9/22 1:30:51