David Venable

{{short description|Cyber security professional (born 1978)}}

{{for|the TV personality|David Venable (TV personality)}}

{{Use mdy dates|date=March 2017}}

{{Infobox spy|name=David Venable|image=DaveVenable.jpg|birth_date={{birth date and age|mf=yes|1978|1|11}}|birth_place=Little Rock, Arkansas, U.S.|allegiance={{Flag|United States of America}}|nickname=|caption=|service= 15px National Security Agency
15px Department of State|serviceyears=|death_date=|death_place=|nationality=American|occupation=Intelligence Officer
Cyber Security
Author
Speaker|education=Doctor of Information Security, International Scientific and Technical University (h.c.)}}

David "Dave" Venable (born January 11, 1978) is a former intelligence officer with the United States National Security Agency, and current cyber security professional and businessman.{{cite web|url=http://www.csoonline.com/article/2936619/data-protection/why-are-there-still-so-many-website-vulnerabilities.html|title=Why are there still so many website vulnerabilities?|website=CSO Online|publisher=CSO|last1=Geer|first1=David|accessdate=October 19, 2016|archive-date=December 5, 2018|archive-url=https://web.archive.org/web/20181205103313/https://www.csoonline.com/article/2936619/data-protection/why-are-there-still-so-many-website-vulnerabilities.html|url-status=dead}}{{cite web|url=https://www.blackhat.com/eu-16/speakers/David-Venable.html|title=Black Hat Europe 2016|publisher=blackhat.com|accessdate=October 19, 2016}} He is an author and speaker on the topics of cyber security, cyberwarfare, and international security; has developed security-related internet protocols;{{cite book|url=http://www.wiley.com/WileyCDA/WileyTitle/productCd-1118679555.html|title=WHOIS Running the Internet: Protocol, Policy, and Privacy|date=2016|publisher=John Wiley & Sons|isbn=978-1-118-67955-5|location=New York|pages=132–133|last1=Bruen|first1=Garth|accessdate=October 19, 2016}}{{cite web|url=http://www.idgconnect.com/blog-abstract/18030/ransomware-why-mustn-pay-ransom|title=Ransomware: Why you mustn't pay the ransom|publisher=IDG Connect|last1=Venable|first1=David}}{{cite web|last1=Venable|first1=David|title=State-Sponsored Cybercrime: A Growing Business Threat|url=http://www.darkreading.com/vulnerabilities---threats/state-sponsored-cybercrime-a-growing-business-threat/a/d-id/1320555|website=Dark Reading|accessdate=October 19, 2016}}{{cite web|title=The Exploitation Game|url=http://www.btc.co.uk/Articles/index.php?mag=Security&page=compDetails&link=6067&cp=3|website=Computing Security|publisher=BTC}}{{cite web|last1=Alvarez|first1=Dean|title=Q&A with David Venable|url=http://www.itsecurityguru.org/2016/06/06/qa-with-david-venable-masergy/|website=IT Security Guru|date=June 6, 2016}} is a US patent holder;{{cite web |title=US Patent for Encrypted data retrieval systems and methods to provide access to encrypted data Patent (Patent # 10,469,482 issued November 5, 2019) - Justia Patents Search |url=https://patents.justia.com/patent/10469482 |website=patents.justia.com}} and has been named as one of the most influential people in security.{{cite journal |title=Security's Most Influential People in Security 2019 - David Venable |website=www.securitymagazine.com |date=September 1, 2019 |url=https://www.securitymagazine.com/articles/90843-securitys-most-influential-people-in-security-2019---david-venable |language=en}}

Early life and education

Venable was born in and grew up in Little Rock, Arkansas, and later attended the University of Arkansas, majoring in mathematics. After college, he joined the United States Air Force and studied Korean at the Defense Language Institute in Monterey, California, a Department of Defense educational and research institution which provides linguistic and cultural instruction to the DoD and other Federal Agencies. Venable has also pursued graduate education in mathematics at the University of Texas, and international relations at Harvard University.{{cite web|title=David Venable - Authors & Columnists|url=http://www.informationweek.com/author-bio.asp?author_id=2270|website=InformationWeek|access-date=October 20, 2016|archive-date=September 16, 2021|archive-url=https://web.archive.org/web/20210916202947/https://www.informationweek.com/author-bio.asp?author_id=2270|url-status=dead}}

Career

Dr. Venable has serve in several intelligence roles with the National Security Agency and Tailored Access Operations, including Computer Network Exploitation, Cyberwarfare, Information Operations, and Digital Network Intelligence in support of global anti-terrorism operations. He has also taught about these subjects while serving as adjunct faculty at the National Cryptologic School, a school within the National Security Agency that provides training to members of the United States Intelligence Community.{{cite web|last1=Solomon|first1=Howard|title=Web vulnerabilities need to be stamped out|url=http://www.itworldcanada.com/post/web-vulnerabilities-need-to-be-stamped-out|website=IT World Canada|date=June 22, 2015 |accessdate=October 21, 2016}}{{cite journal|last1=Howlett|first1=William IV|title=The Rise of China's Hacking Culture: Defining Chinese Hackers|journal=Electronic Theses, Projects, and Dissertations.|date=June 2016|issue=383|page=6|url=http://scholarworks.lib.csusb.edu/cgi/viewcontent.cgi?article=1413&context=etd|accessdate=October 21, 2016}}

After leaving federal service Venable founded and served as CEO of Vanda Security, a Dallas-based security consultancy, which ultimately was acquired, and became the security professional services practice of Comcast Business Masergy. Venable went on to serve as Vice President and CISO of Comcast Business for eight years. Venable regularly speaks at industry and government conferences including The G20 Summit, the World Economic Forum summit in Davos, NATO forums, Black Hat Briefings and European security forums including the Munich Security Conference and the Warsaw Security Forum; serves as a cyber security expert with think tanks and policy research institutes; serves as a board member of Alliance for Innovation and Infrastructure; and is a cybersecurity expert, speaker, and public diplomat with the United States Department of State. {{cite web |last1=ढुंगाना |first1=कृष्ण |title=अमेरिका नेपाललाई साईबर सुरक्षामा सहयोग गर्न तयार छः डेब भेनावेल (अन्तर्वार्ता) |url=https://nepalkhabar.com/interview/6775-2019-08-31-07-56-44 |website=NepalKhabar |date=June 3, 2019 |language=en-gb}}{{cite web|url=http://warsawsecurityforum.org/speakers/|title=Speakers|website=Warsaw Security Forum}}{{cite web|url=http://strategikon.ro/team-and-partners/|title=Team and partners|website=Strategikon|access-date=October 19, 2016|archive-url=https://web.archive.org/web/20161015100056/http://strategikon.ro/team-and-partners/|archive-date=October 15, 2016|url-status=dead}}{{Cite news|url=http://www.informationweek.com/government/cybersecurity/cyberwar-part-1-what-it-can-do-to-survive/a/d-id/1323165|title=Cyberwar Part 1: What IT Can Do To Survive|newspaper=InformationWeek|access-date=October 19, 2016|last1=Baker|first1=Pam}}{{Cite news|url=http://www.scmagazineuk.com/the-rise-and-rise-of-ransomware/article/500858/|title=The rise and rise of ransomware|date=June 3, 2016|newspaper=SC Magazine UK|access-date=October 19, 2016|last1=Winder|first1=Davey}}{{Cite web|url=http://thecolonytx.gov/Boards/Tech/TechnologiesBoard.html|title=Technologies Board|publisher=thecolonytx.gov|access-date=October 19, 2016|archive-date=December 1, 2016|archive-url=https://web.archive.org/web/20161201112451/http://thecolonytx.gov/Boards/Tech/TechnologiesBoard.html|url-status=dead}}{{cite web |last1=Stockwell |first1=Amy |title=Post-Conflict Reconstruction and Peacebuilding Panel Discussion |url=https://today.charleston.edu/2024/11/07/post-conflict-reconstruction-and-peacebuilding-panel-discussion/ |website=The College Today |publisher=College of Charleston |language=en |date=7 November 2024}}

Bibliography

Venable frequently contributes to and appears in Forbes, BBC, Harvard Business Review, Bloomberg Businessweek, InformationWeek, IDG Connect, and other media outlets in matters pertaining to cyber security, cyberwarfare, and international security.{{cite web |last1=Venable |first1=David |last2=McCown |first2=Brigham |title=China On The March: Cybersecurity And Hidden Risks |url=https://www.forbes.com/sites/brighammccown/2018/12/17/china-on-the-march-cybersecurity-and-hidden-risks/#6e27675e4b88 |website=Forbes |language=en}}{{cite web |last1=Ward |first1=Matthew Wall and Mark |title=WannaCry: What can you do to protect your business? |url=https://www.bbc.com/news/business-39947944 |website=BBC News |date=19 May 2017}}{{cite news |last1=Lawrence |first1=Dune |title=North Korea's Bitcoin Play |url=https://www.bloomberg.com/news/articles/2017-12-14/north-korea-s-bitcoin-play |newspaper=Bloomberg |date=December 14, 2017 |publisher=Bloomberg Businessweek}}

Patents

{{ cite patent

| country = US

| number = 10469482

| status = patent

| title = Encrypted data retrieval systems and methods to provide access to encrypted data

| gdate = 2019-11-05

| fdate = 2017-09-05

| inventor = Venable, David

| assign1 = Masergy, Inc.

}}

References

{{reflist|30em}}

External Links