Speaking Engagements

With over two decades of experience, Dr. Venable has become a sought-after keynote speaker, known for his engaging presentations and deep insights into the ever-evolving world of cybersecurity. Drawing from his extensive background as a Chief Information Security Officer, educator, and former intelligence professional, Dr. Venable captivates audiences with compelling stories, actionable strategies, and forward-thinking perspectives. Whether addressing global conferences, corporate events, or educational seminars, Dr. Venable's speaking engagements are designed to inspire, educate, and empower leaders and professionals in navigating the complex landscape of cyber threats and challenges.

Selected Conferences, Classes, & Panels

Black Hat - Breaking Big Data

You are under surveillance. We all are. If you're targeted by a government, nothing you can do will save you. But even if you aren't, the metadata of your life is being gathered and stockpiled by collection capabilities that even Orwell couldn't have imagined, and it's not just being done by governments. The big data industry is rapidly growing and may soon be on par with NSA-style mass surveillance, but with a different goal: to learn everything they can about you in order to sell your information, and sell you the next new thing.

Encryption is only half the battle. Your metadata is often more valuable than your data. Every route you drive, every social media post you make, every aisle you visit in the grocery store, every email, every check-in, and every site you browse is being collected and correlated. The intelligence community calls this pattern-of-life analysis, and there's not much you can do to prevent it. Hiding behind seven proxies won't protect you from Google, the NSA, or the app on your phone with global permissions. This complete erosion of privacy impacts every one of us, and there is a complete lack of transparency around this.

In this talk, a former NSA professional will cover a variety of the techniques used by the mass surveillance industry to analyze an individual's metadata and develop a profile of you, your activities, your affiliations, and what you are likely to buy next. Techniques that can be used to prevent selected activities from being associated with your true persona will be covered, with a focus on making your true persona blend in with the masses.


Black Hat - Information Warfare: Tactics, Techniques, & Procedures

We are at war. But the battlefields are no longer distant deserts and jungles. This war is being fought on your newsfeed, in the comment section, on your TV, in your podcasts, and ultimately in your mind. It's easy to shrug off cries of "FAKE NEWS!" or "meme magic" but governments, militaries, and intelligence agencies have employed information operations techniques for hundreds, if not thousands, of years. And they are often devastatingly effective.


The internet decreases the barriers to entry for information operations to the point that even small non-state actors can use them, while sophisticated and well-funded organizations such as governments and intelligence agencies can dramatically increase the scale and scope of their existing efforts.


In this briefing, a former NSA intelligence professional will review the tactics, techniques, and procedures used in today's information war; along with case studies; and tips on how to identify and defend against these techniques in the wild.

Warsaw Security Forum - Protecting Critical Infrastructure

Warsaw Security Forum - NATO Cybersecurity 

Wiesław Goździewicz - Legal Advisor, NATO Joint Force Training Centre

Sven Sakkov - Director, NATO Cooperative Cyber Defence Centre of Excellence

Lior Tabansky - Director of Strategy, Cyber Security Group, Researcher, Tel Aviv University, Israel

David Venable - Vice President, Cyber Security at Masergy, Alumni 2015 NSL Program, USA

Andrzej Zybertowicz - Advisor to the President of the Republic of Poland


MODERATOR: Izabela Albrycht - Chair of the CYBERSEC Organising Committee, Chair of The Kosciuszko Institute, Poland

Southern Methodist University - Aligning Cyber to the Business (Course Introduction)