Speaking Engagements
With over two decades of experience, Dr. Venable has become a sought-after keynote speaker, known for his engaging presentations and deep insights into the ever-evolving world of cybersecurity. Drawing from his extensive background as a Chief Information Security Officer, educator, and former intelligence professional, Dr. Venable captivates audiences with compelling stories, actionable strategies, and forward-thinking perspectives. Whether addressing global conferences, corporate events, or educational seminars, Dr. Venable's speaking engagements are designed to inspire, educate, and empower leaders and professionals in navigating the complex landscape of cyber threats and challenges.
Selected Conferences, Classes, & Panels
Black Hat - Breaking Big Data
You are under surveillance. We all are. If you're targeted by a government, nothing you can do will save you. But even if you aren't, the metadata of your life is being gathered and stockpiled by collection capabilities that even Orwell couldn't have imagined, and it's not just being done by governments. The big data industry is rapidly growing and may soon be on par with NSA-style mass surveillance, but with a different goal: to learn everything they can about you in order to sell your information, and sell you the next new thing.
Encryption is only half the battle. Your metadata is often more valuable than your data. Every route you drive, every social media post you make, every aisle you visit in the grocery store, every email, every check-in, and every site you browse is being collected and correlated. The intelligence community calls this pattern-of-life analysis, and there's not much you can do to prevent it. Hiding behind seven proxies won't protect you from Google, the NSA, or the app on your phone with global permissions. This complete erosion of privacy impacts every one of us, and there is a complete lack of transparency around this.
In this talk, a former NSA professional will cover a variety of the techniques used by the mass surveillance industry to analyze an individual's metadata and develop a profile of you, your activities, your affiliations, and what you are likely to buy next. Techniques that can be used to prevent selected activities from being associated with your true persona will be covered, with a focus on making your true persona blend in with the masses.
Black Hat - Information Warfare: Tactics, Techniques, & Procedures
We are at war. But the battlefields are no longer distant deserts and jungles. This war is being fought on your newsfeed, in the comment section, on your TV, in your podcasts, and ultimately in your mind. It's easy to shrug off cries of "FAKE NEWS!" or "meme magic" but governments, militaries, and intelligence agencies have employed information operations techniques for hundreds, if not thousands, of years. And they are often devastatingly effective.
The internet decreases the barriers to entry for information operations to the point that even small non-state actors can use them, while sophisticated and well-funded organizations such as governments and intelligence agencies can dramatically increase the scale and scope of their existing efforts.
In this briefing, a former NSA intelligence professional will review the tactics, techniques, and procedures used in today's information war; along with case studies; and tips on how to identify and defend against these techniques in the wild.
Warsaw Security Forum - Protecting Critical Infrastructure
Warsaw Security Forum - NATO Cybersecurity
Wiesław Goździewicz - Legal Advisor, NATO Joint Force Training Centre
Sven Sakkov - Director, NATO Cooperative Cyber Defence Centre of Excellence
Lior Tabansky - Director of Strategy, Cyber Security Group, Researcher, Tel Aviv University, Israel
David Venable - Vice President, Cyber Security at Masergy, Alumni 2015 NSL Program, USA
Andrzej Zybertowicz - Advisor to the President of the Republic of Poland
MODERATOR: Izabela Albrycht - Chair of the CYBERSEC Organising Committee, Chair of The Kosciuszko Institute, Poland