About
Articles by David
Activity
-
Cannot wait to see you all on the Red Carpet in Las Vegas! Congratulations to all the finalists! Come join us and celebrate with these highly…
Cannot wait to see you all on the Red Carpet in Las Vegas! Congratulations to all the finalists! Come join us and celebrate with these highly…
Liked by David Cass
-
Strong CISOs lead with strategy, not just technology. Setting a clear direction—aligned with business goals—is the foundation for a resilient…
Strong CISOs lead with strategy, not just technology. Setting a clear direction—aligned with business goals—is the foundation for a resilient…
Liked by David Cass
-
Looking forward to joining an incredible group of innovators at the #AIinFinanceSummit in London on September 9. If you're interested in how AI is…
Looking forward to joining an incredible group of innovators at the #AIinFinanceSummit in London on September 9. If you're interested in how AI is…
Shared by David Cass
Experience & Education
Licenses & Certifications
-
-
-
Certified Information Privacy Professional/Europe
IAPP - International Association of Privacy Professionals
-
Certified Information Privacy Professional/United States
IAPP - International Association of Privacy Professionals
-
-
-
-
-
-
Volunteer Experience
-
Firefighter & Swiftwater Rescue Technician
New Hope Eagle Fire Co
- Present 11 years 5 months
Disaster and Humanitarian Relief
-
Discussion Leader and Content Contributor - Cybersecurity, Privacy & Risk SME
World Economic Forum
- Present 4 years 7 months
Economic Empowerment
Discussion leader and contributor specializing in cybersecurity, privacy, risk and trust in global financial systems.
-
Executive Board Member
Global Cyber Institute
- Present 7 years 8 months
Education
The Global Cyber Institute Steering Committee convenes on a regular basis to guide the development and fulfillment of the GCI’s mission. Additionally, the Steering Committee carries out its responsibilities in collaboration with the Curriculum Committee. The Steering Committee sets and reviews the general direction of the GCI programs,, ensuring the programs are meeting the needs of the industry.
-
Adjunct Professor, Cyber Security, Privacy, and Cyber Warfare
Rutgers Law School
- Present 5 years 8 months
Adjunct Professor of Law in Cyber Warfare, Cyber Security, and Privacy.
-
Technology Committee - Cybersecurity Subcommittee
New York State Bar Association
- Present 5 years 11 months
Science and Technology
-
-
Official Member & Contributor
Forbes Technology Council
- Present 7 years 4 months
Science and Technology
An invitation-only organization comprised of world-class CIOs, CTOs, CISOs and technology executives
-
Member Board Of Directors - Silicon Beach Innovation Lab
UCLA Extension
- Present 8 years 1 month
Education
The Silicon Beach Innovation Lab (SBi-Lab) provides both academic instruction and real-world experience in the area of digital technology. As an SBi-Lab member, you will enhance your career, learn from experts in the tech community, and collaborate with your peers in the industry.
-
Member Board Of Trustees
Lebanon Valley College
- 7 years
Education
I am honored to have been appointed to serve on the College’s Board effective at its spring meeting on May 2-3, 2014.
-
Independent Board Member
PixarBio
- 6 years 9 months
I have had the opportunity to meet with the PixarBio team, and it is clear that Mr. Reynolds has assembled a strong team of dedicated and accomplished professionals. As an Independent Board Member, I am happy to serve as a member of the audit committee and general nominations committee.
Publications
-
The Importance of Privacy
securitycurrent.com
Security and Privacy are essential in today’s digital economy. 2014 was a year of large-scale security and privacy breaches, leaving everyone asking themselves how much should we trust companies with our sensitive information. Currently, there are more than 80 countries with privacy laws. Violating these laws may result in fines, brand damage, and/or loss of revenue.
-
Modern Measures: Cybersecurity for the Gaming Industry
Global Gaming Expo Conference (G2E)
Cyber intrusions and attacks have increased dramatically over the last decade, exposing personal and business information, disrupting operations and imposing high costs on affected businesses. Despite its expertise in security, the gaming industry is no stranger to this threat. During this session, learn about potential vulnerabilities for all businesses as well as those unique to the gaming industry and how best to safeguard against them. Attendees also will gain insights on developing a…
Cyber intrusions and attacks have increased dramatically over the last decade, exposing personal and business information, disrupting operations and imposing high costs on affected businesses. Despite its expertise in security, the gaming industry is no stranger to this threat. During this session, learn about potential vulnerabilities for all businesses as well as those unique to the gaming industry and how best to safeguard against them. Attendees also will gain insights on developing a response plan for use in the unfortunate event of an attack.
• Learn how, and why, hackers do what they do.
• Hear about the technology available to protect your data.
• Assess your organization’s vulnerability to cybercrime. -
Security Maturity – Urban Legend or Reality?
one2one Summits by Reed Exhibitions
With the increasing utilization of cloud, mobile, social and big data, the traditional model of Information Security has changed. As organizations grapple with these key changes how do you know if your information security program is protecting the right things and how do you gauge security maturity in this new paradigm? How can you answer the question: “How mature is my Information Security program?”
-
Can We Trust the Cloud with our Critical Infrastructure and Sensitive Information?
SINET presents The Global Cybersecurity Innovation Summit “Advancing Global Collaboration and Innovation” supported by Her Majesty’s Government and U.S. Department of Homeland Security, Science & Technology Directorate
Abstract: Greater London has one of the largest concentrations of CCTV cameras in the world and its police service is among the first to experiment with body-worn cameras for its officers and other government agencies and corporations are managing and securing records and data of tens of millions of people. All of these entities stand to benefit from the cloud, but the sensitivity of their data makes its' security paramount. Can we trust the cloud with our most sensitive data types? What should…
Abstract: Greater London has one of the largest concentrations of CCTV cameras in the world and its police service is among the first to experiment with body-worn cameras for its officers and other government agencies and corporations are managing and securing records and data of tens of millions of people. All of these entities stand to benefit from the cloud, but the sensitivity of their data makes its' security paramount. Can we trust the cloud with our most sensitive data types? What should a cloud model include to ensure the integrity, reliability, security and availability of sensitive information for those who need to see it? What solutions make sense and what should we be asking of our cloud providers? This panel will explore these issues and identify areas where industry and government can work together to fully achieve the benefits that the cloud can deliver - including a secure environment that can also protect our privacy.
Other authorsSee publication -
My interview in Infosecurity magazine.
Infosecurity Magazine
David Cass is the most softly spoken and unassuming security executive that I've had the pleasure of meeting. Surprisingly young in comparison with many of his peers, his experience and insight...
-
Reinventing Information Security - Building the Case for Adaptive Security
Presentation: CISO Summit Miami (CDM Media)
The way organizations and people work today has dramatically changed. Social, Mobile, and Cloud require us to change the way that we practice information security. We must move from a short term focus to having a long term vision and strategy.
We will discuss:
- What is adaptive security?
- Achieving business alignment
- Moving from an operational view of security to an outcome based view
- Focus on principles
- Positioning your security team for success
-…The way organizations and people work today has dramatically changed. Social, Mobile, and Cloud require us to change the way that we practice information security. We must move from a short term focus to having a long term vision and strategy.
We will discuss:
- What is adaptive security?
- Achieving business alignment
- Moving from an operational view of security to an outcome based view
- Focus on principles
- Positioning your security team for success
- Putting it all together -
Clarifying the Cloud – A Proactive Approach to Cloud Use
Presentation: NY CISO Executive Summit
The public cloud has not only settled on the IT landscape, it has infiltrated every facet of the business. It presents complex issues around identity management, compliance and data intelligence, and CISOs wonder if the risk is worth the ROI. For David Cass of Elsevier, successful cloud adoption is about establishing governance that takes advantage of the cloud’s versatility. This means engineering the appropriate intelligence for your organization, building a data security framework and…
The public cloud has not only settled on the IT landscape, it has infiltrated every facet of the business. It presents complex issues around identity management, compliance and data intelligence, and CISOs wonder if the risk is worth the ROI. For David Cass of Elsevier, successful cloud adoption is about establishing governance that takes advantage of the cloud’s versatility. This means engineering the appropriate intelligence for your organization, building a data security framework and assessing providers on cloud security standards. In this session, learn how his risk-based approach to cloud translates into competitive advantage.
-
Security as an enabler: Supporting enterprise innovation and transformation
Prensentation: InfoSecurity Europe - Keynote Theatre
As information security teams grapple with the challenges of securing an increasingly complex and ever changing threat landscape they have an opportunity to transform information security into an enabling function, supporting and adding value to the business as it transforms and innovates.
So how can an information security function evolve to become business-led? How do you bring business knowledge into the security team and educate security practitioners about the implications of…As information security teams grapple with the challenges of securing an increasingly complex and ever changing threat landscape they have an opportunity to transform information security into an enabling function, supporting and adding value to the business as it transforms and innovates.
So how can an information security function evolve to become business-led? How do you bring business knowledge into the security team and educate security practitioners about the implications of threats for the business? How can you challenge negative perceptions of risk within information security? How can security functions start thinking like the business and become a business partner? How does information security become fundamental to the business rather than just a compliance issue? How should information security practitioners engage the business and get management and stakeholder buy-in? How can information security and business work together to create a common language to ensure the effective communication of risk intelligence without instilling FUD?
During this session the panel will discuss how information security practitioners can position security as an enabling function and truly support the business including:
How to integrate security into agile business practices and transformation
New strategies to educate the security team to understand business objectives and speak the language of the business
How security can help the business collaborate internally, with suppliers and with customers
How the security function can inform and contribute to business decision-making
What skills are required for an effective security professional and what does this all mean for the role of the CISO?Other authorsSee publication -
Business understanding is key to security - My interview with Computer Weekly
Computer Weekly
Information security professionals must have a good understanding of the business they support, says David Cass, chief information security officer (CISO) for publishing firm Elsevier.
“They must know what is important to the business and what the key business drivers are so that information security can be aligned with those,” he told Computer Weekly. -
Plenary Speaker
Complex Adaptive Systems Conference
Industry and academic experts from around the world will share their knowledge and research on systems engineering topics in the area of Emerging Technologies for Evolving Systems: Socio-technical, Cyber and Big Data
Courses
-
Advanced Topics in Corporate Finance (Post Grad)
15.s06
-
Risk Management (Post Grad)
15.s05
Honors & Awards
-
Global Leadership Program
Elsevier
-
ISE® NORTHEAST PEOPLE'S CHOICE AWARD WINNER 2013
Tech Exec Networks
David won the 2013 ISE Northeast People's Choice Award! The Westin Hotel in Times Square provided the venue for this sold out event. David was selected for this prestigious award by the security community at large through an online poll. David is recognized as true leader within the information security community -- as someone that best exhibits passion, commitment, and integrity!
-
Extraordinary Leader Training Program
Elsevier
Organizations
-
FS-ISAC
Member Digital Assets Steering Committee
- Present -
Journal of Law & Cyber Warfare
Member of Editorial Board
- PresentThe Journal of Law & Cyber Warfare provides a public peer-reviewed professional forum for the open discussion and education of technology, business, legal, and military professionals concerning the legal issues businesses and governments arising out of cyber attacks or acts of cyber war. The Journal of Law and Cyber Warfare is published twice per year by top legal professionals and scholars from the law, technology, security, and business industries. The views expressed in the Journal of Law…
The Journal of Law & Cyber Warfare provides a public peer-reviewed professional forum for the open discussion and education of technology, business, legal, and military professionals concerning the legal issues businesses and governments arising out of cyber attacks or acts of cyber war. The Journal of Law and Cyber Warfare is published twice per year by top legal professionals and scholars from the law, technology, security, and business industries. The views expressed in the Journal of Law and Cyber Warfare are those of the authors and not necessarily of the Journal of Law and Cyber Warfare.
-
Association of Governing Boards of Universities and Colleges
Member
- Present -
International Association of Privacy Professionals
KnowledgeNet Co-Chair Philadelphia Chapter
- Present -
MIT Sloan Alumni-Student Mentor
Alumni Mentor
- Present
Recommendations received
1 person has recommended David
Join now to viewMore activity by David
-
After 40 extraordinary years supporting NASA — including 20 as Goddard Space Flight Center’s Chief Technologist — I’m stepping away from federal…
After 40 extraordinary years supporting NASA — including 20 as Goddard Space Flight Center’s Chief Technologist — I’m stepping away from federal…
Liked by David Cass
-
After more than 25 years, I have left the Federal Reserve Bank of New York and the Federal Reserve System. It was a privilege to contribute to the…
After more than 25 years, I have left the Federal Reserve Bank of New York and the Federal Reserve System. It was a privilege to contribute to the…
Liked by David Cass
-
I’m deeply honored to be named the IT Ambassador for the 43rd Annual Dominican Day Parade. As a proud Dominican and cybersecurity leader, this…
I’m deeply honored to be named the IT Ambassador for the 43rd Annual Dominican Day Parade. As a proud Dominican and cybersecurity leader, this…
Liked by David Cass
-
Last night, the New York Metro InfraGard Chapter welcomed Chapter members, DSAC members, Sector Chiefs, FBI New York Field Office leadership, and…
Last night, the New York Metro InfraGard Chapter welcomed Chapter members, DSAC members, Sector Chiefs, FBI New York Field Office leadership, and…
Liked by David Cass
-
Have you ever felt like your Kubernetes clusters might be a petri dish for complex vulnerabilities? There's a good reason for that. Vulnerabilities…
Have you ever felt like your Kubernetes clusters might be a petri dish for complex vulnerabilities? There's a good reason for that. Vulnerabilities…
Liked by David Cass
-
Getting ready for Blackhat and a great week in Las Vegas. If you are going to the conference DM me and let’s set up time to chat and catch up. For…
Getting ready for Blackhat and a great week in Las Vegas. If you are going to the conference DM me and let’s set up time to chat and catch up. For…
Liked by David Cass
-
For the first time ever… we’re rolling out the Exclusive Red Carpet Dinner to honor our Cybersecurity Woman of the Year Finalists 2025 — and it’s…
For the first time ever… we’re rolling out the Exclusive Red Carpet Dinner to honor our Cybersecurity Woman of the Year Finalists 2025 — and it’s…
Liked by David Cass
-
Space might feel far away, but the decisions we make about it now are closer to home than we think. The new EU Space Act marks a bold step toward…
Space might feel far away, but the decisions we make about it now are closer to home than we think. The new EU Space Act marks a bold step toward…
Liked by David Cass
-
At Security Shark Tank® Nashville, the usual pitch deck disappeared and what emerged was far more valuable. When founders step into the room with…
At Security Shark Tank® Nashville, the usual pitch deck disappeared and what emerged was far more valuable. When founders step into the room with…
Shared by David Cass
-
𝐏𝐫𝐨𝐮𝐝 𝐭𝐨 𝐋𝐚𝐮𝐧𝐜𝐡 𝐎𝐮𝐫 𝐅𝐢𝐫𝐬𝐭 𝐒𝐭𝐚𝐧𝐝𝐚𝐥𝐨𝐧𝐞 𝐂𝐲𝐛𝐞𝐫𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐂𝐚𝐩𝐬𝐭𝐨𝐧𝐞 𝐂𝐨𝐡𝐨𝐫𝐭 This summer, we also…
𝐏𝐫𝐨𝐮𝐝 𝐭𝐨 𝐋𝐚𝐮𝐧𝐜𝐡 𝐎𝐮𝐫 𝐅𝐢𝐫𝐬𝐭 𝐒𝐭𝐚𝐧𝐝𝐚𝐥𝐨𝐧𝐞 𝐂𝐲𝐛𝐞𝐫𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐂𝐚𝐩𝐬𝐭𝐨𝐧𝐞 𝐂𝐨𝐡𝐨𝐫𝐭 This summer, we also…
Liked by David Cass
-
❤️🩹 Yesterday, I experienced two heart attacks (the second one was very serious - Widowmaker) in a single day and was hospitalized. As a…
❤️🩹 Yesterday, I experienced two heart attacks (the second one was very serious - Widowmaker) in a single day and was hospitalized. As a…
Liked by David Cass
Other similar profiles
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top contentOthers named David Cass in United States
-
David Cass
Finance, Operations, and Strategy Executive
-
David Cass
Owner, Cass, Inc. and Information Technology and Services
-
David Cass
Integrity Management Engineer at EQT Corporation
-
David Cass
100 others named David Cass in United States are on LinkedIn
See others named David Cass