New York, New York, United States
20K followers 500+ connections

Join to view profile

About

David Cass is President of CISOs Connect where he leads the company's peer engagement…

Articles by David

Activity

Join now to see all activity

Experience & Education

  • GSR

View David’s full experience

See their title, tenure and more.

or

By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.

Licenses & Certifications

Join now to see all certifications

Volunteer Experience

  • New Hope Eagle Fire Co Graphic

    Firefighter & Swiftwater Rescue Technician

    New Hope Eagle Fire Co

    - Present 11 years 5 months

    Disaster and Humanitarian Relief

  • World Economic Forum Graphic

    Discussion Leader and Content Contributor - Cybersecurity, Privacy & Risk SME

    World Economic Forum

    - Present 4 years 7 months

    Economic Empowerment

    Discussion leader and contributor specializing in cybersecurity, privacy, risk and trust in global financial systems.

  • Global Cyber Institute Graphic

    Executive Board Member

    Global Cyber Institute

    - Present 7 years 8 months

    Education

    The Global Cyber Institute Steering Committee convenes on a regular basis to guide the development and fulfillment of the GCI’s mission. Additionally, the Steering Committee carries out its responsibilities in collaboration with the Curriculum Committee. The Steering Committee sets and reviews the general direction of the GCI programs,, ensuring the programs are meeting the needs of the industry.

  • Rutgers Law School Graphic

    Adjunct Professor, Cyber Security, Privacy, and Cyber Warfare

    Rutgers Law School

    - Present 5 years 8 months

    Adjunct Professor of Law in Cyber Warfare, Cyber Security, and Privacy.

  • New York State Bar Association Graphic

    Technology Committee - Cybersecurity Subcommittee

    New York State Bar Association

    - Present 5 years 11 months

    Science and Technology

  • Techstars Graphic

    Mentor

    Techstars

    - Present 4 years 10 months

    Mentor for the Female Founders First Program

  • Forbes Technology Council Graphic

    Official Member & Contributor

    Forbes Technology Council

    - Present 7 years 4 months

    Science and Technology

    An invitation-only organization comprised of world-class CIOs, CTOs, CISOs and technology executives

  • UCLA Extension Graphic

    Member Board Of Directors - Silicon Beach Innovation Lab

    UCLA Extension

    - Present 8 years 1 month

    Education

    The Silicon Beach Innovation Lab (SBi-Lab) provides both academic instruction and real-world experience in the area of digital technology. As an SBi-Lab member, you will enhance your career, learn from experts in the tech community, and collaborate with your peers in the industry.

  • Lebanon Valley College Graphic

    Member Board Of Trustees

    Lebanon Valley College

    - 7 years

    Education

    I am honored to have been appointed to serve on the College’s Board effective at its spring meeting on May 2-3, 2014.

  • Independent Board Member

    PixarBio

    - 6 years 9 months

    I have had the opportunity to meet with the PixarBio team, and it is clear that Mr. Reynolds has assembled a strong team of dedicated and accomplished professionals. As an Independent Board Member, I am happy to serve as a member of the audit committee and general nominations committee.

Publications

  • The Importance of Privacy

    securitycurrent.com

    Security and Privacy are essential in today’s digital economy. 2014 was a year of large-scale security and privacy breaches, leaving everyone asking themselves how much should we trust companies with our sensitive information. Currently, there are more than 80 countries with privacy laws. Violating these laws may result in fines, brand damage, and/or loss of revenue.

    See publication
  • Modern Measures: Cybersecurity for the Gaming Industry

    Global Gaming Expo Conference (G2E)

    Cyber intrusions and attacks have increased dramatically over the last decade, exposing personal and business information, disrupting operations and imposing high costs on affected businesses. Despite its expertise in security, the gaming industry is no stranger to this threat. During this session, learn about potential vulnerabilities for all businesses as well as those unique to the gaming industry and how best to safeguard against them. Attendees also will gain insights on developing a…

    Cyber intrusions and attacks have increased dramatically over the last decade, exposing personal and business information, disrupting operations and imposing high costs on affected businesses. Despite its expertise in security, the gaming industry is no stranger to this threat. During this session, learn about potential vulnerabilities for all businesses as well as those unique to the gaming industry and how best to safeguard against them. Attendees also will gain insights on developing a response plan for use in the unfortunate event of an attack.
    • Learn how, and why, hackers do what they do.
    • Hear about the technology available to protect your data.
    • Assess your organization’s vulnerability to cybercrime.

    See publication
  • Security Maturity – Urban Legend or Reality?

    one2one Summits by Reed Exhibitions

    With the increasing utilization of cloud, mobile, social and big data, the traditional model of Information Security has changed. As organizations grapple with these key changes how do you know if your information security program is protecting the right things and how do you gauge security maturity in this new paradigm? How can you answer the question: “How mature is my Information Security program?”

    See publication
  • Can We Trust the Cloud with our Critical Infrastructure and Sensitive Information?

    SINET presents The Global Cybersecurity Innovation Summit “Advancing Global Collaboration and Innovation” supported by Her Majesty’s Government and U.S. Department of Homeland Security, Science & Technology Directorate

    Abstract: Greater London has one of the largest concentrations of CCTV cameras in the world and its police service is among the first to experiment with body-worn cameras for its officers and other government agencies and corporations are managing and securing records and data of tens of millions of people. All of these entities stand to benefit from the cloud, but the sensitivity of their data makes its' security paramount. Can we trust the cloud with our most sensitive data types? What should…

    Abstract: Greater London has one of the largest concentrations of CCTV cameras in the world and its police service is among the first to experiment with body-worn cameras for its officers and other government agencies and corporations are managing and securing records and data of tens of millions of people. All of these entities stand to benefit from the cloud, but the sensitivity of their data makes its' security paramount. Can we trust the cloud with our most sensitive data types? What should a cloud model include to ensure the integrity, reliability, security and availability of sensitive information for those who need to see it? What solutions make sense and what should we be asking of our cloud providers? This panel will explore these issues and identify areas where industry and government can work together to fully achieve the benefits that the cloud can deliver - including a secure environment that can also protect our privacy.

    Other authors
    See publication
  • My interview in Infosecurity magazine.

    Infosecurity Magazine

    David Cass is the most softly spoken and unassuming security executive that I've had the pleasure of meeting. Surprisingly young in comparison with many of his peers, his experience and insight...

    See publication
  • Reinventing Information Security - Building the Case for Adaptive Security

    Presentation: CISO Summit Miami (CDM Media)

    The way organizations and people work today has dramatically changed. Social, Mobile, and Cloud require us to change the way that we practice information security. We must move from a short term focus to having a long term vision and strategy.
    We will discuss:
    - What is adaptive security?
    - Achieving business alignment
    - Moving from an operational view of security to an outcome based view
    - Focus on principles
    - Positioning your security team for success
    -…

    The way organizations and people work today has dramatically changed. Social, Mobile, and Cloud require us to change the way that we practice information security. We must move from a short term focus to having a long term vision and strategy.
    We will discuss:
    - What is adaptive security?
    - Achieving business alignment
    - Moving from an operational view of security to an outcome based view
    - Focus on principles
    - Positioning your security team for success
    - Putting it all together

  • Clarifying the Cloud – A Proactive Approach to Cloud Use

    Presentation: NY CISO Executive Summit

    The public cloud has not only settled on the IT landscape, it has infiltrated every facet of the business. It presents complex issues around identity management, compliance and data intelligence, and CISOs wonder if the risk is worth the ROI. For David Cass of Elsevier, successful cloud adoption is about establishing governance that takes advantage of the cloud’s versatility. This means engineering the appropriate intelligence for your organization, building a data security framework and…

    The public cloud has not only settled on the IT landscape, it has infiltrated every facet of the business. It presents complex issues around identity management, compliance and data intelligence, and CISOs wonder if the risk is worth the ROI. For David Cass of Elsevier, successful cloud adoption is about establishing governance that takes advantage of the cloud’s versatility. This means engineering the appropriate intelligence for your organization, building a data security framework and assessing providers on cloud security standards. In this session, learn how his risk-based approach to cloud translates into competitive advantage.

    See publication
  • Security as an enabler: Supporting enterprise innovation and transformation

    Prensentation: InfoSecurity Europe - Keynote Theatre

    As information security teams grapple with the challenges of securing an increasingly complex and ever changing threat landscape they have an opportunity to transform information security into an enabling function, supporting and adding value to the business as it transforms and innovates.

    So how can an information security function evolve to become business-led? How do you bring business knowledge into the security team and educate security practitioners about the implications of…

    As information security teams grapple with the challenges of securing an increasingly complex and ever changing threat landscape they have an opportunity to transform information security into an enabling function, supporting and adding value to the business as it transforms and innovates.

    So how can an information security function evolve to become business-led? How do you bring business knowledge into the security team and educate security practitioners about the implications of threats for the business? How can you challenge negative perceptions of risk within information security? How can security functions start thinking like the business and become a business partner? How does information security become fundamental to the business rather than just a compliance issue? How should information security practitioners engage the business and get management and stakeholder buy-in? How can information security and business work together to create a common language to ensure the effective communication of risk intelligence without instilling FUD?

    During this session the panel will discuss how information security practitioners can position security as an enabling function and truly support the business including:

    How to integrate security into agile business practices and transformation
    New strategies to educate the security team to understand business objectives and speak the language of the business
    How security can help the business collaborate internally, with suppliers and with customers
    How the security function can inform and contribute to business decision-making
    What skills are required for an effective security professional and what does this all mean for the role of the CISO?

    Other authors
    See publication
  • Business understanding is key to security - My interview with Computer Weekly

    Computer Weekly

    Information security professionals must have a good understanding of the business they support, says David Cass, chief information security officer (CISO) for publishing firm Elsevier.

    “They must know what is important to the business and what the key business drivers are so that information security can be aligned with those,” he told Computer Weekly.

    See publication
  • Plenary Speaker

    Complex Adaptive Systems Conference

    Industry and academic experts from around the world will share their knowledge and research on systems engineering topics in the area of Emerging Technologies for Evolving Systems: Socio-technical, Cyber and Big Data

    See publication
Join now to see all publications

Courses

  • Advanced Topics in Corporate Finance (Post Grad)

    15.s06

  • Risk Management (Post Grad)

    15.s05

Honors & Awards

  • Global Leadership Program

    Elsevier

  • ISE® NORTHEAST PEOPLE'S CHOICE AWARD WINNER 2013

    Tech Exec Networks

    David won the 2013 ISE Northeast People's Choice Award! The Westin Hotel in Times Square provided the venue for this sold out event. David was selected for this prestigious award by the security community at large through an online poll. David is recognized as true leader within the information security community -- as someone that best exhibits passion, commitment, and integrity!

  • Extraordinary Leader Training Program

    Elsevier

Organizations

  • FS-ISAC

    Member Digital Assets Steering Committee

    - Present
  • Journal of Law & Cyber Warfare

    Member of Editorial Board

    - Present

    The Journal of Law & Cyber Warfare provides a public peer-reviewed professional forum for the open discussion and education of technology, business, legal, and military professionals concerning the legal issues businesses and governments arising out of cyber attacks or acts of cyber war. The Journal of Law and Cyber Warfare is published twice per year by top legal professionals and scholars from the law, technology, security, and business industries. The views expressed in the Journal of Law…

    The Journal of Law & Cyber Warfare provides a public peer-reviewed professional forum for the open discussion and education of technology, business, legal, and military professionals concerning the legal issues businesses and governments arising out of cyber attacks or acts of cyber war. The Journal of Law and Cyber Warfare is published twice per year by top legal professionals and scholars from the law, technology, security, and business industries. The views expressed in the Journal of Law and Cyber Warfare are those of the authors and not necessarily of the Journal of Law and Cyber Warfare.

  • Association of Governing Boards of Universities and Colleges

    Member

    - Present
  • International Association of Privacy Professionals

    KnowledgeNet Co-Chair Philadelphia Chapter

    - Present
  • MIT Sloan Alumni-Student Mentor

    Alumni Mentor

    - Present

Recommendations received

More activity by David

View David’s full profile

  • See who you know in common
  • Get introduced
  • Contact David directly
Join to view full profile

Other similar profiles

Explore top content on LinkedIn

Find curated posts and insights for relevant topics all in one place.

View top content

Others named David Cass in United States

Add new skills with these courses