
CYBERSECURITY EXECUTIVE & RESEARCHER, INTERNATIONAL SPEAKER, BLOGGER, AUTHOR, INVENTOR & ADJUNCT PROFESSOR WITH MORE THAN 25 YEARS OF EXPERIENCE WORKING IN CYBERSECURITY.
Chuck Davis
Author, Inventor, Blogger, Educator, Keynote Speaker, Executive
Engaging Keynote Speaker
Selected to speak publicly at conferences and events an average of 20 times per year, including Hacker Halted, IFSEC International (London), IANS, PSATec, SecureWorld, ISSA, (ISC)2, & IBM Conferences.
Exceptional Manager
A great understanding of enterprise risk, standards and governance, and a finger on the pulse of the threat landscape. Led teams of security architects, security engineers, forensic analysts, malware reverse engineers and an enterprise vulnerability scanning operations team.
Experienced Technologist
10 US Patents
Co-authored two books
Numerous certifications including CISSP, ISSAP, SICC
ISSA Senior member and former board member
NetBOM founder
Former ISSA Chapter President
Architected, designed and deployed network and endpoint DLP, Network Access Control, Malware Defense tools, Forensic tools, IDS/IPS, Two-factor authentication, Splunk ES, and a virtual desktop solution for secure, crown jewel development.
Managed IDS for September 11th relief fund telethon (tributetoheroes.org)
Award-Winning Security Professional
Recognized as a 2021 Top Cybersecurity Leader by Security Magazine.
Frequently interviewed by television, radio and print media about information security news stories. Assisted former IBM CEO, Lou Gerstner’s team in security his home networks and financial servers.
Award-Winning Educator
Awarded PA post-secondary technology educator of the year.
Developed the CISO Certificate Program for Harrisburg University.
Developed and taught undergraduate and graduate courses for three universities including, Ethical Hacking, Computer Forensics, Network Security, Cryptography and others.
Deployed an enterprise-wide security education and awareness campaign including a managed phishing campaign for a Fortune 500 company.
Architecture and Deployment of Vendor Technologies
Risk-based Vulnerability Management, Digital Transformation, Zero Trust, SBOM, NetBOM, IoT security, Splunk, Symantec, SourceFire/Cisco, FireEye, Mandiant, EnCase, SoftLayer, ForeScout, Fidelis, Cellebrite, FTK, SafeNet, VMWare, Carbon Black, Gigamon, Qualys, Office 365 and more.

Awards
Pennsylvania Post Secondary Technology Educator of the Year - 2013
University of Phoenix Community Service Award
IBM Patent Achievement Award - 2016
IBM Patent Achievement Award - 2008
IBM Patent Achievement Award - 2003
IBM Patent Achievement Award - 2002