CYBERSECURITY EXECUTIVE & RESEARCHER, INTERNATIONAL SPEAKER, BLOGGER, AUTHOR, INVENTOR & ADJUNCT PROFESSOR WITH MORE THAN 25 YEARS OF EXPERIENCE WORKING IN CYBERSECURITY.

Chuck Davis

Author, Inventor, Blogger, Educator, Keynote Speaker, Executive

 

Engaging Keynote Speaker

Selected to speak publicly at conferences and events an average of 20 times per year, including Hacker Halted, IFSEC International (London), IANS, PSATec, SecureWorld, ISSA, (ISC)2, & IBM Conferences.

Exceptional Manager

A great understanding of enterprise risk, standards and governance, and a finger on the pulse of the threat landscape. Led teams of security architects, security engineers, forensic analysts, malware reverse engineers and an enterprise vulnerability scanning operations team.

Experienced Technologist

  • 10 US Patents

  • Co-authored two books

  • Numerous certifications including CISSP, ISSAP, SICC

  • ISSA Senior member and former board member

  • NetBOM founder

  • Former ISSA Chapter President

  • Architected, designed and deployed network and endpoint DLP, Network Access Control, Malware Defense tools, Forensic tools, IDS/IPS, Two-factor authentication, Splunk ES, and a virtual desktop solution for secure, crown jewel development.

  • Managed IDS for September 11th relief fund telethon (tributetoheroes.org)

Award-Winning Security Professional

Recognized as a 2021 Top Cybersecurity Leader by Security Magazine.

Frequently interviewed by television, radio and print media about information security news stories. Assisted former IBM CEO, Lou Gerstner’s team in security his home networks and financial servers.

Award-Winning Educator

  • Awarded PA post-secondary technology educator of the year.

  • Developed the CISO Certificate Program for Harrisburg University.

  • Developed and taught undergraduate and graduate courses for three universities including, Ethical Hacking, Computer Forensics, Network Security, Cryptography and others.

  • Deployed an enterprise-wide security education and awareness campaign including a managed phishing campaign for a Fortune 500 company.

Architecture and Deployment of Vendor Technologies

Risk-based Vulnerability Management, Digital Transformation, Zero Trust, SBOM, NetBOM, IoT security, Splunk, Symantec, SourceFire/Cisco, FireEye, Mandiant, EnCase, SoftLayer, ForeScout, Fidelis, Cellebrite, FTK, SafeNet, VMWare, Carbon Black, Gigamon, Qualys, Office 365 and more.

 

Awards

TCCP-sticky.png

Pennsylvania Post Secondary Technology Educator of the Year - 2013

cd01.png
uop.png

University of Phoenix Community Service Award

IBM Patent Achievement Award - 2016

IBM Patent Achievement Award - 2008

IBM Patent Achievement Award - 2003

IBM Patent Achievement Award - 2002