About
David Cass is President of CISOs Connect where he leads the company's peer engagement…
Articles by David
Contributions
Activity
-
Our CEO recently spent time with our DeepSeas crew based in Costa Rica. Our Deeps are known for being cheerful, cool, and deep. Meet our…
Our CEO recently spent time with our DeepSeas crew based in Costa Rica. Our Deeps are known for being cheerful, cool, and deep. Meet our…
Liked by David Cass
-
🔍 𝐊𝐞𝐲 𝐓𝐚𝐤𝐞𝐚𝐰𝐚𝐲𝐬 𝐟𝐫𝐨𝐦 𝐃𝐚𝐲 1 𝐚𝐭 𝐅𝐢𝐫𝐞𝐛𝐥𝐨𝐜𝐤𝐬 𝐒𝐏𝐀𝐑𝐊 2024 Day 1 offered some incredible insights into the future of…
🔍 𝐊𝐞𝐲 𝐓𝐚𝐤𝐞𝐚𝐰𝐚𝐲𝐬 𝐟𝐫𝐨𝐦 𝐃𝐚𝐲 1 𝐚𝐭 𝐅𝐢𝐫𝐞𝐛𝐥𝐨𝐜𝐤𝐬 𝐒𝐏𝐀𝐑𝐊 2024 Day 1 offered some incredible insights into the future of…
Liked by David Cass
-
¡Hoy celebramos un nuevo hito! 🎉 La Cátedra Fintech de la Universidad de Málaga, en la que la Fundación Kareema se enorgullece de ser uno de los…
¡Hoy celebramos un nuevo hito! 🎉 La Cátedra Fintech de la Universidad de Málaga, en la que la Fundación Kareema se enorgullece de ser uno de los…
Liked by David Cass
Experience
Education
-
Massachusetts Institute of Technology - Sloan School of Management
-
Activities and Societies: Operations Management, Quantitative Finance
-
-
-
-
-
-
-
Licenses & Certifications
-
MIT Media Lab Cryptocurrency
Massachusetts Institute of Technology
IssuedCredential ID MIT Media Lab Cryptocurrency 2021-07-28 -
Certified Information Privacy Professional/Europe
IAPP - International Association of Privacy Professionals
-
Certified Information Privacy Professional/United States
IAPP - International Association of Privacy Professionals
Volunteer Experience
-
Firefighter & Swiftwater Rescue Technician
New Hope Eagle Fire Co
- Present 10 years 9 months
Disaster and Humanitarian Relief
-
Discussion Leader and Content Contributor - Cybersecurity, Privacy & Risk SME
World Economic Forum
- Present 3 years 11 months
Economic Empowerment
Discussion leader and contributor specializing in cybersecurity, privacy, risk and trust in global financial systems.
-
Executive Board Member
Global Cyber Institute
- Present 7 years
Education
The Global Cyber Institute Steering Committee convenes on a regular basis to guide the development and fulfillment of the GCI’s mission. Additionally, the Steering Committee carries out its responsibilities in collaboration with the Curriculum Committee. The Steering Committee sets and reviews the general direction of the GCI programs,, ensuring the programs are meeting the needs of the industry.
-
Adjunct Professor, Cyber Security, Privacy, and Cyber Warfare
Rutgers Law School
- Present 5 years
Adjunct Professor of Law in Cyber Warfare, Cyber Security, and Privacy.
-
Technology Committee - Cybersecurity Subcommittee
New York State Bar Association
- Present 5 years 3 months
Science and Technology
-
Official Member & Contributor
Forbes Technology Council
- Present 6 years 8 months
Science and Technology
An invitation-only organization comprised of world-class CIOs, CTOs, CISOs and technology executives
-
Member Board Of Directors - Silicon Beach Innovation Lab
UCLA Extension
- Present 7 years 5 months
Education
The Silicon Beach Innovation Lab (SBi-Lab) provides both academic instruction and real-world experience in the area of digital technology. As an SBi-Lab member, you will enhance your career, learn from experts in the tech community, and collaborate with your peers in the industry.
-
Member Board Of Trustees
Lebanon Valley College
- 7 years
Education
I am honored to have been appointed to serve on the College’s Board effective at its spring meeting on May 2-3, 2014.
-
Independent Board Member
PixarBio
- 6 years 9 months
I have had the opportunity to meet with the PixarBio team, and it is clear that Mr. Reynolds has assembled a strong team of dedicated and accomplished professionals. As an Independent Board Member, I am happy to serve as a member of the audit committee and general nominations committee.
Publications
-
Blockchain, Smart Contracts, Crypto, and Web 3.0 for Business Lawyers
Business Law Today
By: Hon. Saliann Scarpulla, Bradford K. Newman, David A. Cass
Blockchain technology has become a buzzword in the business world, and its applications are rapidly expanding. With the rise of cryptocurrencies, smart contracts, and other decentralized applications, blockchain has opened up new possibilities for businesses to operate more securely, transparently, and efficiently. This article will explore the basics of blockchain, smart contracts, crypto, and Web 3.0 and how they are relevant…By: Hon. Saliann Scarpulla, Bradford K. Newman, David A. Cass
Blockchain technology has become a buzzword in the business world, and its applications are rapidly expanding. With the rise of cryptocurrencies, smart contracts, and other decentralized applications, blockchain has opened up new possibilities for businesses to operate more securely, transparently, and efficiently. This article will explore the basics of blockchain, smart contracts, crypto, and Web 3.0 and how they are relevant for business lawyers. We will also examine some of this technology’s current business, litigation, and regulatory risks.Other authorsSee publication -
WHEN NOT IF: Supply-chain and Third-party Risks Facing Law Firms
Singapore Academy of Law and TechLaw Fest
-
The Dirty Truth About Crypto: Money Laundering Made Easier
Law.com
Today’s legal landscape requires one to have a clear understanding of the relationship between blockchain, smart contracts, and cryptocurrencies and how these three topics are connected to money laundering and other legal concerns. This article attempts to provide the reader with that basic understanding.
Other authorsSee publication -
The Impact of Digital Transformation on Security Strategy
Cloud Security Alliance at RSAC 2021
-
Cybersecurity in Mass Tort Cases: Best Practices for Handling Massive Troves of Sensitive Data (Panel Presentation)
HB Litigation Conferences
Multiple cybersecurity issues arise that are unique to mass tort cases, especially those involving massive amounts of HIPAA data in medical records, and data protection requirements that the Plaintiff and Defense bars must exercise. This panel will examine these issues from the perspective of lawyers, solution providers, neutrals, and CISOs. In addition insights and best practices for the plaintiff and defense bar, the panel will discuss the rapidly evolving ethical obligations of lawyers and…
Multiple cybersecurity issues arise that are unique to mass tort cases, especially those involving massive amounts of HIPAA data in medical records, and data protection requirements that the Plaintiff and Defense bars must exercise. This panel will examine these issues from the perspective of lawyers, solution providers, neutrals, and CISOs. In addition insights and best practices for the plaintiff and defense bar, the panel will discuss the rapidly evolving ethical obligations of lawyers and the impact on future litigations of cyber-attacks similar to those experienced by firms and providers.
Other authorsSee publication -
Architecting Disruption
fintech americas
I discuss how cloud, cognitive and blockchain are changing the competitive landscape of financial services and what organizations are doing to transform essential customer experiences, rethink business, technology and data to build a platform for the future of financial services.
-
Cyber Security for the Healthcare Sector: HIPAA Compliance Made Simple
West LegalEdcenter
This panel will provide a practical overview of the Health Insurance Portability and Accountability Act (HIPAA), as well as HITECH, as it relates to the cyber security and privacy of covered entities and business associates. Panelists will discuss how to comply with the HIPAA Privacy Rule, Security Rule, Breach Notification Rule, and Enforcement Rule, as well as state HIPAA laws. HIPAA compliance in relation to ransomware will also be discussed. Finally, the panel will discuss regulatory…
This panel will provide a practical overview of the Health Insurance Portability and Accountability Act (HIPAA), as well as HITECH, as it relates to the cyber security and privacy of covered entities and business associates. Panelists will discuss how to comply with the HIPAA Privacy Rule, Security Rule, Breach Notification Rule, and Enforcement Rule, as well as state HIPAA laws. HIPAA compliance in relation to ransomware will also be discussed. Finally, the panel will discuss regulatory guidance for mobile health-related (“mHealth”) apps.
Other authorsSee publication -
How Cyber is Driving the New Board Perspective on Holistic Enterprise Risk Management Across All Business Lines
SINET - Global Cybersecurity Innovation Summit
The topic of Cyber Security is top of mind for many Board of Directors (BOD) and is a common agenda item at BOD meetings. What do BOD want to hear from their Cyber Security executives? What are the salient points a BOD needs to know about the Chief Information Security Officer role and the business of Cyber so they can better manage their overall company risk posture. Does having Cyber professionals on boards of publicly traded companies help communicate a complex challenge to non technical…
The topic of Cyber Security is top of mind for many Board of Directors (BOD) and is a common agenda item at BOD meetings. What do BOD want to hear from their Cyber Security executives? What are the salient points a BOD needs to know about the Chief Information Security Officer role and the business of Cyber so they can better manage their overall company risk posture. Does having Cyber professionals on boards of publicly traded companies help communicate a complex challenge to non technical Boards and h ow does the BOD perceive enterprise risk relative to their company’s goals and objectives. These executives will share how they manage, prioritize and communicate enterprise and organizational risks within a Cyber dominate environment.
Other authorsSee publication -
Cybersecurity and Crisis Management in the Digital Age
Risk Assistance Network + Exchange
Roundtable exercise on responding to a Hypothetical Scenario for a Publicly Traded Healthcare Company
Other authorsSee publication -
Cyberwar: A Technical Survey of the Tools and Weapons Used in Battle
Journal of Law & Cyber Warfare
Discussion of an overview of cyber weapons, threats and countermeasures, and predictions for upcoming years.
Other authorsSee publication -
Legal Issues Around Cloud Computing
West LegalEd Center
This webinar will provide an overview of cloud computing and review the cloud landscape. The panel will then provide an overview of legal and other risks that should be considered when working with the cloud, regardless of the cloud infrastructure being planned for or already in use.
Other authorsSee publication -
Investment Advisors Under Attack: Understanding the SEC and IA Cyber Guidelines
West LegalEdCenter
As the threat landscape continues to evolve, Investment Advisors have also become a target of opportunity. Join our webcast as we discuss the importance of understanding the SEC and IA Cyber guidelines.
Other authorsSee publication -
Cyber Attack: Is your board prepared?
West LegalEd Center
This program discusses what the board of directors of a company, whether large or small, needs to know about the cyber security preparedness of their company in order to both protect from a wide-scale incident and mitigate the damage should a breach occur. Panelists will discuss breach reporting cycles; the importance of clear notification and governance in cyber security recommendations for proactive measures to protect your equities. This program will include a hypothetical cyber incident…
This program discusses what the board of directors of a company, whether large or small, needs to know about the cyber security preparedness of their company in order to both protect from a wide-scale incident and mitigate the damage should a breach occur. Panelists will discuss breach reporting cycles; the importance of clear notification and governance in cyber security recommendations for proactive measures to protect your equities. This program will include a hypothetical cyber incident that allows attendees to understand the different types of response to a breach and the pitfalls with each.
Other authorsSee publication -
A Guide for Lawyers to Understand the Current Threats Facing the Financial Industry
West LegalEd Center
The program offers a legal perspective in the wake of continued escalations in phishing and denial of service attacks against banks and other financial institutions, financial services firms and the quickly evolving regulatory frameworks.
Other authorsSee publication -
"The Cloud: Understanding It, Cyber Threats, Liabilities, and more."
IT Security One2One
This dynamic panel of experts will cover the importance of your contractual agreements that include disaster recovery and decisions for public or private configurations. Also to be discussed are successful DevOp structures with the integration of continuous vulnerability management followed by Data Classification schemes and Identity and Access Management Regimens. Closing out the session will be a discussion regarding Compliance as it relates to PCI and HIPAA when utilizing cloud based…
This dynamic panel of experts will cover the importance of your contractual agreements that include disaster recovery and decisions for public or private configurations. Also to be discussed are successful DevOp structures with the integration of continuous vulnerability management followed by Data Classification schemes and Identity and Access Management Regimens. Closing out the session will be a discussion regarding Compliance as it relates to PCI and HIPAA when utilizing cloud based constructs.
Other authorsSee publication -
Addressing the Challenge of The Dark Web: What Technologies will be Needed to Mitigate Nefarious Behavior and How Can Technology Help Law Enforcement?
SINET presents The Global Cybersecurity Innovation Summit, Supported by Her Majesty's Government and The U.S. Department of Homeland Security, Science & Technology Directorate. The British Museum London
The Dark Net has emerged as the preferred trading venue for organized criminal networks and individuals to carry out illicit activities, and has also bolstered a new breed of crimes such as HaaS “hacking as a service.” Darknet markets have multiplied since the first major takedowns and continue to use enhanced privacy and decentralized technologies in order to evade law enforcement detection. Crimes committed with the Dark Net pose interesting challenges such as how to coordinate technically…
The Dark Net has emerged as the preferred trading venue for organized criminal networks and individuals to carry out illicit activities, and has also bolstered a new breed of crimes such as HaaS “hacking as a service.” Darknet markets have multiplied since the first major takedowns and continue to use enhanced privacy and decentralized technologies in order to evade law enforcement detection. Crimes committed with the Dark Net pose interesting challenges such as how to coordinate technically intensive operations where data runs across national jurisdictions and where targets are fast-moving and hard to pinpoint, often using encryption. But technologies can also help law enforcement address the challenge of the Dark Web:
-Sifting software that sorts through mass amounts of online data to extract meaningful information from targeted searches.
-Indexing programs that give government new ways to analyze, organize and interact with data pulled from a larger pool of sources.
-Computer vision search imaging.
-Outside experts who monitor the web on behalf of law enforcement agencies, trawling to find specific illegal activities and using various tools to automate the gathering.
This panel will address the limitations of these technologies, as well as discuss what additional technologies are needed to combat this challenge.Other authorsSee publication -
Security as a Service
SINET Showcase 2015 - The National Press Club, Washington D.C.
Why are the Public and Private Sector and Venture Capital Communities Investing in Security as a Service?
Security-as-a-service (SaaS) is an outsourcing model for security management. Typically, Security as a Service involves applications such as anti-virus software delivered over the Internet but the term can also refer to security management provided in-house by an external organization.Other authorsSee publication -
Staying Secure with Analytics in the Cloud
IBM Insight 2015
From the front office to the back office, analytics is critical to every role in an organization, and more applications are cloud based. You want to adopt software as a service (SaaS) for analytics, but you're concerned about the security and privacy concerns associated with putting your data in the cloud. Join this session to hear what IBM is doing to keep your data secure so you can focus on business innovation.
Other authors -
Information Security & the Innovator's Dilemma
IT Security One2One
The way people and companies work has fundamentally changed. What were once buzz words, cloud, mobile, social and big data are here to stay. This paradigm shift requires rethinking information security. I will discuss how we transform information security to become a source of innovation and a business enabler.
-
Different approaches to cyber security - regulated versus unregulated industries
FT Cyber Security Summit Europe
Companies in sectors that are significantly regulated by the state – such as pharmaceuticals, financial services and utilities – tend to take a different approach to security from those in less regulated or unregulated sectors – such as retail, consumer products and publishing.
Other authorsSee publication -
UK's Most Innovative Cyber Security Company of the Year: Competition Final
Infosecurity Europe
During this lively session the four finalists from the national competition launched through the Cyber Growth Partnership, with the support of BIS and techUK and sponsors Atkins and HP will pitch their technology/service to the Keynote Stage audience and a judging panel of leading CISOs, venture capitalists and analysts. The judging panel will select the winner and award the title of ‘Most Innovative Small Cyber Security Company of the Year’.
Other authorsSee publication -
Articulating Risk to Senior Management: Enabling Informed Decision-Making
Infosecurity Europe
Buy-in from senior management is repeatedly cited as a key driver of effective information risk management. Cyber security is certainly high-up on most board agendas following high-profile breaches and pressure from governments and regulatory bodies, however increasing board awareness doesn’t always translate into effective information security decision-making or support. Information security practitioners continue to state that articulating risk to senior management remains a big challenge.…
Buy-in from senior management is repeatedly cited as a key driver of effective information risk management. Cyber security is certainly high-up on most board agendas following high-profile breaches and pressure from governments and regulatory bodies, however increasing board awareness doesn’t always translate into effective information security decision-making or support. Information security practitioners continue to state that articulating risk to senior management remains a big challenge. This is often aggravated by the fact that when investment is secured, it is often difficult to demonstrate the return on that investment.
As enterprises become more connected, attackers become more sophisticated, and the likelihood of a breach increases, it has never been more important for information security practitioners to be able to translate risk into the language of the business. During this panel, the speakers will share best practice advice on how to articulate risk and depict the business value of information security, so that senior management understand the decisions they are being asked to make.Other authorsSee publication -
Why Convergence Matters
2015 IT Security one2one @ ISC West Speakers
Whether you are responsible for physical security, information security or both, we are seeing more convergence among these disciplines and the technology they utilize. In 2014, there was a lot of convergence between information security and privacy. In 2015, I expect to see more synergy among physical security and information security. Whether this convergence results in reporting changes or physical security and information security teams working more closely together that remains to be seen.…
Whether you are responsible for physical security, information security or both, we are seeing more convergence among these disciplines and the technology they utilize. In 2014, there was a lot of convergence between information security and privacy. In 2015, I expect to see more synergy among physical security and information security. Whether this convergence results in reporting changes or physical security and information security teams working more closely together that remains to be seen. 2014 raised the bar for complex cyber-attacks, some of these attacks had elements of insider threat and others were able to shut down corporations for a period of time.
Cyber criminals and hackers have a common language and approach that is well understood by their community. As we see convergence among physical and information security there is a need for a common language, which includes risk management and resiliency.
Key Takeaways Include:
Creating a culture of risk management
Developing a common risk structure and framework that can be applied across disciplines
Dealing with known unknowns and unknown unknowns
Building the case for resiliency as part of your strategy
How to execute on your risk management strategy -
Intelligent Security: Balancing Information Security Risks and Priorities
Infosecurity Europe
As organisations accept that they are more than likely to be breached, strengthening business resilience and response capabilities is becoming just as important as developing defensive strategies. As a result, organisations are crafting risk-based approaches to balance their priorities in order to protect, detect, respond and recover.
Other authorsSee publication -
Operational Risk and the Cyber Threat
Advisen
2014 saw an increase in the number of cyber incidents that had devastating effects on the operations of global companies. Nation states allegedly carried out attacks across the globe, but employees are also a weak link. This panel will discuss the cyber risks to corporate operations from outside and within its own walls. It will also touch on the ever-present threat to national critical infrastructure from a cyber attack.
Other authors -
The Importance of Privacy
securitycurrent.com
Security and Privacy are essential in today’s digital economy. 2014 was a year of large-scale security and privacy breaches, leaving everyone asking themselves how much should we trust companies with our sensitive information. Currently, there are more than 80 countries with privacy laws. Violating these laws may result in fines, brand damage, and/or loss of revenue.
-
Modern Measures: Cybersecurity for the Gaming Industry
Global Gaming Expo Conference (G2E)
Cyber intrusions and attacks have increased dramatically over the last decade, exposing personal and business information, disrupting operations and imposing high costs on affected businesses. Despite its expertise in security, the gaming industry is no stranger to this threat. During this session, learn about potential vulnerabilities for all businesses as well as those unique to the gaming industry and how best to safeguard against them. Attendees also will gain insights on developing a…
Cyber intrusions and attacks have increased dramatically over the last decade, exposing personal and business information, disrupting operations and imposing high costs on affected businesses. Despite its expertise in security, the gaming industry is no stranger to this threat. During this session, learn about potential vulnerabilities for all businesses as well as those unique to the gaming industry and how best to safeguard against them. Attendees also will gain insights on developing a response plan for use in the unfortunate event of an attack.
• Learn how, and why, hackers do what they do.
• Hear about the technology available to protect your data.
• Assess your organization’s vulnerability to cybercrime. -
Security Maturity – Urban Legend or Reality?
one2one Summits by Reed Exhibitions
With the increasing utilization of cloud, mobile, social and big data, the traditional model of Information Security has changed. As organizations grapple with these key changes how do you know if your information security program is protecting the right things and how do you gauge security maturity in this new paradigm? How can you answer the question: “How mature is my Information Security program?”
-
Can We Trust the Cloud with our Critical Infrastructure and Sensitive Information?
SINET presents The Global Cybersecurity Innovation Summit “Advancing Global Collaboration and Innovation” supported by Her Majesty’s Government and U.S. Department of Homeland Security, Science & Technology Directorate
Abstract: Greater London has one of the largest concentrations of CCTV cameras in the world and its police service is among the first to experiment with body-worn cameras for its officers and other government agencies and corporations are managing and securing records and data of tens of millions of people. All of these entities stand to benefit from the cloud, but the sensitivity of their data makes its' security paramount. Can we trust the cloud with our most sensitive data types? What should…
Abstract: Greater London has one of the largest concentrations of CCTV cameras in the world and its police service is among the first to experiment with body-worn cameras for its officers and other government agencies and corporations are managing and securing records and data of tens of millions of people. All of these entities stand to benefit from the cloud, but the sensitivity of their data makes its' security paramount. Can we trust the cloud with our most sensitive data types? What should a cloud model include to ensure the integrity, reliability, security and availability of sensitive information for those who need to see it? What solutions make sense and what should we be asking of our cloud providers? This panel will explore these issues and identify areas where industry and government can work together to fully achieve the benefits that the cloud can deliver - including a secure environment that can also protect our privacy.
Other authorsSee publication -
My interview in Infosecurity magazine.
Infosecurity Magazine
David Cass is the most softly spoken and unassuming security executive that I've had the pleasure of meeting. Surprisingly young in comparison with many of his peers, his experience and insight...
-
Reinventing Information Security - Building the Case for Adaptive Security
Presentation: CISO Summit Miami (CDM Media)
The way organizations and people work today has dramatically changed. Social, Mobile, and Cloud require us to change the way that we practice information security. We must move from a short term focus to having a long term vision and strategy.
We will discuss:
- What is adaptive security?
- Achieving business alignment
- Moving from an operational view of security to an outcome based view
- Focus on principles
- Positioning your security team for success
-…The way organizations and people work today has dramatically changed. Social, Mobile, and Cloud require us to change the way that we practice information security. We must move from a short term focus to having a long term vision and strategy.
We will discuss:
- What is adaptive security?
- Achieving business alignment
- Moving from an operational view of security to an outcome based view
- Focus on principles
- Positioning your security team for success
- Putting it all together -
Clarifying the Cloud – A Proactive Approach to Cloud Use
Presentation: NY CISO Executive Summit
The public cloud has not only settled on the IT landscape, it has infiltrated every facet of the business. It presents complex issues around identity management, compliance and data intelligence, and CISOs wonder if the risk is worth the ROI. For David Cass of Elsevier, successful cloud adoption is about establishing governance that takes advantage of the cloud’s versatility. This means engineering the appropriate intelligence for your organization, building a data security framework and…
The public cloud has not only settled on the IT landscape, it has infiltrated every facet of the business. It presents complex issues around identity management, compliance and data intelligence, and CISOs wonder if the risk is worth the ROI. For David Cass of Elsevier, successful cloud adoption is about establishing governance that takes advantage of the cloud’s versatility. This means engineering the appropriate intelligence for your organization, building a data security framework and assessing providers on cloud security standards. In this session, learn how his risk-based approach to cloud translates into competitive advantage.
-
Security as an enabler: Supporting enterprise innovation and transformation
Prensentation: InfoSecurity Europe - Keynote Theatre
As information security teams grapple with the challenges of securing an increasingly complex and ever changing threat landscape they have an opportunity to transform information security into an enabling function, supporting and adding value to the business as it transforms and innovates.
So how can an information security function evolve to become business-led? How do you bring business knowledge into the security team and educate security practitioners about the implications of…As information security teams grapple with the challenges of securing an increasingly complex and ever changing threat landscape they have an opportunity to transform information security into an enabling function, supporting and adding value to the business as it transforms and innovates.
So how can an information security function evolve to become business-led? How do you bring business knowledge into the security team and educate security practitioners about the implications of threats for the business? How can you challenge negative perceptions of risk within information security? How can security functions start thinking like the business and become a business partner? How does information security become fundamental to the business rather than just a compliance issue? How should information security practitioners engage the business and get management and stakeholder buy-in? How can information security and business work together to create a common language to ensure the effective communication of risk intelligence without instilling FUD?
During this session the panel will discuss how information security practitioners can position security as an enabling function and truly support the business including:
How to integrate security into agile business practices and transformation
New strategies to educate the security team to understand business objectives and speak the language of the business
How security can help the business collaborate internally, with suppliers and with customers
How the security function can inform and contribute to business decision-making
What skills are required for an effective security professional and what does this all mean for the role of the CISO?Other authorsSee publication -
Business understanding is key to security - My interview with Computer Weekly
Computer Weekly
Information security professionals must have a good understanding of the business they support, says David Cass, chief information security officer (CISO) for publishing firm Elsevier.
“They must know what is important to the business and what the key business drivers are so that information security can be aligned with those,” he told Computer Weekly. -
Plenary Speaker
Complex Adaptive Systems Conference
Industry and academic experts from around the world will share their knowledge and research on systems engineering topics in the area of Emerging Technologies for Evolving Systems: Socio-technical, Cyber and Big Data
-
Keynote - Analyzing the Current Threat Landscape to Inform Information Security Strategy and Tactics
Infosecurity Magazine Winter Virtual Conference
During this session David Cass - Senior Vice President & CISO, Elsevier, will provide his assessment of the current threat landscape, the emerging risks as business, technology and working practices evolve and how to plan a road map for the future...
-
My Interview with the Financial Times
Financial Times
David Cass, chief information security officer at Elsevier, talks about Elsevier’s approach to privacy and cyber security in a video interview with the Financial Times.
-
The Evolving Role of the CISO
Opening Keynote at the one2one Summit
Technology continues to change at a rapid pace. Emerging technologies are becoming more and more complex and cyber-attacks ever more sophisticated. Privacy and regulations are adding the challenging business environment. Information security must be a business enabler and help the business innovate. We will discuss strategies to navigate this environment, leverage new technology, and help the business innovate.
-
Leading the Organization to Innovation
Presentation: ISACA's World Congress INSIGHTS 2013 Berlin, Germany
Other authors -
Implementing Practical Information Security Programs
Presentation: CISO Summit (CDM Media)
The information security game isn’t what it used to be. Emerging technologies are becoming more and more complex and cyber-attacks ever more sophisticated. As today’s IT department is now being looked to as a driver of business and raiser of the bottom line, department leaders must adopt a more advanced strategy. This session will enable attendees to assess the current state of information security and its key components within their respective organizations, highlighting specific experiences…
The information security game isn’t what it used to be. Emerging technologies are becoming more and more complex and cyber-attacks ever more sophisticated. As today’s IT department is now being looked to as a driver of business and raiser of the bottom line, department leaders must adopt a more advanced strategy. This session will enable attendees to assess the current state of information security and its key components within their respective organizations, highlighting specific experiences and lessons learned. Discussion topics will include:
Methods for Determining Maturity
Communication at the Executive Level
Achieving the Future State
Budget & Strategy: Working Smart -
Increasing Complexity in the Cloud - Tackling Regulations & Misconceptions
Presentation: New York - CISO Executive Summit (Evanta)
Regulations are complicating the cloud environment and the increasing complexity is making it harder to leverage secure cloud capabilities. Security leaders in today’s organization must take a serious look at how to navigate the cloud in order to meet business demands. With no one-size-fits-all solution, this executive boardroom’s goal is to bring together CISOs in the New York community to discuss lessons learned, personal case studies and the business cases built to support a move to the…
Regulations are complicating the cloud environment and the increasing complexity is making it harder to leverage secure cloud capabilities. Security leaders in today’s organization must take a serious look at how to navigate the cloud in order to meet business demands. With no one-size-fits-all solution, this executive boardroom’s goal is to bring together CISOs in the New York community to discuss lessons learned, personal case studies and the business cases built to support a move to the cloud. Join David Cass, Shukri Khader and Dave Anderson to discuss how, despite growing regulatory requirements, you can discover your own personal fit in the cloud environment.
Other authors -
Integrating Cloud Computing Into Your Data Security Program
Presentation: Compliance Week 2012 Washington, DC
-
Creating and Capturing Value through effective Governance, Risk, and Compliance Programs
Presentation:IT Governance Risk & Compliance Conference (ISACA International)
-
Developing Metrics That Matter
Presentation: ISACA IT Governance, Risk & Compliance Conference Las Vegas, NV
Review the present state of risk, resiliency and security metrics. Perform basic quantitative analysis.
Develop diagnostic metrics.
Leverage risk and resiliency management to improve the risk posture, provide a sustainable and resilient technology environment, deliver business value and contribute to innovation.
Evaluate frameworks such as COBIT and ITIL to develop risk and resiliency metrics that are actionable and deliver business value, and are presentable to executive management. -
Crossing the Chasm: Delivering Value and Innovation With the Convergence of IT Governance
ISACA
ISACA Management Forum Key Note, Scottsdale AZ
-
Effective Total Cost of Ownership Strategies for IT Compliance and Governance
CPM
CPM West, Las Vegas NV
-
Basel II Operational Risk and IT Governance
The Wharton School of Business
-
Enhancing Governance through the use of the Resiliency Risk Index
ISACA
ISACA – IT Governance & Compliance Conference, Boston MA.
-
The Economics of IT Governance
ISACA
ISACA NA Computer Audit, Control and Security Conference, Houston TX, 2007
-
The TCO of Business Resiliency: A Framework and Methodology
DRJ World Expo
-
IT Economics
CIO Magazine Seminar Series
Key Note Speaker: IT Economics, CIO Magazine Seminar Series, New York City, Boston, Philadelphia.
-
The TCO of Business Resiliency and Addressing the Challenges of Global Compliance
International Symposium on Affordability Management
International Symposium on Affordability Management, Prague 2006.
-
IT Security for Global Business
Presentation: 22nd International Monetary & Trade Conference
Philadelphia Federal Reserve Bank
Courses
-
Advanced Topics in Corporate Finance (Post Grad)
15.s06
-
Risk Management (Post Grad)
15.s05
Honors & Awards
-
Global Leadership Program
Elsevier
-
ISE® NORTHEAST PEOPLE'S CHOICE AWARD WINNER 2013
Tech Exec Networks
David won the 2013 ISE Northeast People's Choice Award! The Westin Hotel in Times Square provided the venue for this sold out event. David was selected for this prestigious award by the security community at large through an online poll. David is recognized as true leader within the information security community -- as someone that best exhibits passion, commitment, and integrity!
-
Extraordinary Leader Training Program
Elsevier
Organizations
-
FS-ISAC
Member Digital Assets Steering Committee
- Present -
Journal of Law & Cyber Warfare
Member of Editorial Board
- PresentThe Journal of Law & Cyber Warfare provides a public peer-reviewed professional forum for the open discussion and education of technology, business, legal, and military professionals concerning the legal issues businesses and governments arising out of cyber attacks or acts of cyber war. The Journal of Law and Cyber Warfare is published twice per year by top legal professionals and scholars from the law, technology, security, and business industries. The views expressed in the Journal of Law…
The Journal of Law & Cyber Warfare provides a public peer-reviewed professional forum for the open discussion and education of technology, business, legal, and military professionals concerning the legal issues businesses and governments arising out of cyber attacks or acts of cyber war. The Journal of Law and Cyber Warfare is published twice per year by top legal professionals and scholars from the law, technology, security, and business industries. The views expressed in the Journal of Law and Cyber Warfare are those of the authors and not necessarily of the Journal of Law and Cyber Warfare.
-
Association of Governing Boards of Universities and Colleges
Member
- Present -
International Association of Privacy Professionals
KnowledgeNet Co-Chair Philadelphia Chapter
- Present -
MIT Sloan Alumni-Student Mentor
Alumni Mentor
- Present
Recommendations received
1 person has recommended David
Join now to viewMore activity by David
-
Black Friday is a peak time for retail and e-commerce. But as the UK Cybersecurity Chief highlights, it's also a golden opportunity for…
Black Friday is a peak time for retail and e-commerce. But as the UK Cybersecurity Chief highlights, it's also a golden opportunity for…
Shared by David Cass
-
Lieutenant General Harry D. Raduege, Jr. (USAF Ret.) is a highly respected leader in cybersecurity and strategic advisory services, with over 35…
Lieutenant General Harry D. Raduege, Jr. (USAF Ret.) is a highly respected leader in cybersecurity and strategic advisory services, with over 35…
Liked by David Cass
-
Just signed a letter with the President of CANEB - Cámara Nacional de Exportadores de Bolivia, (the National Chamber of Exporters of Bolivia) to…
Just signed a letter with the President of CANEB - Cámara Nacional de Exportadores de Bolivia, (the National Chamber of Exporters of Bolivia) to…
Liked by David Cass
-
Truly an incredible time and learned al much about cybersecurity challenges abroad!
Truly an incredible time and learned al much about cybersecurity challenges abroad!
Liked by David Cass
-
The rise in phishing scams impersonating trusted services like DocuSign highlights how attackers exploit familiarity to target government agencies…
The rise in phishing scams impersonating trusted services like DocuSign highlights how attackers exploit familiarity to target government agencies…
Shared by David Cass
-
It’s my turn to host a #thanksgiving dinner at my house this year, with my family friends from Microsoft Azure , Intel Corporation , banking and…
It’s my turn to host a #thanksgiving dinner at my house this year, with my family friends from Microsoft Azure , Intel Corporation , banking and…
Liked by David Cass
-
I wear many professional hats -- investor, technologist, founder, and board members. I count myself lucky that the different aspects of my…
I wear many professional hats -- investor, technologist, founder, and board members. I count myself lucky that the different aspects of my…
Liked by David Cass
-
Two weeks into TechOperators and the VC world... seeing so much opportunity. Wrote a motivational note after the first start-up pitches: (Yes…
Two weeks into TechOperators and the VC world... seeing so much opportunity. Wrote a motivational note after the first start-up pitches: (Yes…
Liked by David Cass
-
Amazing friend and mentor. I have had some of my best laughs and chats with Devon. I advise everyone interested to take advantage of his offer to…
Amazing friend and mentor. I have had some of my best laughs and chats with Devon. I advise everyone interested to take advantage of his offer to…
Liked by David Cass
-
Karl Mattson is a globally recognized cybersecurity innovator with over 25 years of diverse experience as an enterprise CISO, technology strategist…
Karl Mattson is a globally recognized cybersecurity innovator with over 25 years of diverse experience as an enterprise CISO, technology strategist…
Liked by David Cass
-
I am honored to be speaking at #FireblocksSPARK and looking forward to a great discussion with my distinguished panelists, Christian Adam, David…
I am honored to be speaking at #FireblocksSPARK and looking forward to a great discussion with my distinguished panelists, Christian Adam, David…
Shared by David Cass
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named David Cass in United States
-
David Cass
Finance, Operations, and Strategy Executive
-
David Cass
-
David Cass
Owner, Cass, Inc. and Information Technology and Services
-
David Cass
Superintendent at EDiS
97 others named David Cass in United States are on LinkedIn
See others named David Cass