Top-Rated Speakers Bureau and Entertainment Booking Agency for Corporate Meetings and Business Events. Book an AAE Speaker Today.
Top-Rated Speakers Bureau and Entertainment Booking Agency for Corporate Meetings and Business Events. Book an AAE Speaker Today.
Click to Open Search Bar

Dave Kennedy

5 out of 5

Founder of Binary Defense & TrustedSec

REQUEST BOOKING INFORMATION

Dave Kennedy Biography

David Kennedy is a cybersecurity authority whose mission is to drive the industry forward and make the world a more secure place. In addition to creating two large-scale cybersecurity firms, Kennedy has testified before Congress on issues of national security and has appeared as a subject matter expert on hundreds of national news and TV shows.

TrustedSec and Binary Defense, the two firms that Kennedy founded and continues to own, both work on a global scale to protect companies, people, and the world from malicious hackers. TrustedSec provides Information Security consulting services for organizations of all sizes, while Binary Defense is a leading Managed Security Service Provider (MSSP) that offers Managed Detection and Response (MDR).

Prior to creating TrustedSec and Binary Defense, Kennedy was a Chief Security Officer (CSO) for Diebold Incorporated, a Fortune 1000 company. As a forward thinker in the security field, Kennedy has had the privilege of speaking at some of the nation’s largest conferences, including Microsoft’s BlueHat, DEF CON, Black Hat, and DerbyCon, which he co-created in 2011 and expanded into DerbyCon Communities.

Kennedy is a regular contributor and subject matter expert on cybersecurity stories for Fox News, CNN, Bloomberg, BBC, and other high-profile media outlets. Further, his tools have been featured on a number of TV shows and movies, and he served as Technical Consultant for the critically acclaimed Mr. Robot TV show.

In an effort to advance the industry, Kennedy co-authored 'Metasploit: The Penetration Testers Guide' and co-founded the 'Penetration Testing Execution Standard' (PTES), which is the industry standard for penetration tests and has been adopted by the Payment Card Industry (PCI). Kennedy is the creator of several popular open-source tools, including 'The Social-Engineer Toolkit' (SET), PenTesters Framework (PTF), Artillery, and Fast-Track. In addition to focusing on research, Kennedy has released a number of security advisories, including zero-days.

Prior to his work in the private sector, Kennedy served in the United States Marine Corps (USMC), focusing on cyber warfare and forensics analysis activities, including two tours to Iraq. Kennedy also served on the board of directors for (ISC)2, which is one of the largest security collectives and offers certifications such as the CISSP.

In addition to his formal achievements, Kennedy donates his time and wisdom by speaking with civic leaders and students about the importance of security. Bedford High School, Kennedy's alma mater, named its Kennedy Center for Gaming and Leadership in his honor.

Speaking Topics
  • Abnormal Behavior Detection in Large Environments

    Attack patterns are something that when it occurs is extrinsic (not natural) behavior in a infrastructure. Understanding what attack patterns look like and building an understanding of how to detect them with what you already have is possible. Most preventative technology tries in some extent to detect extrinsic behavior in an environment but falls short because of the continual changes in attack patterns and commoditized detection (sigs, etc). This talk dives into looking at what you already have in your infrastructure that you can use for intrinsic (natural) detection capabilities that doesn't rely on a specific signature, but more so on how attackers go after an organization. As an industry, we need to be detecting the extrinsic occurrences in our networks which exhibit abnormal behavior. During this presentation, we'll be covering a large percentage of techniques used by attackers, and how to detect them with what you currently have in place at your organization today.

  • Compromise Analysis – Why we’re seeing so many breaches.

    After looking at a number of compromises dating the past several years, there are a number of commonalities between each of them and steps that could have been used to prevent. Information security isn't a practice that will always be successful in defending however, there are key indicators of compromise to look for when an attacker is attempting to compromise an organization. During this presentation, we’ll analyze a number of data breaches and look at how a number of the breaches have occurred and how an information security program can be structured in order to defend against a lot of the attacks. Most of the causes are directly related to the human element and directly phishing. This talk will dive into how phishing techniques work, and what you can do to prevent this from happening in the future.

  • Building Defense on Known Good

    There's so much to do. There's not enough people. We can only do what we can based on risk, people, politics, and budget. All common things we share across each organization. This presentation dives into how to focus on building defenses against attacks, staying ahead of the methods, and focusing on known good vs. the rest. You'll leave this talk with a way to think about defense and a way to tackle the issues we face in security today.

  • The Hacking Age

    Attackers are continuously figuring out new methods to gain access to computer systems and enterprises. Everything from Ransomware to targeted and precise attacks aimed at intellectual property theft, monetary gain, or other motives. In today’s age of hacking, it’s never been more important to understand who the hackers are and the methods they use to attack organizations. In this talk, we go into the demographics of hackers, how they are hacking, and the best defenses both from a personal perspective as well as an enterprise. It’s possible to withstand the attacks we see today with proven practices, but it requires hard work, and an understanding of who your adversaries are.

  • Moving Ahead and Beyond Common Tool Detections

    There’s no question that companies continue to try and get better when it comes to detecting attacks in multiple phases. Instead of just patching and hoping for the best, organizations are spending a substantial amount of investment in trying to detect the “well what if they get through” situation. As companies focus on enhanced detection capabilities, the focus is often hard to grasp in what to actually look for – there is so much. This talk will dive into where we see most companies fail at detection and how red teams are helping push the bar forward in not just leveraging a checklist, but focusing on the identification of attack patterns in varying levels of sophistication. The over reliance on technology as a method for trying to jump start these programs often causes more harm than good, and we’ll dive into how effective off the shelf endpoint detection tools do when confronted with even basic attackers. As an industry, we have everything we need to get better – it’s a matter of prioritization, focus, and time.

Videos
FAQs
  • HOW TO BOOK Dave Kennedy?

    Our booking agents have successfully helped clients around the world secure talent like Dave Kennedy for both live and virtual events for over 15 years. The team at All American Entertainment represents and listens to the needs of organizations and corporations seeking to hire keynote speakers, celebrities or entertainers for speaking engagements, personal appearances, product endorsements, or corporate entertainment. Fill out a booking request form for Dave Kennedy, or call our office at 1.800.698.2536 to discuss your upcoming event. One of our experienced agents will be happy to help you get pricing information and check availability for Dave Kennedy or any other celebrity of your choice.
  • HOW MUCH DOES IT COST TO BOOK Dave Kennedy?

    Speaking fees for Dave Kennedy, or any other keynote speakers and celebrities, are determined based on a number of factors and may change without notice. The amount that Dave Kennedy charges to speak often varies according to the circumstances, including their schedule, market conditions, length of presentation, and the location of the event. The speaker fees listed on this website are intended to serve as a guideline only. In some cases, the actual quote may be above or below the stated range. For the most current fee to hire Dave Kennedy, please fill out the booking request form or call our office at 1.800.698.2536 to speak with an experienced booking agent.
  • WHO IS THE AGENT FOR Dave Kennedy?

    All American Entertainment has successfully secured celebrity talent like Dave Kennedy for clients worldwide for more than 15 years. As a full-service talent booking agency, we have access to virtually any speaker or celebrity in the world. Our agents are happy and able to submit an offer to the speaker or celebrity of your choice, letting you benefit from our reputation and long-standing relationships in the industry. Fill out the booking request form or call our office at 1.800.698.2536, and one of our agents will assist you to book Dave Kennedy for your next private or corporate function.
  • WHAT IS A FULL-SERVICE TALENT BOOKING AGENCY?

    All American Speakers is a "buyers agent" and exclusively represents talent buyers, meeting planners and event professionals, who are looking to secure celebrities and speakers for personal appearances, speaking engagements, corporate entertainment, public relations campaigns, commercials, or endorsements. We do not exclusively represent Dave Kennedy or claim ourselves as the exclusive booking agency, business manager, publicist, speakers bureau or management for Dave Kennedy or any other speaker or celebrity on this website. For more information on how we work and what makes us unique, please read the AAE Advantage.
Check Availability

Tell us about your event!

During normal business hours, we respond to most inquiries within 4 hours.

Users also viewed these speakers:

This website is a resource for event professionals and strives to provide the most comprehensive catalog of thought leaders and industry experts to consider for speaking engagements. A listing or profile on this website does not imply an agency affiliation or endorsement by the talent.

All American Entertainment (AAE) exclusively represents the interests of talent buyers, and does not claim to be the agency or management for any speaker or artist on this site. AAE is a talent booking agency for paid events only. We do not handle requests for donation of time or media requests for interviews, and cannot provide celebrity contact information.

If you are the talent and wish to request a profile update or removal from our online directory, please submit a profile request form.

Dave Kennedy

5 out of 5

Founder of Binary Defense & TrustedSec

Travels From:
Strongsville, OH, USA
Speaking Fee:

Dave Kennedy Biography

David Kennedy is a cybersecurity authority whose mission is to drive the industry forward and make the world a more secure place. In addition to creating two large-scale cybersecurity firms, Kennedy has testified before Congress on issues of national security and has appeared as a subject matter expert on hundreds of national news and TV shows.

TrustedSec and Binary Defense, the two firms that Kennedy founded and continues to own, both work on a global scale to protect companies, people, and the world from malicious hackers. TrustedSec provides Information Security consulting services for organizations of all sizes, while Binary Defense is a leading Managed Security Service Provider (MSSP) that offers Managed Detection and Response (MDR).

Prior to creating TrustedSec and Binary Defense, Kennedy was a Chief Security Officer (CSO) for Diebold Incorporated, a Fortune 1000 company. As a forward thinker in the security field, Kennedy has had the privilege of speaking at some of the nation’s largest conferences, including Microsoft’s BlueHat, DEF CON, Black Hat, and DerbyCon, which he co-created in 2011 and expanded into DerbyCon Communities.

Kennedy is a regular contributor and subject matter expert on cybersecurity stories for Fox News, CNN, Bloomberg, BBC, and other high-profile media outlets. Further, his tools have been featured on a number of TV shows and movies, and he served as Technical Consultant for the critically acclaimed Mr. Robot TV show.

In an effort to advance the industry, Kennedy co-authored 'Metasploit: The Penetration Testers Guide' and co-founded the 'Penetration Testing Execution Standard' (PTES), which is the industry standard for penetration tests and has been adopted by the Payment Card Industry (PCI). Kennedy is the creator of several popular open-source tools, including 'The Social-Engineer Toolkit' (SET), PenTesters Framework (PTF), Artillery, and Fast-Track. In addition to focusing on research, Kennedy has released a number of security advisories, including zero-days.

Prior to his work in the private sector, Kennedy served in the United States Marine Corps (USMC), focusing on cyber warfare and forensics analysis activities, including two tours to Iraq. Kennedy also served on the board of directors for (ISC)2, which is one of the largest security collectives and offers certifications such as the CISSP.

In addition to his formal achievements, Kennedy donates his time and wisdom by speaking with civic leaders and students about the importance of security. Bedford High School, Kennedy's alma mater, named its Kennedy Center for Gaming and Leadership in his honor.

Dave Kennedy Speaking Topics

  • Abnormal Behavior Detection in Large Environments

    Attack patterns are something that when it occurs is extrinsic (not natural) behavior in a infrastructure. Understanding what attack patterns look like and building an understanding of how to detect them with what you already have is possible. Most preventative technology tries in some extent to detect extrinsic behavior in an environment but falls short because of the continual changes in attack patterns and commoditized detection (sigs, etc). This talk dives into looking at what you already have in your infrastructure that you can use for intrinsic (natural) detection capabilities that doesn't rely on a specific signature, but more so on how attackers go after an organization. As an industry, we need to be detecting the extrinsic occurrences in our networks which exhibit abnormal behavior. During this presentation, we'll be covering a large percentage of techniques used by attackers, and how to detect them with what you currently have in place at your organization today.

  • Compromise Analysis – Why we’re seeing so many breaches.

    After looking at a number of compromises dating the past several years, there are a number of commonalities between each of them and steps that could have been used to prevent. Information security isn't a practice that will always be successful in defending however, there are key indicators of compromise to look for when an attacker is attempting to compromise an organization. During this presentation, we’ll analyze a number of data breaches and look at how a number of the breaches have occurred and how an information security program can be structured in order to defend against a lot of the attacks. Most of the causes are directly related to the human element and directly phishing. This talk will dive into how phishing techniques work, and what you can do to prevent this from happening in the future.

  • Building Defense on Known Good

    There's so much to do. There's not enough people. We can only do what we can based on risk, people, politics, and budget. All common things we share across each organization. This presentation dives into how to focus on building defenses against attacks, staying ahead of the methods, and focusing on known good vs. the rest. You'll leave this talk with a way to think about defense and a way to tackle the issues we face in security today.

  • The Hacking Age

    Attackers are continuously figuring out new methods to gain access to computer systems and enterprises. Everything from Ransomware to targeted and precise attacks aimed at intellectual property theft, monetary gain, or other motives. In today’s age of hacking, it’s never been more important to understand who the hackers are and the methods they use to attack organizations. In this talk, we go into the demographics of hackers, how they are hacking, and the best defenses both from a personal perspective as well as an enterprise. It’s possible to withstand the attacks we see today with proven practices, but it requires hard work, and an understanding of who your adversaries are.

  • Moving Ahead and Beyond Common Tool Detections

    There’s no question that companies continue to try and get better when it comes to detecting attacks in multiple phases. Instead of just patching and hoping for the best, organizations are spending a substantial amount of investment in trying to detect the “well what if they get through” situation. As companies focus on enhanced detection capabilities, the focus is often hard to grasp in what to actually look for – there is so much. This talk will dive into where we see most companies fail at detection and how red teams are helping push the bar forward in not just leveraging a checklist, but focusing on the identification of attack patterns in varying levels of sophistication. The over reliance on technology as a method for trying to jump start these programs often causes more harm than good, and we’ll dive into how effective off the shelf endpoint detection tools do when confronted with even basic attackers. As an industry, we have everything we need to get better – it’s a matter of prioritization, focus, and time.

Dave Kennedy Videos

  • Exploits, Research, Tools, and the Impact to Security | Dave Kennedy
    David Kennedy is the founder of TrustedSec, Binary Defense Systems, and DerbyCon. TrustedSec and Binary Defense are focused on the betterment of ...
  • Dave Kennedy, TrustedSec - Business Security Weekly #116 ...
    We welcome David Kennedy, founder and CEO, at TrustedSec to discuss " Investing in the right technology and resources"! To learn more ...
  • GrrCon 2018 Augusta00 Keynote Dave Kennedy - YouTube
    These are the videos from GrrCON 2018: http://www.irongeek.com/i.php?page= videos/grrcon2018/mainlist Patreon: ...

Speaker Lists Featuring Dave Kennedy

FAQs on booking Dave Kennedy

  • How to book Dave Kennedy?

    Our booking agents have successfully helped clients around the world secure talent like Dave Kennedy for both live and virtual events for over 20 years. The team at All American Entertainment represents and listens to the needs of organizations and corporations seeking to hire keynote speakers, celebrities or entertainers for speaking engagements, personal appearances, product endorsements, or corporate entertainment. Fill out a booking request form for Dave Kennedy, or call our office at 1.800.698.2536 to discuss your upcoming event. One of our experienced agents will be happy to help you get pricing information and check availability for Dave Kennedy or any other celebrity of your choice.
  • How much does it cost to book Dave Kennedy?

    Speaking fees for Dave Kennedy, or any other keynote speakers and celebrities, are determined based on a number of factors and may change without notice. The amount that Dave Kennedy charges to speak often varies according to the circumstances, including their schedule, market conditions, length of presentation, and the location of the event. The speaker fees listed on this website are intended to serve as a guideline only. In some cases, the actual quote may be above or below the stated range. For the most current fee to hire Dave Kennedy, please fill out the booking request form or call our office at 1.800.698.2536 to speak with an experienced booking agent.
  • Who is the agent for Dave Kennedy?

    All American Entertainment has successfully secured celebrity talent like Dave Kennedy for clients worldwide for more than 20 years. As a full-service talent booking agency, we have access to virtually any speaker or celebrity in the world. Our agents are happy and able to submit an offer to the speaker or celebrity of your choice, letting you benefit from our reputation and long-standing relationships in the industry. Fill out the booking request form or call our office at 1.800.698.2536, and one of our agents will assist you to book Dave Kennedy for your next private or corporate function.
  • What is a full-service talent booking agency?

    All American Speakers is a "buyers agent" and exclusively represents talent buyers, meeting planners and event professionals, who are looking to secure celebrities and speakers for personal appearances, speaking engagements, corporate entertainment, public relations campaigns, commercials, or endorsements. We do not exclusively represent Dave Kennedy or claim ourselves as the exclusive booking agency, business manager, publicist, speakers bureau or management for Dave Kennedy or any other speaker or celebrity on this website. For more information on how we work and what makes us unique, please read the AAE Advantage.

Dave Kennedy is a keynote speaker and industry expert who speaks on a wide range of topics such as Abnormal Behavior Detection in Large Environments, Compromise Analysis – Why we’re seeing so many breaches., Building Defense on Known Good, The Hacking Age and Moving Ahead and Beyond Common Tool Detections. The estimated speaking fee range to book Dave Kennedy for your event is $20,000 - $30,000. Dave Kennedy generally travels from Strongsville, OH, USA and can be booked for (private) corporate events, personal appearances, keynote speeches, or other performances. Similar motivational celebrity speakers are Dr. Eric Cole, Scott Augenbaum, Rachel Tobac, Rachel Wilson and Bryan Seely. Contact All American Speakers for ratings, reviews, videos and information on scheduling Dave Kennedy for an upcoming live or virtual event.

Dave Kennedy Speaking Topics

  • Abnormal Behavior Detection in Large Environments

    Attack patterns are something that when it occurs is extrinsic (not natural) behavior in a infrastructure. Understanding what attack patterns look like and building an understanding of how to detect them with what you already have is possible. Most preventative technology tries in some extent to detect extrinsic behavior in an environment but falls short because of the continual changes in attack patterns and commoditized detection (sigs, etc). This talk dives into looking at what you already have in your infrastructure that you can use for intrinsic (natural) detection capabilities that doesn't rely on a specific signature, but more so on how attackers go after an organization. As an industry, we need to be detecting the extrinsic occurrences in our networks which exhibit abnormal behavior. During this presentation, we'll be covering a large percentage of techniques used by attackers, and how to detect them with what you currently have in place at your organization today.

  • Compromise Analysis – Why we’re seeing so many breaches.

    After looking at a number of compromises dating the past several years, there are a number of commonalities between each of them and steps that could have been used to prevent. Information security isn't a practice that will always be successful in defending however, there are key indicators of compromise to look for when an attacker is attempting to compromise an organization. During this presentation, we’ll analyze a number of data breaches and look at how a number of the breaches have occurred and how an information security program can be structured in order to defend against a lot of the attacks. Most of the causes are directly related to the human element and directly phishing. This talk will dive into how phishing techniques work, and what you can do to prevent this from happening in the future.

  • Building Defense on Known Good

    There's so much to do. There's not enough people. We can only do what we can based on risk, people, politics, and budget. All common things we share across each organization. This presentation dives into how to focus on building defenses against attacks, staying ahead of the methods, and focusing on known good vs. the rest. You'll leave this talk with a way to think about defense and a way to tackle the issues we face in security today.

  • The Hacking Age

    Attackers are continuously figuring out new methods to gain access to computer systems and enterprises. Everything from Ransomware to targeted and precise attacks aimed at intellectual property theft, monetary gain, or other motives. In today’s age of hacking, it’s never been more important to understand who the hackers are and the methods they use to attack organizations. In this talk, we go into the demographics of hackers, how they are hacking, and the best defenses both from a personal perspective as well as an enterprise. It’s possible to withstand the attacks we see today with proven practices, but it requires hard work, and an understanding of who your adversaries are.

  • Moving Ahead and Beyond Common Tool Detections

    There’s no question that companies continue to try and get better when it comes to detecting attacks in multiple phases. Instead of just patching and hoping for the best, organizations are spending a substantial amount of investment in trying to detect the “well what if they get through” situation. As companies focus on enhanced detection capabilities, the focus is often hard to grasp in what to actually look for – there is so much. This talk will dive into where we see most companies fail at detection and how red teams are helping push the bar forward in not just leveraging a checklist, but focusing on the identification of attack patterns in varying levels of sophistication. The over reliance on technology as a method for trying to jump start these programs often causes more harm than good, and we’ll dive into how effective off the shelf endpoint detection tools do when confronted with even basic attackers. As an industry, we have everything we need to get better – it’s a matter of prioritization, focus, and time.

Dave Kennedy Speaker Videos

  • Exploits, Research, Tools, and the Impact to Security | Dave Kennedy
    David Kennedy is the founder of TrustedSec, Binary Defense Systems, and DerbyCon. TrustedSec and Binary Defense are focused on the betterment of ...
    Dave Kennedy, TrustedSec - Business Security Weekly #116 ...
    We welcome David Kennedy, founder and CEO, at TrustedSec to discuss " Investing in the right technology and resources"! To learn more ...
  • GrrCon 2018 Augusta00 Keynote Dave Kennedy - YouTube
    These are the videos from GrrCON 2018: http://www.irongeek.com/i.php?page= videos/grrcon2018/mainlist Patreon: ...
    TrustedSec CEO David Kennedy on The Katie Couric Show - YouTube
    TrustedSec's CEO David Kennedy talking about the risks around hacking on The Katie Couric Show.
  • DEF CON 23 - Social Engineering Village - Dave Kennedy ...
    Understanding End-User Attacks – Real World Examples Dave Kennedy ct: From our own analysis, phishing attacks for the first time are the ...

Tell us about your event!

During normal business hours, we respond to most inquiries within 4 hours.

  • Customized Service

    Our agents find the right fit for your event

  • Unparalleled Database

    Full access to all speakers & celebrities

  • One Stop Shopping

    A reliable and unbiased point of contact

  • Logistics Management

    Your personal Logistics Manager who takes care of all event details

Speakers Similar to Dave Kennedy

This website is a resource for event professionals and strives to provide the most comprehensive catalog of thought leaders and industry experts to consider for speaking engagements. A listing or profile on this website does not imply an agency affiliation or endorsement by the talent.

All American Entertainment (AAE) exclusively represents the interests of talent buyers, and does not claim to be the agency or management for any speaker or artist on this site. AAE is a talent booking agency for paid events only. We do not handle requests for donation of time or media requests for interviews, and cannot provide celebrity contact information.

If you are the talent and wish to request a profile update or removal from our online directory, please submit a profile request form.

TOP