SlideShare a Scribd company logo
1 of 1
Download to read offline
Phone: 708-532-2843
Fax: 708-231-9811
Web: www.savidtech.com
Savid Technologies, Inc.
18470 Thompson Court, 2B
Tinley Park, IL 60477
Michael A. Davis
CEO of Savid Technologies
Over the years, Michael Davis has earned a reputation as one of the nation's leading authorities
on IT security. The list of companies that rely on his council includes AT&T, GroupOn, the US
Department of Defense, and Discover Financial.
In 2005, Mr. Davis founded Savid Technologies. By 2010 it was number 611 on the Inc. 5000 list
of fastest growing companies in America.
Mr. Davis was a contributing author to Hacking Exposed, the best selling security book in the
world, and has recently penned Hacking Exposed: Malware and Rootkits.
He has worked with McAfee, Inc., a leader in anti-virus protection and vulnerability
management, and held the position of Senior Manager of Global Threats, leading a team of
researchers investigating confidential and cutting edge security research.
You will find his advice in InformationWeek where he is a Senior Contributing Author, and in
Information Week Analytics. His insights can also be found in the Wall Street Journal.
Mr. Davis's particular expertise extends to topics such as the relationship between security and
compliance, application security, penetration testing/ethical hacking, risk assessment, policy
development, and software security development life cycles.
Much of his time is spent lecturing, and conferences and conventions know him well, including
Blackhat, InfoSecWorld, FINSEC and CanSecWest. He is also an active developer in the Open
Source community.
"The phrase "I can't" is the most powerful force of negation in the human psyche.
When done properly, security controls enable IT to say "we can".

More Related Content

What's hot

MIT ILP STEX Cybersecurity Workshop 5.28.15
MIT ILP STEX Cybersecurity Workshop 5.28.15MIT ILP STEX Cybersecurity Workshop 5.28.15
MIT ILP STEX Cybersecurity Workshop 5.28.15MIT Startup Exchange
 
Omar Todd - Cybersecurity Expert and Consultant
Omar Todd - Cybersecurity Expert and ConsultantOmar Todd - Cybersecurity Expert and Consultant
Omar Todd - Cybersecurity Expert and ConsultantOmar Todd
 
Securing the Web with the Crowd
Securing the Web with the CrowdSecuring the Web with the Crowd
Securing the Web with the CrowdCrowdsourcing Week
 
Digi securitypres
Digi securitypresDigi securitypres
Digi securitypresFairSay
 
Dr. Lane Arthur, James Johnson - Cybersecurity
Dr. Lane Arthur, James Johnson - CybersecurityDr. Lane Arthur, James Johnson - Cybersecurity
Dr. Lane Arthur, James Johnson - CybersecurityJohn Blue
 
Web hacking using Cyber range
Web hacking using Cyber rangeWeb hacking using Cyber range
Web hacking using Cyber rangePriyanka Aash
 

What's hot (8)

MIT ILP STEX Cybersecurity Workshop 5.28.15
MIT ILP STEX Cybersecurity Workshop 5.28.15MIT ILP STEX Cybersecurity Workshop 5.28.15
MIT ILP STEX Cybersecurity Workshop 5.28.15
 
Omar Todd - Cybersecurity Expert and Consultant
Omar Todd - Cybersecurity Expert and ConsultantOmar Todd - Cybersecurity Expert and Consultant
Omar Todd - Cybersecurity Expert and Consultant
 
Securing the Web with the Crowd
Securing the Web with the CrowdSecuring the Web with the Crowd
Securing the Web with the Crowd
 
Toxic playground deck 1
Toxic playground deck 1Toxic playground deck 1
Toxic playground deck 1
 
Digi securitypres
Digi securitypresDigi securitypres
Digi securitypres
 
Dr. Lane Arthur, James Johnson - Cybersecurity
Dr. Lane Arthur, James Johnson - CybersecurityDr. Lane Arthur, James Johnson - Cybersecurity
Dr. Lane Arthur, James Johnson - Cybersecurity
 
Jack R Dan gfke 2014
Jack R Dan gfke 2014Jack R Dan gfke 2014
Jack R Dan gfke 2014
 
Web hacking using Cyber range
Web hacking using Cyber rangeWeb hacking using Cyber range
Web hacking using Cyber range
 

Viewers also liked

project 3:Social psychology
project 3:Social psychologyproject 3:Social psychology
project 3:Social psychologyOng Shi Hui
 
Cost Justifying IT Security
Cost Justifying IT SecurityCost Justifying IT Security
Cost Justifying IT SecurityMichael Davis
 
Can You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security RisksCan You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security RisksMichael Davis
 
Confirmation Bias - How To Stop Doing The Things In IT Security That Don't Work
Confirmation Bias - How To Stop Doing The Things In IT Security That Don't WorkConfirmation Bias - How To Stop Doing The Things In IT Security That Don't Work
Confirmation Bias - How To Stop Doing The Things In IT Security That Don't WorkMichael Davis
 
Confirmation bias
Confirmation bias Confirmation bias
Confirmation bias yongseenyee
 
Social Psychology Presentation- Confirmation Bias
Social Psychology Presentation- Confirmation BiasSocial Psychology Presentation- Confirmation Bias
Social Psychology Presentation- Confirmation BiasHannahAshburn
 
Make Mobilization Work - Properly Implementing Mobile Security
Make Mobilization Work - Properly Implementing Mobile SecurityMake Mobilization Work - Properly Implementing Mobile Security
Make Mobilization Work - Properly Implementing Mobile SecurityMichael Davis
 
Confirmation Bias & its applications in Marketing
Confirmation Bias & its applications in MarketingConfirmation Bias & its applications in Marketing
Confirmation Bias & its applications in MarketingKashyap Shah
 
Project 2 : Confirmation Bias
Project 2 : Confirmation BiasProject 2 : Confirmation Bias
Project 2 : Confirmation BiasAzeem Banatwala
 

Viewers also liked (10)

project 3:Social psychology
project 3:Social psychologyproject 3:Social psychology
project 3:Social psychology
 
Cost Justifying IT Security
Cost Justifying IT SecurityCost Justifying IT Security
Cost Justifying IT Security
 
Can You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security RisksCan You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security Risks
 
Confirmation Bias - How To Stop Doing The Things In IT Security That Don't Work
Confirmation Bias - How To Stop Doing The Things In IT Security That Don't WorkConfirmation Bias - How To Stop Doing The Things In IT Security That Don't Work
Confirmation Bias - How To Stop Doing The Things In IT Security That Don't Work
 
Confirmation bias
Confirmation bias Confirmation bias
Confirmation bias
 
Social Psychology Presentation- Confirmation Bias
Social Psychology Presentation- Confirmation BiasSocial Psychology Presentation- Confirmation Bias
Social Psychology Presentation- Confirmation Bias
 
Make Mobilization Work - Properly Implementing Mobile Security
Make Mobilization Work - Properly Implementing Mobile SecurityMake Mobilization Work - Properly Implementing Mobile Security
Make Mobilization Work - Properly Implementing Mobile Security
 
Confirmation bias
Confirmation biasConfirmation bias
Confirmation bias
 
Confirmation Bias & its applications in Marketing
Confirmation Bias & its applications in MarketingConfirmation Bias & its applications in Marketing
Confirmation Bias & its applications in Marketing
 
Project 2 : Confirmation Bias
Project 2 : Confirmation BiasProject 2 : Confirmation Bias
Project 2 : Confirmation Bias
 

Similar to Michael Davis CEO Savid Technologies IT Security Expert

Top 25 Cyber Security Blogs You Should Be Reading
Top 25 Cyber Security Blogs You Should Be ReadingTop 25 Cyber Security Blogs You Should Be Reading
Top 25 Cyber Security Blogs You Should Be ReadingDDoS Mitigation
 
Cyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH EconomyCyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH EconomyInternet Law Center
 
BLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity LiteracyBLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity LiteracyCasey Fleming
 
7 Important Cybersecurity Trends
7 Important Cybersecurity Trends7 Important Cybersecurity Trends
7 Important Cybersecurity TrendsMarco
 
ACGSV_Feb11_Keynote_Program
ACGSV_Feb11_Keynote_ProgramACGSV_Feb11_Keynote_Program
ACGSV_Feb11_Keynote_ProgramJaim Harlow
 
fl ast.indd 115723AM 01172014 Page xxffi rs..docx
fl ast.indd 115723AM  01172014 Page xxffi rs..docxfl ast.indd 115723AM  01172014 Page xxffi rs..docx
fl ast.indd 115723AM 01172014 Page xxffi rs..docxclydes2
 
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks Chuck Brooks
 
Top Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdf
Top Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdfTop Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdf
Top Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdfTopCyberNewsMAGAZINE
 
Mobile Security: Preparing for the 2017 Threat Landscape
Mobile Security: Preparing for the 2017 Threat LandscapeMobile Security: Preparing for the 2017 Threat Landscape
Mobile Security: Preparing for the 2017 Threat LandscapeBlackBerry
 
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...Chuck Brooks
 
InfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 AInfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 AWard Pyles
 
2016 HPESR Cyber Risk Report
2016 HPESR Cyber Risk Report2016 HPESR Cyber Risk Report
2016 HPESR Cyber Risk ReportAngela Gunn
 
HPE Cyber Risk Report 2016
HPE Cyber Risk Report 2016HPE Cyber Risk Report 2016
HPE Cyber Risk Report 2016Tim Grieveson
 
Chuck Brooks Profile on Emerging Technologies, Cybersecurity, Homeland Security
Chuck Brooks Profile on Emerging Technologies, Cybersecurity, Homeland Security Chuck Brooks Profile on Emerging Technologies, Cybersecurity, Homeland Security
Chuck Brooks Profile on Emerging Technologies, Cybersecurity, Homeland Security Chuck Brooks
 
Chuck Brooks thought leadership profile (cybersecurity, homeland security ,em...
Chuck Brooks thought leadership profile (cybersecurity, homeland security ,em...Chuck Brooks thought leadership profile (cybersecurity, homeland security ,em...
Chuck Brooks thought leadership profile (cybersecurity, homeland security ,em...Chuck Brooks
 
Chuck brooks profile on cybersecurity, homeland security, and emerging techno...
Chuck brooks profile on cybersecurity, homeland security, and emerging techno...Chuck brooks profile on cybersecurity, homeland security, and emerging techno...
Chuck brooks profile on cybersecurity, homeland security, and emerging techno...Chuck Brooks
 

Similar to Michael Davis CEO Savid Technologies IT Security Expert (20)

Top 25 Cyber Security Blogs You Should Be Reading
Top 25 Cyber Security Blogs You Should Be ReadingTop 25 Cyber Security Blogs You Should Be Reading
Top 25 Cyber Security Blogs You Should Be Reading
 
Cyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH EconomyCyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH Economy
 
BLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity LiteracyBLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity Literacy
 
7 Important Cybersecurity Trends
7 Important Cybersecurity Trends7 Important Cybersecurity Trends
7 Important Cybersecurity Trends
 
ACGSV_Feb11_Keynote_Program
ACGSV_Feb11_Keynote_ProgramACGSV_Feb11_Keynote_Program
ACGSV_Feb11_Keynote_Program
 
fl ast.indd 115723AM 01172014 Page xxffi rs..docx
fl ast.indd 115723AM  01172014 Page xxffi rs..docxfl ast.indd 115723AM  01172014 Page xxffi rs..docx
fl ast.indd 115723AM 01172014 Page xxffi rs..docx
 
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
 
Top Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdf
Top Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdfTop Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdf
Top Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdf
 
Mobile Security: Preparing for the 2017 Threat Landscape
Mobile Security: Preparing for the 2017 Threat LandscapeMobile Security: Preparing for the 2017 Threat Landscape
Mobile Security: Preparing for the 2017 Threat Landscape
 
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...
 
InfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 AInfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 A
 
2016 HPESR Cyber Risk Report
2016 HPESR Cyber Risk Report2016 HPESR Cyber Risk Report
2016 HPESR Cyber Risk Report
 
HPE Security Report 2016
HPE Security Report 2016HPE Security Report 2016
HPE Security Report 2016
 
HPE Cyber Risk Report 2016
HPE Cyber Risk Report 2016HPE Cyber Risk Report 2016
HPE Cyber Risk Report 2016
 
Hpe security research cyber risk report 2016
Hpe security research  cyber risk report 2016Hpe security research  cyber risk report 2016
Hpe security research cyber risk report 2016
 
Chuck Brooks Profile on Emerging Technologies, Cybersecurity, Homeland Security
Chuck Brooks Profile on Emerging Technologies, Cybersecurity, Homeland Security Chuck Brooks Profile on Emerging Technologies, Cybersecurity, Homeland Security
Chuck Brooks Profile on Emerging Technologies, Cybersecurity, Homeland Security
 
Chuck Brooks thought leadership profile (cybersecurity, homeland security ,em...
Chuck Brooks thought leadership profile (cybersecurity, homeland security ,em...Chuck Brooks thought leadership profile (cybersecurity, homeland security ,em...
Chuck Brooks thought leadership profile (cybersecurity, homeland security ,em...
 
Ciso NYC
Ciso NYCCiso NYC
Ciso NYC
 
Chuck brooks profile on cybersecurity, homeland security, and emerging techno...
Chuck brooks profile on cybersecurity, homeland security, and emerging techno...Chuck brooks profile on cybersecurity, homeland security, and emerging techno...
Chuck brooks profile on cybersecurity, homeland security, and emerging techno...
 
Risky Business
Risky BusinessRisky Business
Risky Business
 

Recently uploaded

LinkedIn for Your Job Search in April 2024
LinkedIn for Your Job Search in April 2024LinkedIn for Your Job Search in April 2024
LinkedIn for Your Job Search in April 2024Bruce Bennett
 
Training for Deaconess, biblical qualifications.ppt
Training for Deaconess, biblical qualifications.pptTraining for Deaconess, biblical qualifications.ppt
Training for Deaconess, biblical qualifications.pptVidalMendoza5
 
Chapter 4 - Promoting Inclusive Culture.ppt
Chapter 4 - Promoting   Inclusive Culture.pptChapter 4 - Promoting   Inclusive Culture.ppt
Chapter 4 - Promoting Inclusive Culture.pptmoytopo
 
4. Biomechanical Preparation INTRO AND TECHNIQUES
4. Biomechanical Preparation INTRO AND TECHNIQUES4. Biomechanical Preparation INTRO AND TECHNIQUES
4. Biomechanical Preparation INTRO AND TECHNIQUESaishwaryakhare5
 
How to make career in advance 3d animation
How to make career in advance 3d animationHow to make career in advance 3d animation
How to make career in advance 3d animationsantoshjadhav126
 
Abanoub Ghobrial, Planning Team Leader.pdf
Abanoub Ghobrial, Planning Team Leader.pdfAbanoub Ghobrial, Planning Team Leader.pdf
Abanoub Ghobrial, Planning Team Leader.pdfAbanoubGhobrial1
 
Human Rights are notes and helping material
Human Rights are notes and helping materialHuman Rights are notes and helping material
Human Rights are notes and helping materialnadeemcollege26
 
美国SU学位证,雪城大学毕业证书1:1制作
美国SU学位证,雪城大学毕业证书1:1制作美国SU学位证,雪城大学毕业证书1:1制作
美国SU学位证,雪城大学毕业证书1:1制作ss846v0c
 
Transportation and Trade Part 5 (1) (1).pptx
Transportation and Trade Part 5 (1) (1).pptxTransportation and Trade Part 5 (1) (1).pptx
Transportation and Trade Part 5 (1) (1).pptxSheldon Byron
 
Network to Success - Using Social Media in Job Search
Network to Success - Using Social Media in Job SearchNetwork to Success - Using Social Media in Job Search
Network to Success - Using Social Media in Job SearchBruce Bennett
 
Crack JAG. Guidance program for entry to JAG Dept. & SSB interview
Crack JAG. Guidance program for entry to JAG Dept. & SSB interviewCrack JAG. Guidance program for entry to JAG Dept. & SSB interview
Crack JAG. Guidance program for entry to JAG Dept. & SSB interviewNilendra Kumar
 
Abanoub Ghobrial, Planning Team Leader.pdf
Abanoub Ghobrial, Planning Team Leader.pdfAbanoub Ghobrial, Planning Team Leader.pdf
Abanoub Ghobrial, Planning Team Leader.pdfAbanoubGhobrial1
 
What is the career path of a VFX artist?
What is the career path of a VFX artist?What is the career path of a VFX artist?
What is the career path of a VFX artist?santoshjadhav126
 
Nathan_Baughman_Resume_copywriter_and_editor
Nathan_Baughman_Resume_copywriter_and_editorNathan_Baughman_Resume_copywriter_and_editor
Nathan_Baughman_Resume_copywriter_and_editorNathanBaughman3
 
401799841-Increasing-Crimes-and-Suicides-Among-Youth.pptx
401799841-Increasing-Crimes-and-Suicides-Among-Youth.pptx401799841-Increasing-Crimes-and-Suicides-Among-Youth.pptx
401799841-Increasing-Crimes-and-Suicides-Among-Youth.pptxwaghmare9860lavin
 
Get to know about Raquel Thompson Barbados.pdf
Get to know about Raquel Thompson Barbados.pdfGet to know about Raquel Thompson Barbados.pdf
Get to know about Raquel Thompson Barbados.pdfRaquel Thompson Barbados
 
Banged Dubai Call Girls O525547819 Call Girls Dubai
Banged Dubai Call Girls O525547819 Call Girls DubaiBanged Dubai Call Girls O525547819 Call Girls Dubai
Banged Dubai Call Girls O525547819 Call Girls Dubaikojalkojal131
 
Career-Orientation-for-Grade-9-and-10.pptx
Career-Orientation-for-Grade-9-and-10.pptxCareer-Orientation-for-Grade-9-and-10.pptx
Career-Orientation-for-Grade-9-and-10.pptxGachaFluffy
 
Design, Desire and Demand Presentation.pptx
Design, Desire and Demand Presentation.pptxDesign, Desire and Demand Presentation.pptx
Design, Desire and Demand Presentation.pptxaaronbasko1
 
LinkedIn Strategic Guidelines April 2024
LinkedIn Strategic Guidelines April 2024LinkedIn Strategic Guidelines April 2024
LinkedIn Strategic Guidelines April 2024Bruce Bennett
 

Recently uploaded (20)

LinkedIn for Your Job Search in April 2024
LinkedIn for Your Job Search in April 2024LinkedIn for Your Job Search in April 2024
LinkedIn for Your Job Search in April 2024
 
Training for Deaconess, biblical qualifications.ppt
Training for Deaconess, biblical qualifications.pptTraining for Deaconess, biblical qualifications.ppt
Training for Deaconess, biblical qualifications.ppt
 
Chapter 4 - Promoting Inclusive Culture.ppt
Chapter 4 - Promoting   Inclusive Culture.pptChapter 4 - Promoting   Inclusive Culture.ppt
Chapter 4 - Promoting Inclusive Culture.ppt
 
4. Biomechanical Preparation INTRO AND TECHNIQUES
4. Biomechanical Preparation INTRO AND TECHNIQUES4. Biomechanical Preparation INTRO AND TECHNIQUES
4. Biomechanical Preparation INTRO AND TECHNIQUES
 
How to make career in advance 3d animation
How to make career in advance 3d animationHow to make career in advance 3d animation
How to make career in advance 3d animation
 
Abanoub Ghobrial, Planning Team Leader.pdf
Abanoub Ghobrial, Planning Team Leader.pdfAbanoub Ghobrial, Planning Team Leader.pdf
Abanoub Ghobrial, Planning Team Leader.pdf
 
Human Rights are notes and helping material
Human Rights are notes and helping materialHuman Rights are notes and helping material
Human Rights are notes and helping material
 
美国SU学位证,雪城大学毕业证书1:1制作
美国SU学位证,雪城大学毕业证书1:1制作美国SU学位证,雪城大学毕业证书1:1制作
美国SU学位证,雪城大学毕业证书1:1制作
 
Transportation and Trade Part 5 (1) (1).pptx
Transportation and Trade Part 5 (1) (1).pptxTransportation and Trade Part 5 (1) (1).pptx
Transportation and Trade Part 5 (1) (1).pptx
 
Network to Success - Using Social Media in Job Search
Network to Success - Using Social Media in Job SearchNetwork to Success - Using Social Media in Job Search
Network to Success - Using Social Media in Job Search
 
Crack JAG. Guidance program for entry to JAG Dept. & SSB interview
Crack JAG. Guidance program for entry to JAG Dept. & SSB interviewCrack JAG. Guidance program for entry to JAG Dept. & SSB interview
Crack JAG. Guidance program for entry to JAG Dept. & SSB interview
 
Abanoub Ghobrial, Planning Team Leader.pdf
Abanoub Ghobrial, Planning Team Leader.pdfAbanoub Ghobrial, Planning Team Leader.pdf
Abanoub Ghobrial, Planning Team Leader.pdf
 
What is the career path of a VFX artist?
What is the career path of a VFX artist?What is the career path of a VFX artist?
What is the career path of a VFX artist?
 
Nathan_Baughman_Resume_copywriter_and_editor
Nathan_Baughman_Resume_copywriter_and_editorNathan_Baughman_Resume_copywriter_and_editor
Nathan_Baughman_Resume_copywriter_and_editor
 
401799841-Increasing-Crimes-and-Suicides-Among-Youth.pptx
401799841-Increasing-Crimes-and-Suicides-Among-Youth.pptx401799841-Increasing-Crimes-and-Suicides-Among-Youth.pptx
401799841-Increasing-Crimes-and-Suicides-Among-Youth.pptx
 
Get to know about Raquel Thompson Barbados.pdf
Get to know about Raquel Thompson Barbados.pdfGet to know about Raquel Thompson Barbados.pdf
Get to know about Raquel Thompson Barbados.pdf
 
Banged Dubai Call Girls O525547819 Call Girls Dubai
Banged Dubai Call Girls O525547819 Call Girls DubaiBanged Dubai Call Girls O525547819 Call Girls Dubai
Banged Dubai Call Girls O525547819 Call Girls Dubai
 
Career-Orientation-for-Grade-9-and-10.pptx
Career-Orientation-for-Grade-9-and-10.pptxCareer-Orientation-for-Grade-9-and-10.pptx
Career-Orientation-for-Grade-9-and-10.pptx
 
Design, Desire and Demand Presentation.pptx
Design, Desire and Demand Presentation.pptxDesign, Desire and Demand Presentation.pptx
Design, Desire and Demand Presentation.pptx
 
LinkedIn Strategic Guidelines April 2024
LinkedIn Strategic Guidelines April 2024LinkedIn Strategic Guidelines April 2024
LinkedIn Strategic Guidelines April 2024
 

Michael Davis CEO Savid Technologies IT Security Expert

  • 1. Phone: 708-532-2843 Fax: 708-231-9811 Web: www.savidtech.com Savid Technologies, Inc. 18470 Thompson Court, 2B Tinley Park, IL 60477 Michael A. Davis CEO of Savid Technologies Over the years, Michael Davis has earned a reputation as one of the nation's leading authorities on IT security. The list of companies that rely on his council includes AT&T, GroupOn, the US Department of Defense, and Discover Financial. In 2005, Mr. Davis founded Savid Technologies. By 2010 it was number 611 on the Inc. 5000 list of fastest growing companies in America. Mr. Davis was a contributing author to Hacking Exposed, the best selling security book in the world, and has recently penned Hacking Exposed: Malware and Rootkits. He has worked with McAfee, Inc., a leader in anti-virus protection and vulnerability management, and held the position of Senior Manager of Global Threats, leading a team of researchers investigating confidential and cutting edge security research. You will find his advice in InformationWeek where he is a Senior Contributing Author, and in Information Week Analytics. His insights can also be found in the Wall Street Journal. Mr. Davis's particular expertise extends to topics such as the relationship between security and compliance, application security, penetration testing/ethical hacking, risk assessment, policy development, and software security development life cycles. Much of his time is spent lecturing, and conferences and conventions know him well, including Blackhat, InfoSecWorld, FINSEC and CanSecWest. He is also an active developer in the Open Source community. "The phrase "I can't" is the most powerful force of negation in the human psyche. When done properly, security controls enable IT to say "we can".