David Cross Email and Phone Number
David Cross work email
- Valid
- Valid
David Cross personal email
- Valid
David Cross phone numbers
My goal is to create a positive future for cyber security by both predicting it and creating it. My Strengths are identified as: Strategic, Ideation, Context, Maximizer, and Learner. I use these personal traits to energize my work and create cutting edge security technology and methodologies.As a security leader, evangelist and tool developer, I created the world’s first autonomous voice operated auto-hacking program: Hacker-Mode for Alexa. I was interviewed live for DarkReading and demo'd the tool at ProcureCon, SaintCon, and Black Hat USA 2019. Hacker-Mode is part of the BlackHat Arsenal tool set and a cloud distributed v3 is in the can, and v4 is complete with a 100x improvement on intelligence.As a current participant in security conferences, I co-authored a presentation with Mick Gomm for ISACA's national conference CACS 2017 and I presented at Black Hat 2017 and 2019 and was honored to have a favorite keynote at Procurecon 2018 rated 4.8 stars by attendees. I had fun speaking at other conferences like Saintcon, Data Connectors, AFCEA and at the UVU cyber group. I formerly served on the NIST Resiliency Panel and served two years as President of the SLC InfraGard Member Alliance and two years on the board for UtahSec and currently serve on the Board of the Cyber Security Collaborative Forum where CISOs and security influencer's share their secrets for improving security and protecting their customers. I have maintained my CISSP for 18 years and stay current in computer security technology by writing articles for ISACA, attending conferences, training, and conducting my own research. I specialize in security testing, cloud, and SDLC. I program in Python, C#, Delphi, C, VB, Java, Javascript, PHP, ASP, Swift, Powershell etc. and write Lambda code for serverless. I have extensive experience not only in computer security, but in software development, the application of cryptography, and software and security management. I have created award winning software for every aspect of healthcare including AI analysis and machine learning. I've also enjoyed developing AI expert systems in combination with fuzzy, adaptive learning, distance algorithms, and standard and genetically trained neural nets to extract intelligence and trends from data. I stay up to date on AI development and use the latest tools to produce remarkable results.I regularly make the impossible a reality and enjoy the challenge more than the reward.
Vyne Medical
View-
Distinguished Cybersecurity EngineerVyne Medical Dec 2024 - PresentDunwoody, Georgia, UsFinding and mitigating risk. Recommend solutions and technologies.Safely employing local and remote AI models to enhance Red and Blue teaming. -
Distinguished Security EngineerMagnopus Jan 2022 - PresentLos Angeles, California, UsSecurity program strategy, compliance, AppSec management.Pen-testing, static and dynamic scanning. Cloud testing, threat hunting.General techno-wizardry to solve things that need solving. Automation with Selenium and AI.Actively developing next gen AI solutions for interactive use and security. As an early adopter of GPT I was granted early access to 3, 4 and 4-8k. I found that GPT could do much more than what was described in the documentation. Prompt whisperer, prompt hacker.Testing and driving improvement for cutting edge 3d user-driven world design and the other incredible things Magnopus does.Chosen to create the AI Village for Saintcon 2023 and presented at Storymakers and AI panel member with ISC2. -
Distinguished App Sec ArchitectHenry Schein One Oct 2012 - Jan 2022American Fork, Utah, UsWorked with global CISO and C-suite to resolve issues including legal, technical and risk. Resolved issues with agencies and governing bodies. Resolved tens of millions of dollars in risk. Managed security for cloud and software across product lines and disciplines.Performed Cloud and on-prem security testing, auditing and security automation. Researched new security technologies, partnerships, methods and hacking techniques. Scoped and managed 3rd party audits. Provided SSDLC guidance and policy as well as automated static and dynamic testing. Researched and prepared decision documents to weigh options and establish common rationale and stakeholder buy-in. Grew and matured processes and capabilities. Performed threat analysis and remediation. Consulted with product leaders and development teams to give direction on application-related web, cloud and PKI security design and implementation. Threat hunted, and created SEIM reports and scan automations.Contributed to the hacking community via conference presentations and by writing security tools. Volunteered for NIST, InfraGard, UtahSec and currently am a board member of the Cyber Security Collaboration Forum. I enjoyed teaching security concepts and giving fun training to in-house development and speaking at public events on the future of security and the current problems inherent with it. I love to write security industry opinion content.Created a log parsing program that finds attack patterns in log files, ranks them and provides natural language search. Developed an exploit workbench which assisted in building and hosting payloads for Web-app pen testing. The program used polymorphic smart payload fuzzing to generate syntactically correct candidate payloads that should be more likely to pass WAF, IDS and script filters. Created a security tool to perform recon, attack, and post exploitation with voice control.Handled compliance for HIPAA, PCI and NIST.CISSP, GWAPT, GPEN, GCIH -
Software / Security ConsultantSalt Lake City Corporation Jul 2012 - Oct 2012Salt Lake City, Utah, UsSLC Corp is on the leading edge of mobile and geospatial applications to make government services accessible. Assisting that mission, I developed software and upgraded existing software using Microsoft C# MVC 4, and JQuery. Worked with a large team of experienced developers on a variety of systems and applications. Consulted on standard and obscure security issues including Kerberos authentication debugging. -
Sr R&D Security ArchitectUhealthsolutions Aug 2008 - May 2012Shrewsbury, Massachusetts, UsPerformed security advisory functions and served on the security management committee. Assisted the CTO in securing corporate concerns and advised on business continuity and planning. Performed security reviews and risk assessments. Provided security recommendations and assisted in development of critical software technologies. Designed and developed a BI solution and a paperless office framework for uHealthSolutions. uHealthSolutions, an offshoot of the University of Massachusetts medical school, assists the government and other organizations with healthcare processes and reform while also carrying out significant humanitarian efforts to enhance healthcare for the disadvantaged.Created a healthcare BI system in conjunction with the database team. The resulting data warehouse provided the basis for geographical trend and problem analysis. I contributed a neural network technology which allowed exceptionally accurate future cost analysis.Developed key software frameworks for document management including a full life-cycle document intake and recognition system for scanned paper and fax documents. Document management pieces I developed included: e-fax, high volume scanning, document cleanup/ocr, bar-coding, and recognition with OCR/ICR and document review and correction functionality. -
Consultant - Software Development And SecurityNorthrop Grumman Jan 2008 - Aug 2008Falls Church, Va, UsDeveloped the ACES program which automates Top Secret clearance checking via direct rapsheet interfaces to JAG, Interpol, NCIS, NLETS and many other online law enforcement systems. Programmed components for secure data exhange and developed SSH tunneling scripts to manage secure file exchange between remote systems. Worked under CMMI 3-4 methodologies with a remote team. Developed in J2EE, Spring, BASH, Oracle 10g, using Eclipse, SVN, Toad etc. -
Ai Research And Development ArchitectMedventive Sep 2006 - Jan 2008Developed an AI system to predict medical costs for critically ill patients that was much more accurate than the leading commercial product. The system was able to accurately project future costs for the patient and also accurately predict how costs would rise if a specific disease were to present itself in patient's care cycle.Developed a new form of distance algorithm to match names, addresses, and numerical data with transpositions and misspellings. The program found duplicates in ETL loaded data that saved the company $5,000 per month in per-patient handling charges. Developed in Delphi, C#, ASP.NET
-
Director Of Security And Client Software DevelopmentPost-N-Track May 2004 - May 2006Rocky Hill, Ct, UsDirected security efforts, audit and remediation including compliance. Developed healthcare claims transaction processing software. Provided strong encryption on claims transmission to healthcare payers. Developed a smart-web client with self healing capability and protocols for fault-tolerant communication. System development in Delphi, Visual Basic, C#, ASP, SQL Server etc. -
Deputy Development ManagerNorthrop Grumman Mission Systems Apr 2003 - May 2004Falls Church, Va, UsCo-managed development, schedule and processes for the largest J2EE software project in the world. The EESOH system is designed to support 70,000 concurrent users world wide. It was built within the timeframe provided by the DOD and delivered on time with high user satisfaction. The EESOH system is still in use today. Lead team processes, standards, documentation and efforts to achieve ISO 9000 and CMMI level 3.Developed user management role based system that integrated with existing AF ldap systems. Wrote security policies and procedures, security risk assessment, security test plans and documentation for C2 certification for deployment of EESOH to the Global Combat Support Systems hosting center. -
Vp Software Develpment - Computer Security ConsultantEcenturion Mar 2002 - Apr 2003Provided computer security consulting to Salt Lake area businesses. Consulted with companies on protection of digital assets. Developed a USB token based VPN system for S3 that would produce encrypted USB tokens with keyed VPN software to ensure authenticated key-holders complete secure remote access to vital systems. Developed firewall management system that would report on employee web site usage and access to restricted sites. Developed a digital certificate production system that used PKI hardware to produce certificates for TrustWave.
-
Director Of Security Software DevelopmentUnited Healthcare / Ingenix May 2000 - Mar 2002UsDesigned and implemented HIPAA compatible systems including EDI, PKI and biometric security. Worked with CTO in buy/license/partner relationships. Developed custom security applications by evaluating vendors and integrating best-of-breed components into complete solutions. Designed and implemented a custom two-factor biometric and certificate based web security package for Blue Cross Blue Shield.Worked with CEO to put in place an industry standard certificate authority. Designed a usage model to provide secure authentication, single-sign on and identity validation for physicians representing multiple organizations.Investigated network incidents and kept policies current with changing threats and computer use patterns.Helped implement InfraGard in inner-mountain west area. Worked with Infra Gard members to implement a state wide incident sharing system. -
Director Of Security Software DevelopmentInfominers Dec 1999 - May 2000Designed a web based security system based on customer requirements and current industry standards to satisfy strict government regulations regarding information security in healthcare. Developed protocols for exchanging data securely using custom mime types and client-side plug-in applications. Developed web friendly encryption and hash components using Delphi. Developed fingerprint login applications in VB that worked with plug-ins and a custom mime type handler to authenticate users over the web.Created a certificate authority system using the Microsoft Crypto API. Enabled the Certificate Authority to produce client and server SSL certificates, code signing, SMIME certificates etc. Wrote certificate practice statement and certificate plans for the company CA.(Purchased by Ingenix)
-
Vice President Of Research And Development - Board MemberAltacast Jul 1994 - Oct 1999Began as a temp worker and soon was hired as a programmer, then manager, then Director and VP. Secured over 20 million in investment money based on software and provisional patents I created on behalf of HealthCast. Served on the Board of Directors and Management Committee for 4 years. Personally hired and worked with development staff to create software for use in the healthcare industry and other vertical markets. Designed solutions for a wide variety of applications ranging from security to document scanning and archiving, transcription, coding, chart tracking and voice operated applications. Developed world-class mainframe emulation software. Worked extensively with fingerprint verification and indexing fingerprint data.Directed development of large scale development efforts in behalf of not only Health+Cast but also for software products developed under contract with Shared Medical Systems (SMS) and QuadraMed. Ensured development efforts complied with upcoming HIPAA regulations by using strong encryption and employing strict security measures.Designed a trust-chain model for symmetric encryption using image-based shared secrets, hashed, signed and time-synchronized shared secrets provided unique keys per transaction and a safe way to share encrypted data. .
David Cross Skills
David Cross Education Details
-
Brigham Young University - IdahoComputer Info Systems
Frequently Asked Questions about David Cross
What company does David Cross work for?
David Cross works for Vyne Medical
What is David Cross's role at the current company?
David Cross's current role is The AI Security Guy, CISSP, GWAPT, GPEN, GCIH, ISTQB, Hacker, Presenter, Futurist, Writer, AI coder, tool developer.
What is David Cross's email address?
David Cross's email address is in****@****hoo.com
What is David Cross's direct phone number?
David Cross's direct phone number is +120893*****
What schools did David Cross attend?
David Cross attended Brigham Young University - Idaho.
What are some of David Cross's interests?
David Cross has interest in Science And Technology, Health.
What skills is David Cross known for?
David Cross has skills like Databases, Agile Methodologies, Computer Security, Microsoft Sql Server, Information Security, Java, C#, Oracle, Cissp, Sql, Javascript, Penetration Testing.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial