Robert Hansen

Robert Hansen Email and Phone Number

Chief Technology Officer @ Root Evidence
Austin, TX, US
Robert Hansen's Location
Austin, Texas, United States, United States
About Robert Hansen

Senior executive focusing on creating cutting edge secure solutions for web application and browser security. Primarily interested in risk analysis for enterprises in high value situations.Also interested in advisory positions and developing technology direction within startups.Specialties: Web Application Security/Browser Security/Network Security. Internet marketing. Search Engine Optimization (SEO).

Robert Hansen's Current Company Details
Root Evidence

Root Evidence

View
Chief Technology Officer
Austin, TX, US
Website:
rootevidence.com
Employees:
5
Robert Hansen Work Experience Details
  • Root Evidence
    Chief Technology Officer
    Root Evidence
    Austin, Tx, Us
  • Grossman Ventures
    Managing Director
    Grossman Ventures Mar 2024 - Present
  • The Rsnake Show
    Host
    The Rsnake Show Jan 2022 - Present
    Austin, Texas, Us
  • Redshield Security Limited
    Advisory Board Member
    Redshield Security Limited Jan 2018 - Present
    Wellington, Nz
    Secure software and code remediation through a combination of web application shielding and expert security services. Hand RedShield a penetration testing report and they’ll patch your website.
  • Capital Factory
    Mentor
    Capital Factory Aug 2018 - Present
    Austin, Tx, Us
  • Arkose Labs
    Advisory Board Member
    Arkose Labs Aug 2016 - Present
    San Mateo, California, Us
    Arkose uses fun puzzles that are easy for humans to complete but extremely difficult for robots. Unlike other CAPTCHA systems it is highly resilient to optical character recognition, since it uses unique 3D models instead of letters or numbers. It has been shown to greatly reduce fraud compared to competitors, and can actually increase conversions because it is easy to use.
  • Data.World
    Advisory Board Member
    Data.World Jan 2016 - Present
    Austin, Texas, Us
    Data.world is a bit like Github for data. Find, download and manipulate data from many different sources.
  • Manifest
    Mentor
    Manifest Jul 2016 - Present
    Austin, Texas, Us
    Computer security incubator based in Austin Texas.
  • Techstars
    Mentor
    Techstars Nov 2012 - Present
    New York City, New York, Us
    TechStars provides seed funding from over 75 top venture capital firms and angel investors who are vested in the success of your startup, as well as intense mentorship from hundreds of the best entrepreneurs in the world.
  • Tenable
    Deputy Cto
    Tenable Jun 2022 - Jun 2023
    Columbia, Md, Us
    In charge of technical aspects of Tenable’s attack surface management solution and web application scanner solution after being acquired.
  • Bit Discovery
    Cto
    Bit Discovery Mar 2018 - Jun 2022
    Santa Clara, Ca, Us
    Bit Discovery illuminates every little bit of the Internet so our customers are aware of all the websites they own. Using snapshots of the entire Internet, we organize massive amounts of information and distill it down to simple and elegant portfolio tracking. Bit Discovery acquired OutsideIntel, March 2018. Tenable acquired Bit Discovery in June 2022.
  • Craxel, Inc.
    Advisor
    Craxel, Inc. Feb 2018 - Jan 2022
    Fairfax, Va, Us
    Craxel, Inc. is the company behind the Black Forest Digital Trust Platform. Our platform makes the world's data safe and useful. Our breakthroughs in high performance searchable encryption will maximize your trusted IT surface by making your data layer zero knowledge. Now you can finally rely solely on cryptography to securely store, search, and exchange sensitive information while your data remains strongly encrypted and therefore impervious to theft.Developers can leverage the Black Forest Digital Trust Platform to secure existing applications or build the next generation of powerful, secure applications. Not only can applications securely store, index, and search information using Black Forest Database, they can take advantage of the power of "trustless and immutable" transactions provided by Black Forest Distributed Ledger. Since Black Forest Distributed Ledger eliminates the impediments to the widespread adoption of distributed ledger, enterprises and their application developers can finally take advantage of the unrealized promise of this technology.
  • .Trust Gtld
    Advisory Board Member
    .Trust Gtld Nov 2014 - Jan 2022
    Advising on matters related to the .trust GTLD specification and technical policy.
  • Outsideintel
    Chairman And Founder
    Outsideintel Feb 2015 - Mar 2018
    Corporate architecture discovery and prediction software, big data analytics and a splash of security. The company was acquired in March 2018 by Bit Discovery.
  • Whitehat Security
    Vice President - Labs (Advanced Technology Group)
    Whitehat Security Feb 2013 - Feb 2016
    San Jose, California, Us
    Vice President of WhiteHat Security's Labs team (Advanced Technology Group). This was before it was purchased by NTT and then by Synopsys.
  • Lockify
    Advisory Board
    Lockify May 2011 - Apr 2015
    Lockify provides businesses and individuals the best balance of security and simplicity for encrypting, sending, tracking, and controlling confidential messages and files.
  • Website Security For Dummies
    Author
    Website Security For Dummies Oct 2013 - Oct 2013
    Pocket book for understanding how to secure web applications.
  • Falling Rock Networks
    Ceo
    Falling Rock Networks Jul 2008 - Feb 2013
    Falling Rock Networks created the Armored Stack - a next generation operating system/web application platform designed to allow people to host insecure applications in a way that makes applications extremely difficult to compromise. Without using code-hooks of any kind, the server uses infrastructure and configuration only to isolate and protect otherwise vulnerable web applications so that the data and the website users are secure even after an otherwise successful compromise. The Armored Stack has withstood millions of attacks, all while running known-vulnerable code, without a single compromise.
  • Sectheory
    Ceo
    Sectheory Nov 2006 - Feb 2012
    SecTheory is a security consulting company combining cutting edge security theory with practical enterprise defense tactics to assess and address complex security issues with professional security consulting.
  • Detecting Malice
    Author
    Detecting Malice Nov 2009 - Dec 2010
    Detecting Malice was written to help website administrators, developers, operations personelle and security product managers in building and maintaining a higher security posture. Understanding user intent is the cornerstone for reducing fraud ratios in modern web applications. From retail to government, this book covers many different realms of fraud and how to detect it at many different technical layers. From DNS and TCP to embedded content and browser fingerprinting techniques it is possible to identify users who are most likely to become dangerous often before it actually happens.
  • Intrepidus Group
    Advisory Board
    Intrepidus Group Mar 2008 - Dec 2010
    PhishMe (from the Intrepidus Group) is a spear phishing simulator that raises awareness of the strategies and sophisticated tactics utilized today by hackers looking to compromise your firm’s data and systems using "teachable moments."
  • Justthrive
    Technical Advisory Board
    Justthrive Jan 2008 - Feb 2009
    N/A Technical adviser prior to being sold to LendingTree.
  • Click Forensics
    Technical Advisory Board Member
    Click Forensics Feb 2007 - Jan 2008
    Austin, Tx, Us
    Adometry (was ClickForensics) provides deep insights that guide and improve the overall performance and incremental ROI of cross-channel marketing campaigns. By bringing all the media together – both offline and online – Adometry provides the most accurate picture of what is really performing best.
  • Xss Attacks
    Author
    Xss Attacks Jun 2006 - May 2007
    XSS Attacks discusses the concepts, methodology, and technology that makes XSS a valid concern. The book covers how XSS attacks are implemented, used, and abused. The book provides examples of XSS malware and demonstrates real cases where XSS is a dangerous risk that exposes internet users to remote access, sensitive data theft, and monetary losses. Lastly, the book closes by examining the ways developers can avoid XSS vulnerabilities in their web applications, and how users can avoid becoming a victim.
  • Move
    Director Product Management
    Move Mar 2006 - Apr 2007
    Santa Clara, Ca, Us
    Managed dynamic mapping solutions and the SEO strategy for the company.
  • Ebay
    Sr. Global Product Manager Of Trust And Safety
    Ebay May 2004 - Mar 2006
    San Jose, Ca, Us
    Managed "Safety" initiatives surrounding DHTML malware, anti-virus, and anti-phishing including the eBay toolbar. Built bleeding edge systems to detect malicious behaviors, and take corrective action based on numerous dispirit heuristics. Completely managed all aspects of sign-in (the third most often hit webpage on eBay) and other forms of API based authentication and authorization including 2nd factor authentication, tiered authentication and more. Also managed many safety functions around the selling flows, and anti-CSRF functionality. Was the sole eBay representative to the IT-ISAC, and acted as a technologist liaison with a number of partner companies and all Safety initiatives surrounding M&A website integration activities. And much much more....
  • Savvis
    Product Manager
    Savvis 2005 - 2005
    Monroe, La, Us
  • Savvis/Cable & Wireless/Digital Island
    Product Manager - Managed Security Services
    Savvis/Cable & Wireless/Digital Island Oct 2000 - May 2004
    Monroe, La, Us
    Managed P&L for many complete managed security product lines. Was hired into Digital Island as an engineer, and was later promoted to Sr. Security Architect. After Cable & Wireless bought Digital Island Cable & Wireless then bought Exodus and the CWDI name changed again to Exodus, a Cable & Wireless Service. Was then promoted to Product Manager in charge of three product lines at that time. Later after brand changing, the name moved to Cable & Wireless America and global branding of Cable & Wireless. Manage P&Ls for the following: Managed Vulnerability Scanning (using Whisker/Nikto, Nmap and Nessus), Intrusion Detection Event Correlation and Root Cause Analysis (SIM), PKI product line (SSL certs, and Secure Email based on Keon desktop), Email Virus Protection, Email Spam Scanning and Email Porn Scanning, Cisco and RealSecure NIDS (and reporting), Realsecure HIDS, TopLayer multipoint aggregators, Intrusion Protection Systems, Content Integrity Management System, anti-DDoS, etc...
  • Cable & Wireless
    Product Manager
    Cable & Wireless 2002 - 2004
  • Exodus
    Product Manager
    Exodus 2002 - 2002
    London, England, Gb
  • Digital Island
    Product Manager
    Digital Island 2001 - 2002
  • Digital Island
    Sr. Security Architect
    Digital Island 2000 - 2001
  • Silicon Alchemy
    Chief Operations Officer/Partner
    Silicon Alchemy Jan 1999 - Dec 2000
    Originally hired in as a Project manager, and returned after a year hiatus as the Chief Operations Officer of the holding company. Was asked to manage the offices in Chico, while building out the product lines of the three subsidiaries, manage human resources, and negotiate financing in exchange for 10% ownership in the parent company. Managed team in design and development of a more secure credit card verification system via merchant transactions bypassing ISOs and directly processing through MSPs and member banks using both EDI and VISA/MIPS transactions. Directly involved in negotiations with banks interested in partnering agreements.
  • Valueclick
    Information Specialist
    Valueclick Jan 1998 - 1999
    Initially hired in as an engineer involved in integration of the billing systems with the Solomon Systems database. Was later promoted to Information Specialist with much greater breath of responsibility. Reported directly to the COO of ValueClick and provided updates of all changes to network configuration, sales tools, security holes, and telephony changes.

Robert Hansen Skills

Security Computer Security Information Security Web Application Security Penetration Testing Enterprise Software Application Security Network Security Cloud Computing Product Management Intrusion Detection Saas Vulnerability Assessment Start Ups Web Applications Information Security Management Vulnerability Management Web Development Seo Software Development Pci Dss Ips Networking Web Application Security Assessment Linux Internet Security Application Security Architecture Online Fraud Entrepreneurship Pki Computer Forensics Security Audits Firewalls Identity Management Software As A Service Data Center Business Continuity Cryptography Cloud Security Owasp Search Engine Optimization Payment Card Industry Data Security Standard Data Security Security Policy Mobile Security Security Awareness Ddos Mitigation Encryption Security Architecture Design Xss

Robert Hansen Education Details

  • California State University, Chico
    California State University, Chico
    Computer Engineering

Frequently Asked Questions about Robert Hansen

What company does Robert Hansen work for?

Robert Hansen works for Root Evidence

What is Robert Hansen's role at the current company?

Robert Hansen's current role is Chief Technology Officer.

What is Robert Hansen's email address?

Robert Hansen's email address is ro****@****ory.com

What is Robert Hansen's direct phone number?

Robert Hansen's direct phone number is +153052*****

What schools did Robert Hansen attend?

Robert Hansen attended California State University, Chico.

What skills is Robert Hansen known for?

Robert Hansen has skills like Security, Computer Security, Information Security, Web Application Security, Penetration Testing, Enterprise Software, Application Security, Network Security, Cloud Computing, Product Management, Intrusion Detection, Saas.

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.