SlideShare a Scribd company logo
1 of 1
Download to read offline
Phone: 708-532-2843
Fax: 708-231-9811
Web: www.savidtech.com
Savid Technologies, Inc.
18470 Thompson Court, 2B
Tinley Park, IL 60477
Michael A. Davis
CEO of Savid Technologies
Over the years, Michael Davis has earned a reputation as one of the nation's leading authorities
on IT security. The list of companies that rely on his council includes AT&T, GroupOn, the US
Department of Defense, and Discover Financial.
In 2005, Mr. Davis founded Savid Technologies. By 2010 it was number 611 on the Inc. 5000 list
of fastest growing companies in America.
Mr. Davis was a contributing author to Hacking Exposed, the best selling security book in the
world, and has recently penned Hacking Exposed: Malware and Rootkits.
He has worked with McAfee, Inc., a leader in anti-virus protection and vulnerability
management, and held the position of Senior Manager of Global Threats, leading a team of
researchers investigating confidential and cutting edge security research.
You will find his advice in InformationWeek where he is a Senior Contributing Author, and in
Information Week Analytics. His insights can also be found in the Wall Street Journal.
Mr. Davis's particular expertise extends to topics such as the relationship between security and
compliance, application security, penetration testing/ethical hacking, risk assessment, policy
development, and software security development life cycles.
Much of his time is spent lecturing, and conferences and conventions know him well, including
Blackhat, InfoSecWorld, FINSEC and CanSecWest. He is also an active developer in the Open
Source community.
"The phrase "I can't" is the most powerful force of negation in the human psyche.
When done properly, security controls enable IT to say "we can".

More Related Content

What's hot

MIT ILP STEX Cybersecurity Workshop 5.28.15
MIT ILP STEX Cybersecurity Workshop 5.28.15MIT ILP STEX Cybersecurity Workshop 5.28.15
MIT ILP STEX Cybersecurity Workshop 5.28.15MIT Startup Exchange
 
Omar Todd - Cybersecurity Expert and Consultant
Omar Todd - Cybersecurity Expert and ConsultantOmar Todd - Cybersecurity Expert and Consultant
Omar Todd - Cybersecurity Expert and ConsultantOmar Todd
 
Securing the Web with the Crowd
Securing the Web with the CrowdSecuring the Web with the Crowd
Securing the Web with the CrowdCrowdsourcing Week
 
Digi securitypres
Digi securitypresDigi securitypres
Digi securitypresFairSay
 
Dr. Lane Arthur, James Johnson - Cybersecurity
Dr. Lane Arthur, James Johnson - CybersecurityDr. Lane Arthur, James Johnson - Cybersecurity
Dr. Lane Arthur, James Johnson - CybersecurityJohn Blue
 
Web hacking using Cyber range
Web hacking using Cyber rangeWeb hacking using Cyber range
Web hacking using Cyber rangePriyanka Aash
 

What's hot (8)

MIT ILP STEX Cybersecurity Workshop 5.28.15
MIT ILP STEX Cybersecurity Workshop 5.28.15MIT ILP STEX Cybersecurity Workshop 5.28.15
MIT ILP STEX Cybersecurity Workshop 5.28.15
 
Omar Todd - Cybersecurity Expert and Consultant
Omar Todd - Cybersecurity Expert and ConsultantOmar Todd - Cybersecurity Expert and Consultant
Omar Todd - Cybersecurity Expert and Consultant
 
Securing the Web with the Crowd
Securing the Web with the CrowdSecuring the Web with the Crowd
Securing the Web with the Crowd
 
Toxic playground deck 1
Toxic playground deck 1Toxic playground deck 1
Toxic playground deck 1
 
Digi securitypres
Digi securitypresDigi securitypres
Digi securitypres
 
Dr. Lane Arthur, James Johnson - Cybersecurity
Dr. Lane Arthur, James Johnson - CybersecurityDr. Lane Arthur, James Johnson - Cybersecurity
Dr. Lane Arthur, James Johnson - Cybersecurity
 
Jack R Dan gfke 2014
Jack R Dan gfke 2014Jack R Dan gfke 2014
Jack R Dan gfke 2014
 
Web hacking using Cyber range
Web hacking using Cyber rangeWeb hacking using Cyber range
Web hacking using Cyber range
 

Viewers also liked

project 3:Social psychology
project 3:Social psychologyproject 3:Social psychology
project 3:Social psychologyOng Shi Hui
 
Cost Justifying IT Security
Cost Justifying IT SecurityCost Justifying IT Security
Cost Justifying IT SecurityMichael Davis
 
Can You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security RisksCan You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security RisksMichael Davis
 
Confirmation Bias - How To Stop Doing The Things In IT Security That Don't Work
Confirmation Bias - How To Stop Doing The Things In IT Security That Don't WorkConfirmation Bias - How To Stop Doing The Things In IT Security That Don't Work
Confirmation Bias - How To Stop Doing The Things In IT Security That Don't WorkMichael Davis
 
Confirmation bias
Confirmation bias Confirmation bias
Confirmation bias yongseenyee
 
Social Psychology Presentation- Confirmation Bias
Social Psychology Presentation- Confirmation BiasSocial Psychology Presentation- Confirmation Bias
Social Psychology Presentation- Confirmation BiasHannahAshburn
 
Make Mobilization Work - Properly Implementing Mobile Security
Make Mobilization Work - Properly Implementing Mobile SecurityMake Mobilization Work - Properly Implementing Mobile Security
Make Mobilization Work - Properly Implementing Mobile SecurityMichael Davis
 
Confirmation Bias & its applications in Marketing
Confirmation Bias & its applications in MarketingConfirmation Bias & its applications in Marketing
Confirmation Bias & its applications in MarketingKashyap Shah
 
Project 2 : Confirmation Bias
Project 2 : Confirmation BiasProject 2 : Confirmation Bias
Project 2 : Confirmation BiasAzeem Banatwala
 

Viewers also liked (10)

project 3:Social psychology
project 3:Social psychologyproject 3:Social psychology
project 3:Social psychology
 
Cost Justifying IT Security
Cost Justifying IT SecurityCost Justifying IT Security
Cost Justifying IT Security
 
Can You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security RisksCan You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security Risks
 
Confirmation Bias - How To Stop Doing The Things In IT Security That Don't Work
Confirmation Bias - How To Stop Doing The Things In IT Security That Don't WorkConfirmation Bias - How To Stop Doing The Things In IT Security That Don't Work
Confirmation Bias - How To Stop Doing The Things In IT Security That Don't Work
 
Confirmation bias
Confirmation bias Confirmation bias
Confirmation bias
 
Social Psychology Presentation- Confirmation Bias
Social Psychology Presentation- Confirmation BiasSocial Psychology Presentation- Confirmation Bias
Social Psychology Presentation- Confirmation Bias
 
Make Mobilization Work - Properly Implementing Mobile Security
Make Mobilization Work - Properly Implementing Mobile SecurityMake Mobilization Work - Properly Implementing Mobile Security
Make Mobilization Work - Properly Implementing Mobile Security
 
Confirmation bias
Confirmation biasConfirmation bias
Confirmation bias
 
Confirmation Bias & its applications in Marketing
Confirmation Bias & its applications in MarketingConfirmation Bias & its applications in Marketing
Confirmation Bias & its applications in Marketing
 
Project 2 : Confirmation Bias
Project 2 : Confirmation BiasProject 2 : Confirmation Bias
Project 2 : Confirmation Bias
 

Similar to Michael Davis CEO Savid Technologies IT Security Expert

Top 25 Cyber Security Blogs You Should Be Reading
Top 25 Cyber Security Blogs You Should Be ReadingTop 25 Cyber Security Blogs You Should Be Reading
Top 25 Cyber Security Blogs You Should Be ReadingDDoS Mitigation
 
Cyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH EconomyCyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH EconomyInternet Law Center
 
BLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity LiteracyBLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity LiteracyCasey Fleming
 
7 Important Cybersecurity Trends
7 Important Cybersecurity Trends7 Important Cybersecurity Trends
7 Important Cybersecurity TrendsMarco
 
ACGSV_Feb11_Keynote_Program
ACGSV_Feb11_Keynote_ProgramACGSV_Feb11_Keynote_Program
ACGSV_Feb11_Keynote_ProgramJaim Harlow
 
fl ast.indd 115723AM 01172014 Page xxffi rs..docx
fl ast.indd 115723AM  01172014 Page xxffi rs..docxfl ast.indd 115723AM  01172014 Page xxffi rs..docx
fl ast.indd 115723AM 01172014 Page xxffi rs..docxclydes2
 
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks Chuck Brooks
 
Top Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdf
Top Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdfTop Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdf
Top Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdfTopCyberNewsMAGAZINE
 
Mobile Security: Preparing for the 2017 Threat Landscape
Mobile Security: Preparing for the 2017 Threat LandscapeMobile Security: Preparing for the 2017 Threat Landscape
Mobile Security: Preparing for the 2017 Threat LandscapeBlackBerry
 
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...Chuck Brooks
 
InfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 AInfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 AWard Pyles
 
2016 HPESR Cyber Risk Report
2016 HPESR Cyber Risk Report2016 HPESR Cyber Risk Report
2016 HPESR Cyber Risk ReportAngela Gunn
 
HPE Cyber Risk Report 2016
HPE Cyber Risk Report 2016HPE Cyber Risk Report 2016
HPE Cyber Risk Report 2016Tim Grieveson
 
Chuck Brooks Profile on Emerging Technologies, Cybersecurity, Homeland Security
Chuck Brooks Profile on Emerging Technologies, Cybersecurity, Homeland Security Chuck Brooks Profile on Emerging Technologies, Cybersecurity, Homeland Security
Chuck Brooks Profile on Emerging Technologies, Cybersecurity, Homeland Security Chuck Brooks
 
Chuck Brooks thought leadership profile (cybersecurity, homeland security ,em...
Chuck Brooks thought leadership profile (cybersecurity, homeland security ,em...Chuck Brooks thought leadership profile (cybersecurity, homeland security ,em...
Chuck Brooks thought leadership profile (cybersecurity, homeland security ,em...Chuck Brooks
 
Chuck brooks profile on cybersecurity, homeland security, and emerging techno...
Chuck brooks profile on cybersecurity, homeland security, and emerging techno...Chuck brooks profile on cybersecurity, homeland security, and emerging techno...
Chuck brooks profile on cybersecurity, homeland security, and emerging techno...Chuck Brooks
 

Similar to Michael Davis CEO Savid Technologies IT Security Expert (20)

Top 25 Cyber Security Blogs You Should Be Reading
Top 25 Cyber Security Blogs You Should Be ReadingTop 25 Cyber Security Blogs You Should Be Reading
Top 25 Cyber Security Blogs You Should Be Reading
 
Cyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH EconomyCyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH Economy
 
BLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity LiteracyBLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity Literacy
 
7 Important Cybersecurity Trends
7 Important Cybersecurity Trends7 Important Cybersecurity Trends
7 Important Cybersecurity Trends
 
ACGSV_Feb11_Keynote_Program
ACGSV_Feb11_Keynote_ProgramACGSV_Feb11_Keynote_Program
ACGSV_Feb11_Keynote_Program
 
fl ast.indd 115723AM 01172014 Page xxffi rs..docx
fl ast.indd 115723AM  01172014 Page xxffi rs..docxfl ast.indd 115723AM  01172014 Page xxffi rs..docx
fl ast.indd 115723AM 01172014 Page xxffi rs..docx
 
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
 
Top Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdf
Top Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdfTop Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdf
Top Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdf
 
Mobile Security: Preparing for the 2017 Threat Landscape
Mobile Security: Preparing for the 2017 Threat LandscapeMobile Security: Preparing for the 2017 Threat Landscape
Mobile Security: Preparing for the 2017 Threat Landscape
 
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...
 
InfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 AInfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 A
 
2016 HPESR Cyber Risk Report
2016 HPESR Cyber Risk Report2016 HPESR Cyber Risk Report
2016 HPESR Cyber Risk Report
 
HPE Security Report 2016
HPE Security Report 2016HPE Security Report 2016
HPE Security Report 2016
 
HPE Cyber Risk Report 2016
HPE Cyber Risk Report 2016HPE Cyber Risk Report 2016
HPE Cyber Risk Report 2016
 
Hpe security research cyber risk report 2016
Hpe security research  cyber risk report 2016Hpe security research  cyber risk report 2016
Hpe security research cyber risk report 2016
 
Chuck Brooks Profile on Emerging Technologies, Cybersecurity, Homeland Security
Chuck Brooks Profile on Emerging Technologies, Cybersecurity, Homeland Security Chuck Brooks Profile on Emerging Technologies, Cybersecurity, Homeland Security
Chuck Brooks Profile on Emerging Technologies, Cybersecurity, Homeland Security
 
Chuck Brooks thought leadership profile (cybersecurity, homeland security ,em...
Chuck Brooks thought leadership profile (cybersecurity, homeland security ,em...Chuck Brooks thought leadership profile (cybersecurity, homeland security ,em...
Chuck Brooks thought leadership profile (cybersecurity, homeland security ,em...
 
Ciso NYC
Ciso NYCCiso NYC
Ciso NYC
 
Chuck brooks profile on cybersecurity, homeland security, and emerging techno...
Chuck brooks profile on cybersecurity, homeland security, and emerging techno...Chuck brooks profile on cybersecurity, homeland security, and emerging techno...
Chuck brooks profile on cybersecurity, homeland security, and emerging techno...
 
Risky Business
Risky BusinessRisky Business
Risky Business
 

Recently uploaded

Gurgaon Call Girls: Free Delivery 24x7 at Your Doorstep G.G.N = 8377087607
Gurgaon Call Girls: Free Delivery 24x7 at Your Doorstep G.G.N = 8377087607Gurgaon Call Girls: Free Delivery 24x7 at Your Doorstep G.G.N = 8377087607
Gurgaon Call Girls: Free Delivery 24x7 at Your Doorstep G.G.N = 8377087607dollysharma2066
 
Human Rights are notes and helping material
Human Rights are notes and helping materialHuman Rights are notes and helping material
Human Rights are notes and helping materialnadeemcollege26
 
定制英国克兰菲尔德大学毕业证成绩单原版一比一
定制英国克兰菲尔德大学毕业证成绩单原版一比一定制英国克兰菲尔德大学毕业证成绩单原版一比一
定制英国克兰菲尔德大学毕业证成绩单原版一比一z zzz
 
Crack JAG. Guidance program for entry to JAG Dept. & SSB interview
Crack JAG. Guidance program for entry to JAG Dept. & SSB interviewCrack JAG. Guidance program for entry to JAG Dept. & SSB interview
Crack JAG. Guidance program for entry to JAG Dept. & SSB interviewNilendra Kumar
 
办理哈珀亚当斯大学学院毕业证书文凭学位证书
办理哈珀亚当斯大学学院毕业证书文凭学位证书办理哈珀亚当斯大学学院毕业证书文凭学位证书
办理哈珀亚当斯大学学院毕业证书文凭学位证书saphesg8
 
办理学位证(UoM证书)北安普顿大学毕业证成绩单原版一比一
办理学位证(UoM证书)北安普顿大学毕业证成绩单原版一比一办理学位证(UoM证书)北安普顿大学毕业证成绩单原版一比一
办理学位证(UoM证书)北安普顿大学毕业证成绩单原版一比一A SSS
 
Nathan_Baughman_Resume_copywriter_and_editor
Nathan_Baughman_Resume_copywriter_and_editorNathan_Baughman_Resume_copywriter_and_editor
Nathan_Baughman_Resume_copywriter_and_editorNathanBaughman3
 
格里菲斯大学毕业证(Griffith毕业证)#文凭成绩单#真实留信学历认证永久存档
格里菲斯大学毕业证(Griffith毕业证)#文凭成绩单#真实留信学历认证永久存档格里菲斯大学毕业证(Griffith毕业证)#文凭成绩单#真实留信学历认证永久存档
格里菲斯大学毕业证(Griffith毕业证)#文凭成绩单#真实留信学历认证永久存档208367051
 
Application deck- Cyril Caudroy-2024.pdf
Application deck- Cyril Caudroy-2024.pdfApplication deck- Cyril Caudroy-2024.pdf
Application deck- Cyril Caudroy-2024.pdfCyril CAUDROY
 
Back on Track: Navigating the Return to Work after Parental Leave
Back on Track: Navigating the Return to Work after Parental LeaveBack on Track: Navigating the Return to Work after Parental Leave
Back on Track: Navigating the Return to Work after Parental LeaveMarharyta Nedzelska
 
原版快速办理MQU毕业证麦考瑞大学毕业证成绩单留信学历认证
原版快速办理MQU毕业证麦考瑞大学毕业证成绩单留信学历认证原版快速办理MQU毕业证麦考瑞大学毕业证成绩单留信学历认证
原版快速办理MQU毕业证麦考瑞大学毕业证成绩单留信学历认证nhjeo1gg
 
Black and White Minimalist Co Letter.pdf
Black and White Minimalist Co Letter.pdfBlack and White Minimalist Co Letter.pdf
Black and White Minimalist Co Letter.pdfpadillaangelina0023
 
定制(SCU毕业证书)南十字星大学毕业证成绩单原版一比一
定制(SCU毕业证书)南十字星大学毕业证成绩单原版一比一定制(SCU毕业证书)南十字星大学毕业证成绩单原版一比一
定制(SCU毕业证书)南十字星大学毕业证成绩单原版一比一z xss
 
Storytelling, Ethics and Workflow in Documentary Photography
Storytelling, Ethics and Workflow in Documentary PhotographyStorytelling, Ethics and Workflow in Documentary Photography
Storytelling, Ethics and Workflow in Documentary PhotographyOrtega Alikwe
 
Escorts Service Near Surya International Hotel, New Delhi |9873777170| Find H...
Escorts Service Near Surya International Hotel, New Delhi |9873777170| Find H...Escorts Service Near Surya International Hotel, New Delhi |9873777170| Find H...
Escorts Service Near Surya International Hotel, New Delhi |9873777170| Find H...nitagrag2
 
办理学位证(Massey证书)新西兰梅西大学毕业证成绩单原版一比一
办理学位证(Massey证书)新西兰梅西大学毕业证成绩单原版一比一办理学位证(Massey证书)新西兰梅西大学毕业证成绩单原版一比一
办理学位证(Massey证书)新西兰梅西大学毕业证成绩单原版一比一A SSS
 
Digital Marketing Training Institute in Mohali, India
Digital Marketing Training Institute in Mohali, IndiaDigital Marketing Training Institute in Mohali, India
Digital Marketing Training Institute in Mohali, IndiaDigital Discovery Institute
 
LinkedIn Strategic Guidelines April 2024
LinkedIn Strategic Guidelines April 2024LinkedIn Strategic Guidelines April 2024
LinkedIn Strategic Guidelines April 2024Bruce Bennett
 
办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改
办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改
办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改yuu sss
 
LinkedIn for Your Job Search in April 2024
LinkedIn for Your Job Search in April 2024LinkedIn for Your Job Search in April 2024
LinkedIn for Your Job Search in April 2024Bruce Bennett
 

Recently uploaded (20)

Gurgaon Call Girls: Free Delivery 24x7 at Your Doorstep G.G.N = 8377087607
Gurgaon Call Girls: Free Delivery 24x7 at Your Doorstep G.G.N = 8377087607Gurgaon Call Girls: Free Delivery 24x7 at Your Doorstep G.G.N = 8377087607
Gurgaon Call Girls: Free Delivery 24x7 at Your Doorstep G.G.N = 8377087607
 
Human Rights are notes and helping material
Human Rights are notes and helping materialHuman Rights are notes and helping material
Human Rights are notes and helping material
 
定制英国克兰菲尔德大学毕业证成绩单原版一比一
定制英国克兰菲尔德大学毕业证成绩单原版一比一定制英国克兰菲尔德大学毕业证成绩单原版一比一
定制英国克兰菲尔德大学毕业证成绩单原版一比一
 
Crack JAG. Guidance program for entry to JAG Dept. & SSB interview
Crack JAG. Guidance program for entry to JAG Dept. & SSB interviewCrack JAG. Guidance program for entry to JAG Dept. & SSB interview
Crack JAG. Guidance program for entry to JAG Dept. & SSB interview
 
办理哈珀亚当斯大学学院毕业证书文凭学位证书
办理哈珀亚当斯大学学院毕业证书文凭学位证书办理哈珀亚当斯大学学院毕业证书文凭学位证书
办理哈珀亚当斯大学学院毕业证书文凭学位证书
 
办理学位证(UoM证书)北安普顿大学毕业证成绩单原版一比一
办理学位证(UoM证书)北安普顿大学毕业证成绩单原版一比一办理学位证(UoM证书)北安普顿大学毕业证成绩单原版一比一
办理学位证(UoM证书)北安普顿大学毕业证成绩单原版一比一
 
Nathan_Baughman_Resume_copywriter_and_editor
Nathan_Baughman_Resume_copywriter_and_editorNathan_Baughman_Resume_copywriter_and_editor
Nathan_Baughman_Resume_copywriter_and_editor
 
格里菲斯大学毕业证(Griffith毕业证)#文凭成绩单#真实留信学历认证永久存档
格里菲斯大学毕业证(Griffith毕业证)#文凭成绩单#真实留信学历认证永久存档格里菲斯大学毕业证(Griffith毕业证)#文凭成绩单#真实留信学历认证永久存档
格里菲斯大学毕业证(Griffith毕业证)#文凭成绩单#真实留信学历认证永久存档
 
Application deck- Cyril Caudroy-2024.pdf
Application deck- Cyril Caudroy-2024.pdfApplication deck- Cyril Caudroy-2024.pdf
Application deck- Cyril Caudroy-2024.pdf
 
Back on Track: Navigating the Return to Work after Parental Leave
Back on Track: Navigating the Return to Work after Parental LeaveBack on Track: Navigating the Return to Work after Parental Leave
Back on Track: Navigating the Return to Work after Parental Leave
 
原版快速办理MQU毕业证麦考瑞大学毕业证成绩单留信学历认证
原版快速办理MQU毕业证麦考瑞大学毕业证成绩单留信学历认证原版快速办理MQU毕业证麦考瑞大学毕业证成绩单留信学历认证
原版快速办理MQU毕业证麦考瑞大学毕业证成绩单留信学历认证
 
Black and White Minimalist Co Letter.pdf
Black and White Minimalist Co Letter.pdfBlack and White Minimalist Co Letter.pdf
Black and White Minimalist Co Letter.pdf
 
定制(SCU毕业证书)南十字星大学毕业证成绩单原版一比一
定制(SCU毕业证书)南十字星大学毕业证成绩单原版一比一定制(SCU毕业证书)南十字星大学毕业证成绩单原版一比一
定制(SCU毕业证书)南十字星大学毕业证成绩单原版一比一
 
Storytelling, Ethics and Workflow in Documentary Photography
Storytelling, Ethics and Workflow in Documentary PhotographyStorytelling, Ethics and Workflow in Documentary Photography
Storytelling, Ethics and Workflow in Documentary Photography
 
Escorts Service Near Surya International Hotel, New Delhi |9873777170| Find H...
Escorts Service Near Surya International Hotel, New Delhi |9873777170| Find H...Escorts Service Near Surya International Hotel, New Delhi |9873777170| Find H...
Escorts Service Near Surya International Hotel, New Delhi |9873777170| Find H...
 
办理学位证(Massey证书)新西兰梅西大学毕业证成绩单原版一比一
办理学位证(Massey证书)新西兰梅西大学毕业证成绩单原版一比一办理学位证(Massey证书)新西兰梅西大学毕业证成绩单原版一比一
办理学位证(Massey证书)新西兰梅西大学毕业证成绩单原版一比一
 
Digital Marketing Training Institute in Mohali, India
Digital Marketing Training Institute in Mohali, IndiaDigital Marketing Training Institute in Mohali, India
Digital Marketing Training Institute in Mohali, India
 
LinkedIn Strategic Guidelines April 2024
LinkedIn Strategic Guidelines April 2024LinkedIn Strategic Guidelines April 2024
LinkedIn Strategic Guidelines April 2024
 
办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改
办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改
办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改
 
LinkedIn for Your Job Search in April 2024
LinkedIn for Your Job Search in April 2024LinkedIn for Your Job Search in April 2024
LinkedIn for Your Job Search in April 2024
 

Michael Davis CEO Savid Technologies IT Security Expert

  • 1. Phone: 708-532-2843 Fax: 708-231-9811 Web: www.savidtech.com Savid Technologies, Inc. 18470 Thompson Court, 2B Tinley Park, IL 60477 Michael A. Davis CEO of Savid Technologies Over the years, Michael Davis has earned a reputation as one of the nation's leading authorities on IT security. The list of companies that rely on his council includes AT&T, GroupOn, the US Department of Defense, and Discover Financial. In 2005, Mr. Davis founded Savid Technologies. By 2010 it was number 611 on the Inc. 5000 list of fastest growing companies in America. Mr. Davis was a contributing author to Hacking Exposed, the best selling security book in the world, and has recently penned Hacking Exposed: Malware and Rootkits. He has worked with McAfee, Inc., a leader in anti-virus protection and vulnerability management, and held the position of Senior Manager of Global Threats, leading a team of researchers investigating confidential and cutting edge security research. You will find his advice in InformationWeek where he is a Senior Contributing Author, and in Information Week Analytics. His insights can also be found in the Wall Street Journal. Mr. Davis's particular expertise extends to topics such as the relationship between security and compliance, application security, penetration testing/ethical hacking, risk assessment, policy development, and software security development life cycles. Much of his time is spent lecturing, and conferences and conventions know him well, including Blackhat, InfoSecWorld, FINSEC and CanSecWest. He is also an active developer in the Open Source community. "The phrase "I can't" is the most powerful force of negation in the human psyche. When done properly, security controls enable IT to say "we can".