“Dave is an exciting and dynamic person that overflows with passion for the security and technology industry. He is a motivating force in an industry that can get bogged down in technical detail.”
| CARVIEW |
Sign in to view Dave’s full profile
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Atlanta, Georgia, United States
Sign in to view Dave’s full profile
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
5K followers
500+ connections
Sign in to view Dave’s full profile
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
View mutual connections with Dave
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
View mutual connections with Dave
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Sign in to view Dave’s full profile
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Websites
- Personal Website
-
https://www.daveshackleford.com
- Company Website
-
https://www.voodoosec.com
Activity
Sign in to view Dave’s full profile
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
-
Ted Lasso was right: don’t judge someone at their lowest moment. A year ago, Ryan Day lost to Michigan and the fan base wanted him gone. He…
Ted Lasso was right: don’t judge someone at their lowest moment. A year ago, Ryan Day lost to Michigan and the fan base wanted him gone. He…
Liked by Dave Shackleford
-
Thrilled to share that I’ve successfully completed the SEC504: Hacker Tools, Techniques, and Incident Handling Course with the SANS Institute!
Thrilled to share that I’ve successfully completed the SEC504: Hacker Tools, Techniques, and Incident Handling Course with the SANS Institute!
Liked by Dave Shackleford
-
I’m happy to share that I have successfully completed the SANS Institute portion of my Kuwait Institute of Banking Studies (KIBS) training program…
I’m happy to share that I have successfully completed the SANS Institute portion of my Kuwait Institute of Banking Studies (KIBS) training program…
Liked by Dave Shackleford
Experience & Education
-
Voodoo Security
******* *** ***
-
**** *********
****** **********
-
****
**** *******
-
******* ***** **********
*** undefined undefined
-
-
******** ***** **********
** ******** *********** *******
-
View Dave’s full experience
See their title, tenure and more.
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Projects
-
Security in Hybrid Datacenters SANS Webcast
-
See projectToday's datacenter is a mixture of physical and virtual systems, but the tried-and-true methods of securing systems, such as scanning for signatures of hostile activity, may no longer be valid. Attackers have switched their targeting from random systems and are now taking aim at databases which hold a company's crown jewels, whether they are hoping to capture confidential information or merely embarrass the organization. Although security models are moving from searching for the forbidden to…
Today's datacenter is a mixture of physical and virtual systems, but the tried-and-true methods of securing systems, such as scanning for signatures of hostile activity, may no longer be valid. Attackers have switched their targeting from random systems and are now taking aim at databases which hold a company's crown jewels, whether they are hoping to capture confidential information or merely embarrass the organization. Although security models are moving from searching for the forbidden to only permitting that which is specifically approved, many IT security efforts are still trapped in the habits of the past. This webcast will discuss how to recast your systems protection efforts to meet the challenges presented by modern, focused attacks.
Languages
-
Spanish
-
Recommendations received
9 people have recommended Dave
Join now to viewMore activity by Dave
-
More to come from Amazon Web Services (AWS) #awsreinvent2025 for the second year in a row the very best part was seeing my amazing daughter Madison…
More to come from Amazon Web Services (AWS) #awsreinvent2025 for the second year in a row the very best part was seeing my amazing daughter Madison…
Liked by Dave Shackleford
-
Friday was a big day for me. First I joined with some of the people I love to celebrate Britiney Tackett and I getting married. It was a very full…
Friday was a big day for me. First I joined with some of the people I love to celebrate Britiney Tackett and I getting married. It was a very full…
Liked by Dave Shackleford
-
Proud to announce our team won first place in the Kuwait Hackathon Cybersecurity competition! 🥇 A huge thank you to my teammates Dawood Boland…
Proud to announce our team won first place in the Kuwait Hackathon Cybersecurity competition! 🥇 A huge thank you to my teammates Dawood Boland…
Liked by Dave Shackleford
-
Proud to share that my team earned 1st place in the SANS Institute’s SEC504 Capture the Flag! It was an eye-opening experience working with…
Proud to share that my team earned 1st place in the SANS Institute’s SEC504 Capture the Flag! It was an eye-opening experience working with…
Liked by Dave Shackleford
-
Sitting here this morning reflecting on where I am and where I am going. Next week I am getting married. That is an exciting thing to type and I…
Sitting here this morning reflecting on where I am and where I am going. Next week I am getting married. That is an exciting thing to type and I…
Liked by Dave Shackleford
-
I recently participated in a capture the flag event as part of the SANS SEC504 course, and our team earned 1st place! The challenges focused on…
I recently participated in a capture the flag event as part of the SANS SEC504 course, and our team earned 1st place! The challenges focused on…
Liked by Dave Shackleford
-
I’m excited to share that we’ve raised a $22.5M Series A led by Cerberus Ventures , with participation from Ballistic Ventures , Forgepoint Capital…
I’m excited to share that we’ve raised a $22.5M Series A led by Cerberus Ventures , with participation from Ballistic Ventures , Forgepoint Capital…
Liked by Dave Shackleford
-
In April I was honored to speak on the RSAC keynote stage. Professionally it was a big career accomplishment for me, and I got to do it alongside a…
In April I was honored to speak on the RSAC keynote stage. Professionally it was a big career accomplishment for me, and I got to do it alongside a…
Liked by Dave Shackleford
-
I have a TV in my home office mounted on the wall facing me. I used to have it tuned into CNN (muted) in case something interesting happened. I…
I have a TV in my home office mounted on the wall facing me. I used to have it tuned into CNN (muted) in case something interesting happened. I…
Liked by Dave Shackleford
-
I put ketchup on eggs sometimes, all because of something that happened in 1942, on the opposite side of the world. These are weird things that go…
I put ketchup on eggs sometimes, all because of something that happened in 1942, on the opposite side of the world. These are weird things that go…
Liked by Dave Shackleford
View Dave’s full profile
-
See who you know in common
-
Get introduced
-
Contact Dave directly
Other similar profiles
Explore more posts
-
Wade Baker, Ph.D.
Are #cybersecurity incidents growing more costly? Cyentia Institute's recent Information Risk Insights Study points to a 15-fold increase in the cost of #incidents and #databreaches over the last 15 years. The chart on the left shows the distribution of known/reported financial losses from incidents across the time period of study. The typical (median) incident costs about $600K, while more extreme (95th percentile) losses swell to $32M. Note that the chart uses a log scale, so the tail of large losses is a lot longer than it appears. The chart on the right trends the escalating costs of cyber events over time. Median losses from a security incident have absolutely exploded over the last 15 years, rising 15-fold from $190K to almost $3 million! The cost of extreme events has also risen substantially (~5x). So, yeah—cyber events are definitely growing more costly. That said, this picture looks a lot different among different types and sizes of organizations. How are cyber losses trending for orgs like yours? Download the full IRIS 2025 to find out! Link in the comments.
102
15 Comments -
Gareth Bowker
I haven't seen any announcement about this, but the PCI Security Standards Council has published an update in the last few days to the "Guidance for PCI DSS Requirements 6.4.3 and 11.6.1" Information Supplement. In the original version, it said "Note that PCI DSS Requirements 6.4.3 and 11.6.1 do not apply to merchants with webpages that redirect to a TPSP’s page (for example, via an HTTP 30x redirect, a meta redirect tag, or a JavaScript redirect)." That's been removed, and in its place it now says "Note that, where scripts are used as part of a redirection mechanism, PCI DSS Requirements 6.4.3 and 11.6.1 will apply to those scripts." The thing is, by fully-redirecting to a PCI DSS-compliant payment service provider or processor to take payments, the merchant doesn't have a payment page - and it's only the payment page (or parent page when iframes are used) that these requirements apply to. While I think protecting all JavaScript on a website is a really good security best practice - whether that's using CSP+SRI, Jscrambler's Webpage Integrity product, or something else, I'm currently scratching my head as to how this change to the guidance - which "does not replace or supersede requirements in any PCI SSC Standard" - currently applies. I'm curious to hear what others think...
54
17 Comments -
Tim Callan
2024 set in motion major changes for certificate lifespans and DCV. In this Root Causes Podcast lookback episode Jason Soroko and I discuss the Apple 47-day proposal, stepping down certificate term, public versus private CA use cases, DCV reuse periods, MPIC, WHOIS, and other topics. Audio: https://lnkd.in/gH3Z-adY Video: https://lnkd.in/gN_VpVPy #pki #security
29
-
Alon Gal
New - Investigating Hy-Vee’s massive data breach, Hudson Rock identified critical employees infected by infostealers, compromising Atlassian (Confluence and Jira) credentials. This likely enabled this Stormous group 53GB data heist. (tl;dr below) New Blog (4 minutes read) - https://lnkd.in/dPZYU_-f TL;DR: On June 23, 2025, Stormous breached Hy-Vee’s Atlassian accounts, stealing 53GB of sensitive data, including infrastructure diagrams and operational details. Hudson Rock’s research uncovered an infostealer infections Hy-Vee employee devices, exposing credentials that likely granted attackers access, fueling one of 2025’s boldest retail breaches.
37
-
Rohit Agnihotri
Self-Healing IAM Systems - A Business Centric Framework 🚀"The Identity Navigator" Podcast - New Episode Alert🚀 A self-healing IAM system enhances enterprise security by automating identity governance, mitigating operational risks, and ensuring adaptive security resilience. By leveraging this framework organizations can create dynamic, self-correcting identity frameworks that reduce administrative overhead and improve security posture. Self-healing mechanisms ensure robust access management by automatically detecting and mitigating disruptions, policy misconfigurations, or security anomalies. https://lnkd.in/ecm7Bz8V Tune in now and let's check them out together 🎧🔍 #TheIdentityNavigator #IAM #Podcast #TechTalk #IdentityAndAccessManagement #IAM
36
2 Comments -
Sean O'Connor
Recorded Future investigates how Russia’s intelligence services maintain controlled impunity over cybercriminal groups, identifying direct links, indirect affiliations, and tacit agreements that provide plausible deniability while supporting state objectives. Blog: https://lnkd.in/eAdzpAUZ PDF: https://lnkd.in/eFTDTvbB #RecordedFuture #cyber #threatintelligence #infosec #CTI #Russia #cybercrime #espionage #DarkCovenant
62
1 Comment -
Tobias Musser
CMMC Level 2 Assessment Objective: Privacy & Security Notices PRACTICE: Organizations must provide privacy and security notices consistent with applicable rules for controlled unclassified information (CUI). ASSESSMENT: System use notifications can be implemented using messages or warning banners displayed before individuals log in to organizational systems. Users may be required to click to agree to the displayed requirements of using the system each time they log on to the machine. This agreement can be used in the civil and/or criminal prosecution of an attacker that violates the terms. Be prepared! Your assessor could ask to 🔍 EXAMINE privacy and security policies and procedures addressing system use notification. 🗣 INTERVIEW system or network administrators. 📝 TEST mechanisms implementing system use notification. (CMMC Assessment Guide: Level 2 Version 2.13, page 34) #CMMC #DoD #cybersecurity #NIST #InformationSecurity
64
-
Taylor Walton
You might be feeling frustrated by the endless struggle of getting Sigma detection rules to work seamlessly in your open-source SIEM stack. It probably feels like every new rule demands manual conversions, special configs, and a ton of guesswork. It can be exhausting--and I’ve definitely been there. In this walkthrough I introduce how we can incorporate Velociraptor DFIR to solve our Sigma challenge. I share how I set up automated scans, tackled noisy detections, and fed alerts into my incident-response workflow (CoPilot). https://lnkd.in/gX5-X_mN
89
3 Comments -
Douglas Levin
K-12 Cybersecurity Insider | 8/25/2025 In this edition: * When SSO and MFA Aren't Enough: Hidden Credential Risk in K-12 * L.A. Schools Telehealth Vendor Waited 8 Months to Report Breach * If a 14-year-old could hack them, how weak was security for 400,000 confidential student records? * K12 SIX Announces 2025-26 Steering Committee Read more and sign up to get it delivered straight to your inbox: https://lnkd.in/enaKAHCb #edtech #edusec K12 SIX
26
1 Comment -
Terrence McGraw
Stop whining about how much CMMC costs; It pales in comparison to the costs of not adequately defending your networks, and not just for you but all the taxpayers funding it. CMMC is about compliance and real security. While nation-state espionage represents a significant threat to the Defense Industrial Base, cybercrime presents the most immediate and operationally disruptive risk to your organization's daily operations and long-term viability. Cybercrimes occur every 39 seconds—translating to 2,244 incidents per minute and 3.2 million attacks daily. In 2022, 49% of US internet users experienced cybercrime. Global cybercrime damages are projected to reach $10.5 trillion annually by 2025, up from $3 trillion in 2015—making cybercrime the world's third-largest economy, trailing only the United States and China. Data theft for extortion has become nearly ubiquitous in modern cybercrime operations. Any Department of Defense data you have failed to properly identify, classify, and protect walks right out the door with along with all your other data. Whether the threat actor is China, Russia, or a financially motivated cybercriminal group, the result is the same: you have lost control of data critical to national security; and you will have to report it to the DoD along with your other stakeholders. Additionally, inaccurate Self-Assessment reporting to the DoD carries serious consequences and it is time we started treating it as such. When you sign a DFARS clause, you are making a commitment to the government and fellow taxpayers that you will maintain adequate cybersecurity controls. Achieving CMMC Compliance is not just a regulatory requirement but critical to safeguarding national security data. Knowingly or unknowingly providing false information about your cybersecurity posture can be considered breach of contract and potentially a charge under the False Claims Act. One of the most pressing challenges facing defense contractors is identifying and securing Controlled Unclassified Information (CUI) within their environments. Many organizations struggle with culling through millions of files to locate and properly protect all CUI they have been entrusted to safeguard. The first question is whether you have CUI in your environment, the second question is whether you know where it is and how to protect it before it's too late. P.S. If you are not completely confident on where you really are in compliance and actual security, we are happy to help with any or all of it. #capeendeavors #teramis #cmmc #cybersecurity #cyberthreats
34
1 Comment -
Tom McAndrew
🔥 Crisis moments aren’t the time to write the plan. Your incident response playbook should already answer: • Who’s doing what? • How are we communicating? • How fast can we contain it? In this article, James Bird, Principal at Coalfire unpacks CISA’s guidance into real-world, customizable steps your team can use - today. 👉 Read Now: https://ow.ly/pF6I50Wc2Z1 #CyberResilience #IncidentResponse #Coalfire #CISAguidance #PlaybookStrategy #SecurityOps
28
1 Comment
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top contentAdd new skills with these courses
View Dave’s full profile
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
LinkedIn is better on the app
Don’t have the app? Get it in the Microsoft Store.
Open the app