Dave Coughanour
Details
Cyber Security
Utica College
2012 : 2014
Executive Education and Certificate Program
Chief Information Security Officer (CISO)
Carnegie Mellon University - Heinz College of Information Systems and Public Policy
2017 : 2018
Ansys
Vice President of Cybersecurity
Responsible for guiding the organization’s 21-person security team and all aspects of the firm's physical and information security programs with operations in 45 cities across 5 continents.
Lead the team through ISO 27001 certification with no major or minor findings for three consecutive years.
Worked jointly with the Office of General Counsel to prepare for European Union General Data Protection Regulation (EU-GDPR) compliance.
Quickly recruited trained personnel and have maintained a high retention rate.
Effectively responded to over 200 client driven assessments and reviews with no negative outcomes.
Created leading edge countermeasures against online fraud, data mishandling, and sophisticated attempts to compromise confidential data.
Established the firm’s Data Loss Prevention and Insider Threat Program.
Created the firm’s first Cybersecurity Intelligence Program.
Saved the firm significant financial resources through platform consolidation and direct vendor negotiation.
Defined policies and designed security measures for a variety of cloud services, enabling the firm to safely meet clients on the platforms of their choosing.
Implemented anti-malware systems which have prevented the execution of all malicious code for three consecutive years.
Ensured the physical security of the firm’s personnel and offices with no injuries or significant theft to date.
Advised numerous clients and partners on security, compliance, digital forensics and incident response issues.
2016 : 2019
K&L Gates
Director of Security
Managed the activity of PNC’s Security Operations Center (SOC), digital forensics, threat intelligence, cyber counterintelligence, and technical incident response capabilities which includes the supervision of four Vice President level managerial direct reports and a span of control over 50 cyber security professionals.
Oversaw the creation of the Cyber Operations group, to include the develop of four functional teams, staff levels, response processes, metrics, team member roles, knowledge management, reporting, coordination with law enforcement and relationships with peer groups.
Led the team during numerous incidents of high visibility, the most notable being widespread denial of service attacks targeting the Financial Industry in 2013.
Transitioned from a Managed Security Solutions Provider (MSSP) model to internal 24 x 7 SOC operations.
Developed innovative threat modeling and intelligence collection approaches to keep PNC ahead of threat actors before damage to the bank was incurred.
Designed and led the deployment of the organization’s digital forensics and incident response technologies. Provided oversight and guidance related to the organization’s sensor grid and Security Information & Event Management (SIEM) platform as well as ensured they were leveraged for maximum effect.
Coordinated with multiple peer teams to improve the organization’s resilience against malicious code resulting in an 81% reduction in infections from 2014 through 2015.
Routinely fielded inquiries from peer Financial Institutions, customers, regulators and internal teams in order to demonstrate PNC’s commitment to cyber security and compliance with industry best practice.
Directly recruited and retained top tier cyber security talent.
2013 : 2016
PNC
SVP, Director | Cyber Operations
Led a team of 14 digital forensic examiners and reverse engineers in support of Department of Defense operations.
Deployed to Afghanistan to provide digital forensics support to high value targeting operations
Served as a Senior Network Security Engineer for the Department of Justice, Office of Justice Programs.
Deployed to Camp Taji Iraq as a Media Exploitation Analyst in support of the US Army Tactical Document and Media Exploitation Program (TAC DOMEX)
2006 : 2013
ManTech
Computer Forensics / Intrusion Analysis - Lead
Operation Noble Eagle : Served as shift supervisor providing physical security for United States Air Force assets.
Operation Iraqi Freedom : Served as the battalion’s Automation Systems NCOIC (Non- Commissioned Officer in Charge) responsible for the operation of all Secret (SIPR), Non- Classified (NIPR), Army Battle Command Systems (ABCS), and civilian networks for Forward Operating Base Habbaniyah.
Designed, implemented, and maintained a base wide commercial Internet Service Provider (ISP) that supported over 350 users in order to improve unit morale.
2002 : 2006
Army National Guard
Sergeant
Skills
CISSP, Cloud Access Security Broker (CASB), Cloud Security, Computer Forensics, Computer Security, Corporate Security, Counterintelligence, Cyber Operations, Cyber Threat Intelligence (CTI), Data Privacy, Digital Forensics, DoD, EnCase, Forensic Analysis, Fraud Investigations, FTK, General Data Protection Regulation (GDPR), Government, IDS, Incident Response, Information Assurance, Information Security, Information Security Management, Information Technology, Intelligence, Intelligence Analysis, Intrusion Detection, IPS, ISO 27001, Linux, Malware Analysis, Military, Network Security, NIST 800-53, Penetration Testing, Physical Security, Security, Security Audits, Security Incident & Event Management, Security Management, Strategic Planning, Threat Modeling, u.s. department of defense, Vulnerability Assessment, Vulnerability Management, Vulnerability Scanning, Mac OS, Cyber Defense, Smartphones, Incident Handling, McAfee, Network Forensics, Cybercrime, Nessus, Network Engineering, Data Loss Prevention, Cyber Threat, Remote Forensics, Password Decryption
About
Experienced in leading a range of security programs.
Successfully navigated hundreds of incident response engagements and have developed multiple teams that are highly effective in their prevention, detection, analysis and remediation.
Expert in conducting digital forensics examinations for a wide range of cases and technologies.
Well versed in intrusion detection, insider threat mitigation, attack surface management, threat intelligence, malware analysis, brand protection, cyber fraud prevention, physical security measures and network defense methodologies.
Fully capable of making sound decisions, based on limited information, in stressful environments.
Comfortable advising senior executive and board level leadership on cyber security issues.