The Remarkable Journey of Dave Kennedy as a Cyber Security Innovator
Reading Time: 5 Minutes
Introduction
Dave Kennedy holds a prominent position as a highly respected and influential figure in the field of cybersecurity with over 25 years of experience.
He has gained widespread recognition for his exceptional expertise in areas such as penetration testing, social engineering, and offensive security techniques. Throughout his remarkable career, Kennedy has made noteworthy contributions to the industry by drawing upon his diverse background that encompasses military service, significant consulting roles, and active engagement within the cybersecurity community.
Who is Dave Kennedy?
Early life
Dave Kennedy was born in the early 1980s in Ohio, United States.
He developed a strong passion for computers during his nomadic upbringing, which involved frequent moves. As his family relocated from one place to another, building long-lasting friendships became increasingly difficult. Nevertheless, the realm of computers consistently provided him with a sense of connection and familiarity in the ever-changing environment. Engrossed in the world of technology, these machines became loyal companions that allowed him to explore personal interests and pave the way for future endeavors.
During his early years, Dave discovered a strong affinity for computer programming and gaming, cultivating these passions from a young age. However, his enthusiasm for these computer-related activities contrasted with his feelings about traditional schooling, which lacked the subjects he truly enjoyed. He attended multiple high schools before ultimately attaining his educational milestone at Bedford High School in Ohio.
Despite his graduation, the conventional academic path did not resonate with him, leading him to make the decision not to enroll in college. Instead, he followed his passion for technology and embarked on a remarkable journey that would eventually establish him as a prominent figure in the cybersecurity industry.
The start of the journey
US Marine Corps service
Marines with Marine Corps Forces Cyberspace Command pose for photos in the cyber operations center at Lasswell Hall aboard Fort Meade, Maryland, Feb. 5, 2020. Credit: defense.gov
Dave Kennedy embarked on a remarkable career that commenced with dedicated service in the United States Marine Corps, where his focus was on cyber warfare and forensic analytics. He completed two tours in Iraq, accumulating a total of 2 years of experience in the Middle East.
Becoming the CSO at Diebold at just 27
Following his commendable 5-year tenure in the Marines, he transitioned to the private sector and joined a small consulting firm based in Cleveland. What sets him apart is his appointment as Diebold’s Chief Security Officer (CSO), an impressive achievement considering he was merely 27 at the time. Diebold, headquartered in northeast Ohio, is a fortune-1000 company.
In 2011, Kennedy decided to make a significant impact in the realm of cybersecurity, leading him to establish TrustedSec, an information security consulting company. Alongside this venture, he also founded Binary Defense, a sister company of TrustedSec in 2014.
See Also: So you want to be a hacker?
Offensive Security and Ethical Hacking Course
Founding TrustedSec
David Kennedy, founder and CEO of TrustedSec, has opened a new corporate headquarters in Fairlawn that will serve as a national hub for cybersecurity services, research and testing.
Credits: Karen Schiely, Akron Beacon Journal
In pursuit of his passion for cybersecurity and a desire to make a broader impact, Kennedy founded TrustedSec in 2011, a leading cybersecurity consulting firm.
Since its inception, the company has been at the forefront of helping organizations identify vulnerabilities and enhance their security posture.
TrustedSec’s dedication to advancing the cybersecurity field goes beyond their consultancy work. They actively contribute to the open-source community, developing tools and frameworks that support security assessments and education while also actively engaging in industry events, conferences, and knowledge-sharing initiatives. One notable contribution by TrustedSec is the creation of the “Social-Engineer Toolkit” (SET), a popular open-source tool aimed at raising awareness about social engineering risks.
TrustedSec and its dedicated team are driven by a strong sense of social responsibility and a desire to give back to the community. Firmly believing in doing the right thing, is actively engaging in philanthropic efforts and various community initiatives.
These efforts encompass a range of activities, including donating time and resources to local charities.
Under Kennedy’s leadership, TrustedSec became known for its comprehensive security assessments, penetration testing, and social engineering engagements. The company’s dedication to providing practical and effective security solutions earned it a sterling reputation within the industry.
Creating the Social-Engineer Toolkit (SET)
Dave is also renowned for creating the Social-Engineer Toolkit (SET). This open-source Python-driven tool is specifically crafted for social-engineering penetration testing. SET has garnered widespread recognition and has been featured at esteemed conferences like Blackhat, DerbyCon, Defcon, and ShmooCon. The tool’s tremendous success is evidenced by over 2 million downloads and its adoption as the industry standard for social-engineering tests.
SET toolkit being used for attacks in the Mr. Robot series. Credit: kitploit.com
The toolkit has been featured in various books, including the best-selling “Metasploit: The Penetration Tester’s Guide,” co-authored by Dave Kennedy, Devon Kearns, Jim O’Gorman, and Mati Aharoni.
See Also: Offensive Security Tool: SecretOpt1c
Founding DerbyCon
As the industry continued to grow, Dave Kennedy noticed a lack of college courses, and the existing ones were inadequate and provided only foundational knowledge in terms of cybersecurity. Additionally, resources like YouTube videos were insufficient for individuals seeking to learn and exchange ideas about hacking. Recognizing this gap, Dave had the innovative idea of founding DerbyCon, a platform aimed at training and assisting individuals in entering the cybersecurity field.
DerbyCon, held annually in Louisville, Kentucky from 2011 to 2019, and stood as a celebrated hacker conference. It was founded by Dave alongside Martin Bos, Alex Kah, and Adrian Crenshaw.
Esteemed within the cybersecurity community, it brought together professionals, enthusiasts, and researchers worldwide. It served as a knowledge-sharing platform for attendees encompassing research exchange and valuable networking opportunities.
DerbyCon should be noted for its unique approach, as it was not founded with the intention of becoming a profitable business. Instead, the conference placed a strong emphasis on giving back to the community and supporting charitable causes. Each year, DerbyCon organized fundraising activities and initiatives, raising hundreds of thousands of dollars that were donated to various charity organizations.
However, in 2019, the organizers of DerbyCon announced that the conference would be concluding after its ninth and final edition. The organizers pointed out the increasing negativity, polarization, and disruptive behavior observed within the conference attendees. Ultimately, the organizers made the decision to step away from managing the conference while expressing gratitude for its positive impact.
Opening ceremony at DerbyCon, the InfoSec conference Sept. 6-8 2019 in Louisville, Ky. Credit: Becky Rutherford
Founding Binary Defense
In 2014 he founded Binary Defense when he acknowledged a major deficiency in the market for helping companies that were struggling with their cybersecurity. Cybersecurity is a very complex and multifaceted field, that requires a comprehensive approach to effectively address the ever-evolving threats and challenges posed by cybercriminals. So, the main goal of Binary Defense was to take out the complexity and help companies with their cybersecurity issues.
Binary Defense offers a range of services, including managed detection and response (MDR), security operations center (SOC) as a service, endpoint detection and response (EDR), threat hunting, and vulnerability management. The company’s advanced technology platform, known as Binary Defense Vision, combines powerful analytics, machine learning, and expert human analysis to detect and respond to threats in real time.
Over the years, Binary Defense has earned the trust of a wide range of clients, including government agencies, enterprises, and small to medium-sized businesses. The company’s commitment to proactive defense and rapid response has made it a go-to partner for organizations seeking robust cybersecurity solutions.
Trending: Offensive Security Tool: TerminatorZ
Dave’s role in the Mr. Robot series
Dave had helped in the production of Mr. Robot in a major way. He collaborated closely with the show’s creators, writers, and production team as the technical consultant.
His expertise guided various aspects related to hacking, cybersecurity, and technology.
He played a crucial role in ensuring the authenticity of the hacking sequences and cybersecurity storylines depicted in Mr. Robot.
Scene from the Mr. Robot series, featuring Rami Malek
In his advisory capacity, he provided valuable insights to the show’s creators regarding cutting-edge techniques employed by hackers, potential vulnerabilities, and effective defense strategies used by cybersecurity experts.
Fostering tech education and scholarships at Bedford High School
Dave was granted a position on the Bedford High School technology board, where he played a key role in assisting high schools in developing their computer programming and cybersecurity classes.
In addition, he took the initiative to establish an e-sports game facility called “Gaming and Leadership Excellence” for Bedford High School. This facility offers 11 scholarships annually to students who demonstrate outstanding academic performance, further encouraging their growth and achievements.
Highlight – Live social engineering attack on CNN in 2016
Watch this hacker break into a company
In a widely-known CNN video, Dave Kennedy impressively demonstrates his social engineering skills by taking over an employee’s computer within a mere 2 minutes during a mobile call.
Co-author – “Metasploit: The Penetration Tester’s Guide”
Cover of “Metasploit: The Penetration Tester’s Guide”
This book, highly regarded in the cybersecurity community, provides comprehensive insights into the Metasploit Framework, a powerful tool used for penetration testing and ethical hacking. Alongside other co-authors(Devon Kearns, Jim O’Gorman, and Mati Aharoni), Dave Kennedy contributed to the content of the book, sharing his knowledge and expertise on using Metasploit for effective penetration testing. The book serves as a valuable resource for security professionals and enthusiasts looking to deepen their understanding of this widely used framework.
Life today
Dave Kennedy. Credit: binarydefense.com
Dave Kennedy currently leads the companies he founded, with the support of an exceptional team. At TrustedSec, he has brought in a Chief Operating Officer (COO) to handle day-to-day operations while he maintains his focus on his hacking expertise. The company boasts exemplary teams in leadership, sales, marketing, and consulting departments.
Similarly, at Binary Defense, where he serves as the CTO since its inception, he actively shapes the company’s roadmap and sets strategic directions for technology development. Together with dedicated teams, he continues to drive innovation and excellence in the field of cybersecurity.
Dave and his team are dedicated to continuous research and development, constantly expanding and enhancing their services in both companies.
Beyond his cybersecurity ventures, Dave is also involved in investments related to basketball technology integrations, with a particular focus on aiding young kids in developing their basketball skills and taking their game to the next level.
Amid the challenges presented by the Covid pandemic, Dave discovered solace and passion in powerlifting and bodybuilding. He devoted himself to regular lifting sessions throughout the week, complemented by a commitment to maintaining a healthy diet. This dedication ensured not only physical strength but also promoted overall well-being and equilibrium in his lifestyle.
Carving a Path Forward
Dave Kennedy’s journey in the field of cybersecurity spans over 25 years, marked by remarkable achievements and influential contributions. His hacking nickname “Rel1k” has become synonymous with his exceptional skills and prowess in the cyber world.
From his early passion for computers during a nomadic upbringing to becoming the CSO at Diebold at a young age, Kennedy’s dedication to technology and cybersecurity shines through.
Through founding TrustedSec and Binary Defense, he has led cutting-edge initiatives in information security consulting and threat detection.
His impact though extends beyond the industry, as he actively fosters tech education for the youth.
Dave Kennedy’s journey can be followed through his social media presence, where he goes by the handle @hackingdave on Twitter.
References:
⦿ Lay of the Land – #67 David Kennedy
⦿ https://web.archive.org/web/20190114191657/https:/www.derbycon.com/blog/derbycon-9-0-every-beginning-has-an-end
⦿ https://www.binarydefense.com/about-us/our-team/dave-kennedy/
⦿ https://www.trustedsec.com/team/dave-kennedy/
⦿ https://cybersecurityventures.com/social-engineering-hacking-dave-to-the-rescue/
Are u a security researcher? Or a company that writes articles or write ups about Cyber Security, Offensive Security (related to Information Security in general) that match with our specific audience and is worth sharing?
If you want to express your idea in an article contact us here for a quote: [email protected]