What inspired you to want to be on the CTA board?

“Having spent a significant part of my career in cybersecurity, I’ve always been passionate about enhancing our defenses against the constantly evolving cyber threats. In this regard, I believe a rising tide raises all boats. The collaborative approach of the CTA resonated deeply with my belief that united we stand stronger against these threats. Being part of the CTA board gives me the opportunity to drive this collective defense mission at a higher level.”

What do you hope to accomplish as a CTA board member?

“As a CTA board member, my aim is to foster greater collaboration among member organizations, finding ways to increase the value of our collaboration, and to help grow participation in the organization internationally. I also believe CTA is well positioned to support recent movement towards shifting cyber responsibility to service providers.”

What role does CTA play in the global sharing ecosystem? How is CTA different than other sharing activities that you engage with?

“CTA plays a crucial role in the global sharing ecosystem by pooling together knowledge and resources from organizations that construct information sharing pathways that support response and resiliency. Unlike other sharing activities that might be more unilateral or less organized, CTA’s structured platform, unstructured sharing platform, and commitment to reciprocal sharing ensures that all members benefit and contribute equally, fostering a truly collaborative environment that is of the highest value.”

What role do you think CTA plays in addressing and responding to this ever-evolving cyber threat landscape?

“CTA plays a critical role in swiftly sharing and collaborating time sensitive information during incidents. Equally important is the ability for participating organizations to validate or cross check ideas and what they are seeing, sort of a ‘sanity check’. Moreover, CTA can leverage collective insights to understand threat trends, anticipate future threats, and guide the cybersecurity community in preparing for them.”

Where do you see CTA in 5 years?

“I see the CTA evolving into an even more influential entity in the global cybersecurity landscape. Over the next 5 years, I anticipate an increase in membership across various sectors and more international participation. This will enhance our shared knowledge base and bolster collective defenses for participating members.”

Where should CTA focus next / what should be CTA’s next priority?

“CTA should focus on expanding its influence and network, bringing more organizations under its umbrella. We should also strive to enhance the technical capabilities of our shared platform to facilitate more effective and timely threat intelligence sharing. Collaboration among members is critical for ongoing value, so looking at ways to foster real time threat collaboration among members would be of value to CTA but also to the larger cybersecurity community.”

Can you share some personal insights and what you like to do outside of work?

“I recently read the book Mastery by George Leonard as a part of a coach training program I am in. I am really impressed by the simplicity, the engaging examples, and the clarity of what it takes to become a master in any field in which someone chooses. 

In terms of motivation, I am generally motivated by learning and new insights that change the way I see the world…things that change the observer that I am of everything around me. I have also recently been supporting neurodiversity efforts in multiple organizations. I find it inspiring and motivating to help unlock talent in people by looking at how we are wired between our ears and aligning that against the challenges we want to work on. The idea of that kind of paradigm shifting taking hold is exciting to think about.”

“Outside of work, I enjoy spending time with my family and traveling. I am also an artistic blacksmith and I like to use it as an outlet for the creative and artistic side of my brain as well as a good physical outlet.”

David is a highly accomplished cybersecurity executive with over 17 years of experience in various roles across the industry, demonstrating a strong track record of strategic leadership, business development, and risk management. As a bilingual (Arabic) professional with a Master’s degree in Information Systems from Johns Hopkins University and a Bachelor’s degree in Labor Economics from the University of Akron, David has also attended the NTT sponsored Global Leadership Development Program at IMD Business School in Lausanne, Switzerland.

Throughout David’s career, he has advised senior leaders and developed innovative solutions to complex business problems. He has held multiple roles at NTT and is currently assigned to NTT Inc. Security and Trust Office (STO). David is currently the STO Leader for International Public and Private Partnerships focused on threat information exchange with the US Government. He is also working with an internal project team to operationalize management of Cyber Threat Intelligence (CTI) across NTT operating companies. He has also held roles leading the Americas Cybersecurity Consulting business for NTT Security as well as Global VP for Cyber Consulting for NTT Ltd.

David has an extensive history of working with C-suite executives and Boards, assessing the effectiveness of governance and cyber risk management strategies, and evaluating data privacy and regulatory risk. Their experience extends to international cybersecurity risk analysis for commercial and federal customers, as well as contributing to the defense of the global information grid for the US Government.

Beyond their professional accomplishments, David is dedicated to giving back to the community through volunteering, such as their work at Boulder Crest Retreat. David is also a member of the Board of Advisors for the Washington, DC, based CyberGuild and is a Strategic Advisor to L!NK Talent, LLC, implementing cyber talent development programs focused on Neuroinclusion. He also hold numerous industry certifications, including Certified Forensic Computer Examiner, Customer Experience (CX) Professional, and CISSP.

Back to News