Skip to Main Content

Scott White

Director of Software Security

EXPERIENCE
Scott White is the Director of Software Security for TrustedSec. He joined TrustedSec’s founder, David Kennedy, after years of working together in both global corporate and consulting environments. Scott’s expertise in application security and penetration testing stems from his years of experience ranging from help desk support and system administration to web development and penetration testing.

Scott has been called upon not only academically but also professionally by the FBI and the United States Secret Service as a subject matter expert. Scott has developed several application security programs for large international organizations. As the global application security team lead for a Fortune 1000 company, Scott performed several hundred web application security assessments, including both dynamic and static code analysis, dynamic testing, and reverse engineering. He was instrumental in developing the entire process, from secure design to developer education and awareness, secure coding practices, and to final approval reviews for production.

BOOKS

  • “Metasploit: The Penetration Tester’s Guide” - Technical Editor
  • “The Basics of Web Hacking” - Technical Editor

EDUCATION & CERTIFICATIONS

  • Bachelor of Science, Computer Science, Ohio Northern University (with distinction)
  • Master of Science, Network Security, University of Advancing Technology (Summa Cum Laude)

INDUSTRY CONTRIBUTIONS

  • DerbyCon - CTF Founder & Organizer, Trainer
  • Defcon 16 speaker
  • Numerous publications and presentations to local and national organizations such as OWASP, ISSA, FBI InfraGard, ISACA, AZSPF, SWSPF, etc.

Featured Blogs And Resources

Discover the blogs, analysis, webinars, and podcasts by this team member.

Blog November 17 2017

Full Disclosure: Authenticated Command Execution Vulnerability in pfSense

On 05/19/2016 Scott White of TrustedSec discovered an authenticated command injection vulnerability in pfSense. It was responsibly disclosed to pfSense…

Read about this article
Blog September 13 2017

Ruby ERB Template Injection

Written by Scott White & Geoff Walton Templates are commonly used both client and server-side for many of today’s web applications.  Many template engines…

Read about this article
Blog August 19 2015

Ashley Madison Hacked. Dump Released

Ashley Madison suffered a breach a number of months ago. The hackers called "Impact Team" stated that if Ashley Madison didn't shut down, it would expose the…

Read about this article
Webinars June 03 2020

Seeing the Entire Software Security Picture

Join TrustedSec security consultants Scott White, Geoff Walton, and Rob Simon as they provide helpful resources, talk about some of their favorite exploits,…

Read about this article
Webinars December 04 2024

BEC Basics: Your First Step to Thwarting Email Scams

Join Senior Security Consultant Steven Erwin and Security Consultant Olivia Cate as they cover the basics of BEC analysis, providing participants with…

Read about this article
Webinars October 30 2024

Ask Me Anything: Advanced Cloud Pen Testing Scenarios

Join TrustedSec Force Cloud Security Practice Lead Paul Burkeland, along with Principal Security Consultant Mike Felch and Security Consultants Edwin David and…

Read about this article
Blog October 29 2024

Android Hacking for Beginners

1.1    Prerequisites Set Up an Android Lab: https://www.trustedsec.com/blog/set-up-an-android-hacking-lab/ Burp Suite: https://portswigger.net/burp DVBA…

Read about this article
News October 25 2024

Newsweek - Hackers May Have Accessed Trove of Intel on Trump and Vance Phones

Hackers may have accessed a trove data and intel on phones belonging to former President Donald Trump and his running mate JD Vance. Director of Security…

Read about this article
News October 24 2024

Team Spotlight - Megan Nilsen

Let’s meet TAC Practice Lead Megan Nilsen! Megan goes by many names (as you will find out below) including @mega_spl0it on X. Her full title is technically…

Read about this article
Blog October 22 2024

Offensively Groovy

On a recent red team engagement, I was able to compromise the Jenkins admin user via retrieving the necessary components and decrypting credentials.xml. From…

Read about this article

Empower your business through better security design.

Talk directly with our experienced advisory consultants to learn how we can help.