Skip to Main Content

Scott White

Director of Software Security

EXPERIENCE
Scott White is the Director of Software Security for TrustedSec. He joined TrustedSec’s founder, David Kennedy, after years of working together in both global corporate and consulting environments. Scott’s expertise in application security and penetration testing stems from his years of experience ranging from help desk support and system administration to web development and penetration testing.

Scott has been called upon not only academically but also professionally by the FBI and the United States Secret Service as a subject matter expert. Scott has developed several application security programs for large international organizations. As the global application security team lead for a Fortune 1000 company, Scott performed several hundred web application security assessments, including both dynamic and static code analysis, dynamic testing, and reverse engineering. He was instrumental in developing the entire process, from secure design to developer education and awareness, secure coding practices, and to final approval reviews for production.

BOOKS

  • “Metasploit: The Penetration Tester’s Guide” - Technical Editor
  • “The Basics of Web Hacking” - Technical Editor

EDUCATION & CERTIFICATIONS

  • Bachelor of Science, Computer Science, Ohio Northern University (with distinction)
  • Master of Science, Network Security, University of Advancing Technology (Summa Cum Laude)

INDUSTRY CONTRIBUTIONS

  • DerbyCon - CTF Founder & Organizer, Trainer
  • Defcon 16 speaker
  • Numerous publications and presentations to local and national organizations such as OWASP, ISSA, FBI InfraGard, ISACA, AZSPF, SWSPF, etc.

Featured Blogs And Resources

Discover the blogs, analysis, webinars, and podcasts by this team member.

Blog November 17 2017

Full Disclosure: Authenticated Command Execution Vulnerability in pfSense

On 05/19/2016 Scott White of TrustedSec discovered an authenticated command injection vulnerability in pfSense. It was responsibly disclosed to pfSense…

Read about this article
Blog September 13 2017

Ruby ERB Template Injection

Written by Scott White & Geoff Walton Templates are commonly used both client and server-side for many of today’s web applications.  Many template engines…

Read about this article
Blog August 19 2015

Ashley Madison Hacked. Dump Released

Ashley Madison suffered a breach a number of months ago. The hackers called "Impact Team" stated that if Ashley Madison didn't shut down, it would expose the…

Read about this article
Webinars June 03 2020

Seeing the Entire Software Security Picture

Join TrustedSec security consultants Scott White, Geoff Walton, and Rob Simon as they provide helpful resources, talk about some of their favorite exploits,…

Read about this article
Training Resources November 07 2024

Actionable Purple Team Simulation Online Training (November 7-8)

Learn how to create specific detections to identify early Indicators of Compromise (IOCs) in our online course. Designed for those looking to improve their…

Read about this article
Webinars August 07 2024

Ask Me Anything: Proactive Threat Hunting

As threat actors become more sophisticated, organizations' approaches to finding malicious activity must become more proactive and refined. Dive into the…

Read about this article
Training Resources August 03 2024

Black Hat USA Training - Applied Threat Hunting and Detection Engineering

Registration is now open for our Black Hat training on August 3-6, 2024

Read about this article
Blog August 01 2024

Lapse of Control: Applauding PCI SSC for FAQ 1572

I want to applaud the PCI Security Standards Council (PCI SSC) for FAQ 1572 published in March of 2024 for simply and effectively answering a question asked by…

Read about this article
Events TrustedSec HQ | July 30 2024

ISC2 Cleveland Chapter Member Meeting July 2024

ISC2 Cleveland Chapter July MeetupCome join us for our monthly meetup! The ISC2 Cleveland Chapter is hosting an exciting in-person event for all cybersecurity…

Read about this article
Webinars July 29 2024

Specula: A Red Team Chronicle

Microsoft Outlook is often used as the primary email client in corporate environments, making it a high-value target for threat actors. Any potential to…

Read about this article

Empower your business through better security design.

Talk directly with our experienced advisory consultants to learn how we can help.