Tod Beardsley of Austin Hackers Anonymous (AHA!) Joins CVE Board

Links that redirect to external websites will open a new window or tab depending on the web browser used.

blog

By CVE Program

The CVE Program is pleased to welcome Tod Beardsley of Austin Hackers Anonymous (AHA!) as the newest member of the CVE Board. Tod is chair of the CVE Numbering Authority Coordination Working Group (CNACWG) and has served multiple terms as the CNA Liaison to the Board.

CVE Board Member Tod Beardsley

About Tod

Tod Beardsley is employed by the U.S. government’s Cybersecurity and Infrastructure Security Agency (CISA). He is also a founder of, and the CVE Numbering Authority (CNA) point of contact for, AHA!. He spends most of his time involved in vulnerability research and coordinated vulnerability disclosure (CVD).

Tod has over 30 years of hands-on security experience, stretching from in-band telephony switching to modern Internet of Things (IoT) implementations. He has held information technology (IT) operations, security, software engineering, and management positions in large organizations such as Rapid7, 3Com, Dell, and Westinghouse, as both an offensive and defensive practitioner.

Tod is a long-term active member of the CVE community. In addition to chairing the CNACWG and serving as CNA Board Liaison, Tod created the CNA Mentoring Program, has led or contributed to numerous CVE- and CNA-oriented workshops, and published “An Inside Look at What Makes the CVE Program Tick” on SCMagazine.

Tod has authored several research papers and hosted the Security Nation podcast. He is a Travis County Election Judge in Texas and an internationally tolerated horror fiction expert.

About the CVE Board

The CVE Board is the organization responsible for the strategic direction, governance, operational structure, policies, and rules of the CVE Program. The Board includes members from numerous cybersecurity-related organizations including commercial security tool vendors, academia, research institutions, government departments and agencies, and other prominent security experts, as well as end-users of vulnerability information.

Feedback

Please use the CVE Blog on Medium, or use the CVE Request Web forms and select “Other” from the dropdown menu, to provide feedback about this article.