David Wolf Portfolio

AI security and product security work, shown as proof.

David Wolf helps teams turn AI security, product security, and governance work into operating systems: controls, evidence, workflows, architecture, and decision-ready artifacts.

Browse signals

Projects

55

Companies

28

Featured

3

Claim ready

2

The directory below filters by company, engagement type, claim readiness, and visual proof so you can move from broad signal to concrete case study quickly.

28 records use company imagery

Browse the proof

Filter the portfolio by company, type, and surface.

The page is structured as a living directory, not a static gallery. Use the controls to jump straight to company-era work, research outputs, product builds, or public-safe consulting proof.

Engagement type

All projects

Projects

55

Companies

28

Featured

3

Company imagery

28

Public-safe

2

Visible now

55

Showing 55 of 55 projects. Filters preserve the curated manifest order, so the most important proof remains visible in the sequence you approved.

Featured proof

Pinned portfolio anchors

The most public-facing proof remains pinned even when the rest of the directory is filtered.

The State of AI Security Engineering Report 2026 portrait cover
AI Security LLC2026
SurfacePublic-safe with caveat
The AI Security Engineering Field Guide portrait cover
aisecurity.llc2026
SurfacePublic-safe with caveat
AI Product Security in the Age of Mythos portfolio cover
AI Security LLC2026
SurfacePublic-safe

Consulting projects

Client-facing and methodology work that can support advisory, assessment, and sales conversations.

9 projects
Browser-Native Trust Boundary Security Model portfolio cover
Consulting
Confidential Browser Security Research2025–2026
SurfacePublic-safe with caveat
Mandiant — Operation Aurora DFIR & FBI Cybercrime Training hero image
Consulting
Mandiant (Google Cloud)2009–2011
SurfacePublic-safe with caveat
Disney IAM SIEM Alert Debugging & Executive Dashboard hero image
Consulting
DisneyCareer Role
SurfacePublic-safe with caveat
UNUM LLM Attack Story & Detection Engineering hero image
Consulting
UNUM2024–2025
SurfacePublic-safe with caveat
Caya logo — Forex PCI DSS Level 3 Compliance portfolio cover
Consulting
Forex trading platform2010
SurfaceTeaser only
Trada logo — Data.com B2B Rainmaker Contact Intelligence portfolio cover
Consulting
Performance advertising platform2011
SurfaceTeaser only
Cogstate logo — Regulated Health Data Product Delivery portfolio cover
Consulting
Cogstate2012
SurfaceTeaser only
Pathwwway logo — ISO 27001 Audit & Management Consulting portfolio cover
Consulting
Pathwwway iGaming2017
SurfaceTeaser only
NIST NICE Cyber Workforce Research Program hero image
Consulting
Sapient Search Group2024–2026
SurfacePublic-safe with caveat

Key FTE projects

Conservative public-safe summaries of prior operating work.

10 projects
Splunk Product Security Program Buildout hero image
Splunk2013–2014
SurfacePublic-safe with caveat
Splunkbase App Certification Program hero image
Splunk2015
SurfacePublic-safe with caveat
Forescout Smart IoT Security Lab hero image
Forescout2016–2017
SurfacePublic-safe with caveat
Forescout Rapid Response Program hero image
Forescout2017–2018
SurfacePublic-safe with caveat
ServiceNow Principal Security Research Program hero image
ServiceNow2022–2025
SurfacePublic-safe with caveat
Cornerstone FedRAMP Moderate ATO Security Controls hero image
Cornerstone OnDemand2015–2016
SurfacePublic-safe with caveat
Syntryx OSINT Platform Product Buildout hero image
Syntryx2006–2010
SurfacePublic-safe with caveat
Cendant / Orbitz Affiliate Growth & ML Multileg Itinerary Generation hero image
Cendant / Orbitz2005
SurfaceTeaser only
Cendant / Orbitz Geographic Waypoint & GDS Cleanup hero image
Cendant / Orbitz2006
SurfaceTeaser only
Pathwwway logo — iGaming Deputy Head of Technology portfolio cover
Pathwwway iGaming2017
SurfaceTeaser only

Reports and assessments

Research, assessment, and proof artifacts that translate technical work into reusable evidence.

10 projects
DuckDuckGo Browser Security Assessment hero image
DuckDuckGo2026
SurfacePublic-safe with caveat
Forescout Device Cloud Elastic/Kibana Analytics Platform hero image
Forescout2019–2020
SurfacePublic-safe with caveat
Forescout Connected Medical Device Security Report hero image
Forescout2019–2021
SurfacePublic-safe with caveat
Forescout Enterprise of Things Security Report 2020 hero image
Forescout2020
SurfacePublic-safe with caveat
Forescout Banking on Security Financial Services Research hero image
Forescout2020
SurfacePublic-safe with caveat
Forescout Operational Technology Security Research hero image
Forescout2019–2020
SurfacePublic-safe with caveat
Forescout DTEN / WIRED-Featured Offensive Security Research hero image
ForescoutCareer Role
SurfacePublic-safe with caveat
Devo Security Research & Conference Program hero image
Devo2022–2023
SurfacePublic-safe with caveat
Devo SIEM Reference Architecture, Taxonomy & Detection Validation hero image
Devo2022–2023
SurfacePublic-safe with caveat
Mapping Motives: Analysis of 2,000 Enterprise Cloud Detections hero image
Devo2023
SurfacePublic-safe with caveat

Public-safe caveat

Portfolio items use conservative public-safe language. They avoid raw job-description text, ATS payloads, personal data, secrets, private customer records, unapproved quotes, sponsor negotiation notes, unsupported maturity claims, accusatory company-level framing, and psychometric diagnosis.

David Wolf Portfolio | AISECURITY.LLC | aisecurity.llc