David Wolf · Portfolio Use Case
Device Cloud and research-backed analysis of OT, IoT, industrial, unmanaged, and cyber-physical systems as enterprise attack surfaces.
Contributed to Forescout operational-technology and Enterprise-of-Things research by using Device Cloud analytics and Elastic/Kibana-style workflows to help examine OT, IoT, unmanaged, industrial, and connected-device exposure across enterprise environments.

Client
Forescout
Engagement Type
Full-Time research contribution; exact title and dates should be confirmed from resume/Profile source
Period
2019–2020
Role
Security Research / Device Cloud Analytics / Kibana & Elastic Analyst Contributor
Focus Areas
Operational Technology Security, Industrial IoT Security, Enterprise of Things
The Context
Operational technology was no longer isolated from enterprise security. Industrial systems, sensors, controllers, building systems, IoT devices, and traditional IT assets were converging into one connected enterprise attack surface.
The Challenge
OT security cannot be reduced to ordinary endpoint security. Availability, safety, legacy systems, specialized protocols, and industrial process constraints change how controls must be designed and communicated.
What I Did
The Outcome
The work strengthened a recurring portfolio theme: every serious security program begins with visibility. Whether the surface is OT, IoT, healthcare, financial services, or AI systems, inventory and control evidence are the foundation.
Forescout
Materials in 2019–2020 positioned the company around securing the Enterprise of Things across IT, IoT, and OT environments
Forescout
Materials describe the need for visibility and control across campus, data center, cloud, and operational technology networks
Key Deliverables
Collaboration
Worked in a Forescout research and device-intelligence context where large-scale Device Cloud analysis and OT/IoT product-security understanding needed to become credible market education, customer-facing guidance, and enterprise-security narrative.
Client
Forescout
Engagement Type
Full-Time research contribution; exact title and dates should be confirmed from resume/Profile source
Period
2019–2020
Role
Security Research / Device Cloud Analytics / Kibana & Elastic Analyst Contributor
Focus Areas
Operational Technology Security, Industrial IoT Security, Enterprise of Things
The Context
Operational technology was no longer isolated from enterprise security. Industrial systems, sensors, controllers, building systems, IoT devices, and traditional IT assets were converging into one connected enterprise attack surface.
The Challenge
OT security cannot be reduced to ordinary endpoint security. Availability, safety, legacy systems, specialized protocols, and industrial process constraints change how controls must be designed and communicated.
What I Did
The Outcome
The work strengthened a recurring portfolio theme: every serious security program begins with visibility. Whether the surface is OT, IoT, healthcare, financial services, or AI systems, inventory and control evidence are the foundation.
Forescout
Materials in 2019–2020 positioned the company around securing the Enterprise of Things across IT, IoT, and OT environments
Forescout
Materials describe the need for visibility and control across campus, data center, cloud, and operational technology networks
Key Deliverables
Collaboration
Worked in a Forescout research and device-intelligence context where large-scale Device Cloud analysis and OT/IoT product-security understanding needed to become credible market education, customer-facing guidance, and enterprise-security narrative.
At a Glance
Focus Areas
Tools & Technologies
Evidence & Artifacts
Public-Safe Caveat
This case study uses public Forescout sources for OT and Enterprise-of-Things context and user-provided context for the author's Device Cloud and Elastic/Kibana contribution. Exact authorship, internal queries, dashboards, customer details, raw datasets, unpublished drafts, and proprietary analysis details are omitted unless later confirmed and approved for public use.
David Wolf
AI Security · Product Security · Security Leadership
Based on analyzed public signals, not proof of any individual's or company's internal state.