`
`David Moshe Goldschlag, PhD
`
`12018 Auth Lane, Silver Spring, Maryland, 20902, USA
`+1.202.525.6661
`david@goldschlag.com
`
`An experienced business and technology executive, with exceptional strategic, analytical,
`technical, and communication skills. Excels at collaboratively determining what is core,
`building the shared narrative that helps teams succeed, and executing to meet goals.
`
`Strategic corporate activities, including corporate and product strategy, strategic sales,
`corporate development, OEM relationships, and IP prosecution and litigation.
`
`Broad and deep technology expertise, including mobile systems, compliance and risk
`management, digital rights management, cryptography, security, storage systems, and
`managed IT services.
`
`Brings to the organization a focus on effective performance, with tremendous optimism,
`energy, creativity, and leadership.
`
`Pulse Secure, LLC
`
`2014 -
`SVP Strategy
`• Corporate Strategy, Corporate Development, Strategic Architecture, IP
`Pulse Secure is a leader in secure remote access for the enterprise, enabling users to
`access any service from any device.
`
`San Jose, CA
`
`Address
`
`Qualifications
`
`Professional experience
`
`MobileSpaces
`
`2011 - 2014
`CEO
`• Strategy, Partnering, Selling, IP
`My focus at MobileSpaces is to build the company that enables BYOD for enterprise
`mobility.
`MobileSpaces was acquired by Pulse Secure in October 2014.
`
`Silver Spring, MD
`
`McAfee, Inc
`
`2010 - 2011
`VP Mobile
`• Strategy
`• Strategic Selling
`• Partners
`• IP and Patents
`My focus at McAfee is to build a unified consumer and enterprise mobile security
`offering that leverage McAfee’s strengths into the new mobile world.
`
`McLean, VA
`
`Trust Digital, Inc
`
`2006 - 2010
`President & CTO
`• Marketing, Engineering, QA, and Support
`• IP and Patents
`
` 1
`
`McLean, VA
`
`IV 2020
`IPR2014-00682
`
`
`
`
`
`• DOD / NSA Certifications
`• Strategic Partners and Accounts
`My focus at Trust Digital is to build the company that enables enterprises and
`government to make employee’s smartphones a secure part of their corporate network.
`Trust Digital was acquired by McAfee in April 2010.
`
`McLean, VA
`
`Trusted Edge, Inc.
`
`2004 - 2006
`SVP & CTO
`• Corporate Strategy: Markets, Products, Partners, and Acquisitions
`• Product Roadmap
`• OEMs & Partners: Symantec, OpenText, and IBM
`• IP and Patents
`• Strategic Accounts
`My focus at Trusted Edge was to enable enterprises to improve compliance and reduce
`risk by having visibility and control over information created and used at the network’s
`edge. Trusted Edge sold direct and through OEM channels. Trusted Edge was acquired
`by FileTek in 2007.
`
`Consultant
`2002 - 2004
`• Security & Cryptography
`• Digital Rights Management, Networked Storage, IT hosting, Embedded Systems
`• Strategy & Planning; Architecture & Design; Review & Due Diligence; Standards
`Work; IP Prosecution & Litigation
`
`Silver Spring, MD
`
`KeySec Software
`
`Silver Spring, MD
`
`2002 – 2003
`Founder
`• Corporate Strategy and Business Model
`• Intellectual property and product architecture
`• Marketing to both OEM and end-customers
`• Financing
`KeySec Software develops and markets policy management and access-control solutions
`for networked storage. KeySec enables enterprises to better leverage their SAN
`infrastructure investment through software.
`
`
`2001 - 2003
`Board of Advisors
`• Corporate Strategy and Business Model
`•
`Intellectual Property, technology, and security architecture
`• Marketing to both studio and technology partners
`• Financing
`Cinea develops and markets digital content protection technologies for cinema. Cinea is
`enabling the movie industry’s transition to digital distribution and projection.
`
`
`
`Cinea, Inc.
`
`
`
`
`
`Herndon, VA
`
`USinternetworking, Inc.
`
`1999 - 2001
`Chief Technology Officer
`• Strategy: Corporate direction and roadmap
`• Architecture: The context within which USi’s infrastructure, products, services, and
`processes operate
`
`Annapolis, MD
`
` 2
`
`
`
`
`
`• Operational: Responsible for the productization, design, engineering, deployment,
`and support of USi’s communication services, security and disaster recovery products,
`and management and monitoring infrastructure
`• Quality: Vulnerabilities, metrics, operational trends, design reviews
`• Communication: Positioning the company for clients, industry, and financial analysts
`My focus at USi was threefold: inverting the Application Service Provider (ASP)
`operational concept from a collection of many client data centers under one roof to a
`single data center supporting many clients; introducing provisioning as a key competency
`of ASPs, in addition to the existing competencies of application management and
`support; and building the next generation telco from the synergy of bandwidth, storage,
`and computation.
`
`Divx
`
`Herndon, VA
`
`1997 - 1999
`Manager, Security Systems
`• Lead design, development, and production of Divx’s second generation conditional
`access infrastructure.
`• Active in industry working groups on conditional access for high-definition television,
`copy protection for broadcast and cable TV, and secure digital music.
`My focus at Divx was to develop an economically sound architecture for securing digital
`entertainment content. We designed a system that made it unprofitable for a pirate to
`leverage Divx’s distribution channels, media, and customer devices to compete with
`Divx’s value proposition to movie consumers and studios.
`
`Washington, D.C.
`
`Naval Research Laboratory
`
`1993 - 1997
`Computer Scientist
`• Developed enabling technologies for e-commerce analogs of standard business models
`and new types of transactions, with increased security and privacy.
`• Designed “Onion Routing” (now called Tor), a system for anonymous communication
`over the Internet. The anonymous connections protect identity and location, in
`addition to transmitted data.
`• Developed security architectures that minimize trusted components.
`• Research in security and privacy.
`
`1991 - 1993
`Computer Scientist
`• Responsible for introducing formal methods to Agency developments.
`
`National Security Agency
`
` Fort Meade, Maryland
`
`Computational Logic, Inc.
`1987 - 1991
`Computing Research Scientist
`• Research in formal analysis of concurrent systems.
`
`1986 - 1987
`Research Assistant
`• Research in automated theorem proving.
`
`ICSCA, University of Texas
`
`Austin, Texas
`
`Austin, Texas
`
`1984 - 1985
`
`
`Software Services Corporation
`Ford Motor Company
`
`Detroit, Michigan
`
` 3
`
`
`
`
`
`Programmer
`• Developed and maintained systems for analyzing and reporting vehicle test results.
`
`Awards received
`
`Alan S. Berman Award at the Naval Research Laboratory, 1999.
`
`Education
`
`Outstanding Paper Award at the 11th Annual Computer Security Applications
`Conference, December 1995.
`
`MCD Fellowship at the University of Texas at Austin, 9/85-5/86.
`
`Merit Scholar at Wayne State University, Detroit, Michigan, 9/82-4/85.
`
`1985 - 1992
`Ph.D. Computer Science
`• Dissertation: Mechanically Verifying Concurrent Programs
`
`University of Texas at Austin
`
`Austin, Texas
`
`Wayne State University
`1982 - 1985
`B.S. in Computer Science with a second major in Mathematics
`
`Detroit, Michigan
`
`Board of Advisors
`
`ClassifEye, 2007- 2008
`
`Zenoss, 2006 - 2007
`
`Trust Digital, 2005 - 2006
`
`Cinea, 2001-2003
`
`MyWebOS.com, 2000-2002
`
`Patents
`
`System and Method for Controlling Mobile Device Access to a Network, United States
`#8,750,108, 6/10/2014 (with N. Laudermilch, W. Supernor, R. Boroday)
`
`Mobile Risk Assessment, United States #8,677,497, 3/18/2014 (with P. Ganapathi
`Basavapatna, S. Kumar Gaddala, and S. Schrecker)
`
`System, method, and device for mediating connections between policy source servers,
`corporate repositories, and mobile devices, United States #8,565,726 B2, 10/22/2013,
`(with K. Sapp and D. Walker)
`
`System, method, and device for mediating connections between policy source servers,
`corporate repositories, and mobile devices, United States #8,528,042 B2, 9/3/2013, (with
`K. Sapp and D. Walker).
`
`Local Content Security System, United States, #7,277,544 B1, 10/2/2007, (with R. Eye,
`T. Siner, J. Segal, R. Schumann).
`
` 4
`
`
`
`
`
`Digital Content Distribution System and Method, United States, #7,162,642 B2,
`1/9/2007, (with R. Schumann, R. Whittemore, D. Kravtiz, S. Iu, G. Mercier, M.
`Bergeron, J. Ehrhardt, and R. Vitkus).
`
`Hierarchical Key Management, United States #6,975,728 B1, 12/13/2005, (with R. Eye
`and D. Kravitz).
`
`Manufacturing Trusted Devices, United States #6,957,344, 10/18/2005, (with D.
`Kravitz).
`
`Key Management Encoding and Decoding, United States #6,907,127, 6/14/2005, (with
`D. Kravitz).
`
`Conditional Access via Secure Logging with Simplified Key Management, United States
`Patent #6,738,905 (with D. Kravitz).
`
`Onion Routing Network for Securely Moving Data through Communication Networks,
`United States Patent #6,266,704, 7/24/2001 (with M. Reed and P. Syverson).
`
`System and Method for Electronic Transactions, United States Patent #6,108,644 (with S.
`Stubblebine and P. Syverson).
`
`Publications
`
`
`34 Publications
`
` 5
`
`