Skills
About
David Etue is Chief Strategy Officer of Cyberbit, a leading cybersecurity training and skills assessment platform ensuring cybersecurity team readiness which he joined via the acquisition of RangeForce where he was CEO. He is also a Senior Fellow at the National Security Institute’s Cyber and Technology Center, and a top-rated public speaker. David has over 20 years of experience at early-stage and mature companies, bringing industry perspective is built from experience including security program leadership, management consulting, product management and technical implementation. As CEO of Nisos, they defined and became the leader of the Managed Intelligence market, creating an award-winning company and offerings underpinned by one of the top intelligence analysis capabilities in the private sector anchored with deep expertise in open-source (OSINT) and cyber intelligence. Prior to Nisos, he was Global Head of Managed Security Services at BlueVoyant and previously VP of Managed Services at Rapid7 where he drove the creation, execution and strategic vision of the managed services offerings globally. He was the VP of Business Development for Gemalto's identity and data protection business, which he joined via the SafeNet acquisition. He was previously the cyber security practice lead at PRTM (now PwC), VP of Products & Markets at Fidelis Security Systems, led General Electric's global computer security program, and held various positions in technology strategy, operations and product management. He is a Certified Information Privacy Professional, a Certified CISO, and a graduate of GE's Information Management Leadership Program.
David Etue
Published content

expert panel
The foundational philosophy of zero trust can sound deceptively simple: Verify everyone, trust no one and keep attackers from moving freely. In practice, though, it’s not that neat. Businesses change, employees need access to new tools, cloud environments expand and attackers keep finding fresh ways to test old assumptions. New users, new systems, new attack vectors: The environment that zero trust is meant to protect keeps changing, which means it’s time to move beyond philosophies and frameworks and implement realistic, forward-thinking architectures. The essential question is whether an organization can clearly see what’s happening across its systems, contain damage when something goes wrong, and keep operations running without forcing people to work around security controls to get their jobs done. The answer lies in shifting focus from implementation milestones to measurable outcomes: protecting the most critical assets, supporting the way people actually work, and measuring progress through outcomes rather than activity. The goal of zero trust isn’t to prove that every possible risk has been eliminated. It’s to show that an organization is becoming harder to compromise, faster to respond and easier to operate securely. Members of the Senior Executive Cybersecurity Think Tank have years of experience and deep expertise in enterprise cybersecurity strategies, threat detection, risk management and zero-trust architecture. Below, five of them discuss how to define “good enough” zero trust progress in practical terms and the real-world signals that tell leaders they’re reducing risk, not just adding friction.
Company details
Cyberbit
Company bio
Cyberbit delivers operational cyber readiness through a best-in-class cloud-based cyber range that leverages real-world commercial tools to test and scale the capabilities of security teams. The Cyberbit ActiveExperiences™ platform sharpens decision-making, builds muscle memory, and strengthens team coordination in real environments simulating real attacks. With deep expertise in adversarial tactics, Cyberbit empowers defenders with the confidence and capability to protect what matters, with speed and precision. For more information visit cyberbit.com.