Dr. Charlie Miller and Chris Valasek offer unique insights on the evolving and dangerous cybersecurity landscape, their dedication to identifying vulnerabilities in various technologies, and what it all means for your organization.
Recognized as two of the most technically proficient hackers on earth by ForeignPolicy.com, Charlie and Chris are best known for the remote compromise of a 2014 Jeep Cherokee, whereby they obtained physical control of the vehicle from more than 10 miles away, exposing serious security flaws. Their headline-making research led to Fiat Chrysler’s recall of 1.4 million vehicles.
The pair currently serve as Cruise Automation’s Principal Autonomous Vehicle Security Architects. Charlie is the former National Security Agency hacker, and former head of autonomous vehicle security division at Didi Chuxing, a China-based ride sharing company. Chris is the former security lead at Uber’s Advanced Technologies Center and is also the chairman of SummerCon, America’s oldest hacker conference.
In presentations as unique and fascinating as the cyber superheroes themselves, Charlie and Chris captivate with insights that will alter your perspective of cybersecurity. From their roles as hackers for good and the perpetual battle against online adversaries, to emerging threats facing specific industries and companies, this hacker duo sounds the alarm on this 21st century issue, while injecting humor in a twist all their own. Participants walk away enlightened, with strategies and solutions for identifying risks and preventing hacks and breaches.
Joseph Muniz is an architect at Cisco Systems and security researcher. He has extensive experience in designing security solutions and architectures for the top Fortune 500 corporations and US Government. Joseph’s current role gives him visibility into the latest trends in cyber security both from leading vendors and customers.
Joseph runs The Security Blogger website, a popular resource for security and product implementation. He is the author and contributor of several publications including a recent Cisco Press book focused on security operations centers (SOC). Follow Joseph at www.thesecurityblogger.com and @SecureBlogger
His presentation will break down security attack treads, how the capabilities of most products work and how you can assess yourself to truly take on the future cyber threat, whatever it may be. You likely have security tools and have heard of various types of cyberattacks. You are also likely being bombarded with how important you need features like artificial intelligence, threat feeds, some shiny new tool, etc. or the evil hackers living in cyberspace will hack into your soul. The reality is these and concepts like “best of breed” or “blocked the most attacks according to XYZ” is all fabricated with the purpose to sell something.
The speaker is the author of multiple publications including a recent Cisco press book titled Digital Forensics for Network Engineers.