<p>Dr. Charlie Miller reveals just how vulnerable your computer systems are, while making a passionate plea for consumers and companies to treat cybersecurity as a top priority.</p><p>A former National Security Agency hacker, 4-time winner of Pwn2Own, the “Super Bowl” of computer hacking, and the first to hack both iPhone and Android phones, Dr. Miller gained national attention after he and research partner Chris Valasek hacked a 2014 Jeep Cherokee and took control of the vehicle from more than 10 miles away.</p><p>A Principal Autonomous Vehicle Security Architect at Cruise Automation and the former head of the autonomous vehicle security division at Didi Chuxing, Dr. Miller focuses on society’s increasing connectivity and the opportunities it creates for harmful intrusions. </p><p>On stage, he takes audiences on detailed, behind-the-scenes journeys to illustrate how hackers exploit vulnerabilities and why corporations and governments should address cybersecurity before assets—or lives—are put at risk. By providing practical suggestions to improve security and deter dangerous online adversaries, Dr. Miller’s candid and enlightening presentations help audiences recognize the gravity of this 21st century issue and walk away with solutions for prevention. </p>

Category
First Name
Charlie
Last Name
Miller
Twitter
0xcharlie
Siebel ID
1-15PV3L
Moniker

Principal Autonomous Vehicle Security Architect, Cruise Automation & Renowned 'White Hat' Hacker

Speech Topics

<ul><li><strong>Internet of Things vs. The Security of Things </strong></li><li>The headlines talk about your light bulbs and toothbrushes getting hacked. What the heck is going on, this is not the future we were promised. Luckily, you can hear from a couple of experts who have hacked everything from computers, to phones, to laptop batteries, and even a car once. Incorporating stories from their research, they’ll talk about what makes IoT devices so different from normal computers and why they are uniquely vulnerable. However, it is not all doom and gloom. They will also describe why we shouldn’t necessarily be too scared about IoT security and why we can safely keep iterating and advancing technology moving forward without fear of a cyber apocalypse.</li><li><strong>Hacking For Good</strong></li><li>Since the days of movies like War Games and Hackers, computer hackers have been in the social conscience but today hackers are even more feared and perhaps misunderstood. Meet a couple of the worlds most feared computer hackers. However, they aren’t feared by people who think they might steal their banking information. No, these are good guy hackers who point out flaws in the software and hardware we all use every day. They are feared by leading companies like Apple, Google, and even companies like Fiat Chrysler. They’ll explain why all the computers and devices we use are inherently vulnerable to attack and what we can do to protect ourselves. Utilizing a casual style and relying on stories of when they hacked cars, computers, or the time they could hack your phone just by getting near it, you’ll learn why these guys spend time looking for vulnerabilities and writing exploits and how it ultimately helps to protect us all.</li></ul>

Hide Fee
Off
Exclusive
Off
Environment
Headline (Deprecated)
The former NSA “white hat” hacker who made headlines after exposing dangerous cybersecurity flaws in vehicles reveals emerging threats facing consumers and businesses and how to better protect all kinds of assets.
Image Alt Tag
Charlie Miller, Business Speaker, Keppler Speakers Bureau
Marketing Toolkit
Miller C-Article (New York Times 5.15).pdf
Miller C-Article (Wired 6.17).pdf
Miller C-Bio.doc
Miller C-Intro.doc
Miller C-Photo (ASAE-2016).JPG
Miller C-Photo (HEADSHOT).jpg
Miller C-Photo (High Res Speaking).jpg
Miller C-Topics.doc
Ignore Keppler Lit?
No