<p>Dr. Charlie Miller and Chris Valasek offer unique insights on the evolving and dangerous cybersecurity landscape, their dedication to identifying vulnerabilities in various technologies, and what it all means for your organization.</p>

<p>Recognized as two of the most technically proficient hackers on earth by ForeignPolicy.com, Charlie and Chris are best known for the remote compromise of a 2014 Jeep Cherokee, whereby they obtained physical control of the vehicle from more than 10 miles away, exposing serious security flaws. Their headline-making research led to Fiat Chrysler’s recall of 1.4 million vehicles.</p>

<p>The pair currently serve as Cruise Automation&#39;s Principal Autonomous Vehicle Security Architects. Charlie is the former National Security Agency hacker, and former head of autonomous vehicle security division at Didi Chuxing, a China-based ride sharing company. Chris is the former security lead at Uber’s Advanced Technologies Center and is also the chairman of SummerCon, America’s oldest hacker conference.</p>

<p>In presentations as unique and fascinating as the cyber superheroes themselves, Charlie and Chris captivate with insights that will alter your perspective of cybersecurity. From their roles as hackers for good and the perpetual battle against online adversaries, to emerging threats facing specific industries and companies, this hacker duo sounds the alarm on this 21st century issue, while injecting humor in a twist all their own. Participants walk away enlightened, with strategies and solutions for identifying risks and preventing hacks and breaches.</p>

Category
Last Name
Dr. Charlie Miller and Chris Valasek
Siebel ID
1-1AUCUR
Moniker

Principal Autonomous Vehicle Security Architects, Cruise Automation & Renowned “White Hat” Hackers

Speech Topics

<ul><li><strong>The Hacker News Show</strong></li><li>There is a constant flood of infosec related news stories showering us on a daily basis. These include things like new vulnerability announcements, new breaches, new hacking techniques. It is easy to panic and fall into a trap of inaction due to information overload on this topic. In come a couple of the world’s best computer hackers to distill this fire hose into the most important topics and what you need to know. They will dispel the magic of the latest vulnerability and tell you what you need to know, since they have a history of being the subject of these types of stories. They will explain the latest breaches and how it actually happened, so that you can learn from it and make sure it doesn’t happen to you. Don’t rely on the pundits, instead hear from experts who aren’t trying to get you to click on their articles so that you can make sense of the current and ever changing information security landscape.</li><li><strong>Internet of Things vs. The Security of Things </strong></li><li>The headlines talk about your light bulbs and toothbrushes getting hacked. What the heck is going on, this is not the future we were promised. Luckily, you can hear from a couple of experts who have hacked everything from computers, to phones, to laptop batteries, and even a car once. Incorporating stories from their research, they’ll talk about what makes IoT devices so different from normal computers and why they are uniquely vulnerable. However, it is not all doom and gloom. They will also describe why we shouldn’t necessarily be too scared about IoT security and why we can safely keep iterating and advancing technology moving forward without fear of a cyber apocalypse.</li><li><strong>Hacking For Good</strong></li><li>Since the days of movies like War Games and Hackers, computer hackers have been in the social conscience but today hackers are even more feared and perhaps misunderstood. Meet a couple of the worlds most feared computer hackers. However, they aren’t feared by people who think they might steal their banking information. No, these are good guy hackers who point out flaws in the software and hardware we all use every day. They are feared by leading companies like Apple, Google, and even companies like Fiat Chrysler. They’ll explain why all the computers and devices we use are inherently vulnerable to attack and what we can do to protect ourselves. Utilizing a casual style and relying on stories of when they hacked cars, computers, or the time they could hack your phone just by getting near it, you’ll learn why these guys spend time looking for vulnerabilities and writing exploits and how it ultimately helps to protect us all.</li></ul>

Hide Fee
Off
Exclusive
Off
Environment
Headline (Deprecated)
These “white hat” hackers made headlines after exposing security flaws in vehicles—now they take you inside the cybercriminal underworld to dissect emerging threats and offer solutions for protecting your assets.
Image Alt Tag
Dr. Charlie Miller &amp; Chris Valasek, Business Speakers, Keppler Speakers Bureau
Marketing Toolkit
Dr. Charlie Miller and Chris Valasek-Article (WIRED 8.2016).doc
Dr. Charlie Miller and Chris Valasek-Topics.doc
Dr. Charlie Miller and Chris Valasek-Bio.doc
Dr. Charlie Miller and Chris Valasek-Intro.doc
Headshot
dr. charlie miller and chris valasek-.jpg
Ignore Keppler Lit?
Yes