Advertise on ITWeb         Fri, 23 Aug, 18:39:55 PM
SPEAKER - Charlie Miller
Charlie Miller

Prior to joining Twitter, Charlie Miller spent five years as a global network exploitation analyst for the National Security Agency. During this time, he identified weaknesses and vulnerabilities in computer networks and executed numerous successful computer network exploitations against foreign targets. He sought and discovered vulnerabilities against security-critical network code, including Web servers and Web applications. Since then, he has worked as a senior security architect for a financial firm, as well as a consultant for Independent Security Evaluators and Accuvant Labs. He is currently an engineer on the Platform Services team at Twitter.

His areas of expertise include identifying vulnerabilities in software, writing exploits, and computer attack methodology. He is a Red Hat Certified Engineer (RHCE), GIAC Certified Forensics Analyst (GCFA), and is a Certified Information Systems Security Professional (CISSP). He has a BS from Truman State University and a PhD from the University of Notre Dame.

iOS Hacker's Handbook, published by Wiley

Authors: Charlie Miller, Dino Dai Zovi, Dionysus Blazakis, Stefan Esser, Vincenzo Iozzo

iOS is Apple's mobile operating system for the iPhone and iPad. With the introduction of iOS5, many security issues have come to light. This book explains and discusses them all. The award-winning author team, experts in Mac and iOS security, examines the vulnerabilities and the internals of iOS to show how attacks can be mitigated. The book explains how the operating system works, its overall security architecture, and the security risks associated with it, as well as exploits, rootkits, and other payloads developed for it.

DEF CON 18 - Charlie Miller - Kim Jong-il and Me: How to Build a Cyber Army to attack the US
DEF CON 19 - Charlie Miller - Battery Firmware Hacking
Andy Greenberg (2010-04-12). "The Mac Hacker Strikes Again"
Nick Barber, Robert McMillan (2008-03-28). "Apple Mac Hacked in Two Minutes at CanSecWest"
Brian Krebs (2008-10-08). "The Internet's Top 10 Most Controversial Figures of 2008". Popular Mechanics
Alan Dang (2009-03-25). "Behind Pwn2Own: Exclusive Interview With Charlie Miller". Tom's Hardware

 
EVENT SPONSOR
PLATINUM SPONSOR
JUNIPER
GOLD SPONSORS
BlackBerry
SILVER SPONSORS
Cyberoam Maxtec
authorised distributor of
Fortinet
Networks Unlimited Trend Micro
BRONZE SPONSORS
MyDBA Spectrami SYNAQ
DISPLAY SPONSORS
Craison
 
SPONSORS

Palo Alto Networks
ENDORSED BY


 

Home
Security Summit 2014 in the news
Press office
Speakers
Sponsors
Contacts
Advisory board
Video
Infosec insiders
Industry insiders
Security Summit 2014
View picture gallery
View Facebook album

EVENT SPONSOR

Performanta - a global and local leader in Information Security - provides both a personalized approach and pragmatic solutions to a broad spectrum of Information Security controls. Our class-leading technologies and practical implementation approach have continually expedited effective mitigation, presenting us with ample local and international awards and accolades.
With 60 employees and over 400 amalgamated years of experience, we specialise in data privacy, endpoint management, privileged identity and access management, SIEM solutions and data centre security. Practical. Trust. Performanta.
www.performanta.co.za

PLATINUM SPONSOR

JUNIPER

TWITTER

Follow us on twitter and join the discussion at #itwebsec


TECHNICAL COMMITTEE
Sensepost is an independent company that provides services in the Information Security Services area. Combining experience and knowledge, SensePost specialises in Information Security Consulting, Training, Security Assessment Services and IT Vulnerability Management.


MEDIA PARTNERS