901-754-9404
My List0

We've now made it easier for you to research and save your favorite keynotes speakers. Click on the + sign to add a speaker to your Speaker List and email your favorites to colleagues and friends.

using System.Text.RegularExpressions;
Charlie Miller

Dr. Charlie Miller

    • "One of the most technically proficient hackers on Earth"- Foreign Policy
    • Renowned Automotive and iPhone Hacker
    • Former "White Hat" Hacker, National Security Agency (NSA)
    • Four-Time Pwn2Own Champion
Full Bio
In Person-Fee 🛈

$10,000 - $15,000

Virtual Fee:

Please Inquire

Travels From

Pennsylvania

WATCH: Hackers Prove How Easy It Is To Control Your Car!

WATCH: Hackers Prove How Easy It Is To Control Your Car!

Advanced CAN Injection Techniques for Vehicle Networks

Advanced CAN Injection Techniques for Vehicle Networks

DEF CON 23

DEF CON 23

Dr. Charlie Miller Speaker Biography


Recognized globally for his ability to identify vulnerabilities in consumer products, Dr. Charlie Miller is "one of the most technically proficient hackers on Earth", according to Foreign Policy.com. 
 
Currently the head of autonomous vehicle security at Didi Chuxing, the Chinese ride sharing company, Dr. Miller has made waves within the field of automotive security for his work alongside research partner, Chris Valasek.

Dr. Miller previously helped secure Uber’s self-driving car fleet.  Before that he served on Twitter’s computer security team after five years as a computer hacker for the National Security Agency. The 4-time winner of the “Super Bowl” of computer hacking, the annual Pwn2Own competition, Dr. Miller has publicly demonstrated many security exploits, specifically of Apple products and is the first person to remotely hack the iPhone, as well as the Android smartphone (on the day it was released).
 
He is the co-author of three books, including iOS Hacker’' Handbook, and has been featured in a range of media outlets, including NBC, ABC, CNN, NPR, CNBC, The New York Times, USA Today and Forbes.

The Hacker News Show

There is a constant flood of infosec related news stories showering us on a daily basis. These include things like new vulnerability announcements, new breaches, new hacking techniques. It is easy to panic and fall into a trap of inaction due to information overload on this topic. In come a couple of the world’s best computer hackers to distill this fire hose into the most important topics and what you need to know. They will dispel the magic of the latest vulnerability and tell you what you need to know, since they have a history of being the subject of these types of stories. They will explain the latest breaches and how it actually happened, so that you can learn from it and make sure it doesn’t happen to you. Don’t rely on the pundits, instead hear from experts who aren’t trying to get you to click on their articles so that you can make sense of the current and ever changing information security landscape.

Internet of Things vs. The Security of Things 

The headlines talk about your light bulbs and toothbrushes getting hacked. What the heck is going on, this is not the future we were promised. Luckily, you can hear from a couple of experts who have hacked everything from computers, to phones, to laptop batteries, and even a car once. Incorporating stories from their research, they’ll talk about what makes IoT devices so different from normal computers and why they are uniquely vulnerable. However, it is not all doom and gloom. They will also describe why we shouldn’t necessarily be too scared about IoT security and why we can safely keep iterating and advancing technology moving forward without fear of a cyber apocalypse.

Hacking For Good

Since the days of movies like War Games and Hackers, computer hackers have been in the social conscience but today hackers are even more feared and perhaps misunderstood. Meet a couple of the worlds most feared computer hackers. However, they aren’t feared by people who think they might steal their banking information. No, these are good guy hackers who point out flaws in the software and hardware we all use every day. They are feared by leading companies like Apple, Google, and even companies like Fiat Chrysler. They’ll explain why all the computers and devices we use are inherently vulnerable to attack and what we can do to protect ourselves. Utilizing a casual style and relying on stories of when they hacked cars, computers, or the time they could hack your phone just by getting near it, you’ll learn why these guys spend time looking for vulnerabilities and writing exploits and how it ultimately helps to protect us all.

Related Speakers

Vivek Wadhwa

Vivek Wadhwa

Academic

Blake Mycoskie, Consumer Behavior Speaker

Blake Mycoskie

Founder and Chief Shoe Giver of TOMS Shoes

Jay Acunzo

Jay Acunzo

Author of Break the Wheel

Mark Thompson, Customer Experience Speaker

Mark Thompson

World-Renowned Authority

Gregory Stock, speaker

Gregory Stock

Co-Director

Mark L Thompson, speaker

Mark L Thompson

Results-driven B2B strategist for Fortune 500 & mid-market CEOs

Tom Morris, Business Strategy Speaker

Tom Morris

Public Philosopher and Advisor

Jim Sterne, Technology Speaker

Jim Sterne

Technology Consultant Speaker

Matt Havens,Speaker

Matt Havens

Entertaining Generations Speaker

Joe Trippi, Technology Speaker

Joe Trippi

Political Strategist & Media Consultant

Kare Anderson, Speaker

Kare Anderson

Emmy-winner

Erik Wahl Speaker

Erik Wahl

Internationally-recognized Graffiti Artist

Reviews

Testimonials

A wonderful bureau to work with! Big ups to everyone who helped make our event a success. Fingers crossed we get the chance to collaborate fo..

MDRT | Testimonial

"As always, you are the best most responsive speaker bureau I've ever worked with!"

Image Media

Angela Schelp was a great partner in finding the right kick-off speaker for our conference. This was my first conference identifying the keyn..

CubeSmart

I just wanted to thank Matt Meyer and Sheryl Moon for their meticulous assistance with identifying, securing and preparing our chosen guest s..

Testimonials | TraceLink | Executive Speakers

This was my first experience using ESB to locate and secure a keynote speaker for my Corporate event. They were extremely easy to work with a..

AngMar Medical Holdings

"Matt Meyer was really wonderful in assisting me to find the correct keynote speaker for our conference. Jenny Foreman was completely on top ..

The Anchor Group

"As always, Executive Speakers Bureau helped us execute another flawless event. It is always so reassuring to know that you have a team behin..

Texas Hospital Association

"What stands out about the times I have worked with Executive Speakers Bureau is their lightning-fast response time. ESB’s account exec..

Keynote Speaker

"I've worked with Richard and ESB for many years and he's always able to deliver for us. He works hard to meet your speaker goals within the ..

Chem Dry

"Angela is the best!!! I can always count on her honest feedback about speakers. She helps me look like a hero to my company!"

Testimonials | Medtronic | Executive Speakers
Need Suggestions? Have Questions?

Need Suggestions? Have Questions?

Call to discuss how we can you help find the right speaker(s) for your organization.

© 2024 Executive Speakers Bureau. All Rights Reserved.

Design and Developed by eBiz Solutions

Get Ideas in 1 hour or less

Executive Speakers Bureau consistently receives praises about our speed and efficiency. From the beginning of your event planning, our extensive online speaker database and resourceful staff allow us to quickly equip you with the best speaker for your event.

Need a last minute speaker? No worries. Our speed and efficiency help us give you ideas for speakers in one hour or less.