Kevin Johnson [Speaker-Timeline] [Speaker-Links]

Tell us about missing data
Title Conference Tags
Mutiny on the Bounty: Handling security in a bug bounty world BSidesJacksonville-2016 - jacksonville,usa
Next Gen Web Pen Testing: Handling Modern Applications in a Penetration Test AppSecUSA-2016 - washington,usa
Back to the Future: Understanding our future but following the past GrrCon-2016 - grand rapids,usa
Next Gen Web Pen Testing: Handling modern applications in a penetration test DerbyCon-2016 - derby,usa
Once More Into the Breach: Examing the Causes Behind Modern Breaches BSidesjacksonville-2015 - jacksonville,usa
Keynote BsideCharleston-2015 - charleston,USA
Panel DerbyCon-2015 - louisville,USA
Be Quick or Be Vulnerable BSidesOklohoma-2015 - Oklohoma,USA
Bug Bounties and,Security Research BSidesTAMPA-2015 - tampa,usa
Application Security: Making It Work AtlantaInfoSecForum-2014 - Atlanta,USA
Getting a Handle on ‘Shadow IT’ AtlantaInfoSecForum-2014 - Atlanta,USA
ImPROve visibility track AtlantaInfoSecForum-2014 - Atlanta,USA
Keynote Address Security Researcher, Security Besmircher: Security for Organizations in aworld of bug bounties and random security researchers ISSAinternationalcon-2014 - orlando,usa
Securing our Ethics: Ethics and Privacy in a Target-Rich Environment GrrCon-2014 - grand rapids,usa
Application Security: Making It Work BostonInfoSecForum-2014 - boston,usa
Getting a Handle on ‘Shadow IT’ BostonInfoSecForum-2014 - boston,usa
BYOD: Controlling the Risks BostonInfoSecForum-2014 - boston,usa
Ethical Control: Ethics and Privacy in a Target-Rich Environment DerbyCon-2014 - kentucky,usa
Advanced Web Penetration Testing (day 1 of 2) AppSecUSA-2014 - denver,usa
Advanced Web Penetration Testing (day 2 of 2) AppSecUSA-2014 - denver,usa
Streaking the Internet: Looking at privacy within modern systems SecureAustin-2014 - Austin,USA
Keynote - Securing our Ethics: Ethics and Privacy in a Target-Rich Environment BsidesOrlando-2014 - Orlando,USA
TMI: Testing and Exploiting SharePoint DerbyCon-2013 - Louisville,Kentucky
I am a doctor Jim, not a Doctor: A Guide to Becoming a Security Consultant and What that Means GrrCon-2013 - Michigan,USA
Samurai Developers BsideSOrlando-2013 - Orlanado, USA
Security Awareness: Deal or No Deal? New England Information Security Forum-2012 - Boston,USA
The Next Generation Security Operations Team New England Information Security Forum-2012 - Boston,USA
Exploring Managed Security Services and Security-as-a-Service New England Information Security Forum-2012 - Boston,USA
Tactical SecOps: A Guide to Precision Security Operation GrrCON-2012 - Michigan, USA Security
Smart Bombs: Mobile Vulnerability and Exploitation OWASP AppSecDC-2012 - Washington DC, USA
Whack-a-Mobile II: Mobile App Pen Testing with the MobiSec Live Environment OWASP AppSecDC-2012 - Washington DC, USA
Whack-a-Mobile: Getting a Handle on Mobile Testing with MobiSec Live Environment ShmooCon-2012 - Washington DC, USA
Don't Drop the SOAP: Real World Web Service Testing for Web Hackers Defcon19-2011 - Las Vegas,USA
Don't Drop the SOAP: Real World Web Service Testing for Web Hackers BlackhatUSA-2011 - Las Vegas,USA
Social Zombies Gone Wild: Totally Exposed And Uncensored Notacon-8 - Cleveland, USA Security
The Friendly Traitor: Our Software Wants To Kill Us ShmooCon-2011 - Washington DC, USA
Pen-Test Panel OWASP Appsec-2010 - Washington DC, USA Panel
Friendly Traitor 2 Features Are Hot But Giving Up Our Secrets Is Not! OWASP Appsec-2010 - Washington DC, USA Security Exploitation
Social Zombies Gone Wild: Totally Exposed And Uncensored OWASP Appsec-2010 - Washington DC, USA Security Social Media
Social Zombies: Your Friends Want To Eat Your Brains OWASP Appsec-2009 - Washington DC, USA Security Botnets
Injectable Exploits: Two New Tools For Pwning Web Apps And Browsers OWASP Appsec-2009 - Washington DC, USA Web Exploitation Network Penetration