Georgia Weidman [Speaker-Timeline] [Speaker-Links]

Tell us about missing data
Title Conference Tags
Nine years into mobility, has security caught up saintcon-2016 - utah,usa
Bypassing Security Controls With Mobile Devices DeepSec-2013 - Vienna,Austria
Burning the Enterprise with BYOD DerbyCon-2013 - Louisville,Kentucky
Burning the Enterprise with BYOD GrrCon-2013 - Michigan,USA
Can You Hear Me Now: Leveraging Mobile Devices on Pentests Confidence-2013 - Krakow,Poland Security
Can You Hear Me Now? Leveraging Mobile Devices on Pentests HackMiami-2013 - Miami,USA Security
Can you hear me now? Leveraging Mobile Devices on Penetration Tests Hackcon-2013 - Oslo, Norway Security
ASSESSING BYOD WITH THE SMARTPHONE PENTEST FRAMEWORK BlackHat EU-2013 - Amsterdam, Netherlands Security
Smartphone Insecurity BSidesPHX-2013 - Arizona,USA Security
INTRODUCING THE SMARTPHONE PENTEST FRAMEWORK Blackhat Abu Dhabi-2012 - Abu Dhabi, UAE Android Mobile Security Tools
Introducing the Smartphone Pentesting Framework Deepsec-2012 - Vienna, Austria Security
Penetration Testing with Metasploit Deepsec-2012 - Vienna, Austria Security
Keynote Speaker:Smartphone Pentest Framework BSidesJackson-2012 - Jackson,USA Security
Metasploit for Beginners Workshop BSidesJackson-2012 - Jackson,USA Security
Introducing the Smartphone Penetration Testing Framework BruCON-2012 - Ghent, Belgium Security
Transparent Botnet Command and Control for Smartphones over SMS Security B-Sides Las Vegas-2011 - Las Vegas, USA Security
Introducing the Smartphone Penetration Testing Framework [Breaking Ground Overflow] BSidesLasVegas-2012 - Las Vegas,USA
Metasploit BSidesLasVegas-2012 - Las Vegas,USA
SMARTPHONE PENTESTING FRAMEWORK BlackHat USA-2012 - Las Vegas, USA Security
The Smartphone Penetration Testing Framework HOPE-9 - New York Security
Bypassing the Android Permission Model Hack In Paris-2012 - Paris, France Security
Transparent Command and Control for Smartphones over SMS Redux Security B-Sides CT-2012 - Meriden, CT, USA Security
bypassing the android permission model HITB-2012 - Amsterdam,Netherkands
Bypassing the Android Permission Model (E) Rocky Mountain Information Security Conference-2012 - Denver, USA Security
Bypassing Android Permissions CarolinaCon-8 - Raleigh, USA Security
Bypassing the Android Permission Model Thotcon-2012 - Chicago, USA Security
Metasploit for penetration testing Security B-Sides San Francisco-2012 - San Francisco, USA Security
Smartphone Insecurity Security B-Sides Phoenix-2012 - Phoenix, USA Security
Class Name: Metasploit for Penetration Testing Security B-Sides Delaware-2011 - Delaware, USA Security
Transparent Smartphone Spying No Apps Required Security B-Sides Delaware-2011 - Delaware, USA Security
transparent smartphone spying HackerHalted-2011 - Atlanta,USA
Transparent Botnet Control For Smartphones Over Sms ShmooCon-2011 - Washington DC, USA Security