Chris ( Weld Pond ) Wysopal [Speaker-Timeline] [Speaker-Links]

Tell us about missing data
Title Conference Tags
Keynote: How hackers changed the security industry and how we need to keep changing it. brucon-2017 - brussels,belgium
INFLUENCING THE MARKET TO IMPROVE SECURITY blackhat-2017 - las vegas,usa
LOCKNOTE: CONCLUSIONS AND KEY TAKEAWAYS FROM BLACK HAT EUROPE 2016 BlackHatEU-2016 - London,uk
Keynote BSidesNYC-2016 - new york,usa
Keynote:The History Of L0phtCrack passwords-2015 - cambridge,uk
The State of Software Security SecTor-2015 - toronto,canada
CISO Survival Guide: How to thrive in the C-Suite and Boardroom SecTor-2015 - toronto,canada
Rapid7 Rapid Fire Panel Session UnitedSecuritySummit-2015 - Boston,USA
the coming revolution:industry groups defining vendor assessment standards RSAus-2015 - San Francisco,USA
Evaluating the Security of Purchased Software: Can We Find Common Ground? RSACon-2014 - San Francisco, USA
Should a National Cyber Safety Board Be Created to Help Report on Breaches? RSACon-2014 - San Francisco, USA
Keynote RVAsec-2013 - Richmond,USA Security
We See The Future And It's Not Pretty SourceBoston-2013 - Boston,USA
Data Mining a Mountain of Vulnerabili4es HITBSecConf Malaysia-2012 - KL, Malaysia Statistics
Data Mining a Mountain of Zero Day Vulnerability Secure360-2012 - Saint Paul, USA Security
Data Mining a Mountain of Zero Day Vulnerabilities Blackhat Europe-2012 - Amsterdam, The Netherlands Security
PANEL: Owning Your Phone at Every Layer BlackhatUSA-2011 - Las Vegas,USA
Intelligence on the Intractable Problem of Insecure Software RSA-2011 - N.A,US
Vulnerability Management - How Tough Can It Be? Vulnerabilities Are Identified, Categorized, And Then (Hopefully) Fixed Through Patches Or Upgrades. Simple Enough, Right? Actually, The Process Is Far SOURCE Boston-2010 - Boston, USA Security Panel
Jedi mind tricks for building application security programs BSidesLondon-2010 - London,UK
Application Security Metrics From The Organization On Down To The Vulnerabilities OWASP Appsec-2009 - Washington DC, USA Security Others
Detecting Certified Pre-Owned Software And Devices Blackhat Europe-2009 - Barcelona, Spain Security
Software Security Weakness Scoring Metricon -2 - Washington, USA Security
Static Detection of Application Backdoors BlackHatDC-2007 - Washington,USA
Security Through Automated Binary Analysis The Fifth HOPE -2004 - USA Security Analysis
Mtv - How Did It Happen? H2K-2000 - USA Security