Joe Grand

Former member of the legendary hacker collective L0pht Heavy Industries. Product designer & Founder, Grand Idea Studio, Inc

$5,000 - $20,000 USD
USA
Joe Grand

REQUEST AVAILABILITY

Want to book Joe Grand for your event? Please provide the info below and we’ll get in touch within 24h:

Joe Grand Speaker Biography

Joe Grand Keynote Topics

Through the Eyes of a Hardware Hacker
Within the electronics lifecycle, there lie weaknesses that can be exploited by those looking to subvert, monitor, manipulate, or intentionally damage your product or service. While embedded security is finally a topic discussed by engineers, it is difficult to properly implement given our need to meet stringent development timeframes, budgetary constraints, and manufacturing requirements.

This presentation explores common hardware attack vectors, the importance of thinking like an adversary, and recommendations to help make systems more secure, with a caveat about why absolute security will never be guaranteed.
Tools of the Hardware Hacking Trade
Many electronic devices contain design flaws that could lead to exploitable vulnerabilities. In order to discover such flaws, hackers and engineers use a variety of tools. This presentation explores the tools commonly used during hardware hacking/reverse engineering, including those that monitor/decode communications, extract firmware, and identify/connect to debug interfaces.
Every Cloud has a Silver Lining
Security is often overlooked during the design process of electronic devices. “We’ll fix it later,” says the engineer. “It’s not worth the cost until something happens,” says the manager. Poor embedded security practices and a lack of clearly defined security goals increase the risk of a product getting hacked, whether for malicious purposes or bragging rights.

This presentation provides industry standards, best practices, and recommendations to help make systems more secure, with a caveat about why absolute security is never guaranteed.
The Pitfalls and Perls of Poor Security
Hardware hacking and attacks against embedded systems are no longer limited to hobbyists who simply want to have fun making products do things they were never intended to do. Nation states, criminal organizations, and others looking to maliciously subvert, monitor, manipulate, or intentionally damage are now involved.

Throughout the electronics lifecycle, including semiconductor fabrication, hardware and firmware design, and product manufacturing, there lie weaknesses that can be exploited. This presentation chronicles some clever hacks and scary attacks, and highlights why all of us in the electronics industry need to take responsibility and action in an attempt to make our products more secure.

Joe Grand Speaking Videos

Joe Grand Talks About When Hacking and Engineering Collide
Confessions of a Hacker known as Kingpin
Joe Grand

REQUEST AVAILABILITY

Want to book Joe Grand for your event? Please provide the info below and we’ll get in touch within 24h:

Joe Grand

Former member of the legendary hacker collective L0pht Heavy Industries. Product designer & Founder, Grand Idea Studio, Inc

$5,000 - $20,000 USD
USA

Joe Grand Keynote Topics

Through the Eyes of a Hardware Hacker
Within the electronics lifecycle, there lie weaknesses that can be exploited by those looking to subvert, monitor, manipulate, or intentionally damage your product or service. While embedded security is finally a topic discussed by engineers, it is difficult to properly implement given our need to meet stringent development timeframes, budgetary constraints, and manufacturing requirements.

This presentation explores common hardware attack vectors, the importance of thinking like an adversary, and recommendations to help make systems more secure, with a caveat about why absolute security will never be guaranteed.
Tools of the Hardware Hacking Trade
Many electronic devices contain design flaws that could lead to exploitable vulnerabilities. In order to discover such flaws, hackers and engineers use a variety of tools. This presentation explores the tools commonly used during hardware hacking/reverse engineering, including those that monitor/decode communications, extract firmware, and identify/connect to debug interfaces.
Every Cloud has a Silver Lining
Security is often overlooked during the design process of electronic devices. “We’ll fix it later,” says the engineer. “It’s not worth the cost until something happens,” says the manager. Poor embedded security practices and a lack of clearly defined security goals increase the risk of a product getting hacked, whether for malicious purposes or bragging rights.

This presentation provides industry standards, best practices, and recommendations to help make systems more secure, with a caveat about why absolute security is never guaranteed.
The Pitfalls and Perls of Poor Security
Hardware hacking and attacks against embedded systems are no longer limited to hobbyists who simply want to have fun making products do things they were never intended to do. Nation states, criminal organizations, and others looking to maliciously subvert, monitor, manipulate, or intentionally damage are now involved.

Throughout the electronics lifecycle, including semiconductor fabrication, hardware and firmware design, and product manufacturing, there lie weaknesses that can be exploited. This presentation chronicles some clever hacks and scary attacks, and highlights why all of us in the electronics industry need to take responsibility and action in an attempt to make our products more secure.

Joe Grand Speaking Videos

Joe Grand Talks About When Hacking and Engineering Collide
Confessions of a Hacker known as Kingpin

To inquire about Joe Grand's availability and fees to speak at your event, please fill out the form and we will contact you as soon as possible:

Para consultar la tarifa de Joe Grand y su disponibilidad para participar en su próximo evento, por favor rellene el formulario y le contactaremos lo antes posible: