Joe Grand

Former member of the legendary hacker collective L0pht Heavy Industries. Product designer & Founder, Grand Idea Studio, Inc

Speaker Fee Range: $5,000 - $20,000 USD

Travels From: USA

Joe Grand is available for virtual keynotes and webinars. Please complete the form or contact one of our agents to inquire about the fees for virtual engagements. Please note: the fee range listed above is for in-person engagements.

Cybersecurity Speaker Joe Grand
REQUEST AVAILABILITY

Want to book Joe Grand for your event? Please provide the info below and we’ll get in touch within 24h:

    Joe Grand

    Former member of the legendary hacker collective L0pht Heavy Industries. Product designer & Founder, Grand Idea Studio, Inc

    Speaker Fee Range: $5,000 - $20,000 USD

    Travels From: USA

    Joe Grand is available for virtual keynotes and webinars. Please complete the form or contact one of our agents to inquire about the fees for virtual engagements. Please note: the fee range listed above is for in-person engagements.

    Joe Grand Speaker Biography

    Joe Grand a.k.a Kingpin is a sought-after cybersecurity speaker and hardware hacking speaker. He is the product designer and the founder of Grand Idea Studio, Inc. He specializes in the invention and licensing of consumer devices and modules for electronics hobbyists. Joe is a former member of the legendary hacker collective L0pht Heavy Industries, where he helped raise awareness of computer security vulnerability research and disclosure. He is a sought after speaker for his work on reverse engineering and hacking embedded systems.

    Joe holds a Bachelor of Science degree in Computer Engineering from Boston University in Boston, Massachusetts and a Doctorate of Science in Technology (Honorary) degree from the University of Advancing Technology in Tempe, Arizona.

    Joe Grand Keynote Topics

    Within the electronics lifecycle, there lie weaknesses that can be exploited by those looking to subvert, monitor, manipulate, or intentionally damage your product or service. While embedded security is finally a topic discussed by engineers, it is difficult to properly implement given our need to meet stringent development timeframes, budgetary constraints, and manufacturing requirements.

    This presentation explores common hardware attack vectors, the importance of thinking like an adversary, and recommendations to help make systems more secure, with a caveat about why absolute security will never be guaranteed.

    Many electronic devices contain design flaws that could lead to exploitable vulnerabilities. In order to discover such flaws, hackers and engineers use a variety of tools. This presentation explores the tools commonly used during hardware hacking/reverse engineering, including those that monitor/decode communications, extract firmware, and identify/connect to debug interfaces.

    Security is often overlooked during the design process of electronic devices. “We’ll fix it later,” says the engineer. “It’s not worth the cost until something happens,” says the manager. Poor embedded security practices and a lack of clearly defined security goals increase the risk of a product getting hacked, whether for malicious purposes or bragging rights.

    This presentation provides industry standards, best practices, and recommendations to help make systems more secure, with a caveat about why absolute security is never guaranteed.

    Hardware hacking and attacks against embedded systems are no longer limited to hobbyists who simply want to have fun making products do things they were never intended to do. Nation states, criminal organizations, and others looking to maliciously subvert, monitor, manipulate, or intentionally damage are now involved.

    Throughout the electronics lifecycle, including semiconductor fabrication, hardware and firmware design, and product manufacturing, there lie weaknesses that can be exploited. This presentation chronicles some clever hacks and scary attacks, and highlights why all of us in the electronics industry need to take responsibility and action in an attempt to make our products more secure.

    Joe Grand Speaking Videos

    Joe Grand Talks About When Hacking and Engineering Collide
    Confessions of a Hacker known as Kingpin