Duckering has been a thought leader and respected advisor in enterprise IT for more than 15 years. With experience in engineering, product management, marketing, business strategy and technology evangelism, he has held executive-level positions at business- and consumer-facing companies, both large and small, and has multiple degrees in engineering and technology management. Duckering has spent the last eight years focused on enterprise mobility, with a focus on achieving both productivity and security.
With the advent of mobility and the flood of consumer devices, the attack vectors to compromise your sensitive data and applications have multiplied exponentially. Chief among the new threats: Unsecured third-party applications that deliver malware to these devices and other attacks, putting your organization at...
Chang is a software security expert in the anti-tamper and anti-reverse-engineering field. A founder of Arxan, he created Arxan's industry-leading, binary and object-based Guard technologies, which have been widely deployed in applications running on desktop and mobile devices. At Arxan, Chang leads the efforts in technology innovation, and was also the chief architect behind most of Arxan's products. Chang holds Ph.D. and M.S. degrees in Computer Science from Purdue University, and a B.S. in Mathematics and Computer Science from Slippery Rock University.
Duckering has been a thought leader and respected advisor in enterprise IT for more than 15 years. With experience in engineering, product management, marketing, business strategy and technology evangelism, he has held executive-level positions at business- and consumer-facing companies, both large and small, and has multiple degrees in engineering and technology management. Duckering has spent the last eight years focused on enterprise mobility, with a focus on achieving both productivity and security.
Miller, who is currently a Security Engineer at Twitter, spent five years as a Global Network Exploitation Analyst for the National Security Agency. During this time, he identified weaknesses and vulnerabilities in computer networks and executed numerous successful computer network exploitations against foreign targets. He sought and discovered vulnerabilities against security critical network code, including web servers and web applications. His areas of expertise include identifying vulnerabilities in software, writing exploits, and computer attack methodology.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cybered.io, you agree to our use of cookies.