Dr. Charlie Miller and Chris Valasek Headshot
Dr. Charlie Miller and Chris Valasek
Dr. Charlie Miller and Chris ValasekHeadshot

Dr. Charlie Miller and Chris Valasek

Principal Autonomous Vehicle Security Architects, Cruise Automation & Renowned “White Hat” Hackers
Fee Range $20,001 - $30,000 *
* This specific fee falls within this range. Ranges are presented as a guideline only. Speaker fees are subject to change without notice. For an exact quote, please contact your Keppler Speakers representative.
Add to Favorites


Dr. Charlie Miller and Chris Valasek offer unique insights on the evolving and dangerous cybersecurity landscape, their dedication to identifying vulnerabilities in various technologies, and what it all means for your organization.

Recognized as two of the most technically proficient hackers on earth by ForeignPolicy.com, Charlie and Chris are best known for the remote compromise of a 2014 Jeep Cherokee, whereby they obtained physical control of the vehicle from more than 10 miles away, exposing serious security flaws. Their headline-making research led to Fiat Chrysler’s recall of 1.4 million vehicles.

The pair currently serve as Cruise Automation's Principal Autonomous Vehicle Security Architects. Charlie is the former National Security Agency hacker, and former head of autonomous vehicle security division at Didi Chuxing, a China-based ride sharing company. Chris is the former security lead at Uber’s Advanced Technologies Center and is also the chairman of SummerCon, America’s oldest hacker conference.

In presentations as unique and fascinating as the cyber superheroes themselves, Charlie and Chris captivate with insights that will alter your perspective of cybersecurity. From their roles as hackers for good and the perpetual battle against online adversaries, to emerging threats facing specific industries and companies, this hacker duo sounds the alarm on this 21st century issue, while injecting humor in a twist all their own. Participants walk away enlightened, with strategies and solutions for identifying risks and preventing hacks and breaches.

Related Speakers


Tell us a little about your event and our team of experienced sales agents will get back to you with a customized list of speaker recommendations available for in-person and virtual speaking engagements. 

NOTE: We cannot process requests for media interviews, podcasts or other non-speech related inquiries of a personal nature.

All fields are required.*