Skip to content

Jeff Williams, Co-Founder, Chief Technology Officer

Jeff brings more than 20 years of security leadership experience as co-founder and Chief Technology Officer of Contrast Security. He recently authored the DZone DevSecOps, IAST, and RASP refcards and speaks frequently at conferences including JavaOne (Java Rockstar), BlackHat, QCon, RSA, OWASP, Velocity, and PivotalOne. Jeff is also a founder and major contributor to OWASP, where he served as Global Chairman for 9 years, and created the OWASP Top 10, OWASP Enterprise Security API, OWASP Application Security Verification Standard, XSS Prevention Cheat Sheet, and many more popular open source projects. Jeff has a BA from Virginia, an MA from George Mason, and a JD from Georgetown.

Subscribe Now
    Topics
    Point of View: Senate Stalls Cybersecurity Bill

    Point of View: Senate Stalls Cybersecurity Bill

    The rush to "do something" about cyber security issues is leading both legislators in industry to ridiculous place...

    Point of View: Chrysler recalls 1.4 million hackable cars

    Point of View: Chrysler recalls 1.4 million hackable cars

    “The interesting thing about this recall is not that it’s going to be expensive and inconvenient (it will), but that it..

    The Fast, Free, Fantastic Way to Find Cross-Site Scripting (XSS)

    The Fast, Free, Fantastic Way to Find Cross-Site Scripting (XSS)

    What Is XSS? Cross-site scripting (XSS) is really pretty simple. Any time untrusted data ends up an HTML page without..

    The 10 Most Important Security Controls Missing in JavaEE

    The 10 Most Important Security Controls Missing in JavaEE

    JavaEE has some excellent built-in security mechanisms, but they don’t come close to covering all the threats that your..

    Staying Compliant with PCI DSS Can Be Easier Than You Think

    Staying Compliant with PCI DSS Can Be Easier Than You Think

    What Does PCI DSS Compliance Mean? In 2004, Visa, MasterCard, Discover, American Express, and JCB combined their..

    Point of View: Tesla opens up bug bounty program

    Point of View: Tesla opens up bug bounty program

    “Bug bounty programs have been surprisingly effective and I don’t see this being any different for Tesla. I think..

    Point of View: Army's Public Website Hacked by Unknown Intruders

    Point of View: Army's Public Website Hacked by Unknown Intruders

    All breaches are not created equal. The Army breach is actually considerably more disturbing than the IRS breach.

    Point of View: Federal Personnel Data Breach

    Point of View: Federal Personnel Data Breach

    Government agencies are in serious danger from cyber threats. While many have a continuous network security program in..

    IRS Hackers stole $39M and effected 2.7 million taxpayers

    It’s easy to jump all over the IRS for a seemingly obvious security problem. Congress and reporters are calling for a..