Remote Exploitation of an Unaltered Passenger Vehicle

You've heard all the civilian buzz about summit speaker Chris Valasek's and Charlie Miller's 2014 Jeep Cherokee Hack. But have you read their 91-page whitepaper outlining their research and explaining their process in granular detail? Polish up on the details of Chris's hack in advance of his session at the event.

Please note: That all fields marked with an asterisk (*) are required.

Please Enter Your First Name
Please Enter Your Last Name
Please Enter Your Job Title
Please Enter Your Company Name
Please Enter Your Email Address
Please Enter Your Telephone
Please Select Your Country