Jeff Williams, Co-Founder, Chief Technology Officer
Jeff brings more than 20 years of security leadership experience as co-founder and Chief Technology Officer of Contrast Security. He recently authored the DZone DevSecOps, IAST, and RASP refcards and speaks frequently at conferences including JavaOne (Java Rockstar), BlackHat, QCon, RSA, OWASP, Velocity, and PivotalOne. Jeff is also a founder and major contributor to OWASP, where he served as Global Chairman for 9 years, and created the OWASP Top 10, OWASP Enterprise Security API, OWASP Application Security Verification Standard, XSS Prevention Cheat Sheet, and many more popular open source projects. Jeff has a BA from Virginia, an MA from George Mason, and a JD from Georgetown.
Subscribe Now- Thought Leaders
- Application Security
- Contrast News
- DevOps
- AppSec
- vulnerabilities
- Hacked
- Threat
- Runtime Security
- DevSecOps
- API security
- Product
- RASP
- cyberattacks
- Contrast Assess
- Contrast Protect
- CodeSec
- Security
- AI
- APIs
- MFA
- Metrics
- CVE
- OSS
- cybersecurity
- 2FA
- ADR
- CISA
- IAST
- SCA
- passwords
- application attacks
- cybersecurity awareness month
- ransomware
- runtime protection
- AWS
- Contrast Scan
- JavaScript
- Log4j
- SAST
- backlog
- incident response
- regulation
- CISO
- GitHub
- MTTR
- OpenSource
- Security Observability
- WAF
- attack
- breach
- cyberespionage
- data breach
- observability
- scan
- software development
- threat detection
- threat modeling
- transparency
- .Net
- AST
- Awards
- ChatGPT
- Community Edition
- Contrast SCA
- DBIR
- DHS
- Gen AI
- KVE
- Log4Shell
- OpenAI
- RSA
- React
- SQL injection
- XSS
- application layer
- artificial intelligence
- awareness
- chat apps
- critical infrastructure
- cybercrime
- data privacy week
- jQuery
- malware
- okta
- path traversal
- python
- remediation
- security culture
- supply chain
- vulnerability disclosure
- workplace
- zero-day
- .Net
- AI Act
- Angular
- Article 25
- Below the Waterline
- CISO Insights
- CISOs
- CSRF
- Chris Hughes
- Cloud Native Security
- Console
- Cyber Bank Heists
- DAST
- DORA
- Dependabot
- Developers
- Digital Operational Resilience Act
- Drupal
- EDR
- EL injection
- European Union
- Gartner Peer Insights
- Genie
- Git
- GitHub Action
- GitLab
- Go
- IoT
- Known Exploited Vulnerabilities
- MLflow
- MOVEit
- Microsoft
- Namasday
- Netflix
- Node.js
- OpenSourceSoftware
- PATs
- RCA
- RCE
- Regulation (EU) 2022/2554
- Ruby
- SEC
- SIEM
- SOAR
- SOC
- Secure from within
- Splunk
- TypeScript
- agents
- authentication security
- benefits
- best practices
- brute force attack
- burnout
- certificates
- compliance
- corporate culture
- crime
- data privacy
- deep fakes
- detection
- digital resilience
- directory traversal
- false positive
- financial
- financial institutions
- financial sector
- github application security
- github secure code
- github security scanning
- hackers
- happiness
- hiring
- insecure deserialization
- insider threat
- instrumentation
- java
- labor shortage
- languages
- legislation
- machine learning
- malicious actors
- method tampering
- nation states
- open-source software
- organized crime
- passkeys
- password managers
- penetration testing
- perks
- personal access tokens
- phishing
- policies
- proactive security
- quantum encryption
- regulatory
- retention
- risk ranking
- root account
- sbom
- scams
- secure by design
- security blueprint
- security debt
- security monitoring
- security posture
- shift smart
- social engineering
- telemetry
- tracking
- training
- unsafe deserialization
- verizon
- video
- voice cloning
- voice of the customer
- vue.js
- vulnerability
- work-life balance
Loving our content? Subscribe now!
Get the latest application security news, trends, tips and insights content from Contrast directly to your inbox. By subscribing, you will stay up to date with all the latest and greatest from Contrast Security.