Skip to content

Jeff Williams, Co-Founder, Chief Technology Officer

Jeff brings more than 20 years of security leadership experience as co-founder and Chief Technology Officer of Contrast Security. He recently authored the DZone DevSecOps, IAST, and RASP refcards and speaks frequently at conferences including JavaOne (Java Rockstar), BlackHat, QCon, RSA, OWASP, Velocity, and PivotalOne. Jeff is also a founder and major contributor to OWASP, where he served as Global Chairman for 9 years, and created the OWASP Top 10, OWASP Enterprise Security API, OWASP Application Security Verification Standard, XSS Prevention Cheat Sheet, and many more popular open source projects. Jeff has a BA from Virginia, an MA from George Mason, and a JD from Georgetown.

Subscribe Now
    Topics
    3 ways Contrast helps to build digital resilience

    3 ways Contrast helps to build digital resilience

    Cyberattacks, supply-chain issues, flooding, tsunamis, wildfires, equipment failures and even war: The financial sector..

    Trust ‘zero trust’ for Application Security

    Trust ‘zero trust’ for Application Security

    The perimeter cybersecurity model is like the defensive walls that surround ancient cities. For thousands of years,..

    Legal liability for insecure software might work, but it's dangerous

    Legal liability for insecure software might work, but it's dangerous

    Ensuring security in the software market is undeniably crucial, but it is important to strike a balance that avoids..

    Cybersecurity Insights with Contrast Co-founder and CTO Jeff Williams | 11/18

    Cybersecurity Insights with Contrast Co-founder and CTO Jeff Williams | 11/18

    Insight #1 " Feds continue to push aggressive timelines for requiring app/API security “attestations” from software..

    Building a modern API security strategy — API protection

    Building a modern API security strategy — API protection

    Part four of the five-part series, Building a modern API security strategy.

    Building a modern API security strategy — API components

    Building a modern API security strategy — API components

    Part three of the five-part series, Building a modern API security strategy.

    Building a modern API security strategy — API testing

    Building a modern API security strategy — API testing

    Part two of the five-part series, Building a modern API security strategy.

    Building a modern API security strategy — API inventory

    Building a modern API security strategy — API inventory

    Part one of the five-part series, Building a modern API security strategy.

    Building a modern API security strategy: A five-part series — Overview

    Building a modern API security strategy: A five-part series — Overview

    The Spring4Shell exploit was, really, quite elegant.