Adam leads the Software Application Security practice at GRIMM. Adam specializes in discovering and exploiting vulnerabilities in Internet-accessible applications, networks, websites, as well as embedded systems, and encryption and blockchain technologies. He excels as automating research and development, and using machine learning to create solutions to complex problems - particularly those evolving areas of research that are critical to privacy, including blockchain and encryption. For five years, Adam ran DEFCON’s open-capture the flag contest, and developed and ran experimental communication software on the conference’s network. You’ll often find Adam speaking at Hacker or blockchain conferences on the state of the industry, and prevalent attacker methodologies. Adam is also dedicated to helping the entire community get better. Each week, Adam’s team finds bugs in various pieces of software, discloses the bug to the vendor in line with NIST’s industry standards, and then, following the 45 day disclosure timeframe, or until the vendor confirms it has patched the vulnerability, Adam writes up the vulnerability for general educational purposes at #NotQuite0DayFriday on Twitter.