Tutwiler, Mississippi, United States
Contact Info
22K followers
500+ connections
About
Articles by Georgia
-
My Journey to Achieving the LinkedIn Top Voice in Cybersecurity: A Tale of Rapid Success in Just 2 Days
My Journey to Achieving the LinkedIn Top Voice in Cybersecurity: A Tale of Rapid Success in Just 2 Days
By Georgia Weidman
-
Additional Book Exercises: Apache Tomcat Guessable Credentials
Additional Book Exercises: Apache Tomcat Guessable Credentials
By Georgia Weidman
Contributions
Activity
-
Hey all! 🙋♀️ As someone who has found great success in the world of cybersecurity, I believe it's important to give back to the community and help…
Hey all! 🙋♀️ As someone who has found great success in the world of cybersecurity, I believe it's important to give back to the community and help…
Shared by Georgia Weidman
-
Exploit Dev class module 7 is out on @Patreon. We are outside of book/OSCP territory now. We will examine space and character set issues for the next…
Exploit Dev class module 7 is out on @Patreon. We are outside of book/OSCP territory now. We will examine space and character set issues for the next…
Shared by Georgia Weidman
-
With all these companies wanting a return to the office for employees, we need to first answer the important questions about professional attire.
With all these companies wanting a return to the office for employees, we need to first answer the important questions about professional attire.
Liked by Georgia Weidman
Experience & Education
Licenses & Certifications
Volunteer Experience
-
volunteer
Asociación PRETOMA
- Present 14 years 10 months
Animal Welfare
Volunteered on a sea turtle conservation project in Costa Rica. Duties included beach patrol, moving eggs to the hatchery, and releasing hatchlings into the wild.
Publications
-
Penetration Testing: A Hands-on Introduction to Hacking
No Starch Press
A heavily hands on introduction to ethical hacking.
-
Transparent Botnet Control for Smartphones over SMS
Shmoocon 2011
I present a system for command and control for smartphone based botnets using SMS.
The bot application sits below the smartphone application layer in the base operating
system and is thus transparent to smartphone users. Additionally I present a botnet
structure for smartphones that maximizes robustness and security. -
On edge graceful labelings of disjoint unions of 2r-regular edge graceful graphs
Journal of the Institute of Combinatorics and its Applications
We prove that if G is a 2r-regular edge graceful (p, q) graph
with (r, kp) = 1 then kG is edge graceful for odd k. We also
prove that for certain specific classes of 2r-regular edge graceful
graphs it is possible to drop the requirement that (r, kp) = 1Other authors -
Patents
-
Method and system for assessing data security
Issued US20190387016A1
A method and system for conducting simulated phishing attacks. This may include identifying a target device from a list, such as a corporate directory, and sending a message to the device with a link to a website. On the website, the user may be directed to or enrolled in a network security course, or may be directed to install an app, which may then be used to gather data or further conduct simulated phishing attacks on other devices on a network.
-
Method and system for assessing data security
Issued US10432656B2
A method and system for conducting simulated phishing attacks. This may include identifying a target device from a list, such as a corporate directory, and sending a message to the device with a link to a website. On the website, the user may be directed to or enrolled in a network security course, or may be directed to install an app, which may then be used to gather data or further conduct simulated phishing attacks on other devices on a network.
Honors & Awards
-
Finalist
Virginia Velocity Tour
One of the thirty most promising startups in Virginia by the Virginia Velocity Tour
-
Southeast’s thirty-six most innovative startups
36|86’s Village 36
One of the Southeast’s thirty-six most innovative startups by 36|86’s Village 36
-
Pentest Ninja
Women's Society of Cyberjutsu
Won the Pentest Ninja award at the annual awards dinner.
-
Cohort
Mach37
Shevirah Inc. is one of 5 companies in the Spring 2015 Mach37 cyber accelerator for security product companies.
-
Cyber Fast Track Grant
DARPA
Received a DARPA cyber fast track grant to complete the Smartphone Pentest Framework.
Recommendations received
6 people have recommended Georgia
Join now to viewMore activity by Georgia
-
Pierre-Alexis Tremblay, ing will be joining us as our new vCISO! With his extensive experience in #cybersecurity strategy and leadership…
Pierre-Alexis Tremblay, ing will be joining us as our new vCISO! With his extensive experience in #cybersecurity strategy and leadership…
Liked by Georgia Weidman
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore More