Ted Harrington runs Independent Security Evaluators (ISE), the elite security researchers who pioneered car hacking, were first to exploit the iPhone, first to exploit Android OS, pioneered medical device hacking, and run hacking event IoT Village. Since inception in 2005 out of the PhD program at The Johns Hopkins University, ISE has served technology pioneers such as Amazon, Google, Microsoft, Netflix, Disney, Qualcomm and many more as their trusted security advisor.
The Common Thread to Hacking Emerging Tech
Blockchain, IoT, Artificial Intelligence, Machine Learning, and Cloud are all pretty different technologies... but from an attacker's perspective, are they really? Are defenders even thinking about their own security approach correctly?
In this keynote, you'll hear from #1 bestselling author and leader of ethical hackers Ted Harrington, as he examines the mindset, strategies and tactics used by attackers -- irrespective of the tech being attacked. You'll learn about the mistaken mindsets that many companies hold, which only make it easier for attackers to win. You'll hear stories from these different domains, and learn how to think differently about how your organization can defend.
Think Like a Hacker: Secure Your Brand
Book this keynote to address the seemingly overwhelming collection of security concerns with which today’s leaders contend:
Is security a critical need for your organization, and one which you want to make sure you're doing right?
Are you struggling to understanding how hackers think, how they operate, how they break systems, and how to keep pace as they evolve?
Do you need to know how to defend accordingly?
Are you uncertain about whether your security investments are, in fact, actually making you any more secure?
Do you have the appetite and capacity for change?
If any of this describes you, this is the keynote for you! An engaging blend of research-based issue analysis combined with storytelling, this keynote seeks to you with how to:
Implement a proven security method, based on years of practical experience in security research and security consulting, designed to help equip leaders like you deal with modern attackers.
Define and implement a threat model.
Differentiate between assessment methods.
Understand level of attacker intensity.
Challenge conventional wisdom
Secure Design Principles: Technology changes; the fundamentals do not
This keynote is designed to address the challenges with which today’s software developers and security professionals contend:
are you trying to better understand attack anatomies, how systems get broken, and which defense mechanisms would be effective mitigating measures?
do you desire to better understand how to implement principles of secure design?
are you trying to improve your grasp on how different adversary groups are motivated, resourced and operate? do you hope to better understand their methods so you can learn from them?
do you struggle with obtaining executive support for your security mission?
do you have the appetite and capacity for change?
If any of this describes you, this is the keynote for you! An engaging blend of research-based issue analysis combined with storytelling, this keynote seeks to empower today’s software developers and security professionals, teaching attendees how to:
Understand different attacker motivations, skills, and access to resources
Achieve clarity on the different principles of secure design and how to implement them
Obtain insights and talking points for how to think and talk about security in ways that will give you a voice to the leadership team
Challenge conventional wisdom
Custom! You focus on a technology niche; we are there to guide you
You are focused on solving the specific needs of a technology niche; this keynote is customized to those needs, including topic areas such as:
Internet of Things
If any of this describes you, this is the keynote for you! An engaging blend of research-based issue analysis combined with storytelling, this keynote seeks to empower today’s leaders, security pros, and software developers.
Learning objectives TBD per YOUR needs! We'll work together to craft custom outcomes