Leading Expert in Cybersecurity & Hacking
In today's rapidly evolving digital landscape, the need for cybersecurity expertise has never been greater. Ted Harrington is not just a speaker; he is a renowned cybersecurity expert with years of hands-on experience. His deep understanding of the subject matter enables him to provide invaluable insights into the challenges, risks, and solutions surrounding cybersecurity. From innovative strategies to real-world case studies, Ted's engaging presentations will empower your audience to navigate the complex cybersecurity landscape with confidence and resilience.
Ted Harrington runs Independent Security Evaluators (ISE), the elite security researchers who pioneered car hacking, were first to exploit the iPhone, first to exploit Android OS, pioneered medical device hacking, and run hacking event IoT Village. Since inception in 2005 out of the PhD program at The Johns Hopkins University, ISE has served technology pioneers such as Amazon, Google, Microsoft, Netflix, Disney, Qualcomm and many more as their trusted security advisor.
HACKING THE FUTURE
With most new breakthroughs in technology there are also people looking to exploit that new technology. What exciting new opportunities will new tech make possible? Will artificial intelligence develop to a point where we can’t defend against it? How do we better secure our brands and companies as AI becomes more powerful?
In this forward-looking program, you’ll get to explore these important issues (and more), from the viewpoint of a hacker.
You’ll learn a 3-step process to help you anticipate and prepare for the inevitable changes that are coming. Delivered by Ted Harrington, #1 bestselling author and leader of ethical hackers, you’ll learn how to think differently about not just the future -- but also the present moment.
Think Like a Hacker: Secure Your Brand
Book this keynote to address the seemingly overwhelming collection of security concerns with which today’s leaders contend:
Is security a critical need for your organization, and one which you want to make sure you're doing right?
Are you struggling to understanding how hackers think, how they operate, how they break systems, and how to keep pace as they evolve?
Do you need to know how to defend accordingly?
Are you uncertain about whether your security investments are, in fact, actually making you any more secure?
Do you have the appetite and capacity for change?
If any of this describes you, this is the keynote for you! An engaging blend of research-based issue analysis combined with storytelling, this keynote seeks to you with how to:
Implement a proven security method, based on years of practical experience in security research and security consulting, designed to help equip leaders like you deal with modern attackers.
Define and implement a threat model.
Differentiate between assessment methods.
Understand level of attacker intensity.
Challenge conventional wisdom
Custom! You focus on a technology niche; we are there to guide you
You are focused on solving the specific needs of a technology niche; this keynote is customized to those needs, including topic areas such as:
Internet of Things
If any of this describes you, this is the keynote for you! An engaging blend of research-based issue analysis combined with storytelling, this keynote seeks to empower today’s leaders, security pros, and software developers.
Learning objectives TBD per YOUR needs! We'll work together to craft custom outcomes