TED HARRINGTON

In today's rapidly evolving digital landscape, the need for cybersecurity expertise has never been greater. Ted Harrington is not just a speaker; he is a renowned cybersecurity expert with years of hands-on experience. His deep understanding of the subject matter enables him to provide invaluable insights into the challenges, risks, and solutions surrounding cybersecurity. From innovative strategies to real-world case studies, Ted's engaging presentations will empower your audience to navigate the complex cybersecurity landscape with confidence and resilience.

Ted Harrington runs Independent Security Evaluators (ISE), the elite security researchers who pioneered car hacking, were first to exploit the iPhone, first to exploit Android OS, pioneered medical device hacking, and run hacking event IoT Village. Since inception in 2005 out of the PhD program at The Johns Hopkins University, ISE has served technology pioneers such as Amazon, Google, Microsoft, Netflix, Disney, Qualcomm and many more as their trusted security advisor.

Speech topics

HACKING THE FUTURE

With most new breakthroughs in technology there are also people looking to exploit that new technology. What exciting new opportunities will new tech make possible? Will artificial intelligence develop to a point where we can’t defend against it? How do we better secure our brands and companies as AI becomes more powerful?

In this forward-looking program, you’ll get to explore these important issues (and more), from the viewpoint of a hacker.

You’ll learn a 3-step process to help you anticipate and prepare for the inevitable changes that are coming. Delivered by Ted Harrington, #1 bestselling author and leader of ethical hackers, you’ll learn how to think differently about not just the future -- but also the present moment.

Think Like a Hacker: Secure Your Brand

Book this keynote to address the seemingly overwhelming collection of security concerns with which today’s leaders contend:

If any of this describes you, this is the keynote for you! An engaging blend of research-based issue analysis combined with storytelling, this keynote seeks to you with how to:

Custom! You focus on a technology niche; we are there to guide you

If any of this describes you, this is the keynote for you! An engaging blend of research-based issue analysis combined with storytelling, this keynote seeks to empower today’s leaders, security pros, and software developers.

Learning objectives TBD per YOUR needs! We'll work together to craft custom outcomes

Books

Learn how to think like an attacker, how to pick a methodology, how to figure out if you need penetration testing, and more...

Request booking info