TED HARRINGTON

• Leading Expert in Cybersecurity & Hacking

Ted Harrington runs Independent Security Evaluators (ISE), the elite security researchers who pioneered car hacking, were first to exploit the iPhone, first to exploit Android OS, pioneered medical device hacking, and run hacking event IoT Village. Since inception in 2005 out of the PhD program at The Johns Hopkins University, ISE has served technology pioneers such as Amazon, Google, Microsoft, Netflix, Disney, Qualcomm and many more as their trusted security advisor.

Speech topics

The Common Thread to Hacking Emerging Tech

Blockchain, IoT, Artificial Intelligence, Machine Learning, and Cloud are all pretty different technologies... but from an attacker's perspective, are they really?  Are defenders even thinking about their own security approach correctly?

In this keynote, you'll hear from #1 bestselling author and leader of ethical hackers Ted Harrington, as he examines the mindset, strategies and tactics used by attackers  -- irrespective of the tech being attacked. You'll learn about the mistaken mindsets that many companies hold, which only make it easier for attackers to win. You'll hear stories from these different domains, and learn how to think differently about how your organization can defend.

Think Like a Hacker: Secure Your Brand

Book this keynote to address the seemingly overwhelming collection of security concerns with which today’s leaders contend:

If any of this describes you, this is the keynote for you! An engaging blend of research-based issue analysis combined with storytelling, this keynote seeks to you with how to:

Secure Design Principles: Technology changes; the fundamentals do not

This keynote is designed to address the challenges with which today’s software developers and security professionals contend:

If any of this describes you, this is the keynote for you! An engaging blend of research-based issue analysis combined with storytelling, this keynote seeks to empower today’s software developers and security professionals, teaching attendees how to:

Custom! You focus on a technology niche; we are there to guide you

If any of this describes you, this is the keynote for you! An engaging blend of research-based issue analysis combined with storytelling, this keynote seeks to empower today’s leaders, security pros, and software developers.

Learning objectives TBD per YOUR needs! We'll work together to craft custom outcomes

TED TAlk

Books

Learn how to think like an attacker, how to pick a methodology, how to figure out if you need penetration testing, and more...

Request booking info