Ted Harrington
CVP

Ted Harrington

CA, US
Ted empowers technology leaders to defend against modern attackers. Ted takes your audience on a journey: Think Like a Hacker. Secure Your Brand.
certified virtual presenter

You will learn from Ted how modern attackers think, how they operate, and how to defend.

Using...

  • vivid storytelling,

  • Relatable metaphors, and

  • Real-world examples...

Ted is able to...

  • translate technical into tangible; jargon into stories

So that YOU can...

  • Obtain SUPPORT from internal stakeholders

  • Build TRUST with customers and other external stakeholders

  • Change security from a technical challenge into a BUSINESS ADVANTAGE

Leaders today are uneasy about how to defend against hackers, and uncertain about whether their investments in cybersecurity deliver the outcomes they seek. Based on many years of leading ethical hackers – who have published security research discovering security flaws in everything from cars to smartphones to medical devices.

Many of the insights woven into Ted's keynotes are derived from research published by the security consultancy he leads, Independent Security Evaluators (ISE). Ted has been named both Executive of the Year and 40 Under 40, he is one of the organizers of popular hacking concept IoT Village, and has built a company culture that has twice been named Best Places to Work. He is a keynote speaker on application security, where he and ISE are frequently featured in media outlets such as New York Times, Wall Street Journal, Forbes, Washington Post, USA Today, Business Insider, CBS, Fox, ABC and more. Ted is a Boston Marathon finisher, and holds a bachelor's degree from Georgetown University.

Ted 's Virtual Presenter Certificate

You will learn from Ted how modern attackers think, how they operate, and how to defend.

Using...

  • vivid storytelling,

  • Relatable metaphors, and

  • Real-world examples...

Ted is able to...

  • translate technical into tangible; jargon into stories

So that YOU can...

  • Obtain SUPPORT from internal stakeholders

  • Build TRUST with customers and other external stakeholders

  • Change security from a technical challenge into a BUSINESS ADVANTAGE

Leaders today are uneasy about how to defend against hackers, and uncertain about whether their investments in cybersecurity deliver the outcomes they seek. Based on many years of leading ethical hackers – who have published security research discovering security flaws in everything from cars to smartphones to medical devices.

Many of the insights woven into Ted's keynotes are derived from research published by the security consultancy he leads, Independent Security Evaluators (ISE). Ted has been named both Executive of the Year and 40 Under 40, he is one of the organizers of popular hacking concept IoT Village, and has built a company culture that has twice been named Best Places to Work. He is a keynote speaker on application security, where he and ISE are frequently featured in media outlets such as New York Times, Wall Street Journal, Forbes, Washington Post, USA Today, Business Insider, CBS, Fox, ABC and more. Ted is a Boston Marathon finisher, and holds a bachelor's degree from Georgetown University.

Ted 's Virtual Presenter Certificate

Think Like a Hacker. Secure Your Brand.

Idea in brief: empowering leaders on their quest to security excellence

This keynote is designed to address the seemingly overwhelming collection of security concerns with which today's leaders contend:

  • Do you struggle with designing and implementing a security program that effectively achieves the goals outlined in your security mission?
  • Are you interested in better understanding how hackers think, how they operate, and how to...
Audience ActivityEducational / InformativeTechnical / SpecificInspirational / Life-changingHumorous / Funny

Secure Design Principles

Idea in brief: technology changes; the fundamentals do not

This keynote is designed to address the challenges with which today's software developers and security professionals contend:

  • are you trying to better understand attack anatomies, how systems get broken, and which defense mechanisms would be effective mitigating measures?

  • do you desire to better understand how to implement principles of secure...

Educational / InformativeTechnical / SpecificInspirational / Life-changingHumorous / Funny

Custom Program!

Idea in brief: you focus on a technology niche; I am there to guide you

You are focused on solving the specific needs of a technology niche; this keynote is customized to those needs, including topic areas such as:

  • applications

  • cloud

  • mobile

  • Internet of Things

  • medical...

Educational / InformativeTechnical / SpecificInspirational / Life-changingHumorous / Funny

Workshop: How to Build a Threat Model

Format:
  • 1-2 hour hands on workshop

Audience:
  • Mid level to senior technology executives
  • Nontechnical leaders
  • Technical leaders
  • Anyone executive about how to deal with hackers
Outcomes:
  • Learn how to identify assets, adversaries, attack surfaces
  • Understand how to develop a threat model at your organization
  • Realize that is both...
Cyber SecurityAudience ActivityEducational / Informative
Ted 's Virtual Presenter Certificate