You will learn from Ted how modern attackers think, how they operate, and how to defend.
Using...
-
vivid storytelling,
-
Relatable metaphors, and
-
Real-world examples...
Ted is able to...
-
translate technical into tangible; jargon into stories
So that YOU can...
-
Obtain SUPPORT from internal stakeholders
-
Build TRUST with customers and other external stakeholders
-
Change security from a technical challenge into a BUSINESS ADVANTAGE
Leaders today are uneasy about how to defend against hackers, and uncertain about whether their investments in cybersecurity deliver the outcomes they seek. Based on many years of leading ethical hackers – who have published security research discovering security flaws in everything from cars to smartphones to medical devices.
Many of the insights woven into Ted's keynotes are derived from research published by the security consultancy he leads, Independent Security Evaluators (ISE). Ted has been named both Executive of the Year and 40 Under 40, he is one of the organizers of popular hacking concept IoT Village, and has built a company culture that has twice been named Best Places to Work. He is a keynote speaker on application security, where he and ISE are frequently featured in media outlets such as New York Times, Wall Street Journal, Forbes, Washington Post, USA Today, Business Insider, CBS, Fox, ABC and more. Ted is a Boston Marathon finisher, and holds a bachelor's degree from Georgetown University.
You will learn from Ted how modern attackers think, how they operate, and how to defend.
Using...
-
vivid storytelling,
-
Relatable metaphors, and
-
Real-world examples...
Ted is able to...
-
translate technical into tangible; jargon into stories
So that YOU can...
-
Obtain SUPPORT from internal stakeholders
-
Build TRUST with customers and other external stakeholders
-
Change security from a technical challenge into a BUSINESS ADVANTAGE
Leaders today are uneasy about how to defend against hackers, and uncertain about whether their investments in cybersecurity deliver the outcomes they seek. Based on many years of leading ethical hackers – who have published security research discovering security flaws in everything from cars to smartphones to medical devices.
Many of the insights woven into Ted's keynotes are derived from research published by the security consultancy he leads, Independent Security Evaluators (ISE). Ted has been named both Executive of the Year and 40 Under 40, he is one of the organizers of popular hacking concept IoT Village, and has built a company culture that has twice been named Best Places to Work. He is a keynote speaker on application security, where he and ISE are frequently featured in media outlets such as New York Times, Wall Street Journal, Forbes, Washington Post, USA Today, Business Insider, CBS, Fox, ABC and more. Ted is a Boston Marathon finisher, and holds a bachelor's degree from Georgetown University.
Think Like a Hacker. Secure Your Brand.
Idea in brief: empowering leaders on their quest to security excellence
This keynote is designed to address the seemingly overwhelming collection of security concerns with which today's leaders contend:
- Do you struggle with designing and implementing a security program that effectively achieves the goals outlined in your security mission?
- Are you interested in better understanding how hackers think, how they operate, and how to...
Secure Design Principles
This keynote is designed to address the challenges with which today's software developers and security professionals contend:
-
are you trying to better understand attack anatomies, how systems get broken, and which defense mechanisms would be effective mitigating measures?
-
do you desire to better understand how to implement principles of secure...
Custom Program!
You are focused on solving the specific needs of a technology niche; this keynote is customized to those needs, including topic areas such as:
-
applications
-
cloud
-
mobile
-
Internet of Things
-
medical...
Workshop: How to Build a Threat Model
- 1-2 hour hands on workshop
Audience:
- Mid level to senior technology executives
- Nontechnical leaders
- Technical leaders
- Anyone executive about how to deal with hackers
- Learn how to identify assets, adversaries, attack surfaces
- Understand how to develop a threat model at your organization
- Realize that is both...




