HACKABLE: How to Do Application Security Right with Ted Harrington Cybertraps 65

Ted Harrington is the #1 best selling author of HACKABLE: How to Do Application Security Right, and the Executive Partner at Independent Security Evaluators (ISE), the company of ethical hackers famous for hacking cars, medical devices, web applications, and password managers. He’s helped hundreds of companies fix tens of thousands of security vulnerabilities, including Google, Amazon, and Netflix. Ted has been featured in more than 100 media outlets, including The Wall Street Journal, Financial Times, and Forbes. His team founded and organizes IoT Village, an event whose hacking contest is a three-time DEF CON Black Badge winner. He hosts the Tech Done Different podcast. To get help with security consulting and security assessments, or to book Ted to keynote your next event, visit https://www.tedharrington.com. Using a modifier with a password How to think like an attacker A hacker is a problem solver - the intent is what matters. My job is to think the bad thoughts and ask the hard questions How to hack a bar waiting line. Determine what the rules of the game are The people who really succeed are the people who see the way the world could be. It’s really about independent thinking. Constraints provide opportunity for us to do better. How to teach people to be better Give kids opportunities to explore their creativity. Most humans are inherently wired to do good and make good choices. Be Better - the two words that define security Start from the foundation that all people are good. Automation of hacking techniques and if it’s too easy to be bad, people will do that. The democratization of an elite skill Zeroday vulnerabilities marketplace Security research community. The Blockchain bandit. What do we do about zerodays? We have to accept that they exist, and then we have to go find them.
Ted Harrington is the #1 best selling author of HACKABLE: How to Do Application Security Right, and the Executive Partner at Independent Security Evaluators (ISE), the company of ethical hackers famous for hacking cars, medical devices, web applications, and password managers. He’s helped hundreds of companies fix tens of thousands of security vulnerabilities, including Google, Amazon, and Netflix. Ted has been featured in more than 100 media outlets, including The Wall Street Journal, Financial Times, and Forbes. His team founded and organizes IoT Village, an event whose hacking contest is a three-time DEF CON Black Badge winner. He hosts the Tech Done Different podcast.

To get help with security consulting and security assessments, or to book Ted to keynote your next event, visit https://www.tedharrington.com.

  • Using a modifier with a password
  • How to think like an attacker
  • A hacker is a problem solver - the intent is what matters.
  • My job is to think the bad thoughts and ask the hard questions
  • How to hack a bar waiting line.
  • Determine what the rules of the game are
  • The people who really succeed are the people who see the way the world could be.
  • It’s really about independent thinking.
  • Constraints provide opportunity for us to do better.
  • How to teach people to be better
  • Give kids opportunities to explore their creativity.
  • Most humans are inherently wired to do good and make good choices.
  • Be Better - the two words that define security
  • Start from the foundation that all people are good.
  • Automation of hacking techniques and if it’s too easy to be bad, people will do that.
  • The democratization of an elite skill
  • Zeroday vulnerabilities marketplace
  • Security research community.
  • The Blockchain bandit.
  • What do we do about zerodays? We have to accept that they exist, and then we have to go find them.

We’re thrilled to be sponsored by IXL. 

IXL’s comprehensive teaching and learning platform for math, language arts, science, and social studies is accelerating achievement in 95 of the top 100 U.S. school districts. Loved by teachers and backed by independent research from Johns Hopkins University, IXL can help you do the following and more:
  • Simplify and streamline technology
  • Save teachers’ time
  • Reliably meet Tier 1 standards
  • Improve student performance on state assessments
🚀 Ready to see why leading districts trust IXL for their educational needs? Visit IXL.com/BE today to learn more about how IXL can elevate your school or district.
HACKABLE: How to Do Application Security Right with Ted Harrington Cybertraps 65