Podcasts about iot village

  • 20PODCASTS
  • 106EPISODES
  • 33mAVG DURATION
  • 1MONTHLY NEW EPISODE
  • Dec 20, 2024LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about iot village

Latest podcast episodes about iot village

@BEERISAC: CPS/ICS Security Podcast Playlist
EP 52: Hacking Cellular-Enabled IoT Devices

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Dec 20, 2024 37:59


Podcast: Error Code (LS 26 · TOP 10% what is this?)Episode: EP 52: Hacking Cellular-Enabled IoT DevicesPub date: 2024-12-18Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationThis is the story of the secret life of cellular chips and why we need to mitigate against the unintended access they provide. Deral Heiland, Principal Security Research for IoT at Rapid 7, describes a research project he presented at the IoT Village at DEF CON 32 where they compiled AT command manuals from various vendors, discovering unexpected functionalities, such as internal web services.The podcast and artwork embedded on this page are from Robert Vamosi, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Error Code
EP 52: Hacking Cellular-Enabled IoT Devices

Error Code

Play Episode Listen Later Dec 18, 2024 37:59


This is the story of the secret life of cellular chips and why we need to mitigate against the unintended access they provide. Deral Heiland, Principal Security Research for IoT at Rapid 7, describes a research project he presented at the IoT Village at DEF CON 32 where they compiled AT command manuals from various vendors, discovering unexpected functionalities, such as internal web services.

IoT Security Podcast
Hackers, Researchers, and Industry Tackle Security Challenges with IoT Village

IoT Security Podcast

Play Episode Listen Later May 2, 2023 23:01


In this episode, Brian and John dive into the world of Capture the Flag competitions in the realm of cybersecurity. Our special guest, Rachael Tubbs from IoT Village, discusses the rise of CTFs and how they are becoming a popular feature at cybersecurity conferences like Defcon. We explore how IoT Village is leading the way in making these conferences more accessible, exhibiting a range of innovative devices, and even holding a free virtual conference. We also discuss the challenges of developing security life cycles for IoT development and how the limited security mindset of small companies is a concerning trend across the 50 billion devices in use. Tune in for an exciting and informative look into the rapidly evolving world of cybersecurity.Topics covered in this episode include:Introduction to Capture the Flags (CTFs) and their importance in securityBackground of IoT VillageDefcon CTF and its valueIoT Village's response to pandemicRachel Tubbs is a psychology graduate who developed an interest in understanding human motivation. She started working as a contractor for the US Government's Defense Counterintelligence Security Agency, where she was introduced to the world of cybersecurity. However, she found that the private sector was more suited to her, and she eventually found a position at IoT Village, a security consulting and research firm founded by Independent Security Evaluators. Rachel has been with IoT Village for almost three years now. Let's get into Things on the IoT Security Podcast!Follow Brian Contos on LinkedIn at https://www.linkedin.com/in/briancontosAnd you can follow John Vecchi at https://www.linkedin.com/in/johnvecchiThe IoT Security Podcast is powered by Phosphorus Cybersecurity. Join the conversation for the IoT Security Podcast — where xIoT meets Security. Learn more at https://phosphorus.io/podcast

Tech Done Different
Embodying Authenticity | A Conversation With Nick Hughes | Tech Done Different Podcast With Ben Schmerler and Ted Harrington

Tech Done Different

Play Episode Listen Later Mar 30, 2023 28:27


Tech Done Different
Ethical Baby Thief | A Conversation With Andrew Lemon | Tech Done Different Podcast With Ben Schmerler

Tech Done Different

Play Episode Listen Later Mar 22, 2023 21:19


Guest: Andrew Lemon, CEO / Principal Security Engineer at Red ThreatOn LinkedIn | https://www.linkedin.com/in/lemonitup/On Twitter | https://twitter.com/LemonitupOn YouTube | https://www.youtube.com/@redthreatsec________________________________Host: Ben SchmerlerOn ITSPmagazine  

Tech Done Different
Lean Into Your Digital Senses | A Conversation With Debasish Biswas | Tech Done Different Podcast With Ben Schmerler

Tech Done Different

Play Episode Listen Later Mar 17, 2023 23:24


Tech Done Different
Chatting with a Hacker | A Conversation With Matt Brown | Tech Done Different Podcast With Ted Harrington and Ben Schmerler

Tech Done Different

Play Episode Listen Later Mar 8, 2023 38:02


Tech Done Different
Think About Grit | A Conversation With Cody MacDonald | Tech Done Different Podcast With Ben Schmerler

Tech Done Different

Play Episode Listen Later Feb 23, 2023 20:24


Tech Done Different
Scientists are Artists | A Conversation With Artist and TEDx Speaker, Sabela Garcia Cuesta | Tech Done Different Podcast With Ted Harrington

Tech Done Different

Play Episode Listen Later Feb 16, 2023 34:54


Guest: Sabela García Cuesta, Artist and TEDx [@TEDx] Franfurt [@TEDxFrankfurt] SpeakerOn LinkedIn | https://www.linkedin.com/in/sabela-garcia-cuesta/On Twitter | https://twitter.com/HHSabelaOn YouTube | https://www.youtube.com/channel/UC2ZDUWKjCPuQC4z14xXIp0w________________________________Host: Ted HarringtonOn ITSPmagazine  

Tech Done Different
Creativity & Innovation | A Conversation With TEDxFrankfurt Performer Jako Bär | Tech Done Different Podcast With Ted Harrington

Tech Done Different

Play Episode Listen Later Feb 3, 2023 26:47


Guest: Jako Bär, Performer, Songwriter, and TEDxFrankfurt [@TEDxFrankfurt] PerformerOn LinkedIn | https://www.linkedin.com/in/jako-b%C3%A4r-097675247/On Facebook | https://www.facebook.com/BAER.artpopOn YouTube | https://www.youtube.com/c/BAER_artpop________________________________Host: Ted HarringtonOn ITSPmagazine  

Tech Done Different
CyberPunk Is Dead | A Conversation With Michael Goetzman | Tech Done Different Podcast With Ben Schmerler

Tech Done Different

Play Episode Listen Later Jan 27, 2023 23:15


Guest: Michael Goetzman, CISO at Solano Security and Founder of CypherCon [@cyphercon]On Twitter | https://twitter.com/GoetzmanOn LinkedIn | https://www.linkedin.com/in/goetzman/________________________________Host: Ben SchmerlerOn ITSPmagazine  

Tech Done Different
Problems Worth Solving | A Conversation With Barry Phetteplace | Tech Done Different Podcast With Ted Harrington And Ben Schmerler

Tech Done Different

Play Episode Listen Later Jan 18, 2023 26:56


RETAIL IN AMERICA
LIVE in Malibu, CA, with Ted Harrington; think like a hacker!

RETAIL IN AMERICA

Play Episode Listen Later Nov 29, 2022 35:01


Welcome to RETAIL IN AMERICA!This podcast is part of The RETAIL IN AMERICA tour, my year-long journey to discover incredible retail heroes all across the country, celebrating our retail culture, community, and careers. Go to retailpride.com or IG @retail pride to see it all, including past podcast episodes, playlists, and future cities on tour.This is an extraordinary episode filled with incredible takeaways from my great friend, Ted Harrington.Ted has many titles, including the #1 best-selling author of HACKABLE, the Tech Done Different podcast host, and the Executive Partner at Independent Security Evaluators (ISE), the company of ethical hackers famous for hacking cars, medical devices, web applications, and password managers. Ted and his company have helped hundreds of companies fix tens of thousands of security vulnerabilities, including Google, Amazon, and Netflix.Ted has been featured in over 100 media outlets, including The Wall Street Journal, Financial Times, and Forbes. His team also founded and organizes IoT Village, an event whose hacking contest is a three-time DEF CON Black Badge winner.And just last month, he delivered his first TedTalk!But most importantly, he's a man with great wisdom that he generously shared with me as we sat together a recent morning while the Airstream was parked in Malibu.Don't miss this conversation, as you may discover you're a hacker too!A huge thank you to the three title sponsors fueling the RETAIL IN AMERICA tour and this podcast:Spotify Advertising Spotify is the #1 podcast platform in the US and has grown to over 420M monthly unique registered users around the globe, over half of which are supported on the ad platform. Spotify advertising will help you reach and target your audience across devices, locations, and formats. YOOBIC Over 300 companies in 80 countries trust YOOBIC to drive their retail performance at scale, get real-time visibility into multi-location business execution, digitized task management, and more. KWI is the industry's only true turnkey omni-channel platform for specialty retailers. With over 35 years of experience, let KWI help you execute flawlessly with the features that matter most, including endless aisle, clienteling, mobile checkout, inventory management, e-commerce, and more. The RETAIL IN AMERICA podcast team includes:Producer Roi PeretsAudio Engineer

Tech Done Different
Be Natural, Be Yourself | A Conversation With Ben Schmerler | Tech Done Different Podcast With Ted Harrington

Tech Done Different

Play Episode Listen Later Nov 6, 2022 22:17


Tech Done Different
Changing Buyer Behavior | A Conversation With Greg Coticchia | Tech Done Different Podcast With Ted Harrington

Tech Done Different

Play Episode Listen Later Oct 17, 2022 20:59


Buyers want to be informed, and the internet has made finding the info they need easy to do. Greg Coticchia shares insights into how behavior is changing, and how to think differently about selling too.You'll learn:Why buying behavior is changingHow to think differently about the interplay between marketing, sales, and moreWhy you need to make buying easy________________________________GuestGreg CoticchiaCEO of Sopheon [@Sopheon]On Twitter | https://twitter.com/GregCottOn LinkedIn | https://linkedin.com/in/gregcoticchia________________________________HostTed HarringtonOn ITSPmagazine  

Tech Done Different
Analyzing Security Research | A Conversation With Casey Ellis | Tech Done Different Podcast With Ted Harrington

Tech Done Different

Play Episode Listen Later Oct 6, 2022 23:53


We are joined by the Founder & Chair of Bugcrowd, Casey Ellis, to discuss where security research is today, where it is going, and many other aspects of how to think about securing systems.You'll learn:where security research is today, and where it is goingwhy businesses should be incentivized to secure systems (hint: not just because it's the right thing to do)how to think about security of open source systems________________________________GuestCasey EllisFounder, Chairman, and CTO of Bugcrowd [@Bugcrowd]On Twitter | https://twitter.com/caseyjohnellisOn LinkedIn | https://linkedin.com/in/caseyjohnellis________________________________HostTed HarringtonOn ITSPmagazine  

Tech Done Different
Creating A Vision Statement | A Conversation With Aaron Day | Tech Done Different Podcast With Ted Harrington

Tech Done Different

Play Episode Listen Later Sep 22, 2022 22:31


In this episode of Tech Done Different, you'll hear from Aaron Day, the CEO of Amaze, about how and why to build a vision statement.You'll learn:why a vision statement mattershow to build a vision statementhow to communicate the vision statementhow to use the vision statement to guide daily decisions________________________________GuestAaron DayCEO of Amaze [@amazeanywhere]On Twitter | https://twitter.com/adhbcaOn LinkedIn | https://www.linkedin.com/in/aaroneday/________________________________HostTed HarringtonOn ITSPmagazine  

Tech Done Different
Fear Less, Not Fearless | A Conversation With Mark Edwards | Tech Done Different Podcast With Ted Harrington

Tech Done Different

Play Episode Listen Later Sep 14, 2022 22:28


A season veteran in building software businesses, Mark Edwards joins Tech Done Different to share the common pitfalls that software companies make and what to do about it.You'll learn:why (and how!) to identify your areas of excellence and areas of weaknesswhat happens when you are always operating with your exit strategy in mindwhy to not be fearless, but to "fear less"________________________________GuestMark EdwardsCEO of Boss Equity [@boss_equity]On Twitter | https://twitter.com/MarkLEdwardsOn LinkedIn | https://linkedin.com/in/markledwardsOn YouTube | https://www.youtube.com/channel/UCkUpBhDr512e0pdOjJWJZ7Q________________________________HostTed HarringtonOn ITSPmagazine  

Tech Done Different
Gut and Common Sense | A Conversation With Carla Donev | Tech Done Different Podcast With Ted Harrington

Tech Done Different

Play Episode Listen Later Aug 30, 2022 19:10


Carla Donev, the VP and CISO at NiSource, joins Tech Done Different to share her experiences as a female in the male-dominated field of technology, and how she went from being an accountant to a CISO.You'll learn:how to get more women into the cyber fieldswhy to say yes when opportunities present themselveshow to balance your business needs with your security challengeswhen you should use your gut and common senseand more________________________________GuestCarla DonevVP of Infrastructure and Chief Information Security Officer at NiSource [@NiSourceInc]On LinkedIn | https://www.linkedin.com/in/carladonev/________________________________HostTed HarringtonOn ITSPmagazine  

Tech Done Different
Adapt To Change | A Conversation With Jonathan Kite | Tech Done Different Podcast With Ted Harrington

Tech Done Different

Play Episode Listen Later Aug 17, 2022 23:59


Jonathan Kite, the founder & CEO of Rent Ready, joins Tech Done Different to share insights in how he built his software company, and how they overcame many obstacles along the way.You'll learn:how to fail forwardwhat happens when your vision needs to changehow to think through solving complex problemshow to interview for adaptability to changeand more________________________________GuestJonathan KiteCo-Founder & CEO at Rent ReadyOn LinkedIn | https://linkedin.com/in/jonathan-kite-13025752________________________________HostTed HarringtonOn ITSPmagazine  

Tech Done Different
Web 3.0 Security | A Conversation With Nicole Little | Tech Done Different Podcast With Ted Harrington

Tech Done Different

Play Episode Listen Later Aug 11, 2022 26:32


Nicole Little joins TDD to explain Web 3.0, what it is, and how to think about security around it. She's a security researcher who currently works in the content protection team at Disney.You'll learn:what Web 3.0 is and why it matterswhat security challenges that Web 3.0 introduceshow to think about the security versus benefits tradeoffs of this emerging technologywhy independent security assessments matterand more________________________________GuestNicole LittleSenior Manager, Distribution Technology at Walt Disney Studios [@DisneyStudios]On LinkedIn | https://www.linkedin.com/in/nicolellittle/________________________________HostTed HarringtonOn ITSPmagazine  

That Tech Pod
It's Too Late You're Already Being Hacked With Ethical Hacker Ted Harrington

That Tech Pod

Play Episode Listen Later Aug 9, 2022 38:58


Today on That Tech Pod, Laura and Gabi talk to Ted Harrington. Ted Harrington is the author of HACKABLE: How to Do Application Security Right and the Executive Partner at Independent Security Evaluators (ISE), the company of ethical hackers famous for hacking cars, medical devices, and password managers. He's helped hundreds of companies fix tens of thousands of security vulnerabilities, including Google, Amazon, Microsoft, Netflix, and more. Ted has helped hundreds of companies fix tens of thousands of security vulnerabilities, including Disney, Amazon, Google, Netflix, Adobe, Warner Brothers, Qualcomm, and more. For his stewardship of security research that Wired Magazine says “wins the prize, hands down,” Ted has been named both Executive of the Year by the American Business Awards and an SD Metro 40 Under 40 entrepreneur. He leads a team that started and organizes IoT Village, an event whose hacking contest is a three-time DEFCON Black Badge winner, representing the discovery of more than 300 zero-day vulnerabilities (and counting). Ted has been featured in more than 100 media outlets, including The Wall Street Journal, Financial Times, and Forbes. His team founded and organizes IoT Village, an event whose hacking contest has produced three DEF CON Black Badges.Learn more here.

Redefining CyberSecurity
After More Than Two Decades, Where Are We On The Road To Better Cyber Defenses? | A Conversation With VC Bob Ackerman | Black Hat 2022 And DEF CON 30 Las Vegas Event Coverage | Redefining CyberSecurity Podcast With Sean Martin And Marco Ciappelli

Redefining CyberSecurity

Play Episode Listen Later Aug 8, 2022 30:22


25 years of BlackHat gatherings and related research. 20+ years of venture capital, investments, and mergers & acquisitions dedicated to CyberSecurity. That's a lot of time and presumably a lot of effort and money. So...where do we find ourselves on the road to better cyber defenses?Our guest for this episode is Bob Ackerman. Bob started AllegisCyber nearly 20 years ago with the vision to be the first venture firm to focus 100% on cyber security investing. We are experiencing a third downmarket where Bob has been as a dedicated cyber VC—a distinction shared by a select few—and he has helped hundreds of startups navigate these cycles. The geopolitical landscape, threats to civilian critical infrastructure, and heightened government involvement collectively make this market even more different, uncertain, and riddled with risk for the startups and investors new to the cyber domain. A lot has happened. But a lot has stayed the same as well. Let's explore this a bit during this chat as part of our Black Hat and DEF CON 2022 coverage.Be sure to catch all of our conversations from Black Hat and DEF CON 2022 at https://www.itspm.ag/bhdc22____________________________GuestBob AckermanManaging Director & Founder - AllegisCyber Capital [@AllegisCyber]On LinkedIn | https://www.linkedin.com/in/bob-ackerman-a233336/On Twitter | https://twitter.com/BobAckerman____________________________This Episode's SponsorsCrowdSec | https://itspm.ag/crowdsec-b1vpEdgescan | https://itspm.ag/itspegwebPentera | https://itspm.ag/pentera-tyuw____________________________ResourcesForbes Article - New SEC Cybersecurity Reporting Requirements: What Companies Should Know About Regulations: https://www.forbes.com/sites/forbesfinancecouncil/2022/07/08/new-sec-cybersecurity-reporting-requirements-what-companies-should-know-about-regulationsForbes Article - New SEC Cybersecurity Reporting Requirements: Three Things Companies Need To Do Now: https://www.forbes.com/sites/forbesfinancecouncil/2022/05/25/new-sec-cybersecurity-reporting-requirements-three-things-companies-need-to-do-now____________________________For more Black Hat and DEF CON  Event Coverage podcast and video episodes visit: https://www.itspmagazine.com/black-hat-2022-and-def-con-hacker-summer-camp-las-vegas-usa-cybersecurity-event-and-conference-coverageAre you interested in telling your story in connection with Black Hat and DEF CON by sponsoring our coverage?

ITSPmagazine | Technology. Cybersecurity. Society
IoT Village At DEF CON 30 | Chats On The Road | A Conversation With Rachael Tubbs | Black Hat 2022 And DEF CON 30 Las Vegas Event Coverage | Redefining CyberSecurity Podcast With Sean Martin And Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Aug 6, 2022 23:07


Everything is connected these days — from coffee machines to home security cameras to drones. And they all could use a good ole hacking. Regardless of your hacking skills level, join the IoT Village crew for good vibes and tons of stuff to get your hands on.Join us and our guest, Rachael Tubbs, as we get into the vibe of all things IoT Village at DEF CON 2022!About the IoT VillageIoT Village advocates for advancing security in the Internet of Things (IoT) industry through bringing researchers and industry together. IoT Village hosts talks by expert security researchers, interactive hacking labs, live bug hunting in the latest IoT tech, and competitive IoT hacking contests. Over the years IoT Village has served as a platform to showcase and uncover hundreds of new vulnerabilities, giving attendees the opportunity to learn about the most innovative techniques to both hack and secure IoT. IoT Village is organized by security consulting and research firm, Independent Security Evaluators (ISE), and the non-profit organization, Loudmouth Security.Be sure to catch all of our conversations from Black Hat and DEF CON 2022 at https://www.itspm.ag/bhdc22____________________________GuestRachael TubbsMarketing and Events Lead at Independent Security Evaluators [@ISEsecurity]On LinkedIn | https://www.linkedin.com/in/rachael-tubbs-1a1085135/____________________________This Episode's SponsorsCrowdSec | https://itspm.ag/crowdsec-b1vpEdgescan | https://itspm.ag/itspegweb____________________________ResourcesIoT Village DEF CON Schedule: https://www.iotvillage.org/defcon.htmlIoT Village website: https://www.iotvillage.org/On LinkedIn | https://www.linkedin.com/showcase/iotvillageAt DEF CON: https://forum.defcon.org/node/239789____________________________For more Black Hat and DEF CON  Event Coverage podcast and video episodes visit: https://www.itspmagazine.com/black-hat-2022-and-def-con-hacker-summer-camp-las-vegas-usa-cybersecurity-event-and-conference-coverageAre you interested in telling your story in connection with Black Hat and DEF CON by sponsoring our coverage?

Redefining CyberSecurity
IoT Village At DEF CON 30 | Chats On The Road | A Conversation With Rachael Tubbs | Black Hat 2022 And DEF CON 30 Las Vegas Event Coverage | Redefining CyberSecurity Podcast With Sean Martin And Marco Ciappelli

Redefining CyberSecurity

Play Episode Listen Later Aug 6, 2022 23:58


Everything is connected these days — from coffee machines to home security cameras to drones. And they all could use a good ole hacking. Regardless of your hacking skills level, join the IoT Village crew for good vibes and tons of stuff to get your hands on.Join us and our guest, Rachael Tubbs, as we get into the vibe of all things IoT Village at DEF CON 2022!About the IoT VillageIoT Village advocates for advancing security in the Internet of Things (IoT) industry through bringing researchers and industry together. IoT Village hosts talks by expert security researchers, interactive hacking labs, live bug hunting in the latest IoT tech, and competitive IoT hacking contests. Over the years IoT Village has served as a platform to showcase and uncover hundreds of new vulnerabilities, giving attendees the opportunity to learn about the most innovative techniques to both hack and secure IoT. IoT Village is organized by security consulting and research firm, Independent Security Evaluators (ISE), and the non-profit organization, Loudmouth Security.Be sure to catch all of our conversations from Black Hat and DEF CON 2022 at https://www.itspm.ag/bhdc22____________________________GuestRachael TubbsMarketing and Events Lead at Independent Security Evaluators [@ISEsecurity]On LinkedIn | https://www.linkedin.com/in/rachael-tubbs-1a1085135/____________________________This Episode's SponsorsCrowdSec | https://itspm.ag/crowdsec-b1vpEdgescan | https://itspm.ag/itspegwebPentera | https://itspm.ag/pentera-tyuw____________________________ResourcesIoT Village DEF CON Schedule: https://www.iotvillage.org/defcon.htmlIoT Village website: https://www.iotvillage.org/On LinkedIn | https://www.linkedin.com/showcase/iotvillageAt DEF CON: https://forum.defcon.org/node/239789____________________________For more Black Hat and DEF CON  Event Coverage podcast and video episodes visit: https://www.itspmagazine.com/black-hat-2022-and-def-con-hacker-summer-camp-las-vegas-usa-cybersecurity-event-and-conference-coverageAre you interested in telling your story in connection with Black Hat and DEF CON by sponsoring our coverage?

Tech Done Different
Why VRM Needs Customization | A Conversation With Jonathan Rau | Tech Done Different Podcast With Ted Harrington

Tech Done Different

Play Episode Listen Later Aug 5, 2022 25:48


As CISO of a cloud startup, Jonathan Rau fields tons of security questionnaires. He joins the show to explain the many struggles the vendors receiving such questionnaires face and what to do about it.You'll learn:why questionnaires need to be customizedwhy it's lazy to send the same questions to everyonewhy VRM is really about building trust, not just about answering questionsand more________________________________GuestJonathan RauCISO at Lightspin [@LightspinTech]On LinkedIn | https://www.linkedin.com/in/jonathan-r-2b2742112/________________________________HostTed HarringtonOn ITSPmagazine  

The Hacker Mind
EP 52: DEF CON Villages

The Hacker Mind

Play Episode Listen Later Aug 3, 2022 39:30


DEF CON is 30 years old this year, and it's bigger and better in part because of topic-specific villages. Here's an inside look at four of the most popular villages. In this episode I'm talking to the organizers of the Lockpicking Village,the ICS village, the Car Hacking Village, and the Aerospace Village. And, there's thirty more villages including Girls Hack Village, the Voting Machine Hacking village, the IoT Village, and the Bio Hacking village. In each you will find people with like interests. You will learn cool new things. And … you won't be disappointed.

Tech Done Different
Remove Friction | A Conversation With Josh Twist | Tech Done Different Podcast With Ted Harrington

Tech Done Different

Play Episode Listen Later Jul 25, 2022 26:19


What happens when you remove friction? Better yet, what happens when you focus on small, incremental gains that compound on each other rather than aiming for big massive wins?On this episode, we are joined by ex-Facebook & ex-Microsoft tech leader Josh Twist to dig into these topics and more.You'll learn:why small wins are better than big winswhy it's mission critical to make things easywhy UX doesn't win deals (but it does earn advocacy)why feature growth can kill (rather than help) a product________________________________GuestJosh TwistCo-Founder & CEO at Zuplo [@zuplo]On LinkedIn | https://linkedin.com/in/joshtwistOn Twitter | https://twitter.com/joshtwist________________________________HostTed HarringtonOn ITSPmagazine  

Tech Done Different
Threat Intelligence | A Conversation With Mounir Hahad | Tech Done Different Podcast With Ted Harrington

Tech Done Different

Play Episode Listen Later Jul 7, 2022 26:26


Mounir Hahad knows a thing or two about threat intelligence, and he joins Tech Done Different to share those insights.You'll learn:what threat intelligence, and why it matterswhy it's important to share informationhow to think about outsourcing, insourcing, or some combinationand more________________________________GuestMounir HahadHead of Threat Labs at Juniper NetworksOn LinkedIn | https://linkedin.com/in/mounirhahadOn Twitter | https://twitter.com/Mounirhahad________________________________HostTed HarringtonOn ITSPmagazine  

Tech Done Different
Early Stage Medical Devices | A Conversation With Chris Barron | Tech Done Different Podcast With Ted Harrington

Tech Done Different

Play Episode Listen Later Jun 30, 2022 24:56


In this episode, we are joined by long-time medical device veteran Chris Barron, to help walk us through the many challenges that early-stage medical device startups face, and how to overcome them.You'll learn:why fundraising is a long processwhat you need to make clear to investors in order to get them to invest in your startupwhat role your mission has in deciding where to allocate resourceswhy to apply your passion________________________________GuestChris BarronVP of Engineering at Respiratory Motion, Inc.On LinkedIn | https://linkedin.com/in/chris-barron________________________________HostTed HarringtonOn ITSPmagazine  

Tech Done Different
Do It Anyways | A Conversation With Zach Belanger | Tech Done Different Podcast With Ted Harrington

Tech Done Different

Play Episode Listen Later Jun 24, 2022 25:15


Sometimes the best ideas are the craziest ones. In this episode of Tech Done Different, entrepreneur Zach Belanger walks us through how to think big, think creatively, and pursue big goals.You'll learn:why sometimes the right ideas sound the craziestwhy crazy ideas are better than boring ideaswhy to do it "indie" rather than "industry"why to ask if it's ever been done before (and what to do with the answer you get)why to start as soon as possible________________________________GuestZach BelangerCEO of Mob Entertainment [@EnchantedMob]On LinkedIn | https://linkedin.com/in/zachary-belanger-%F0%9F%8C%88-73b072118On YouTube | https://www.youtube.com/c/EnchantedMob/videos________________________________HostTed HarringtonOn ITSPmagazine  

Tech Done Different
Artist In The Room | A Conversation With Mariana Muntean | Tech Done Different Podcast With Ted Harrington

Tech Done Different

Play Episode Listen Later Jun 15, 2022 28:30


As we build complex software systems, we also need to ensure we understand what to some might feel unscientific: how does this system make me feel? Mariana Muntean joins Tech Done Different to help us understand the differences between artistic thinkers and engineers, and how the two can partner to produce great results.You'll learn:why creatives and engineers butt headswhy abstraction is an important skillwhy to use visuals to communicatewhy an experienced UI/UX designer saves time and moneywhy to get feedback from outside the team building the thing________________________________GuestMariana MunteanCo-Founder & CEO of CINEVVA [@CINEVVAGames]On LinkedIn | https://linkedin.com/in/munmariaOn Twitter | https://twitter.com/upontheroofs________________________________HostTed HarringtonOn ITSPmagazine  

Tech Done Different
Why Company Culture Matters | A Conversation With Candice Lu | Tech Done Different Podcast With Ted Harrington

Tech Done Different

Play Episode Listen Later Jun 10, 2022 29:35


Candice Lu joins Tech Done Different to teach us about entrepreneurship, building teams, and developing leaders.You'll learn:why being a founder is about controlwhy autonomy mattershow to create a culture that people want to be part ofwhy emotional intelligence is the most important factor to being truly consultativewhy doing right by your people creates lasting positive impactwhy to grow you must let go________________________________GuestCandice LuFounding Partner & Managing Director at OmPrem Solution Partners [@OnPremSP]On LinkedIn | https://www.linkedin.com/in/cseneriches________________________________HostTed HarringtonOn ITSPmagazine  

Tech Done Different
Skills Vs Personality | A Conversation With Sameer Ranjan | Tech Done Different With Ted Harrington

Tech Done Different

Play Episode Listen Later Jun 2, 2022 28:51


What is the interplay between hard skills, soft skills, and personality? How can leaders groom people in all of these areas? Sameer Ranjan, the CTO of Catenate, joins Tech Done Different to explain how data science drives all of this.You'll learn:why no amount of money will keep a person in a role that's not right for them, and why we need to put the right people in the right roleswhat the difference is between hard skills, soft skills, and personality traitshow leaders should groom people based on personalityhow our brains are wired to learn________________________________GuestSameer RanjanCTO & Director of Data Science at Catenate [@Catenate17]On LinkedIn | https://linkedin.com/in/sameerranjan009On Twitter | https://twitter.com/sameerranjan009________________________________HostTed HarringtonOn ITSPmagazine  

Tech Done Different
Against The Grain | A Conversation With Author Craig Perkins | Tech Done Different With Ted Harrington

Tech Done Different

Play Episode Listen Later May 20, 2022 31:07


Author & business consultant Craig Perkins joins Tech Done Different to help us understand how to reject conventional thinking and live more entrepreneurially. Whether you are a leader, individual contributor, or entrepreneur, these principles are for you.You'll learn:why to move towards fearhow to learn about yourself in order to find your passionwhy to do what gives you goossbumpswhat it means to listen to your authentic selfhow to persevere over obstacles________________________________GuestCraig PerkinsAuthor & Business ConsultantOn LinkedIn | https://www.linkedin.com/in/craig-a-perkins/On Twitter | https://twitter.com/perk2540________________________________HostTed HarringtonOn ITSPmagazine  

Tech Done Different
Make Others Great | A Conversation With Chief Information Security Office (CISO) David Cross | Tech Done Different With Ted Harrington

Tech Done Different

Play Episode Listen Later Apr 27, 2022 29:49


David Cross has to balance both engineering and business priorities. He teaches us how to get veterans involved in cybersecurity, how to grow & pivot your career, and the ways to establish influence.As CISO for Oracle SaaS, David Cross has to balance both engineering and business priorities. He joins Tech Done Different to teach us how to get veterans involved in cybersecurity, how to grow & pivot your career, and the ways to establish influence.You'll learn:why the core values that many veterans have are a great fit for security roleshow to think about transition careers, roles, and companieshow to build an ecosystem of mentorswhy to partner with someone whose strengths complement your weaknesseswhy to seek feedback that stings________________________________GuestDavid CrossSenior VP & CISO at Oracle [@Oracle]On LinkedIn | https://linkedin.com/in/%E2%98%A2%EF%B8%8F-david-b-cross-b856657On Twitter | https://twitter.com/MrDBCross________________________________HostTed HarringtonOn ITSPmagazine  

Tech Done Different
Lessons From Secret Service | A Conversation With Former Special Agent, John Toney | Tech Done Different With Ted Harrington

Tech Done Different

Play Episode Listen Later Apr 19, 2022 27:14


Former special agent John Toney joins Tech Done Different to provide insights gleaned from the Secret Service, and how he applies those insights now as a Global CISO in the private sector. You'll learn how protecting a US President is pretty much the same as protecting your digital assets, as well as how to build teams, foster culture, and so much more.You'll learn:when to move and when not to movewhy incident response needs to be done in advancehow stress prevents good decisionswhy (and how) to be your own best self advocatewhy it matters for leaders to coach their teams on how to share information________________________________GuestJohn ToneyGlobal Chief Information Security Officer at City Electric Supply [@CityElectricUSA] & former Special Agent, US Secret Service [@SecretService]On LinkedIn | https://www.linkedin.com/in/johntoney/________________________________HostTed HarringtonOn ITSPmagazine  

Tech Done Different
Building An Iconic Business | A Conversation With Entrepreneur And Author, Richard Thalheimer | Tech Done Different With Ted Harrington

Tech Done Different

Play Episode Listen Later Apr 13, 2022 29:20


Entrepreneurial legend, Richard Thalheimer, joins Tech Done Different to teach us the many things he learned by starting and growing The Sharper Image.You'll learn:how to adapt to disruptive technologywhy it's common for people to say No (hint: it's safe)why to execute "management by opportunity"why you should talk about your idea to everyone you meet (and why withholding it actually holds you back)what to look for in people you hire, and how to make room for them to growwhy to disregard formal training and prioritize on the ground trainingwhy to be nice________________________________GuestRichard ThalheimerFounder and Former CEO of The Sharper Image [@richard_solo]On LinkedIn | https://linkedin.com/in/richard-thalheimer-6b481a213________________________________HostTed HarringtonOn ITSPmagazine  

Tech Done Different
Starting With Security | A Conversation With Author Of Designing Secure Software, Loren Kohnfelder | Tech Done Different With Ted Harrington

Tech Done Different

Play Episode Listen Later Apr 5, 2022 27:29


Fellow security author, Loren Kohnfelder, joins Tech Done Different to teach us how developers (and their managers) should think about building more secure software.You'll learn:why to understand threats as the starting point in building softwarewhy collaboration between developer and security teams matterswhy to ask "what's the worst that could happen?" as a way to think about secure softwarewhy empathy is the most important soft skill for building secure software________________________________GuestLoren KohnfelderAuthor of Designing Secure SoftwareOn LinkedIn | https://linkedin.com/in/kohnfelder________________________________HostTed HarringtonOn ITSPmagazine  

Tech Done Different
Researchers Are Your Friends | A Conversation With Jay Balan | Tech Done Different With Ted Harrington

Tech Done Different

Play Episode Listen Later Mar 29, 2022 29:43


As a Security Research Director, Jay Balan has lived on both sides of the responsible disclosure process: he is a researcher himself, submitting vulnerabilities to companies—and he has a built his own bug bounty program for his company, to receive vulnerabilities. He joins Tech Done Different to discuss the current state of relations between researchers and the companies they study, and what needs to change.You'll learn:why it matters to have a security contact at your companywhy to hire a security company, and how to vet themwhy it is good to allow white hat hackers to hack you (yes, seriously)why "no vulnerabilities" is not the goal________________________________GuestJay BalanDirector of Security Research at Bitdefender [@Bitdefender]On Twitter | https://twitter.com/JaymzuOn LinkedIn | https://linkedin.com/in/jaymzu________________________________HostTed HarringtonOn ITSPmagazine  

Webcology on WebmasterRadio.fm
Application Security with Cybersecurity Author Ted Harrington

Webcology on WebmasterRadio.fm

Play Episode Listen Later Mar 25, 2022 58:42


Jim and Dave speak with Ted Harrington who argues that companies need to take a similar approach to secure their systems. He explains how important it is to think outside the box and be willing to push boundaries in potentially troublesome ways, whether the subject is application security or something else entirely.Ted Harrington is the author of HACKABLE: How to Do Application Security Right, and the Executive Partner at Independent Security Evaluators (ISE), the company of ethical hackers famous for being the first to hack the iPhone. He's overseen security research hacking medical devices, password managers, and cryptocurrency wallets. Ted has helped hundreds of companies fix tens of thousands of security vulnerabilities, including Disney, Amazon, Google, Netflix, Adobe, Warner Brothers, Qualcomm, and more. For his stewardship of security research that Wired Magazine says “wins the prize, hands down,” Ted has been named both Executive of the Year [by American Business Awards] and 40 Under 40 [by SD Metro].  He leads a team that started and organizes IoT Village, an event whose hacking contest is a three-time DEFCON Black Badge winner, and which represents the discovery of more than 300 zero-day vulnerabilities (and counting). Ted‘s work has been featured in more than 100 media outlets, including The New York Times, Financial Times, Wall Street Journal, Washington Post, and USA Today. Ted is a Boston Marathon finisher, and holds a Bachelor's degree from Georgetown University, where he started his first company while a student.Support this podcast at — https://redcircle.com/webcology/exclusive-contentAdvertising Inquiries: https://redcircle.com/brandsPrivacy & Opt-Out: https://redcircle.com/privacy

Tech Done Different
Building Better Workplaces | A Conversation With Chloé Messdaghi | Tech Done Different With Ted Harrington

Tech Done Different

Play Episode Listen Later Mar 22, 2022 24:53


Chloé Messdaghi joins Tech Done Different to help illuminate how to create better workplaces, what motivates employees today, how to avoid burnout, and more.You'll learn:why mental health matterswhat causes burnoutwhy depression is on the risehow to think about notificationswhat to do when you go on vacation________________________________GuestChloé MessdaghiFounder & Principal, Head of Security Research at Impactive ConsultingOn ITSPmagazine  

Tech Done Different
The Machines Won't Kill Us | A Conversation With Ria Cheruvu | Tech Done Different With Ted Harrington

Tech Done Different

Play Episode Listen Later Mar 15, 2022 31:26


Ria Cheruvu commonly gets asked about the ethical implications of artificial intelligence. especially if the machines will rise up to be our overlords soon. She addresses this and more.As the AI Ethics Lead Architect for Intel. Ria Cheruvu commonly gets asked about the ethical implications of artificial intelligence... especially if the machines will rise up to be our overlords soon. She addresses this and more in this episode of Tech Done Different.You'll learn:why AI is at the intersection most domainswhy the state of AI is nowhere near the problems as depicted in science fiction... but some much more problematic issues are already present today (and what to do about it)what each of us should do in order to address the many ethical, scientific, and practical challenges of AI as it exists today (and will years from now)________________________________GuestRia CheruvuAI Ethics Lead Architect at Intel [@intel]On Linkedin | https://www.linkedin.com/in/ria-cheruvu-54348a173/________________________________HostTed HarringtonOn ITSPmagazine  

Tech Done Different
Lead With Positive Effects | A Conversation With April Sabral | Tech Done Different With Ted Harrington

Tech Done Different

Play Episode Listen Later Mar 8, 2022 26:56


Leadership coach, author, and entrepreneur, April Sabral, joins Tech Done Different to teach us why leaders need to become more aware in order to create better connections.You'll learn:why these three pillars of leadership success matter: Accept, Create, and Teachwhy to measure performance but not judge the performerwhy emotions matter in leadership and how to think about themhow to ask better questions, and use questions to lead betterwhy leaders must have a positive effect________________________________GuestApril SabralCEO & Founder retailu | Coach to Executives | Author of The Positive Effect | Leadership ExpertOn Linkedin | https://linkedin.com/in/aprilsabralOn Twitter | https://twitter.com/aprilsabral________________________________HostTed HarringtonOn ITSPmagazine  

Tech Done Different
Build Allies | A Conversation With Shamane Tan | Tech Done Different With Ted Harrington

Tech Done Different

Play Episode Listen Later Mar 1, 2022 30:43


Author and leader Shamane Tan joins Tech Done Different to teach insights from her new book Cyber Mayday about what to do before, during, and after a security incident.You'll learn:what to do before, during, and after a security incidentwhy allies matter, and should be the first thing to establish for a new security executivewhy to prioritize different efforts in the security programhow to think about empathy in the midst of a security breachwhy it's dumb (and a complete misunderstanding of how security works) to make the CISO be the "fall guy" in the event of a security breach________________________________GuestShamane TanChief Growth Officer at Sekuro and Best-Selling AuthorOn Linkedin | https://www.linkedin.com/in/shamane/On Twitter | https://twitter.com/ShamaneTan________________________________HostTed HarringtonOn ITSPmagazine  

Tech Done Different
What Is A Hacker | A Conversation With John Hammond | Tech Done Different With Ted Harrington

Tech Done Different

Play Episode Listen Later Feb 22, 2022 33:55


Security researcher, advocate, and fellow ginger John Hammond joins Tech Done Different to provide insights on how to think like both attackers and defenders, and how a technical person can become a good communicator of ideas.You'll learn:Why the defender only needs to be right onceWhy to know thy enemy, and how you have some control over the information the attacker can collectWhat a hacker really is, and why this distinction mattersWhat it means to "defend forward"Why it matters to teach, learn, repeatWhy the more things change in security the more we need to adhere to the fundamentals________________________________GuestJohn HammondSenior Security Researcher at HuntressOn Linkedin | https://linkedin.com/in/johnhammond010On Twitter | https://twitter.com/_johnhammondOn YouTube | https://www.youtube.com/channel/UCVeW9qkBjo3zosnqUbG7CFw________________________________HostTed HarringtonOn ITSPmagazine  

Tech Done Different
Questions Are Communication | A Conversation With Camille Morhardt | Tech Done Different With Ted Harrington

Tech Done Different

Play Episode Listen Later Feb 16, 2022 26:45


As the Director of Security Initiatives for Intel's Security Center of Excellence, Camille Morhardt gets to learn from some of the brightest minds in all of tech. As the co-host of one of the biggest public podcasts in the game today Cyber security Inside, she brings those bright minds to the audience. She joins TDD to teach us how to communicate complex ideas simply.You'll learn:why good questions are the key to communicating simplywhy to not let go of a line of questioning until you fully understand (and then keep asking more)how an unusually long pause can lead to the insights you're looking forhow to get to the heart of the matterthe 3 phase process for success in security: 1) get started 2) don't stop learning and 3) gain insights from outside of your sphere________________________________GuestCamille MorhardtDirector, Security Initiatives and Communications, Intel and Co-Host of Cyber Security Inside PodcastOn Linkedin | https://www.linkedin.com/in/camille-morhardt-448a182/On Twitter | https://twitter.com/morhardt________________________________HostTed HarringtonOn ITSPmagazine  

Tech Done Different
Mentor At Scale | A Conversation With Helen Patton | Tech Done Different With Ted Harrington

Tech Done Different

Play Episode Listen Later Feb 8, 2022 34:46


Helen Patton joins Tech Done Different to provide insights from her new book and explain the Cybersecurity Canon, a collection of books to help security professionals.As an advisory CISO and published author, Helen Patton advocates for how to get people into the security industry, and how to navigate a career in the field. She joins Tech Done Different to provide insights from her new book and explain the Cybersecurity Canon, a collection of books to help security professionals.You'll learn:why writing a book enables you to "mentor at scale"why we should hire based on potential, not demonstrated experiencewhy recruiting for security should include going to middle and high schoolswhy self care is so important in a security careerwhy you need to understand your "why"why security is a business enabler________________________________GuestHelen PattonOn Linkedin | https://www.linkedin.com/in/helenpatton/On Twitter | https://twitter.com/CisoHelen________________________________HostTed HarringtonOn ITSPmagazine  

She Said Privacy/He Said Security
How Can Hackers Improve Your Company's Security?

She Said Privacy/He Said Security

Play Episode Listen Later Dec 9, 2021 32:52


Ted Harrington is the #1 best-selling Author of Hackable: How to do Application Security Right. He is also the Executive Partner at Independent Security Evaluators, a company of ethical hackers famous for hacking cars, medical devices, web applications, and password managers. Ted has helped hundreds of companies — including Google, Amazon, and Netflix — fix security vulnerabilities. He also hosts the Tech Done Different podcast. In addition to this, Ted is a professional keynote speaker and the Co-founder of IoT Village, a traveling hacking event series. Previously, he was the Chief Executive Officer at NMG Technologies and the Director at Wolfpack. In this episode… Hackers are evil people trying to destroy companies and wreak havoc on the world of privacy and security. Right? Not necessarily. The word hacking and the term hacker have become grossly abused. Hackers are neither good nor bad — they are simply problem solvers. They see a system and say, “It's supposed to do one thing. Can it do this other thing instead?” As Ted Harrington explains, the differentiating factor is the hacker's motivation: are they after personal gain or trying to harm an organization? Those are attackers. On the other hand, ethical hackers find vulnerabilities in order to fix them and make the technology stronger. By identifying all the holes in your security perimeter, a team of ethical hackers can show you how to make your defense almost impenetrable. In this episode of She Said Privacy/He Said Security, Jodi and Justin Daniels sit down with Ted Harrington, Executive Partner at Independent Security Evaluators, to discuss how ethical hackers can improve your company's cybersecurity. Ted talks about why many companies' security is lagging behind technology developments, the benefits of ethical hacking, and his tips for keeping your passwords secure.

The Cybertraps Podcast
HACKABLE: How to Do Application Security Right with Ted Harrington Cybertraps 65

The Cybertraps Podcast

Play Episode Listen Later Aug 6, 2021 42:15


Ted Harrington is the #1 best selling author of HACKABLE: How to Do Application Security Right, and the Executive Partner at Independent Security Evaluators (ISE), the company of ethical hackers famous for hacking cars, medical devices, web applications, and password managers. He's helped hundreds of companies fix tens of thousands of security vulnerabilities, including Google, Amazon, and Netflix. Ted has been featured in more than 100 media outlets, including The Wall Street Journal, Financial Times, and Forbes. His team founded and organizes IoT Village, an event whose hacking contest is a three-time DEF CON Black Badge winner. He hosts the Tech Done Different podcast. To get help with security consulting and security assessments, or to book Ted to keynote your next event, visit https://www.tedharrington.com. Using a modifier with a password How to think like an attacker A hacker is a problem solver - the intent is what matters. My job is to think the bad thoughts and ask the hard questions How to hack a bar waiting line. Determine what the rules of the game are The people who really succeed are the people who see the way the world could be. It's really about independent thinking. Constraints provide opportunity for us to do better. How to teach people to be better Give kids opportunities to explore their creativity. Most humans are inherently wired to do good and make good choices. Be Better - the two words that define security Start from the foundation that all people are good. Automation of hacking techniques and if it's too easy to be bad, people will do that. The democratization of an elite skill Zeroday vulnerabilities marketplace Security research community. The Blockchain bandit. What do we do about zerodays? We have to accept that they exist, and then we have to go find them.