POPULARITY
Podcast: Error Code (LS 26 · TOP 10% what is this?)Episode: EP 52: Hacking Cellular-Enabled IoT DevicesPub date: 2024-12-18Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationThis is the story of the secret life of cellular chips and why we need to mitigate against the unintended access they provide. Deral Heiland, Principal Security Research for IoT at Rapid 7, describes a research project he presented at the IoT Village at DEF CON 32 where they compiled AT command manuals from various vendors, discovering unexpected functionalities, such as internal web services.The podcast and artwork embedded on this page are from Robert Vamosi, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
This is the story of the secret life of cellular chips and why we need to mitigate against the unintended access they provide. Deral Heiland, Principal Security Research for IoT at Rapid 7, describes a research project he presented at the IoT Village at DEF CON 32 where they compiled AT command manuals from various vendors, discovering unexpected functionalities, such as internal web services.
In this episode, Brian and John dive into the world of Capture the Flag competitions in the realm of cybersecurity. Our special guest, Rachael Tubbs from IoT Village, discusses the rise of CTFs and how they are becoming a popular feature at cybersecurity conferences like Defcon. We explore how IoT Village is leading the way in making these conferences more accessible, exhibiting a range of innovative devices, and even holding a free virtual conference. We also discuss the challenges of developing security life cycles for IoT development and how the limited security mindset of small companies is a concerning trend across the 50 billion devices in use. Tune in for an exciting and informative look into the rapidly evolving world of cybersecurity.Topics covered in this episode include:Introduction to Capture the Flags (CTFs) and their importance in securityBackground of IoT VillageDefcon CTF and its valueIoT Village's response to pandemicRachel Tubbs is a psychology graduate who developed an interest in understanding human motivation. She started working as a contractor for the US Government's Defense Counterintelligence Security Agency, where she was introduced to the world of cybersecurity. However, she found that the private sector was more suited to her, and she eventually found a position at IoT Village, a security consulting and research firm founded by Independent Security Evaluators. Rachel has been with IoT Village for almost three years now. Let's get into Things on the IoT Security Podcast!Follow Brian Contos on LinkedIn at https://www.linkedin.com/in/briancontosAnd you can follow John Vecchi at https://www.linkedin.com/in/johnvecchiThe IoT Security Podcast is powered by Phosphorus Cybersecurity. Join the conversation for the IoT Security Podcast — where xIoT meets Security. Learn more at https://phosphorus.io/podcast
Guest: Nick Hughes, CEO of EITR Technologies [@eitr_tech]On LinkedIn | https://www.linkedin.com/in/nicholasmhughes/________________________________Hosts:Ben SchmerlerOn ITSPmagazine
Guest: Andrew Lemon, CEO / Principal Security Engineer at Red ThreatOn LinkedIn | https://www.linkedin.com/in/lemonitup/On Twitter | https://twitter.com/LemonitupOn YouTube | https://www.youtube.com/@redthreatsec________________________________Host: Ben SchmerlerOn ITSPmagazine
Guest: Debasish Biswas, Chief Technology Officer at Aware [@Aware_HQ]On LinkedIn | https://www.linkedin.com/in/debasish-biswas/________________________________Host: Ben SchmerlerOn ITSPmagazine
Guest: Matt Brown, Senior Security Analyst at ISE [@ISEsecurity]On LinkedIn | https://www.linkedin.com/in/mattbrwn/________________________________Hosts:Ben SchmerlerOn ITSPmagazine
Guest: Cody MacDonald, CTO at IPT GlobalOn LinkedIn | https://www.linkedin.com/in/cody-macdonald-5ba20a26/________________________________Host: Ben SchmerlerOn ITSPmagazine
Guest: Sabela García Cuesta, Artist and TEDx [@TEDx] Franfurt [@TEDxFrankfurt] SpeakerOn LinkedIn | https://www.linkedin.com/in/sabela-garcia-cuesta/On Twitter | https://twitter.com/HHSabelaOn YouTube | https://www.youtube.com/channel/UC2ZDUWKjCPuQC4z14xXIp0w________________________________Host: Ted HarringtonOn ITSPmagazine
Guest: Jako Bär, Performer, Songwriter, and TEDxFrankfurt [@TEDxFrankfurt] PerformerOn LinkedIn | https://www.linkedin.com/in/jako-b%C3%A4r-097675247/On Facebook | https://www.facebook.com/BAER.artpopOn YouTube | https://www.youtube.com/c/BAER_artpop________________________________Host: Ted HarringtonOn ITSPmagazine
Guest: Michael Goetzman, CISO at Solano Security and Founder of CypherCon [@cyphercon]On Twitter | https://twitter.com/GoetzmanOn LinkedIn | https://www.linkedin.com/in/goetzman/________________________________Host: Ben SchmerlerOn ITSPmagazine
GuestBarry PhetteplaceCTO at Censis Technologies, Inc. [@CensisTech]On LinkedIn | https://www.linkedin.com/in/barry-phetteplace-083841________________________________HostsTed HarringtonOn ITSPmagazine
Welcome to RETAIL IN AMERICA!This podcast is part of The RETAIL IN AMERICA tour, my year-long journey to discover incredible retail heroes all across the country, celebrating our retail culture, community, and careers. Go to retailpride.com or IG @retail pride to see it all, including past podcast episodes, playlists, and future cities on tour.This is an extraordinary episode filled with incredible takeaways from my great friend, Ted Harrington.Ted has many titles, including the #1 best-selling author of HACKABLE, the Tech Done Different podcast host, and the Executive Partner at Independent Security Evaluators (ISE), the company of ethical hackers famous for hacking cars, medical devices, web applications, and password managers. Ted and his company have helped hundreds of companies fix tens of thousands of security vulnerabilities, including Google, Amazon, and Netflix.Ted has been featured in over 100 media outlets, including The Wall Street Journal, Financial Times, and Forbes. His team also founded and organizes IoT Village, an event whose hacking contest is a three-time DEF CON Black Badge winner.And just last month, he delivered his first TedTalk!But most importantly, he's a man with great wisdom that he generously shared with me as we sat together a recent morning while the Airstream was parked in Malibu.Don't miss this conversation, as you may discover you're a hacker too!A huge thank you to the three title sponsors fueling the RETAIL IN AMERICA tour and this podcast:Spotify Advertising Spotify is the #1 podcast platform in the US and has grown to over 420M monthly unique registered users around the globe, over half of which are supported on the ad platform. Spotify advertising will help you reach and target your audience across devices, locations, and formats. YOOBIC Over 300 companies in 80 countries trust YOOBIC to drive their retail performance at scale, get real-time visibility into multi-location business execution, digitized task management, and more. KWI is the industry's only true turnkey omni-channel platform for specialty retailers. With over 35 years of experience, let KWI help you execute flawlessly with the features that matter most, including endless aisle, clienteling, mobile checkout, inventory management, e-commerce, and more. The RETAIL IN AMERICA podcast team includes:Producer Roi PeretsAudio Engineer
GuestBen SchmerlerSenior Solutions Consultant at Independent Security Evaluators [@ISEsecurity]On LinkedIn | https://www.linkedin.com/in/ben-schmerler-9530304/________________________________HostTed HarringtonOn ITSPmagazine
Buyers want to be informed, and the internet has made finding the info they need easy to do. Greg Coticchia shares insights into how behavior is changing, and how to think differently about selling too.You'll learn:Why buying behavior is changingHow to think differently about the interplay between marketing, sales, and moreWhy you need to make buying easy________________________________GuestGreg CoticchiaCEO of Sopheon [@Sopheon]On Twitter | https://twitter.com/GregCottOn LinkedIn | https://linkedin.com/in/gregcoticchia________________________________HostTed HarringtonOn ITSPmagazine
We are joined by the Founder & Chair of Bugcrowd, Casey Ellis, to discuss where security research is today, where it is going, and many other aspects of how to think about securing systems.You'll learn:where security research is today, and where it is goingwhy businesses should be incentivized to secure systems (hint: not just because it's the right thing to do)how to think about security of open source systems________________________________GuestCasey EllisFounder, Chairman, and CTO of Bugcrowd [@Bugcrowd]On Twitter | https://twitter.com/caseyjohnellisOn LinkedIn | https://linkedin.com/in/caseyjohnellis________________________________HostTed HarringtonOn ITSPmagazine
In this episode of Tech Done Different, you'll hear from Aaron Day, the CEO of Amaze, about how and why to build a vision statement.You'll learn:why a vision statement mattershow to build a vision statementhow to communicate the vision statementhow to use the vision statement to guide daily decisions________________________________GuestAaron DayCEO of Amaze [@amazeanywhere]On Twitter | https://twitter.com/adhbcaOn LinkedIn | https://www.linkedin.com/in/aaroneday/________________________________HostTed HarringtonOn ITSPmagazine
A season veteran in building software businesses, Mark Edwards joins Tech Done Different to share the common pitfalls that software companies make and what to do about it.You'll learn:why (and how!) to identify your areas of excellence and areas of weaknesswhat happens when you are always operating with your exit strategy in mindwhy to not be fearless, but to "fear less"________________________________GuestMark EdwardsCEO of Boss Equity [@boss_equity]On Twitter | https://twitter.com/MarkLEdwardsOn LinkedIn | https://linkedin.com/in/markledwardsOn YouTube | https://www.youtube.com/channel/UCkUpBhDr512e0pdOjJWJZ7Q________________________________HostTed HarringtonOn ITSPmagazine
Carla Donev, the VP and CISO at NiSource, joins Tech Done Different to share her experiences as a female in the male-dominated field of technology, and how she went from being an accountant to a CISO.You'll learn:how to get more women into the cyber fieldswhy to say yes when opportunities present themselveshow to balance your business needs with your security challengeswhen you should use your gut and common senseand more________________________________GuestCarla DonevVP of Infrastructure and Chief Information Security Officer at NiSource [@NiSourceInc]On LinkedIn | https://www.linkedin.com/in/carladonev/________________________________HostTed HarringtonOn ITSPmagazine
Jonathan Kite, the founder & CEO of Rent Ready, joins Tech Done Different to share insights in how he built his software company, and how they overcame many obstacles along the way.You'll learn:how to fail forwardwhat happens when your vision needs to changehow to think through solving complex problemshow to interview for adaptability to changeand more________________________________GuestJonathan KiteCo-Founder & CEO at Rent ReadyOn LinkedIn | https://linkedin.com/in/jonathan-kite-13025752________________________________HostTed HarringtonOn ITSPmagazine
Nicole Little joins TDD to explain Web 3.0, what it is, and how to think about security around it. She's a security researcher who currently works in the content protection team at Disney.You'll learn:what Web 3.0 is and why it matterswhat security challenges that Web 3.0 introduceshow to think about the security versus benefits tradeoffs of this emerging technologywhy independent security assessments matterand more________________________________GuestNicole LittleSenior Manager, Distribution Technology at Walt Disney Studios [@DisneyStudios]On LinkedIn | https://www.linkedin.com/in/nicolellittle/________________________________HostTed HarringtonOn ITSPmagazine
Today on That Tech Pod, Laura and Gabi talk to Ted Harrington. Ted Harrington is the author of HACKABLE: How to Do Application Security Right and the Executive Partner at Independent Security Evaluators (ISE), the company of ethical hackers famous for hacking cars, medical devices, and password managers. He's helped hundreds of companies fix tens of thousands of security vulnerabilities, including Google, Amazon, Microsoft, Netflix, and more. Ted has helped hundreds of companies fix tens of thousands of security vulnerabilities, including Disney, Amazon, Google, Netflix, Adobe, Warner Brothers, Qualcomm, and more. For his stewardship of security research that Wired Magazine says “wins the prize, hands down,” Ted has been named both Executive of the Year by the American Business Awards and an SD Metro 40 Under 40 entrepreneur. He leads a team that started and organizes IoT Village, an event whose hacking contest is a three-time DEFCON Black Badge winner, representing the discovery of more than 300 zero-day vulnerabilities (and counting). Ted has been featured in more than 100 media outlets, including The Wall Street Journal, Financial Times, and Forbes. His team founded and organizes IoT Village, an event whose hacking contest has produced three DEF CON Black Badges.Learn more here.
25 years of BlackHat gatherings and related research. 20+ years of venture capital, investments, and mergers & acquisitions dedicated to CyberSecurity. That's a lot of time and presumably a lot of effort and money. So...where do we find ourselves on the road to better cyber defenses?Our guest for this episode is Bob Ackerman. Bob started AllegisCyber nearly 20 years ago with the vision to be the first venture firm to focus 100% on cyber security investing. We are experiencing a third downmarket where Bob has been as a dedicated cyber VC—a distinction shared by a select few—and he has helped hundreds of startups navigate these cycles. The geopolitical landscape, threats to civilian critical infrastructure, and heightened government involvement collectively make this market even more different, uncertain, and riddled with risk for the startups and investors new to the cyber domain. A lot has happened. But a lot has stayed the same as well. Let's explore this a bit during this chat as part of our Black Hat and DEF CON 2022 coverage.Be sure to catch all of our conversations from Black Hat and DEF CON 2022 at https://www.itspm.ag/bhdc22____________________________GuestBob AckermanManaging Director & Founder - AllegisCyber Capital [@AllegisCyber]On LinkedIn | https://www.linkedin.com/in/bob-ackerman-a233336/On Twitter | https://twitter.com/BobAckerman____________________________This Episode's SponsorsCrowdSec | https://itspm.ag/crowdsec-b1vpEdgescan | https://itspm.ag/itspegwebPentera | https://itspm.ag/pentera-tyuw____________________________ResourcesForbes Article - New SEC Cybersecurity Reporting Requirements: What Companies Should Know About Regulations: https://www.forbes.com/sites/forbesfinancecouncil/2022/07/08/new-sec-cybersecurity-reporting-requirements-what-companies-should-know-about-regulationsForbes Article - New SEC Cybersecurity Reporting Requirements: Three Things Companies Need To Do Now: https://www.forbes.com/sites/forbesfinancecouncil/2022/05/25/new-sec-cybersecurity-reporting-requirements-three-things-companies-need-to-do-now____________________________For more Black Hat and DEF CON Event Coverage podcast and video episodes visit: https://www.itspmagazine.com/black-hat-2022-and-def-con-hacker-summer-camp-las-vegas-usa-cybersecurity-event-and-conference-coverageAre you interested in telling your story in connection with Black Hat and DEF CON by sponsoring our coverage?
Everything is connected these days — from coffee machines to home security cameras to drones. And they all could use a good ole hacking. Regardless of your hacking skills level, join the IoT Village crew for good vibes and tons of stuff to get your hands on.Join us and our guest, Rachael Tubbs, as we get into the vibe of all things IoT Village at DEF CON 2022!About the IoT VillageIoT Village advocates for advancing security in the Internet of Things (IoT) industry through bringing researchers and industry together. IoT Village hosts talks by expert security researchers, interactive hacking labs, live bug hunting in the latest IoT tech, and competitive IoT hacking contests. Over the years IoT Village has served as a platform to showcase and uncover hundreds of new vulnerabilities, giving attendees the opportunity to learn about the most innovative techniques to both hack and secure IoT. IoT Village is organized by security consulting and research firm, Independent Security Evaluators (ISE), and the non-profit organization, Loudmouth Security.Be sure to catch all of our conversations from Black Hat and DEF CON 2022 at https://www.itspm.ag/bhdc22____________________________GuestRachael TubbsMarketing and Events Lead at Independent Security Evaluators [@ISEsecurity]On LinkedIn | https://www.linkedin.com/in/rachael-tubbs-1a1085135/____________________________This Episode's SponsorsCrowdSec | https://itspm.ag/crowdsec-b1vpEdgescan | https://itspm.ag/itspegweb____________________________ResourcesIoT Village DEF CON Schedule: https://www.iotvillage.org/defcon.htmlIoT Village website: https://www.iotvillage.org/On LinkedIn | https://www.linkedin.com/showcase/iotvillageAt DEF CON: https://forum.defcon.org/node/239789____________________________For more Black Hat and DEF CON Event Coverage podcast and video episodes visit: https://www.itspmagazine.com/black-hat-2022-and-def-con-hacker-summer-camp-las-vegas-usa-cybersecurity-event-and-conference-coverageAre you interested in telling your story in connection with Black Hat and DEF CON by sponsoring our coverage?
Everything is connected these days — from coffee machines to home security cameras to drones. And they all could use a good ole hacking. Regardless of your hacking skills level, join the IoT Village crew for good vibes and tons of stuff to get your hands on.Join us and our guest, Rachael Tubbs, as we get into the vibe of all things IoT Village at DEF CON 2022!About the IoT VillageIoT Village advocates for advancing security in the Internet of Things (IoT) industry through bringing researchers and industry together. IoT Village hosts talks by expert security researchers, interactive hacking labs, live bug hunting in the latest IoT tech, and competitive IoT hacking contests. Over the years IoT Village has served as a platform to showcase and uncover hundreds of new vulnerabilities, giving attendees the opportunity to learn about the most innovative techniques to both hack and secure IoT. IoT Village is organized by security consulting and research firm, Independent Security Evaluators (ISE), and the non-profit organization, Loudmouth Security.Be sure to catch all of our conversations from Black Hat and DEF CON 2022 at https://www.itspm.ag/bhdc22____________________________GuestRachael TubbsMarketing and Events Lead at Independent Security Evaluators [@ISEsecurity]On LinkedIn | https://www.linkedin.com/in/rachael-tubbs-1a1085135/____________________________This Episode's SponsorsCrowdSec | https://itspm.ag/crowdsec-b1vpEdgescan | https://itspm.ag/itspegwebPentera | https://itspm.ag/pentera-tyuw____________________________ResourcesIoT Village DEF CON Schedule: https://www.iotvillage.org/defcon.htmlIoT Village website: https://www.iotvillage.org/On LinkedIn | https://www.linkedin.com/showcase/iotvillageAt DEF CON: https://forum.defcon.org/node/239789____________________________For more Black Hat and DEF CON Event Coverage podcast and video episodes visit: https://www.itspmagazine.com/black-hat-2022-and-def-con-hacker-summer-camp-las-vegas-usa-cybersecurity-event-and-conference-coverageAre you interested in telling your story in connection with Black Hat and DEF CON by sponsoring our coverage?
As CISO of a cloud startup, Jonathan Rau fields tons of security questionnaires. He joins the show to explain the many struggles the vendors receiving such questionnaires face and what to do about it.You'll learn:why questionnaires need to be customizedwhy it's lazy to send the same questions to everyonewhy VRM is really about building trust, not just about answering questionsand more________________________________GuestJonathan RauCISO at Lightspin [@LightspinTech]On LinkedIn | https://www.linkedin.com/in/jonathan-r-2b2742112/________________________________HostTed HarringtonOn ITSPmagazine
DEF CON is 30 years old this year, and it's bigger and better in part because of topic-specific villages. Here's an inside look at four of the most popular villages. In this episode I'm talking to the organizers of the Lockpicking Village,the ICS village, the Car Hacking Village, and the Aerospace Village. And, there's thirty more villages including Girls Hack Village, the Voting Machine Hacking village, the IoT Village, and the Bio Hacking village. In each you will find people with like interests. You will learn cool new things. And … you won't be disappointed.
What happens when you remove friction? Better yet, what happens when you focus on small, incremental gains that compound on each other rather than aiming for big massive wins?On this episode, we are joined by ex-Facebook & ex-Microsoft tech leader Josh Twist to dig into these topics and more.You'll learn:why small wins are better than big winswhy it's mission critical to make things easywhy UX doesn't win deals (but it does earn advocacy)why feature growth can kill (rather than help) a product________________________________GuestJosh TwistCo-Founder & CEO at Zuplo [@zuplo]On LinkedIn | https://linkedin.com/in/joshtwistOn Twitter | https://twitter.com/joshtwist________________________________HostTed HarringtonOn ITSPmagazine
Mounir Hahad knows a thing or two about threat intelligence, and he joins Tech Done Different to share those insights.You'll learn:what threat intelligence, and why it matterswhy it's important to share informationhow to think about outsourcing, insourcing, or some combinationand more________________________________GuestMounir HahadHead of Threat Labs at Juniper NetworksOn LinkedIn | https://linkedin.com/in/mounirhahadOn Twitter | https://twitter.com/Mounirhahad________________________________HostTed HarringtonOn ITSPmagazine
In this episode, we are joined by long-time medical device veteran Chris Barron, to help walk us through the many challenges that early-stage medical device startups face, and how to overcome them.You'll learn:why fundraising is a long processwhat you need to make clear to investors in order to get them to invest in your startupwhat role your mission has in deciding where to allocate resourceswhy to apply your passion________________________________GuestChris BarronVP of Engineering at Respiratory Motion, Inc.On LinkedIn | https://linkedin.com/in/chris-barron________________________________HostTed HarringtonOn ITSPmagazine
Sometimes the best ideas are the craziest ones. In this episode of Tech Done Different, entrepreneur Zach Belanger walks us through how to think big, think creatively, and pursue big goals.You'll learn:why sometimes the right ideas sound the craziestwhy crazy ideas are better than boring ideaswhy to do it "indie" rather than "industry"why to ask if it's ever been done before (and what to do with the answer you get)why to start as soon as possible________________________________GuestZach BelangerCEO of Mob Entertainment [@EnchantedMob]On LinkedIn | https://linkedin.com/in/zachary-belanger-%F0%9F%8C%88-73b072118On YouTube | https://www.youtube.com/c/EnchantedMob/videos________________________________HostTed HarringtonOn ITSPmagazine
As we build complex software systems, we also need to ensure we understand what to some might feel unscientific: how does this system make me feel? Mariana Muntean joins Tech Done Different to help us understand the differences between artistic thinkers and engineers, and how the two can partner to produce great results.You'll learn:why creatives and engineers butt headswhy abstraction is an important skillwhy to use visuals to communicatewhy an experienced UI/UX designer saves time and moneywhy to get feedback from outside the team building the thing________________________________GuestMariana MunteanCo-Founder & CEO of CINEVVA [@CINEVVAGames]On LinkedIn | https://linkedin.com/in/munmariaOn Twitter | https://twitter.com/upontheroofs________________________________HostTed HarringtonOn ITSPmagazine
Candice Lu joins Tech Done Different to teach us about entrepreneurship, building teams, and developing leaders.You'll learn:why being a founder is about controlwhy autonomy mattershow to create a culture that people want to be part ofwhy emotional intelligence is the most important factor to being truly consultativewhy doing right by your people creates lasting positive impactwhy to grow you must let go________________________________GuestCandice LuFounding Partner & Managing Director at OmPrem Solution Partners [@OnPremSP]On LinkedIn | https://www.linkedin.com/in/cseneriches________________________________HostTed HarringtonOn ITSPmagazine
What is the interplay between hard skills, soft skills, and personality? How can leaders groom people in all of these areas? Sameer Ranjan, the CTO of Catenate, joins Tech Done Different to explain how data science drives all of this.You'll learn:why no amount of money will keep a person in a role that's not right for them, and why we need to put the right people in the right roleswhat the difference is between hard skills, soft skills, and personality traitshow leaders should groom people based on personalityhow our brains are wired to learn________________________________GuestSameer RanjanCTO & Director of Data Science at Catenate [@Catenate17]On LinkedIn | https://linkedin.com/in/sameerranjan009On Twitter | https://twitter.com/sameerranjan009________________________________HostTed HarringtonOn ITSPmagazine
Author & business consultant Craig Perkins joins Tech Done Different to help us understand how to reject conventional thinking and live more entrepreneurially. Whether you are a leader, individual contributor, or entrepreneur, these principles are for you.You'll learn:why to move towards fearhow to learn about yourself in order to find your passionwhy to do what gives you goossbumpswhat it means to listen to your authentic selfhow to persevere over obstacles________________________________GuestCraig PerkinsAuthor & Business ConsultantOn LinkedIn | https://www.linkedin.com/in/craig-a-perkins/On Twitter | https://twitter.com/perk2540________________________________HostTed HarringtonOn ITSPmagazine
David Cross has to balance both engineering and business priorities. He teaches us how to get veterans involved in cybersecurity, how to grow & pivot your career, and the ways to establish influence.As CISO for Oracle SaaS, David Cross has to balance both engineering and business priorities. He joins Tech Done Different to teach us how to get veterans involved in cybersecurity, how to grow & pivot your career, and the ways to establish influence.You'll learn:why the core values that many veterans have are a great fit for security roleshow to think about transition careers, roles, and companieshow to build an ecosystem of mentorswhy to partner with someone whose strengths complement your weaknesseswhy to seek feedback that stings________________________________GuestDavid CrossSenior VP & CISO at Oracle [@Oracle]On LinkedIn | https://linkedin.com/in/%E2%98%A2%EF%B8%8F-david-b-cross-b856657On Twitter | https://twitter.com/MrDBCross________________________________HostTed HarringtonOn ITSPmagazine
Former special agent John Toney joins Tech Done Different to provide insights gleaned from the Secret Service, and how he applies those insights now as a Global CISO in the private sector. You'll learn how protecting a US President is pretty much the same as protecting your digital assets, as well as how to build teams, foster culture, and so much more.You'll learn:when to move and when not to movewhy incident response needs to be done in advancehow stress prevents good decisionswhy (and how) to be your own best self advocatewhy it matters for leaders to coach their teams on how to share information________________________________GuestJohn ToneyGlobal Chief Information Security Officer at City Electric Supply [@CityElectricUSA] & former Special Agent, US Secret Service [@SecretService]On LinkedIn | https://www.linkedin.com/in/johntoney/________________________________HostTed HarringtonOn ITSPmagazine
Entrepreneurial legend, Richard Thalheimer, joins Tech Done Different to teach us the many things he learned by starting and growing The Sharper Image.You'll learn:how to adapt to disruptive technologywhy it's common for people to say No (hint: it's safe)why to execute "management by opportunity"why you should talk about your idea to everyone you meet (and why withholding it actually holds you back)what to look for in people you hire, and how to make room for them to growwhy to disregard formal training and prioritize on the ground trainingwhy to be nice________________________________GuestRichard ThalheimerFounder and Former CEO of The Sharper Image [@richard_solo]On LinkedIn | https://linkedin.com/in/richard-thalheimer-6b481a213________________________________HostTed HarringtonOn ITSPmagazine
Fellow security author, Loren Kohnfelder, joins Tech Done Different to teach us how developers (and their managers) should think about building more secure software.You'll learn:why to understand threats as the starting point in building softwarewhy collaboration between developer and security teams matterswhy to ask "what's the worst that could happen?" as a way to think about secure softwarewhy empathy is the most important soft skill for building secure software________________________________GuestLoren KohnfelderAuthor of Designing Secure SoftwareOn LinkedIn | https://linkedin.com/in/kohnfelder________________________________HostTed HarringtonOn ITSPmagazine
As a Security Research Director, Jay Balan has lived on both sides of the responsible disclosure process: he is a researcher himself, submitting vulnerabilities to companies—and he has a built his own bug bounty program for his company, to receive vulnerabilities. He joins Tech Done Different to discuss the current state of relations between researchers and the companies they study, and what needs to change.You'll learn:why it matters to have a security contact at your companywhy to hire a security company, and how to vet themwhy it is good to allow white hat hackers to hack you (yes, seriously)why "no vulnerabilities" is not the goal________________________________GuestJay BalanDirector of Security Research at Bitdefender [@Bitdefender]On Twitter | https://twitter.com/JaymzuOn LinkedIn | https://linkedin.com/in/jaymzu________________________________HostTed HarringtonOn ITSPmagazine
Jim and Dave speak with Ted Harrington who argues that companies need to take a similar approach to secure their systems. He explains how important it is to think outside the box and be willing to push boundaries in potentially troublesome ways, whether the subject is application security or something else entirely.Ted Harrington is the author of HACKABLE: How to Do Application Security Right, and the Executive Partner at Independent Security Evaluators (ISE), the company of ethical hackers famous for being the first to hack the iPhone. He's overseen security research hacking medical devices, password managers, and cryptocurrency wallets. Ted has helped hundreds of companies fix tens of thousands of security vulnerabilities, including Disney, Amazon, Google, Netflix, Adobe, Warner Brothers, Qualcomm, and more. For his stewardship of security research that Wired Magazine says “wins the prize, hands down,” Ted has been named both Executive of the Year [by American Business Awards] and 40 Under 40 [by SD Metro]. He leads a team that started and organizes IoT Village, an event whose hacking contest is a three-time DEFCON Black Badge winner, and which represents the discovery of more than 300 zero-day vulnerabilities (and counting). Ted‘s work has been featured in more than 100 media outlets, including The New York Times, Financial Times, Wall Street Journal, Washington Post, and USA Today. Ted is a Boston Marathon finisher, and holds a Bachelor's degree from Georgetown University, where he started his first company while a student.Support this podcast at — https://redcircle.com/webcology/exclusive-contentAdvertising Inquiries: https://redcircle.com/brandsPrivacy & Opt-Out: https://redcircle.com/privacy
Chloé Messdaghi joins Tech Done Different to help illuminate how to create better workplaces, what motivates employees today, how to avoid burnout, and more.You'll learn:why mental health matterswhat causes burnoutwhy depression is on the risehow to think about notificationswhat to do when you go on vacation________________________________GuestChloé MessdaghiFounder & Principal, Head of Security Research at Impactive ConsultingOn ITSPmagazine
Ria Cheruvu commonly gets asked about the ethical implications of artificial intelligence. especially if the machines will rise up to be our overlords soon. She addresses this and more.As the AI Ethics Lead Architect for Intel. Ria Cheruvu commonly gets asked about the ethical implications of artificial intelligence... especially if the machines will rise up to be our overlords soon. She addresses this and more in this episode of Tech Done Different.You'll learn:why AI is at the intersection most domainswhy the state of AI is nowhere near the problems as depicted in science fiction... but some much more problematic issues are already present today (and what to do about it)what each of us should do in order to address the many ethical, scientific, and practical challenges of AI as it exists today (and will years from now)________________________________GuestRia CheruvuAI Ethics Lead Architect at Intel [@intel]On Linkedin | https://www.linkedin.com/in/ria-cheruvu-54348a173/________________________________HostTed HarringtonOn ITSPmagazine
Leadership coach, author, and entrepreneur, April Sabral, joins Tech Done Different to teach us why leaders need to become more aware in order to create better connections.You'll learn:why these three pillars of leadership success matter: Accept, Create, and Teachwhy to measure performance but not judge the performerwhy emotions matter in leadership and how to think about themhow to ask better questions, and use questions to lead betterwhy leaders must have a positive effect________________________________GuestApril SabralCEO & Founder retailu | Coach to Executives | Author of The Positive Effect | Leadership ExpertOn Linkedin | https://linkedin.com/in/aprilsabralOn Twitter | https://twitter.com/aprilsabral________________________________HostTed HarringtonOn ITSPmagazine
Author and leader Shamane Tan joins Tech Done Different to teach insights from her new book Cyber Mayday about what to do before, during, and after a security incident.You'll learn:what to do before, during, and after a security incidentwhy allies matter, and should be the first thing to establish for a new security executivewhy to prioritize different efforts in the security programhow to think about empathy in the midst of a security breachwhy it's dumb (and a complete misunderstanding of how security works) to make the CISO be the "fall guy" in the event of a security breach________________________________GuestShamane TanChief Growth Officer at Sekuro and Best-Selling AuthorOn Linkedin | https://www.linkedin.com/in/shamane/On Twitter | https://twitter.com/ShamaneTan________________________________HostTed HarringtonOn ITSPmagazine
Security researcher, advocate, and fellow ginger John Hammond joins Tech Done Different to provide insights on how to think like both attackers and defenders, and how a technical person can become a good communicator of ideas.You'll learn:Why the defender only needs to be right onceWhy to know thy enemy, and how you have some control over the information the attacker can collectWhat a hacker really is, and why this distinction mattersWhat it means to "defend forward"Why it matters to teach, learn, repeatWhy the more things change in security the more we need to adhere to the fundamentals________________________________GuestJohn HammondSenior Security Researcher at HuntressOn Linkedin | https://linkedin.com/in/johnhammond010On Twitter | https://twitter.com/_johnhammondOn YouTube | https://www.youtube.com/channel/UCVeW9qkBjo3zosnqUbG7CFw________________________________HostTed HarringtonOn ITSPmagazine
As the Director of Security Initiatives for Intel's Security Center of Excellence, Camille Morhardt gets to learn from some of the brightest minds in all of tech. As the co-host of one of the biggest public podcasts in the game today Cyber security Inside, she brings those bright minds to the audience. She joins TDD to teach us how to communicate complex ideas simply.You'll learn:why good questions are the key to communicating simplywhy to not let go of a line of questioning until you fully understand (and then keep asking more)how an unusually long pause can lead to the insights you're looking forhow to get to the heart of the matterthe 3 phase process for success in security: 1) get started 2) don't stop learning and 3) gain insights from outside of your sphere________________________________GuestCamille MorhardtDirector, Security Initiatives and Communications, Intel and Co-Host of Cyber Security Inside PodcastOn Linkedin | https://www.linkedin.com/in/camille-morhardt-448a182/On Twitter | https://twitter.com/morhardt________________________________HostTed HarringtonOn ITSPmagazine
Helen Patton joins Tech Done Different to provide insights from her new book and explain the Cybersecurity Canon, a collection of books to help security professionals.As an advisory CISO and published author, Helen Patton advocates for how to get people into the security industry, and how to navigate a career in the field. She joins Tech Done Different to provide insights from her new book and explain the Cybersecurity Canon, a collection of books to help security professionals.You'll learn:why writing a book enables you to "mentor at scale"why we should hire based on potential, not demonstrated experiencewhy recruiting for security should include going to middle and high schoolswhy self care is so important in a security careerwhy you need to understand your "why"why security is a business enabler________________________________GuestHelen PattonOn Linkedin | https://www.linkedin.com/in/helenpatton/On Twitter | https://twitter.com/CisoHelen________________________________HostTed HarringtonOn ITSPmagazine
Ted Harrington is the #1 best-selling Author of Hackable: How to do Application Security Right. He is also the Executive Partner at Independent Security Evaluators, a company of ethical hackers famous for hacking cars, medical devices, web applications, and password managers. Ted has helped hundreds of companies — including Google, Amazon, and Netflix — fix security vulnerabilities. He also hosts the Tech Done Different podcast. In addition to this, Ted is a professional keynote speaker and the Co-founder of IoT Village, a traveling hacking event series. Previously, he was the Chief Executive Officer at NMG Technologies and the Director at Wolfpack. In this episode… Hackers are evil people trying to destroy companies and wreak havoc on the world of privacy and security. Right? Not necessarily. The word hacking and the term hacker have become grossly abused. Hackers are neither good nor bad — they are simply problem solvers. They see a system and say, “It's supposed to do one thing. Can it do this other thing instead?” As Ted Harrington explains, the differentiating factor is the hacker's motivation: are they after personal gain or trying to harm an organization? Those are attackers. On the other hand, ethical hackers find vulnerabilities in order to fix them and make the technology stronger. By identifying all the holes in your security perimeter, a team of ethical hackers can show you how to make your defense almost impenetrable. In this episode of She Said Privacy/He Said Security, Jodi and Justin Daniels sit down with Ted Harrington, Executive Partner at Independent Security Evaluators, to discuss how ethical hackers can improve your company's cybersecurity. Ted talks about why many companies' security is lagging behind technology developments, the benefits of ethical hacking, and his tips for keeping your passwords secure.
Ted Harrington is the #1 best selling author of HACKABLE: How to Do Application Security Right, and the Executive Partner at Independent Security Evaluators (ISE), the company of ethical hackers famous for hacking cars, medical devices, web applications, and password managers. He's helped hundreds of companies fix tens of thousands of security vulnerabilities, including Google, Amazon, and Netflix. Ted has been featured in more than 100 media outlets, including The Wall Street Journal, Financial Times, and Forbes. His team founded and organizes IoT Village, an event whose hacking contest is a three-time DEF CON Black Badge winner. He hosts the Tech Done Different podcast. To get help with security consulting and security assessments, or to book Ted to keynote your next event, visit https://www.tedharrington.com. Using a modifier with a password How to think like an attacker A hacker is a problem solver - the intent is what matters. My job is to think the bad thoughts and ask the hard questions How to hack a bar waiting line. Determine what the rules of the game are The people who really succeed are the people who see the way the world could be. It's really about independent thinking. Constraints provide opportunity for us to do better. How to teach people to be better Give kids opportunities to explore their creativity. Most humans are inherently wired to do good and make good choices. Be Better - the two words that define security Start from the foundation that all people are good. Automation of hacking techniques and if it's too easy to be bad, people will do that. The democratization of an elite skill Zeroday vulnerabilities marketplace Security research community. The Blockchain bandit. What do we do about zerodays? We have to accept that they exist, and then we have to go find them.