Hacker Valley Red Episode 5 - Ted Harrington

Hacker Valley Red Episode 5 - Ted Harrington

In this episode of the Hacker Valley Studio podcast’s Hacker Valley Red series, this time featuring guest Ted Harrington. Ted is an Executive Partner at ISE Security, an author, and a professional speaker. Hosts Ron and Chris speak with Ted about the concept of unhackability, his experience in the security field, an interesting story of an attack in real time, and more!

To start off the interview, Ted shares about his background. He currently works for a consulting firm that focuses on ethical hacking and aims to help companies solve their security problems, and his interest in the work of hacking goes back to a car-hacking experience in which he and his colleagues were inspired by a claim of unhackability and disproved the claim. Ted clarifies that there is effectively no such thing as an unhackable device or application, but that his work centers on closing attack vectors and making security systems stronger. In fact, he wants his legacy in the field to center on making things better. He shares about his own energy and motivation, and also explains the mindset of a hacker, which involves creativity and a certain way of thinking about and solving problems.

Ted has learned a great deal in his years in the hacking field, and Ron and Chris are eager to draw lessons out for listeners. Ted explains misconceptions about the red side of security before providing an extended example of hacking in real time: an example of cryptocurrency wallets that involved Ted and his team happening upon a real thief at work. Ted explains that people should not have a laissez-faire attitude about security, and that they should foster a right mindset and right partnerships. He clarifies that he sees many breakers start as builders, explains the utility of thinking from the perspective of a buyer, and offers advice for listeners looking to enter the field. This advice centers on mindset and hands-on activity; there are lots of opportunities to get involved with DEF CON, talks, contests, and even internships (including some at Ted’s company).

1:50 - The episode features Ted Harrington; listeners are introduced to him and the episode ahead.

3:05 - The conversation begins with Ted’s background.

7:21 - The group considers the term “unhackable,” closing attack vectors, and breakers starting as builders.

14:02 - “Think like a hacker.”

20:02 - Ted explains some lessons from real-life work, focusing on a cryptocurrency wallet example.

25:13 - What should people learn and do?

30:38 - Where do Ted’s energy and motivation come from, and what is the most interesting part of his work?

34:32 - Ted offers advice and shares what he hopes his legacy in the field will be.

Links:

Connect with Ted on LinkedIn or email him at ted@ise.io

Learn about Ted’s book, Hackable

Learn more about Hacker Valley Studio

Support Hacker Valley Studio on Patreon

Follow Hacker Valley Studio on Twitter

Follow Ronald Eddings on Twitter

Follow Chris Cochran on Twitter

Learn more about the season sponsor, RiskIQ

Jaksot(417)

Episode 9 - The Intelligence Easy Button

Episode 9 - The Intelligence Easy Button

In this Episode, Ron and Napoleon put Chris in the hot seat and reviewed his EASY framework for making an impact in threat intelligence.   - Elicit Requirements - Assess Collection - Plan Strive for I...

7 Heinä 201919min

Episode 8 - Serverless Threat Intel Bot

Episode 8 - Serverless Threat Intel Bot

New Member Alert 🚨! Napoleon Bing joins forces with Chris and Ron and present a Serverless Threat Intel Bot. As organizations mature and scale their security infrastructure, it's vital that analysts,...

7 Heinä 201913min

Episode 7 - Layer 8 - Vulnerability And Diversity

Episode 7 - Layer 8 - Vulnerability And Diversity

How important is being vulnerable in life and in your career? In Episode 7, our guest of honor - Charles Nwatu (https://www.linkedin.com/in/cnwatu/) joins Ron and Chris in starting the conversation ab...

7 Heinä 201944min

Episode 6 - MITRE ATT&CK™ Matrix Overview

Episode 6 - MITRE ATT&CK™ Matrix Overview

In this episode, Chris Cochran and Ronald Eddings review the MITRE ATTACK Matrix and discuss related threat actors, TTPs, Threat Intelligence, and vendor evaluations.

7 Heinä 201921min

Episode 5 - What legacy do you want to leave

Episode 5 - What legacy do you want to leave

In this episode, Chris presents a deep question to Ron during a live recording. What legacy do you want to leave? This can have many meanings for people. Do you want to leave a legacy with your family...

7 Heinä 201917min

Episode 4 - Layer 8 Fitness, Diet, Focus

Episode 4 - Layer 8 Fitness, Diet, Focus

In this Episode, Scott Behrens (https://twitter.com/helloarbit) join us to discuss optimizing diet, fitness, and focus for performance. These three pillars ensure exceptional performance on and off th...

22 Kesä 201942min

Episode 3 - All Things Threat Intelligence

Episode 3 - All Things Threat Intelligence

In this episode Ron and Chris do a function deep dive on threat intelligence. They discuss everything from training and processes to sharing across communities. As always leave a comment on what you w...

22 Kesä 201927min

Episode 2 - Layer 8 Level Up Career, Life, and Self

Episode 2 - Layer 8 Level Up Career, Life, and Self

In this video Ronald Eddings and Chris Cochran discuss Layer 8 - The Human Element. It's vital to onboard and promote productivity, positivity, and creativity to Security Practitioners. Ron and Chris ...

22 Kesä 201916min

Suosittua kategoriassa Koulutus

rss-murhan-anatomia
voi-hyvin-meditaatiot-2
rss-narsisti
adhd-podi
psykopodiaa-podcast
rss-rahamania
rss-uskonto-on-tylsaa
rss-valo-minussa-2
mielipaivakirja
rss-vapaudu-voimaasi
rss-niinku-asia-on
rss-duodecim-lehti
rahapuhetta
ilona-rauhala
aamukahvilla
aloita-meditaatio
kesken
dear-ladies
rss-eron-alkemiaa
rss-arkea-ja-aurinkoa-podcast-espanjasta