Watch Now

Show Notes

In this episode of the Hacker Valley Studio podcast’s Hacker Valley Red series, this time featuring guest Ted Harrington.  Ted is an Executive Partner at ISE Security, an author, and a professional speaker. Hosts Ron and Chris speak with Ted about the concept of unhackability, his experience in the security field, an interesting story of an attack in real time, and more!

 

To start off the interview, Ted shares about his background.  He currently works for a consulting firm that focuses on ethical hacking and aims to help companies solve their security problems, and his interest in the work of hacking goes back to a car-hacking experience in which he and his colleagues were inspired by a claim of unhackability and disproved the claim.  Ted clarifies that there is effectively no such thing as an unhackable device or application, but that his work centers on closing attack vectors and making security systems stronger.  In fact, he wants his legacy in the field to center on making things better.  He shares about his own energy and motivation, and also explains the mindset of a hacker, which involves creativity and a certain way of thinking about and solving problems.

 

Ted has learned a great deal in his years in the hacking field, and Ron and Chris are eager to draw lessons out for listeners.  Ted explains misconceptions about the red side of security before providing an extended example of hacking in real time: an example of cryptocurrency wallets that involved Ted and his team happening upon a real thief at work.  Ted explains that people should not have a laissez-faire attitude about security, and that they should foster a right mindset and right partnerships.  He clarifies that he sees many breakers start as builders, explains the utility of thinking from the perspective of a buyer, and offers advice for listeners looking to enter the field.  This advice centers on mindset and hands-on activity; there are lots of opportunities to get involved with DEF CON, talks, contests, and even internships (including some at Ted’s company). 

 

1:50 - The episode features Ted Harrington; listeners are introduced to him and the episode ahead.

3:05 - The conversation begins with Ted’s background.

7:21 - The group considers the term “unhackable,” closing attack vectors, and breakers starting as builders.

14:02 - “Think like a hacker.”

20:02 - Ted explains some lessons from real-life work, focusing on a cryptocurrency wallet example.

25:13 - What should people learn and do?

30:38 - Where do Ted’s energy and motivation come from, and what is the most interesting part of his work?

34:32 - Ted offers advice and shares what he hopes his legacy in the field will be.

 

Links:

Connect with Ted on LinkedIn or email him at ted@ise.io

Learn about Ted’s book, Hackable

Learn more about Hacker Valley Studio

Support Hacker Valley Studio on Patreon

Follow Hacker Valley Studio on Twitter

Follow Ronald Eddings on Twitter

Follow Chris Cochran on Twitter

Learn more about the season sponsor, RiskIQ

Recent Episodes

Jan 10, 2025

The Year of the Agent: AI, Bug Bounties, and Cybersecurity ...

How will AI redefine cybersecurity in 2025? According to Marco Figueroa, Program Manager for Gen AI at the ODIN Bug Bounty Program, this year is set to be the "Year of the Agent," where AI ...

Jan 7, 2025

Understanding the Psychology of Cyber Risk with David Shipley

Most people think cybersecurity training is about knowledge, but what if motivation is the real key to success? David Shipley, CEO and Field CISO at Beauceron Security, shares how psychology and ...

Dec 24, 2024

From Landscaping to Cyber Leadership with Cole Lisko

How does a scorching July day in a van with no air conditioning lead to a career at one of the world’s top cybersecurity companies? In this episode, Cole Lisko shares his journey from ...

Dec 17, 2024

Think Like a Hacker, Solve Like a Leader featuring Ted Harrington

What if the key to innovation is breaking the rules? Ted Harrington, Executive Partner at Independent Security Evaluators and a pioneering ethical hacker, explores the power of commitment, ...

Dec 12, 2024

Hacking Trust with AI and Deepfakes featuring Iain Jackson

What happens when cutting-edge AI meets the art of deception? In this episode, Iain Jackson, Academy Hive Leader at CovertSwarm, takes us through the uncanny potential and risks of synthetic ...

Dec 3, 2024

Championing the Human in Cybersecurity with Julie Haney

What happens when cybersecurity puts people first? Julie Haney, Human-Centered Cybersecurity Program Lead at NIST, shares how designing security with humans at the center leads to greater ...

Nov 26, 2024

Do You Deserve To Be Hacked? Featuring Ilan Fehler and Dahvid ...

Do you deserve to be hacked? With that bold tagline, CovertSwarm is pushing leaders to rethink how they test and defend their systems, and in this episode, they’re sharing firsthand how ...

Nov 20, 2024

Transforming SOC Operations with AI featuring Roy Halevi

Cybersecurity is evolving fast, and AI is at the center. Roy Halevi, Co-Founder and CTO of Intezer, explains how AI automates SOC operations, improving speed and accuracy while freeing up teams ...

Nov 12, 2024

From Shadow IT to Full Asset Visibility with Wes Wright

Can you truly protect what you can't see? Wes Wright, Chief Healthcare Officer at Ordr, joins Ron to share how organizations can shine a light on their network and asset blind spots and take ...

Nov 6, 2024

Building Opportunities for Women and Minorities in Cybersecurity ...

How do you create waves of change in an industry? Connie Matthews, Founder and CEO of ReynCon, speaks with Ron about the power of resilience, mentorship, and taking that first bold step in ...

WORK WITH US

PODCASTS + SPEAKING + EVENTS

Are you the best kept secret in cybersecurity? Let's change that by partnering together for podcast ads, social campaigns, and your next event or keynote. Send us your details to get started.