Presented by the elite organization of white hat hackers most widely known for being first to break the iPhone, this session will analyze the anatomies of real world attacks against high profile systems, ranging from the well known Target breach, to Texas Instruments RFID, to Apple products, and more. It will extract lessons from these attack anatomies to provide a framework to account for these modern attackers, articulate industry context, and supply attendees with key takeaways, including immediately actionable guidance.
- Discipline Division: Security Separated from Functionality.
- Perspective Matters: White Box vs. Black Box.
- Defense Priorities: Secure Assets, not Just Perimeters.
- Timing Security: Build It In, Not Bolt It On; Procedural Duration: Security as an Ongoing Process.
About Ted Harrington
Ted Harrington drives thought leadership initiatives for Independent Security Evaluators, the elite organization of security researchers and consultants widely known for being the first company to hack the iPhone. Harrington was recently named 40 Under 40, where he was both one of the youngest inductees in the class as well as the only honoree from the field of information security. He is one of the lead organizers of SOHOpelessly Broken, the first-ever router hacking contest at esteemed security conference DEF CON and one of the lead organizers of the popular new hacking event concept IoT Village at DEF CON. He holds a bachelor’s degree from Georgetown University.