Think Like a Hacker.

Secure Your Brand.

Research-based application security keynotes.

Ted empowers technology leaders to defend against modern attackers.

It starts with changing your mindset:

  1. Are you seeking to learn where your vulnerabilities lie and how to fix them, or merely interested in maintaining a “clean bill of health?”

  2. Are you uncertain whether your investments in security are producing the results you desire?

  3. Are you thinking the way the attacker is thinking?

"THE BEST ONE HOUR PRESENTATION ON TECHNOLOGY I'VE EVER SEEN"

- Attendee, CSX North America

Ted leads a team of ethical hackers, who publish security research:

Cars
Medical Devices
Phones
Password
Managers
Blockchain
IoT

Watch Ted & team hack a medical device 

Screen Shot 2019-03-23 at 6.34.21 AM.png

Ted and his company have served as trusted security advisors to some of the world’s foremost technology companies, including:

"Wins the prize, hands down."

- Wired Magazine

Ted’s keynotes empower leaders with a 

3-Stage Action Plan

GRASP

Define who you need to defend against, why those parties would be motivated to attack, how and where they would focus their energies, and what it takes to stay secure.

BREAK

Investigate your system for vulnerabilities just like your attackers will; go beyond merely understanding symptoms to instead understand root causes that cause your security vulnerabilities.

ADAPT

Keep pace with rapid changes to your threat scenario introduced by the ever-advancing adversary, ever-evolving attack landscape, and breakneck pace at which you evolve your technology.

"Security excellence"

- Google

the right approach delivers

PROFOUND OUTCOMES

Obtain SUPPORT from internal stakeholders

Build TRUST with customers and external stakeholders

Transform security from a technical challenge into a BUSINESS ADVANTAGE 

Think like a hacker.  Secure your brand.