Ted empowers technology leaders to defend against modern attackers.
It starts with changing your mindset:
Are you seeking to learn where your vulnerabilities lie and how to fix them, or merely interested in maintaining a “clean bill of health?”
Are you uncertain whether your investments in security are producing the results you desire?
Are you thinking the way the attacker is thinking?
"THE BEST ONE HOUR PRESENTATION ON TECHNOLOGY I'VE EVER SEEN"
- Attendee, CSX North America
"Wins the prize, hands down."
- Wired Magazine
Ted’s keynotes empower leaders with a
3-Stage Action Plan
Define who you need to defend against, why those parties would be motivated to attack, how and where they would focus their energies, and what it takes to stay secure.
Investigate your system for vulnerabilities just like your attackers will; go beyond merely understanding symptoms to instead understand root causes that cause your security vulnerabilities.
Keep pace with rapid changes to your threat scenario introduced by the ever-advancing adversary, ever-evolving attack landscape, and breakneck pace at which you evolve your technology.