Concept & Format
In this 1v1 conversational podcast, we interview people who have succeeded by thinking differently, so that leaders in technology and/or security can succeed, too. Our guests help the audience challenge conventional wisdom by sharing their own stories about how they went against the grain.
Tech Done Different is for leaders in technology and security, such as the CTO, CIO, CISO, VP Engineering, Head of Development, Security Architect, and more. It’s also for anyone else that simply wants to understand how successful people have won by thinking differently.
The audience is looking for insights on how to think differently and do differently. They want to learn from people who have succeeded.
Our guests include gold-medal winning Olympians, Las Vegas headliners, #1 best-selling authors, FBI profilers, ethical hackers, and execs from technology pioneers like Amazon, Netflix, Facebook and more
Are you already booked as a guest? If so, go here to prepare for your appearance.
Tech Done Different is proud to be part of the ITSP Magazine platform of podcasters, a content universe that has enormous reach, including:
Monthly social media impressions
Followers on social media
Average monthly podcast plays
Average monthly unique visitors
For more statistics, visit ITSP
About the Hosts
Ted Harrington is the #1 bestselling author of "Hackable", which led to his TED talk “Why You Need To Think Like a Hacker.” He’s the Executive Partner at ISE, the company of ethical hackers famous for hacking cars, medical devices, and web apps; he also co-founded START, software which simplifies vendor risk management. His clients include Google, Amazon, and Netflix, and he has been featured in more than 100 media outlets, including The Wall Street Journal, Financial Times, and Forbes. His team founded IoT Village, an event series whose hacking contest is a four-time DEF CON Black Badge winner
Ben Schmerler has been helping people manage cybersecurity risks for over a decade. His experience ranges from consulting clients on security risk management, to vulnerability testing, to security awareness and more. He now works with Independent Security Evaluators (ISE) as a Senior Solutions Consultant to guide clients along the assessment process by working with them to identify their needs so that true vulnerabilities are identified, assets are protected and ensure that their security strategy works.