I take your audience into the world of ethical hacking. I help them experience the wild, unexpected, often shocking stories of both companies who got security right, and those who didn't.
​
I then extract the key insights from those stories, translating them into advice your audience can go implement. (Much of which, I cover in my #1 bestselling book Hackable).
​
Your audience will learn exactly what to do, why to do it, and how.

Programs


My programs fall into 3 main categories:

Futurism

Hacking

Mindset
Additional topics inlcude applying insights from ethical hacking to:
-
Artificial Intelligence (AI)
-
Machine Learning (ML)
-
Cloud
-
Third Party Risk & Vendor Risk Management (TPRM/VRM)
-
Bring Your Own Device (BYOD)
-
Leadership
-
Personal Growth
-
Remote Work/Work From Home
-
Cryptocurrency
-
Blockchain
-
Smart Contracts
Need something else? Hit me up!
Hacking the Future
With most new breakthroughs in technology there are also people looking to exploit that new technology. What exciting new opportunities will new tech make possible? Will artificial intelligence develop to a point where we can’t defend against it? How do we better secure our brands and companies as AI becomes more powerful?
In this forward-looking program, you’ll get to explore these important issues (and more), from the viewpoint of a hacker.
You’ll learn a 3-step process to help you anticipate and prepare for the inevitable changes that are coming . Delivered by Ted Harrington, #1 bestselling author and leader of ethical hackers, you’ll learn how to think differently about not just the future -- but also the present moment.

Best for:
Leaders
People who:
-
Primary responsibility is leading, which may or may not be in tech
-
Have titles such as: CEO, CTO, CIO, VP Engineering, Lead Developer, etc


Best for:
Security Professionals
People who:
-
Primary job function is security (or adjacent)
-
Have titles such as: CISO, Security Architect, Security Analyst, Compliance, Governance, Audit, etc
The Hackable Method
This talk addresses the seemingly overwhelming collection of security concerns with which today’s security and tech professionals contend:
-
Is security a critical need for your organization, and one which you want to make sure you're doing right?
-
Are you struggling to understanding how hackers think, how they operate, how they break systems, and how to keep pace as they evolve?
-
Do you need to know how to defend accordingly?
-
Are you uncertain about whether your security investments are, in fact, actually making you any more secure?
-
Do you have the appetite and capacity for change?
​
If any of this describes you, this is the keynote for you! An engaging blend of research-based issue analysis combined with storytelling, this keynote seeks to show you with how to:
-
Implement a proven security method, based on years of practical experience in security research and security consulting, designed to help equip leaders like you deal with modern attackers
-
Define and implement a threat model
-
Differentiate between assessment methods
-
Understand level of attacker intensity
-
Challenge conventional wisdom

Why You Need to Think Like a Hacker
Maybe you're stuck. Maybe you are facing setbacks. Maybe you're just looking for a new way to achieve your goals.
How can you find new pathways to achieve your goals?
​
In this program, you'll learn:
-
The key mindset traits that most hackers have
-
How to apply those traits to your own life
-
How you'll unlock new pathways to achieve your goals
​
​

Best for:
General Audience
People who:
-
Primary job function has nothing to do with security or even tech
-
Have titles such as: literally anything. This talk is for everyone!
